Blog

01Sep, 2015

PCI DSS/ Security Compliance

Mandatory data breach notification still on government’s agenda

The rise of Cybercrime is creating legitimate business risk and privacy concerns for Australians.  

The government has confirmed it is still planning to legislate a mandatory data breach notification scheme before the end of the year.

The legislation will compel organisations to notify people when their privacy is potentially compromised by a data breach.

Read the full article here.

Organisations that embrace solutions regarding data security and the new privacy laws can increase customer satisfaction, reduce costs, secure the business infrastructure, foster a better working environment and broaden service options. It’s a compelling opportunity for businesses to leverage security and compliance investments to maximise returns for the business. In short, certified cloud-based services are available which reduce compliance costs, secure customer data and payment processes while offering opportunities to improving the customer experience – improving the bottom line for business.

Contact us and discover why some of the largest merchants in Australia trust us, to achieve and maintain PCI DSS compliance.

Articles related

The benefits of mandatory data breach notification laws in Australia

Mandatory data breach notification laws would result in greater security for Australians and improved protection of their sensitiveinformation. And it

Read More

Cost of data breach report (with Australian Statistics)

Ponemon Institute 2013 Cost of Data Breach report The 2013 Cost of Data Breach report published by the Ponemon Institute (sponsored by Symantec) revea

Read More
survive data breach

How to survive a data breach

In the past two years, LinkedIn, eHarmony, Twitter, Adobe and, most recently, Target have suffered data breaches that together exposed more than 120 m

Read More
data discovery tools

Credit card data discovery tools lay the foundation for good data security

Card Holder Data (CHD) discovery tools are becoming essential in identifying none secure sensitive data locations. Since December 2013, a series of da

Read More