Archives

About Martin Quinn

Here are my most recent posts

Parking Stations the new target for credit fraudsters and ram-raids?

April 9th, 2015 (No Comments)

   By Martin Quinn (Principal Consultant) 9 April 2015 A few months back was conducting a risk assessment around the safety of credit card information and was on the look out for how credit fraudsters would execute attacks. There are certain modus operandi that these criminals operate. Those that set up scam websites and call centres […]

Über breach – Über long time ago

March 2nd, 2015 (No Comments)

  By Martin Quinn (Principal Consultant) 2 March 2015 Many of us use the super convenient dial-a-hire car/rent-a-driver service freely available on our mobile phones. (It’s much easier to get an Über driver at 12pm on a Friday night than it is a Taxi in some metro areas). For those of us that don’t know […]

Boom! Your business has been hit by malware or a phishing attack.

November 21st, 2014 (No Comments)

  By Martin Quinn (Principal Consultant) 21 November 2014 You frantically try to understand how these bad guys got in, and then your thoughts turn to what did they access and take? For many businesses, they don’t know where to start or what steps to take. But if your business acts quickly and follows these […]

Rebuilding Trust is Expensive

October 4th, 2014 (No Comments)

  By Martin Quinn (Principal Consultant) 4 October 2014 Rebuilding trust is an expensive exercise that most businesses should avoid at all costs. Trust is something that is often earned over time, and once lost, is difficult to recover. In business this also rings true, businesses forge trust over time, whether it be business to […]

What are hackers after anyway?

October 1st, 2014 (No Comments)

By Martin Quinn (Principal Consultant) 1 October 2013 So you think you may have been hacked, you engage a specialist (like Intact) to detect, clean up and eradicate any type of malicious code or backdoors that a hacker may have put on your systems. Your systems are given a clean bill of health but the […]

SHELLSHOCK – The Sleeper Amongst Us

September 30th, 2014 (No Comments)

By Martin Quinn (Principal Consultant) 30 September 2014 There has been an amazing amount of media coverage in the past week regarding Shellshock or the Bash (Bourne Again Shell) vulnerability, (if you haven’t heard about it you must be hiding under a rock). However, Shellshock is not new, it’s a bug that’s been around for […]

To certify or not to certify: That is the question

July 3rd, 2014 (No Comments)

By Martin Quinn (Principal Consultant) 3 July 2014 Many of my customers and colleagues alike have been asking the same question in recent times, do you think we should get certification/certified? Or what value to you see in being certified? My answer is – it depends on your organization. I have been an ISO27001 auditor […]

Australian Privacy Principles – 10 Quick Tips

January 20th, 2014 (No Comments)

By Martin Quinn (Principal Consultant) 20 January 2014 Many businesses may not be aware of the imminent changes regarding the Australian Privacy Principles (APP) and how they affect their business. Previously these principles were known as the National Privacy Principles (NPP), and as of 12 March 2014, the amended principles will be enforceable by the Office of the […]

Mobile cybercrime in Australia on par with rest of the globe

December 12th, 2013 (No Comments)

By Martin Quinn (Principal Consultant) 12 December 2013 Mobile cybercrime is on the rise both here in our own back yard and across the globe. Over the past year cybercrime has cost upwards of $1.1bn with victims averaging a around $200 according to the 2013 Norton Report on security. This dollar figure is almost on […]

Data Privacy, Security and Sovereignty – serious cloud question or storm in a teacup?

December 6th, 2013 (No Comments)

By Martin Quinn (Principal Consultant) 6 December 2013 Data sovereignty is a hot topic when talking in security circles. Many organisations who move to the cloud and use services like Amazon or Azure often overlook the issues of data sovereignty, blinded by huge cost savings and lower TCO or massive redundancy and uptime on offer. […]