Endpoint privacy security presentation
A powerpoint presentation from SANS outlining good security practices for web browsers. No read more
View ArticleAdvice By Email - Security Issues
Answers to questions about the confidentiality of email. No read more
View ArticleFraud in NFPs
A survey of fraud in not-for-profit organisations by BDO Australia. No read more
View ArticleFacebook security best practices
How to protect your privacy and identity on Facebook. No read more
View ArticleInside Network Security Assessment: Guarding Your IT Infrastructure
A collection of utilities and templates that will take you through the network security assessment process. No read more
View ArticleOnline security
A background to ensuring the online security of your organisation. Include Creative Commons Licence read more
View ArticleDon’t Lose That (USB) Stick
USB sticks are widely used but can present risks to your organisation. This ICT Champion briefing looks at the risks and how to avoid them. No read more
View ArticleGiving Your Service Users Access To Your Computers
If you have service users (including clients and trainees) who are entitled to use computing and other facilities in your offices, it is essential that you consider how secure your systems are. This...
View ArticleWorking Safely Online Anytime, Anyplace, Anywhere
Being able to work from anywhere presents great opportunities. However it’s important to keep security in mind when working away from the office. Here we look at the potential security risks and how to...
View ArticleClear screen policy
A clear screen policy directs all your organisation’s employees to lock their computers when leaving their desk and to log off when leaving for an extended period of time. No read more
View ArticleThe GPCG Computer Security Self-Assessment Guideline and Checklist for...
This is a useful guide to data security and, while it has a focus on general medical practice, much of the information is relevant to small to medium community service organisations. It was produced...
View ArticleRisk assessment in a nutshell
A checklist to to help with risk assessments and to guage the disaster recovery needs of your organisation. No read more
View ArticleIT in the Cloud: Understanding the Risks
In cloud computing, you're entrusting your data and the proper operation of things to something or someone you don't know and probably have little access to. No read more
View ArticleSecurity in the Cloud
Security remains to be one of the largest concerns when considering a move of a system or application to the Internet, or the "cloud." No read more
View Article
More Pages to Explore .....