Telstra Security Operations Centre
Secure your business
Secure your business
Data security demands a comprehensive approach

As Australia’s new data-breach disclosure law comes into effect, it’s high time to consider a comprehensive data-security solution. Data and intellectual property theft have be...

Man working in data server space
Secure your business
Secure your business
Cyber resilience: Managing risk in a digital world

Smart businesses understand that cyber security means more than firewalls and encryption, it’s about people. Understanding risk and managing it is essential for any successful...

man in home office on computer
Secure your business
Secure your business

SOCs: Telstra’s commitment to cyber safe Australia

Managed security services are a vital part of any cyber security strategy, so Telstra has launched two brand new Security Operations Centres (SOCs) in Melbourne and Sydney to create a cyber secure Australia. Some of the most widespread, damaging cybercrime in history has taken place in 2017 alone. In Australia and around the world, a string of hi...

Telstra Security Operations Centre
Secure your business
Secure your business
Data security demands a comprehensive approach

As Australia’s new data-breach disclosure law comes into effect, it’s high time to consider a comprehensive data-security solution. Data and intellectual property theft have be...

Man working in data server space
Secure your business
Secure your business
Cyber resilience: Managing risk in a digital world

Smart businesses understand that cyber security means more than firewalls and encryption, it’s about people. Understanding risk and managing it is essential for any successful...

Female using tablet in skyline
Secure your business
Secure your business
Oversharing or over sharing? Millennials and data privacy

The security of personal information submitted online is a hot-button issue. We investigate how generation Y approaches privacy. Millennials are a driving force in today’s di...

Image depicts online shopper holding credit card on laptop
Secure your business
Secure your business
Five cyber security trends to watch in 2017

Leaders know their businesses can’t leave cyber security strategy to the last minute – because without it, the next attack might wipe out the company’s future. The Internet ...

Social privacy in a public world
Secure your business
Secure your business
Social privacy in a public world

In an increasingly public world, privacy remains essential, says renowned US cryptographer Bruce Schneier.

Cyber security: Are your people the problem?
Secure your business
Secure your business
Cyber security: Are your people the problem?

Chief information officers typically take a high-tech approach to cyber security, unwisely ignoring a crucial, familiar presence: staff. Australia has a remarkably high cyber-a...

With big data comes great responsibility
Secure your business
Secure your business
With big data comes great responsibility

As customers grasp just how much organisations value their data, trust becomes key to retaining their loyalty. Big companies are capturing ever more user data – petabytes of th...

Seven steps to securing the cloud
Secure your business
Secure your business
Seven steps to securing the cloud

Cloud security is about more than strong passwords and keeping hackers out – it’s about knowing who has access in the first place.

The white hats: Three ways hacking improves security
Secure your business
Secure your business
The white hats: Three ways hacking improves security

Who knew hacking could be the answer to rising concerns about cyber security?

Cyber security begins in the C-suite
Secure your business
Secure your business
Cyber security begins in the C-suite

Keeping data and processes secure is not just an IT issue – it’s a business issue, and it needs company-wide engagement.

Beware anywhere
Secure your business
Secure your business
Beware anywhere

Smartphones and tablets have already expanded the boundaries of organisations – physically and digitally. Now BYOD policies are stretching them further. Which means the range o...

Out of the shadows
Secure your business
Secure your business
Out of the shadows

Cloud-related security has been front of mind with organisations for a long time. But while much of the concern has been around the sanctity of data housed in public data centr...

When your data is held captive: Dealing with ransomware
Secure your business
Secure your business
When your data is held captive: Dealing with ransomware

One of the fastest growing cyber security challenges isn’t that your data will be stolen or destroyed, but that it will be locked away and held to ransom. How much is your data...

Security on the move: Keeping mobile businesses safe
Secure your business
Secure your business
Security on the move: Keeping mobile businesses safe

The absence of mobile and shadow IT policy may be stifling your business productivity. Telstra’s Hugh Stodart looks at the security challenges.

Cyber security through sound strategy
Secure your business
Secure your business
Cyber security through sound strategy

Australian business is facing unprecedented data security challenges. However, there are effective ways organisations can prepare for and respond to these threats.

Why effective privacy and security strategies drive business outcomes
Secure your business
Secure your business
Why effective privacy and security strategies drive business outcomes

The scale of data being collected by businesses today has made cyber security more important than ever to commercial success.

Security conscious? Watch these three groups
Secure your business
Secure your business
Security conscious? Watch these three groups

There are many threats to information security. Telstra security specialist Jeremy Requena focuses on the people challenges businesses face.

DNA of data loss
Secure your business
Secure your business
DNA of data loss

Don’t get caught out: Five surprising facts you may not know about backup and disaster recovery.

Ben Bernanke: “It’s good to be boring”
Secure your business
Secure your business
Ben Bernanke: “It’s good to be boring”

In 2008 when the global economy was on the brink of collapse, Ben Bernanke kept a level head and helped to pull it back to safety.

Access data on the go
Secure your business
Secure your business
Access data on the go

Does your mobile workforce need easy access to sensitive client data? Telstra’s Next IP® Network gives you enterprise-grade security without compromising staff flexi...

Securing precious resources
Secure your business
Secure your business
Securing precious resources

The mining, oil and gas sectors face some particular challenges when it comes to identifying IT risks and protecting its data.

Microphone
Secure your business
Secure your business
How managed security meets the challenges of 2017

General Manager of Telstra’s Managed Security Services, Thomas King, discusses the vital role managed security services play in Telstra’s efforts to help contribute to a cyber ...