Enterprise Content Management

Cybersecurity threats are becoming more challenging for businesses. According to PurpleSec’s Cyber Security Trend Report in 2021, cybercrime surged by 600% during the pandemic, increasing the costs incurred by cybercrimes at an astonishing rate. An effective cyber risk management program is indispensable to protecting your organization against cyberattacks. A risk management strategy should include using risk quantification methodologies to measure cyber risk and understand the potential financial impact.

More data has traditionally meant more problems. An increase in data can result in problems such as ransomware, disasters, or data loss of any kind. Data Protector standardizes and consolidates backups across multiple platforms. It provides secure, comprehensive backup protection for business-critical data and applications whether virtual, physical, or online in the cloud.

The latest release of Komprise Intelligent Data Management introduces self-service features for line of business (LOB) IT, analytics and research teams. Now, central IT can authorize departmental end users to interactively monitor usage metrics, data trends, tag and search data and identify datasets for analytics, tiering and deletion.

Imperva has new data that shows cyberattacks against Australia in 2022 has grown in both frequency and severity at a rate that outpaces the global average.

In the past three weeks, three cyber attacks resulted in identity leaks that have sent ripples around Australia. Has the triple-A of cyber security (Authentication, Authorisation and Accounting) failed? 

Medicare has admitted that customer data, including medical claims information, is included in 200GB of data that has been obtained by a hacker. In a statement to the Australian Stock Exchange, Medibank said it had been contacted by a criminal who provided a sample of records for 100 customer policies.

Not all MFA solutions are the same, with recent studies demonstrating simple ways to subvert more common methods which are used to lodge cyber-attacks. Furthermore, people also prefer different MFA options depending on their needs and level of tech savviness. So what are the options currently available, their pros and cons, and who are they suited for?

The application formerly known as SharePoint Syntex has been rebranded as Microsoft Syntex and now offers a new set of AI capabilities to automate content creation, indexing, and discovery. Syntex offers backup, archiving, analytics and management tools for documents as well as a viewer to add annotations and redactions to files.

Micro Focus has released the findings of the 2022 Digital Challenges in the Public Sector study, created in partnership with Omdia, which examines the common technology trends facing the Australian public sector. While it was revealed technology investment is increasing across Australia, with more than 50 per cent of respondents anticipating an IT spending rise during the next 18 months, the public sector is facing a perfect storm driven by skills shortages, increased demand, and capabilities of legacy systems. 

One result of the widespread enterprise adoption of Microsoft 365 is the need to move users from one instance of the suite to a new or different instance: a tenant-to-tenant (T2T) migration. These are high-stakes projects, and downtime during the migration or an incomplete migration can seriously impact the business. On the plus side, organisations are finding that an advanced third-party migration tool will mitigate the business risk.

Pages