Almost everyone has been on the receiving end of a request to provide photo identification (most commonly a drivers’ licence or a passport) when applying for a bank account, or purchasing a new mobile phone, or some similar account-based transaction. The person making the request typically either writes down the details of the document or photocopies it. But there is one piece of information that should not be captured unless there is a legitimate reason to – the unique identifier.
Category: Information Security
Risky Business
Axenic wins iSANZ Best Security Project / Initiative award
Who can afford an attack on their Critical Infrastructure?
The world does not suffer from a shortage of hostile individuals or nations, from politically motivated parties, groups and nations, to ideologically motivated individuals and profit-motivated criminals. Information security attacks remain on the top of the list for being a global extensible war tool.
Compliance, a way to provide clients with the assurance that you can safeguard their information
Perform a search on compliance and you will find that there are many definitions. People have a slightly different view of what compliance means and what is included or not. In general, compliance means conforming, satisfying or adhering to a rule. This rule can be a specification, a policy, a standard, a law, a procedure or a requirement.
Information Security & Privacy as part of Project Management
A typical Project Management methodology doesn’t include details about ensuring confidentiality, integrity and availability of information or the privacy of personal information. Experience has shown that too often the information security or privacy subject matter experts are not consulted about the project until the test phase, or even worse when the project needs to be signed off or is about to go live.