Barrington Group Australia > Resources > Blog

  •  

    Barringtons Blog



The Top 5 Cyber Threats For 2020

The demand for cyber security expertise is at an all-time high

Laura Eyles 0 3

Cyber security, or the lack of it, has gone mainstream. A day doesn’t seem to go by where the general public doesn’t hear of some new data breach, ransomware attack, company network compromise, or state-sponsored cyber-attack. Meanwhile, consumers have also become intimately aware of how their own personal data privacy contributes to their own security (thanks Facebook). As a result, it’s no surprise that the demand for cyber security expertise is at an all-time high.

What Smart Cities Can Teach Us About Smart Businesses

The rapid growth of smart city concepts and the innovation of technologies to operate them present the security industry with opportunities

Laura Eyles 0 18

Dubai is on a mission. It wants to become the world’s smartest city by 2021 and has more than 545 initiatives in the works to fundamentally change the way people experience the city. And Dubai is not alone. Cities around the world want to provide residents and visitors with greater access and connections via technology as more people begin to migrate to urban areas.

The Importance Of Bridging The Gap Between Physical And Cybersecurity

Risk is a common language between all sorts of security-esque organisations

Laura Eyles 0 28

Traditionally, there has been a gap between cyber and physical security personnel in organisations. Physical security measures were already in place when computers and networks were first invented, eventually spawning the IT and cybersecurity fields. 

 

Data Breaches And Managing The Risks

Names, telephone numbers, email addresses and cities where clients were registered were revealed

Laura Eyles 0 96

UniCredit has revealed a data breach resulting in the leak of information belonging to three million customers. The Italian bank and financial services organisation said that a compromised file, generated in 2015, is the source of the security incident.

RSS
12345678910Last

Categories