Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Stories by Hamish Barwick

Google+

Privacy Principles awareness high but companies seek guidance: IDC

By Hamish Barwick | 12 August, 2014 13:15

Over 80 per cent of 150 companies surveyed by IDC Australia were aware of the Australian Privacy Principles (APPs) changes but 72 per cent of those said that they sought third party guidance on data management, according to a new whitepaper.

ASG signs contract with Australian Maritime Safety Authority

By Hamish Barwick | 11 August, 2014 09:51

ASG Group (ASX: ASZ) has signed a five-year ICT services contract with the Australian Maritime Safety Authority (AMSA) for an undisclosed sum.

Russian hack could see end of usernames and passwords: industry

By Hamish Barwick | 07 August, 2014 16:09

The implications of a 1.2 billion username and password hack performed by a Russian group could spell the end of the standard username and password combination, say information security experts.

Virtualization helps I-MED Network reduce data centre footprint

By Hamish Barwick | 07 August, 2014 12:19

A virtualization offering has helped medical diagnostics imaging firm I-MED Network reduce three data centres down to two in June this year, leading to cost and energy savings.

UPDATED: Phishing website impersonates auspost.com.au

By Hamish Barwick | 06 August, 2014 09:54

Australia Post is warning customers to steer clear of a phishing website that has been designed to look like its homepage.

5 years on, Windows Event Viewer scam still operating

By Hamish Barwick | 05 August, 2014 09:58

A cold calling scam called Windows Event Viewer or `eventvwr’ is still targeting Australians, five years on from Computerworld Australia’s 2009 investigation.

Aus Post warns customers not to open scam email

By Hamish Barwick | 04 August, 2014 11:09

Australia Post has warned customers not to open a scam email that claims a courier could not deliver a parcel to their address.

How to recognise the cyber insider threat

By Hamish Barwick | 01 August, 2014 10:42

Losing business to a competitor because one of your trusted employees has walked out the door with sensitive information doesn’t need to happen if you look for the signs and put controls in place, according to a panel of cyber security experts.

Countdown begins for switch from debit/credit card signature to PIN

By Hamish Barwick | 30 July, 2014 11:56

Banks are reminding consumers that they will no longer be able to sign when they make purchases on their debit and credit cards in Australia from 1 August 2014. Instead, people will need to use a PIN – part of a move to decrease card fraud in Australia.

ACMA signs online child abuse notification scheme with police

By Hamish Barwick | 29 July, 2014 11:53

The Australian Communications and Media Authority (ACMA) has signed formal agreements with state, territory and federal police for the reporting of online child abuse material in Australia.

More than 6k Australians duped by Koler Android ransomware: report

By Hamish Barwick | 29 July, 2014 10:35

Android ransomware, which displays a message that claims to be from the Australian Federal Police (AFP) and other local law enforcement authorities, has affected 6,223 Australians since May 2014, according to research by Kaspersky Lab.

Rogue employees using photocopiers and email services to steal data

By Hamish Barwick | 28 July, 2014 14:24

Rogue staff members can use a mix of techniques to walk out the door with sensitive data, warns forensic investigator Nick Klein.

Changing times in the CSO suite

By Hamish Barwick | 24 July, 2014 12:19

The role of the CSO is continuing to evolve and becoming more distant from being a technologist as the IT C-suite becomes one with the business, says EMC CSO Dave Martin.

Barbarians are at the gates of Information Age: Juniper

By Hamish Barwick | 23 July, 2014 15:57

If we are not careful in the decisions or actions that we take online today, the Information Age may go the way of the Roman Empire, according to Juniper Networks senior director of product management Kevin Kennedy.

Rules of engagement needed for the Internet: RSA

By Hamish Barwick | 23 July, 2014 10:56

Cyber weapons will never be completely eliminated but bi-lateral agreements between countries about the use of these weapons could establish boundaries, according to RSA executive chairman Arthur W. Coveillo.