• Home
  • Services
    • Resilience & Continuity
      • Business Continuity Management
      • IT Disaster Recovery
      • Crisis Management
      • Emergency Management Planning
      • Workplace Health and Safety
      • Pandemic Response Planning
      • Risk Management
      • Strategy Development
      • Policy, Plan & Process Development
      • Testing & Exercising Services
      • Governance & Compliance
      • Outsourcing & Managed Services
      • Training Services
      • Training Courses
    • Info & Cyber Security Services
      • IT Security Management
      • Security Review & Assessment
      • Security Risk Management
      • Digital Information Security Policy
      • Vulnerability & Penetration Testing
      • Cyber Security Awareness Training
    • Data Management Services
      • Data Management Training & Awareness
      • Data Management Strategy
      • Data Management Documentation
      • Data Management Platforms & Tools
    • IT Services & Solutions
      • Solution Design & Implementation
      • IT Service Management
      • IT Process & Policy Development
      • IT Sourcing Strategy
      • Technology Refresh Development
      • ITIL Auditing
      • Cloud Risk Assessment
    • RPx BCP Software
    • MiRA Incident Response App
  • About Us
    • Meet The Team
    • Partners
    • FAQ
  • Clients
    • Testimonials
  • Resources
  • Blog
  • Contact
phone-icon
1300 BC PLAN
phone-icon
1300 BC PLAN
Skip to content

Category Archives: Information Security

Have Data Protection, Can Travel – IT Security without Borders

Information SecurityBy opscentreJune 21, 2016

IT Security perimeters no longer exists, now that mobile and cloud computing are so prevalent. The availability of files and information to employees in the office, on site, on the road or at home is high.

Will Buggy Releases Triumph Over Smart Mobile Architectures?

Information SecurityBy opscentreMay 24, 2016

Smart mobile has so far been largely a consumer-driven market. That has been good news for the business sector. It has reaped the benefits of the technological advances and better user experiences, with which vendors have sought to woo Jane and Joe Public.

Willie Sutton Logic and Cyber-Attacks

Information SecurityBy opscentreMay 19, 2016

Willie Sutton was the man who (according to a popular story) gave the definitive answer to the question “Why do you rob banks?” He said “Because that’s where the money is”.

Why BYOD Isn’t All Enterprise Security Gloom

Information SecurityBy opscentreMay 17, 2016

The economic arguments for bring your own device (BYOD) working are multiple. The first one is that if employees fund their own terminals (smartphones, tablets, portables), their employer does not have to.

Are Cyber-Security Skills Due to Nature or Nurture?

Information SecurityBy opscentreMay 13, 2016

Culture and language determine much of how we live, think and act. So does history. These factors could explain why the Netherlands has gained a reputation as a leading exporter of IT Cyber-Security.

Cyber Defence

The (Non) Strategy of Australian Government Cyber Defence

Information SecurityBy opscentreMay 3, 2016

The 2016 Defence Whitepaper from the Australian government is now available online. It discusses a broad range of defence topics, of which cyber defence is just one.

←1
2
…34567…
891011
12→
Go to Top
  • RSS Link
 
LINKS
  • Privacy
  • Disclaimer
  • Copyright
  • Spam Policy
 
  • Sitemap
  • Social Media
Contact
  • 1300 BC PLAN
  • [email protected]
  • Level 20, Tower 2 Darling Park,
    201 Sussex Street, Sydney NSW
    2000 Australia

Copyright © 2021 OpsCentre. All Rights Reserved