The past few years have been tough on businesses, having to navigate through an ever-changing landscape of imposed rules and restrictions and adapt to stay competitive in an ambiguous market. Every business had to manage an abrupt shift to remote working and evolve to meet employee expectations, all while experiencing extreme labour shortages (especially in IT and security), and an alarming uptick in cybercriminal activity.
Australia’s recent budget ushers in the nation’s ‘biggest ever’ cybersecurity spend, with $10bn pledged to see electronic spy agency Australian Signals Directory (ASD) double in size and ramp up its ability to launch offensive cyber operations. That’s great news for the IT industry, but the expansion is also likely to usher in a huge demand for cybersecurity jobs.
Data is quickly becoming a key driver for all business transformation endeavours across the globe given how much we use of it and how quickly we consume it. But this isn’t limited to data collected within an organisation, as vast volumes of data are being produced across the web and channelled into actionable insights by businesses around the world.
‘Break the bias’ – the theme of last month’s International Women’s Day – drew worldwide attention to calling out gender bias, smashing stereotypes and breaking inequality. While also shining a light on bias in our communities, schools, colleges and universities, bias in the workplace was key to inspiring collective action. Society has made notable progress towards gender equity in recent decades. However, gender gaps in the workforce are still prevalent. For example, in Australia, women make up 39% of the full-time workforce.
The past two years have been challenging for businesses everywhere, so it’s not surprising to learn that adherence to good data practices may have slipped somewhat during this period. In fact, new research from Validity found that 74% of Aussie CRM administrators felt that data decay increased as a result of COVID-19, while 71% said that a rise in movement of employees between jobs since March 2020 has led to an all-time low in data quality.
In this increasingly uncertain world, information is power. This is a fact for IT teams managing the distributed infrastructure. Increased migrations to the cloud have shifted hardware and network infrastructure away from the enterprise core and to the edge, where IT has no sway. This shift has introduced greater business agility and resilience, but the trade-off is IT must now intensify proactive infrastructure monitoring or risk having applications, websites, and services go down when they least expect it.
Stop buying lattes and smashed avocado, separate your needs and wants, get a side hustle! That’s the money advice we are fed. But the truth is, it’s not your morning coffee that’s keeping you out of the housing market or preventing you from building long term financial security. As a nation, we’ve never earned as much, owned as much, or been so highly educated, and yet millennials struggle with money more than any previous generation. Why?
ISO27002 provides recommendations on security controls to maintain an information security management system (ISMS). It started life as a British Standard in the 90s and migrated to ISO/IEC in 2000. It has been revised several times over the years with the latest iteration, ISO27002:2022. The new version contains many structural changes and controls rationalisation. Arguably, the addition of threat intelligence stands out because many of the other changes relate closely to existing controls.
Nutritional supplements will offer little health benefits unless users know what the best product is for their needs and the correct dosage. $5.69 billion Australian supplement sector is so overcrowded that consumers struggle to know what the right supplements are to complement their health and lifestyle.
New .au domain names are now available in Australia as of March 24th, where people will be able to buy .au domains without the .com, .org or .net for the very first time. Prior to the launch of this .au top-level domain, more than 15,000 Australian websites - including e-commerce, major news sites and government department pages - were taken offline. 95% of consumers consider ccTLDs to be most trustworthy in regions where they are used, according to research. Having a trusted ccTLD (country-code top-level domain) in the same location the business is based will help gain clients trust, helping maintain loyalty.