Much ado about SOCMINT!

| | 'friend', Apple, celeb, Hack, ICloud, Password, Phishing, SOCMINT
You may not have heard of the term SOCMINT which emerged a couple of years ago as the abbreviation for Social Media Intelligence. What has this to do with Apple iCloud and Celebrities?  Well if you are to believe Apple this is what was used to hack into celebrity iCloud ... Read More

For your eye’s only

| | Apple, celeb, Cloud, private, scandal, stole
“Celebs in nude photo scandal’ make it to the top of our news feed today and who’s clicking on the link. I have to say for 1 ‘not me’. I’m sure Jennifer Lawrence has a lovely figure but I don’t need to see it and the photos were never intended ... Read More

To click or not to click…………

We recently assisted one of our clients during an information security incident, a server monitoring system had picked up unusual file access activity on one of their network file stores, upon further investigation they discovered that a piece of malware was encrypting files on a user’s network share.By the time ... Read More
Is my real estate agent allowed to take photos in my house?

What is Privacy? OAIC are showing us the way.

When looking for a new home we like to see photos of what the house looks like but for a tenant/home owner are there any rules that govern what photos the real estate agent takes and is there anything you can do if you are unhappy about the photos they have ... Read More

Nice filesystem you’ve got there…

"Nice filesystem you've got there.  Be a shame if anything... happened to it.  Know what I mean?"It's a stock phrase used by thugs in extortion rackets in countless movies, TV shows, and video games.  It's also exactly the threat that Cryptolocker presents.  Cryptolocker is malware that when activated will encrypt ... Read More

Privacy Awareness Week Day 5: Managing a Breach or Complaint

Business standpoint:The OAIC has not yet enforced the requirement for businesses to disclose a breach, however they do provide considerable support if you do fall victim to a breach that compromises personal information. You can find further information in this Guide to handling personal information security breaches.Reporting a breach does not preclude ... Read More

Privacy Awareness Week Day 4: Business Obligations: What should I be doing to protect personal information?

Before we can talk about protecting personal information, the first question you must ask is “What personal information do we process throughout the organisation?”Do you understand:a) How you collate personal information and when?b) Why you collect personal information?c) What sort of information do you collect?d) Who handles it?e) Where does it go?Once you have an ... Read More
Privacy Awareness Week Day 3: What you can do to protect your privacy when using mobile phones

Privacy Awareness Week Day 3: What you can do to protect your privacy when using mobile phones

We have to remember that mobiles aren't just phones anymore! They store a significant amount of data to make life easier for us, but we must ensure that we don’t make it an easy target for thieves or hackers!  So…what can we do to protect our personal information on our ‘smart’ phones?1 - ... Read More
web banner with border

Privacy Awareness Week Day 2: Protect your privacy online

According to the OAIC 74% of Australians are more concerned about their online privacy than they were five years ago. So what can you do about it?How often do you check your privacy settings?Social media sites frequently update their settings and this may occur without your knowledge.  These changes will ... Read More
web banner with border

Privacy Awareness Week, Day 1: What is privacy and changes to the Act

 This week (5th -10th May) is Privacy Awareness Week (PAW) and CQR has partnered with the Office of the Australian Information Commissioner (OAIC) to help promote Privacy Awareness amongst the community.So what is Privacy?Privacy is about the protection of an individual’s personal information.  We are all responsible for protecting our ... Read More
Loading...