Identify vulnerabilities, conduct an audit, and risk assessment to show the gaps in your threat surfaces and then create an official company security policy that includes automatic updates and automatic back-ups. Train your people to keep up to date and get them used to using multi factor authentication.
The Office of the Australian Information Commissioner (OAIC) promotes and upholds privacy and information access rights for all Australians with a range of powers and responsibilities under the privacy acts and other laws. Having a response plan for a data breach is critical to effectively managing a breach.
Use this list to check whether your response plan addresses relevant issues. To understand when a suspected breach is encountered and what is the initial procedure before escalating further to the response team?