Articles

Medicare has admitted that customer data, including medical claims information, is included in 200GB of data that has been obtained by a hacker. In a statement to the Australian Stock Exchange, Medibank said it had been contacted by a criminal who provided a sample of records for 100 customer policies.

A study into the Future of Data Architecture study has revealed major discrepancies in how data architecture and management is viewed across organizations – with central data and analytics teams generally satisfied with the future viability of their data landscapes, but business users unconvinced that existing architecture is modern enough to meet constantly evolving business needs.

Cybersecurity threats are becoming more challenging for businesses. According to PurpleSec’s Cyber Security Trend Report in 2021, cybercrime surged by 600% during the pandemic, increasing the costs incurred by cybercrimes at an astonishing rate. An effective cyber risk management program is indispensable to protecting your organization against cyberattacks. A risk management strategy should include using risk quantification methodologies to measure cyber risk and understand the potential financial impact.

In the past three weeks, three cyber attacks resulted in identity leaks that have sent ripples around Australia. Has the triple-A of cyber security (Authentication, Authorisation and Accounting) failed? 

One result of the widespread enterprise adoption of Microsoft 365 is the need to move users from one instance of the suite to a new or different instance: a tenant-to-tenant (T2T) migration. These are high-stakes projects, and downtime during the migration or an incomplete migration can seriously impact the business. On the plus side, organisations are finding that an advanced third-party migration tool will mitigate the business risk.

Pages