Latest Story

  • Politicians Pay: A fair salary determining mechanism

    quagga     |      June 15, 2009

    Politicians are some of the only employees who can set their own terms and conditions of employment at will without having to bargain with their employers.

    Recently, due to the recent federal politician pay-freeze ruling last month, the issue of politicians pay has arisen once again. This has lead to various internet comments and proposals on the subject. What I outline in this article is an alternative mechanism for fairly determining the salary of a politician. This simple mechanism is based on the price determining principles found throughout society. This idea it is not new…I first heard from a work colleague over ten years ago and I guess it has been proposed elsewhere before then as well.

  • e-Security Small Business Checkpoints

    Bhuvan Unhelkar     |      June 11, 2009

    Smart e-Security isn’t about locking your clients out.

    Once upon a time there was a king who wanted to be totally secure. He built a castle which was indeed very secure – so secure there were no doors to the castle!

    e-Security Week logoElectronic security, particularly in small and medium enterprise sector is a similar challenge; it is really a balancing act between how secure you want to be and how easily you want to interact with the external world.

    In business, e-Security needs to be considered at the five important checkpoints; networks, databases, applications, processes and interfaces.

  • “Technical recession” Political Con Trick?

    John Hannoush     |      June 10, 2009

    "Technical recession" paleo-spin from 1967.

  • What would happen if you lost your mobile phone today?

    Matthew Sorell     |      June 10, 2009

    Don’t let convenience seduce you away from e-Security.

    You probably think the least secure aspect of using a mobile phone is that it transmits your private information over a radio link, but the fact is that the level of authentication and encryption in use today is sufficient for all but the most sensitive applications. The real problem is, what happens if your phone goes missing?

  • Strong Authentication has Multiple Lines of Defence

    Fran Rosch     |      June 9, 2009

    More and more, customers are demanding better e-Security.

    A consumer survey conducted by Synovate revealed that nearly nine out of 10 consumers prefer to visit websites that take steps to actively engage them in protecting their online identity. It is certainly encouraging to see a growing preference among Internet users to seek out sites that take steps to protect them from identity thieves.

  • Simple Steps to Small Business e-Security

    Prof Vijay Varadharajan     |      June 9, 2009

    So what are the few key things that one needs to do especially in a small business context?

    The phenomenal developments in technology play a key role in the growth of digital economy, which is vital for Australia. Hand in hand with this growth is technology related crimes. This is where eSecurity comes in. In simple terms, it is about protecting your personal and business assets from attackers and criminals.  The e-Security Awareness logosecurity and privacy challenges we face in this digital economy are multi-faceted involving technological, business as well as legal aspects. 

    So what are the few key things that one needs to do especially in a small business context?  Here are some simple tips that can be useful.

  • Digital Economy or Wild West?

    StephenWilson     |      June 8, 2009

    e-Security awareness cuts both ways.  If policy makers take the digital economy seriously, then they need to be aware of the limitations of relying on user education alone to protect the people against cyber crime.

    National e-Security Awareness Week is terrific. You gotta have awareness of safe Internet behaviours – it’s just like road safety. But awareness is not enough. Here I will argue that user education has reached its limit and that we need the same sort of balanced approach to e-security as we have in road safety.

  • E-security Awareness: When it comes to Personal Information, it’s Security AND Privacy ‘cos there is no trade-off

    Malcolm Crompton     |      June 7, 2009

    The experiences of handling (and losing) personal information have a lot to tell us about better security in any organisation. 

    How often have you heard somebody argue that there has to be a trade off between security and privacy?

    The argument usually runs something along the lines that in order to keep you secure, you have to give up some aspect of your privacy.  For example, you must exhibit a lot of evidence of identity before completing a transaction or joining a group or organisation.

  • The simple steps to improving national e-security

    Stephen Conroy     |      June 5, 2009

    As more vital services come to rely on broadband, the security of our networks must be of the highest priority. 

    The Rudd Government has made a strong commitment to drive confidence in the online environment by promoting cyber-safety and e-security.

    e-Security Week logoPeople are already enjoying a whole range of benefits and conveniences via the internet… home banking, education, business services and online trading, to name a few. With confidence, people and businesses are more likely to embrace new services and conduct more online transactions in the future.

  • Uncategorised

    e-Security & Small Business

    editor     |      June 5, 2009

    For the second consecutive year Open Forum is proud to be a community partner of the Australian Government's annual National e-Security Awareness Week (5-12 June 2009), by hosting a special e-Security & Small Business forum »»

  • The New Tax Year is Coming – Don’t Make It the Year of Living Dangerously!

    Paul Ducklin     |      June 4, 2009

    Instead of fighting a pitched battle with people who try to give you IT security advice which you don’t like, why not think of a concession to good security practice you are prepared to make personally?

    Will 2009/10 be the year in which disagreement over policies and procedures to do with computer security finally leads to pitched battles between those who advise on IT issues, and the rest of us, who merely use IT?

    And, if so, who will win?

    e-Security Week logoWill employees who regard themselves as Web2.0-literate finally wear down the joybusting IT wowsers and win at work those internet freedoms they enjoy at home, thus allowing them to do more with less, just as the tightening economy seems to demand?

  • Why and How to erase your hard drive, and protect your digital self?

    Craig Valli     |      June 4, 2009

    You would not place your credit card or personal photos in a rubbish bin so why do the same with your hard disk?

    In annual research conducted by Edith Cowan University, British Telecom, Glamorgan University (UK) and Longwood University(USA) we buy hard disks at random from auction houses and disposal companies. We forensically examine these hard drives for remnant data and consistently across all studies for the last 5 years over 66% of drives contain private and sensitive information as a result of people not disposing of these drives properly. We have found top secret government documents, medical records, financial details, legal documents, credit card numbers, insurance policies, personal photos, emails and most data types we produce as humans.