Embracing technology with good governance

Protect the Data in the Cloud Castle

When it comes to your data in the cloud, thieves or snoops do not pride themselves on the ability to break into or access a server; they pride themselves on the information they are able to get from that server: your data ... READ MORE

Released by Corporate Compliance Insights - August 2013

Most Organisations are Woefully Behind in Application Security

When it comes to locking down enterprise infrastructure, the application layer is responsible for more than 90% of all security vulnerabilities, yet more than 80% of IT security spending continues to be at the network and endpoint layer, new research has found ... READ MORE

Released Infosecurity Magazine - August 2013

10 Minutes on the Stark Realities of Cybersecurity

Cybersecurity is more than an IT challenge it's a business imperative. Our research with business leaders has revealed that cybersecurity is a growing concern. However, many CEOs and boards have yet to truly appreciate the seriousness and magnitude of this critical business issue ... READ MORE

Released by PwC NZ - April 2013

Seven Components of an Effective Social Media Risk Compliance Program

Social media can take many forms, including, but not limited to, micro-blogging sites ( e.g., Facebook, Google Plus, MySpace, and Twitter); forums, blogs, customer review sites and bulletin boards ( e.g., Yelp); photo and video sites ( e.g., Flickr and YouTube); sites that enable professional networking ( e.g., LinkedIn); virtual worlds ( e.g., Second Life); and social games ( e.g., FarmVille and CityVille). As companies use these and other sites to develop and expand a social media presence, however, that activity has the potential to impact a company's risk profile ... READ MORE

Released by Corporate Compliance Insights - June 2013

White Paper on Mobile Device Security

Organisations should use remote wipe and apply encryption to mobile phones in addition to normal security measures. Alan Calder explains what can be done to mitigate the risk of losing your personal or corporate data ... READ MORE

Released by IT Governance UK - 2013