Creating a culture of excellence using best practice

Get the latest ALC news on Facebook
 
 

Blog

New Zealand Information Security Training Calendar 2016


1.   Foundation Certificate in Information Security (FCIS™)  Wellington 24-25 May 2016             Auckland 26-27 May 2016 This “flagship” course is the ideal foundation for anyone who needs a good base knowledge of information security as part of their current or future role. Based upon international standards and industry best practice, the […]

Executives have wrong perception of cyber threats, survey finds


As the business world shifts and evolves at breakneck pace, organisations are constantly facing new sources of risk. Whether it’s corruption, fraud or other forms of corporate crime such as cyber attacks, the board in particular needs to develop strategies to combat these emerging threats. Cybercrime is one of the fastest growing risks to businesses […]

While cyber security threats are rising, many organisations are investing more in IT security training for staff, Dell found.

Dell highlights the high costs of IT security breaches


A recent survey from computing giant Dell has demonstrated the skyrocketing financial costs of IT security breaches – and pointed out that many organisations still aren’t doing enough to protect themselves from this threat. Earlier this year, Dell surveyed more than 1,400 IT decision makers around the world – including 60 in Australia – from organisations […]

Big data driving a big push towards security


One of the most revolutionary trends to hit the IT sphere in recent times, big data is radically transforming the way organisations are handling their information. The use of powerful analytics tools simply means that no data set is too large, and the ability to quickly and accurately extract meaningful insights from large reams of […]

Understanding evolving cybersecurity threats


Organisations need to take the initiative and defend themselves against the full scope of modern cybersecurity threats, or risk malicious parties having a direct impact on their business and reputation. That’s the message of high-ranking US cybersecurity expert Michael S. Rogers, who recently sat down with Trish Regan of Bloomberg Television to address the evolving […]

The 5 key principles of COBIT 5


ISACA’s information technology management framework Control Objectives for Information and Related Technology (COBIT) is widely regarded as the global standard when it comes to leading and governing enterprise IT. Since its initial introduction in 1996, COBIT has gone through a number of iterations and releases. However, the current volume, COBIT 5, is an essential tool for […]

3 reasons why your IT department may not be delivering true business value


Over the past few decades, technology has become a critical component to business success. No company can survive, let alone thrive, without making good use of the technology solutions and tools available to them. Despite this, many organisations are still struggling to achieve maximum business value from their IT specialists. With that in mind, here are three […]

Gartner: Digital workplace will bring new security implications


The modern workplace is evolving rapidly, with more businesses moving towards a ‘consumersation’ of internal IT in order to cater to an increasingly tech-savvy workforce. In fact, a new report from Gartner – entitled Prepare for the Security Implications of the Digital Workplace – predicts that 25 per cent of large businesses will have implemented a strategy […]

Is your business ready to handle a cyberattack?


Everyone involved in the operation of a business, from general management through to IT, needs to ensure that security is at the top of the priority list. Companies are starting to adopt new technologies now more than ever before, investing in both onsite applications and cloud-based storage systems. However, regardless of the type of IT […]

Cybersecurity a top priority for 2015


Across the globe, businesses and consumers are placing increasing amounts of sensitive data on computing platforms, whether on local storage or in virtual alternatives hosted in the cloud. By not focusing on security, the results of cyber data storage could be disastrous. IT security risks have been detailed in a new survey from Protiviti and North […]