Information security

Consider these specific scenarios and how to manage the associated risks.


Transacting online with the public

Online services offer the public a convenient, efficient way to access government and other services. However, as the demand for online services grows, so too does the scale and sophistication of cybercrime and malicious activities.

Outsourcing, offshoring and supply chains

Supply chains are becoming more complex. When you conduct your risk assessment, consider each part of your organisation’s supply chain.

Mobile and remote working

Mobile and remote working is now the norm, yet many people are unaware of the threats that they face. Taking work home, working in the field, working from hotels or conference venues, visiting client offices, and working while on public transport are just a few ways that people work remotely, using portable computers and mobile devices.

Cloud computing

Cloud computing offers organisations cost effective, agile information storage. Cloud computing is generally more secure and provides greater choice than in-house solutions.

Communication security

Communication security (COMSEC) safeguards reduce the threat of unauthorised people gaining access to your communications. COMSEC includes cryptography, transmission security, emission security, traffic-flow security, and physical security of COMSEC equipment.