SECURITY - Barrington Group Australia

  •  

    Barringtons Blog



The Future Of Office Security – Bridging Human Skills And Tech

Laura Eyles 0 65

While Artificial intelligence (AI) and machine learning bring huge benefits to the security landscape in cybersecurity, the door is wide open for physical security threats in the workplace. Workplace strategy and design are evolving alongside AI. The office of the future is designed with openness and connectivity, with open floor plans, glass walls, cafeterias, nap pods, and other amenities – and security design should evolve to bridge the human security and tech security needs accordingly.

Youth’s Love-Hate Relationship With Tech In The Digital Age – Cyber Risk And Educational Institutions

Cyber Risk and Educational Institutions

Laura Eyles 0 150

When digital surveillance is higher than ever, there is a hollowing out of learning, a shallowness that comes with abuses of privacy and surveillance and from a loss of cherished human contact. Kate C. Tilleczek’s studies have revealed that several youth suggested that without the phone, they lacked the confidence to solve basic problems or feared for their safety.

Good Governance Financial And IT Risk - What You Should Know In A Slowing Economy

What You Should Know in a Slowing Economy

Laura Eyles 0 251

A slowing economy will inevitably result in some level of operational budget cuts.  Because it does not result in direct revenue impact, cyber security is often the first target for companies to reduce or cut. As cyber security primarily focusses on minimising financial losses to the organisation and its clients or partners, risk prioritisation decisions must be tackled with caution since cyber breaches can impact customers and other third parties along the supply chain.
 

If the organisation is found to be negligent in their risk management decisions, putting profit before customer security they can be exposed to significant punitive fines and damages which are not covered by cyber insurance. Therefore prioritisation of cyber security investment is a logical step in the IT risk governance process. 

Australian Organisations Identify Their Top Cyber Threats With Only Half Able To Stop Them

Top Cyber Threats

Laura Eyles 0 258

A global survey from CyberArk, 50% of organisations believe attackers can infiltrate their networks each time they try. Attackers can exploit legitimate privileged access to move laterally across a network to conduct reconnaissance and progress their mission.

RSS

Categories