Secure your business

In today's mobile world, powered by cloud services, security is a whole-of-business priority. We help you navigate the complexities of your security landscape so you can protect your brand and strengthen the trust of customers and partners.

Better together: Electronic and cyber security convergence
Secure your business

Secure your business Articles

Secure your business
Better together: Electronic and cyber security convergence

Aligning your approach to physical security devices with your cyber security strategy is giving Australian organisations greater visibility over their security estate. Across A...

Man on mobile and laptop
Secure your business

Secure your business Articles

Secure your business
Towards a whole of organisation incident response plan

Most Australian organisations have an incident response plan in place, but many security professionals face challenges engaging crucial stakeholders outside IT. The Telstra Sec...

A woman using virtual reality headset
Secure your business
Secure your business

Secure your business Articles

The future of security: Threats, trends and investments

From rising budgets to machine learning, we look at the future trends changing the Australian security landscape. With the security landscape continuing to grow more complex, we look at some of the future threats and the technologies that can help manage your risk.

Better together: Electronic and cyber security convergence
Secure your business

Secure your business Articles

Secure your business
Better together: Electronic and cyber security convergence

Aligning your approach to physical security devices with your cyber security strategy is giving Australian organisations greater visibility over their security estate. Across A...

Man on mobile and laptop
Secure your business

Secure your business Articles

Secure your business
Towards a whole of organisation incident response plan

Most Australian organisations have an incident response plan in place, but many security professionals face challenges engaging crucial stakeholders outside IT. The Telstra Sec...

Navigating the year of new security compliance
Secure your business

Secure your business Articles

Secure your business
Navigating the year of new security compliance

Between the introduction of the General Data Protection Regulation and the Notifiable Data Breach scheme, the time is right to rethink your approach to security compliance legi...

An effective approach to security's year of compliance
Secure your business

Secure your business Articles

Secure your business
An effective approach to security's year of compliance

2018 has seen a greater focus on compliance than ever before, with new laws in effect that businesses need to align their security frameworks to.

Smile and say security: Video surveillance as a service
Secure your business

Secure your business Articles

Secure your business
Smile and say security: Video surveillance as a service

As Australian businesses grapple with the need to keep their business and data secure, more and more are integrating advanced electronic security devices to improve their aware...

Better prepared: Effective security planning
Secure your business

Secure your business Articles

Secure your business
Better prepared: Effective security planning

Effective security preparation doesn’t just help you manage risks – it empowers you to respond more effectively when they surface. In the last several years, security has shi...

A stitch in time: The evolving world of security preparation
Secure your business

Secure your business Articles

Secure your business
A stitch in time: The evolving world of security preparation

Awareness of the importance of security has never been higher – but many organisations are finding it challenging to translate awareness into preparedness.

typing on various devices
Secure your business

Secure your business Articles

Secure your business
Are you ready for the year ahead in security?

Neil Campbell, Director of Global Security Solutions at Telstra, shares his insights into the next year in security. It’s been a big year for security, with outbreaks like the ...

Business interrupted: The impacts of a security breach
Secure your business

Secure your business Articles

Secure your business
Business interrupted: The impacts of a security breach

Australian businesses are experiencing business interrupting security breaches like never before, so making sure you have a robust security framework is a key factor in your or...

When your data is held captive: Dealing with ransomware
Secure your business

Secure your business Articles

Secure your business
When your data is held captive: Dealing with ransomware

How much is your data worth, and would you pay to get it back? What to do about the explosive growth of the global ransomware market. You arrive at work and turn your computer ...

man sitting at computer with codes
Secure your business

Secure your business Articles

Secure your business
A unified approach to security

We explore how organisations are adapting the logical convergence of electronic and cyber security. As traditional analogue devices make the switch to digital and new attack su...

Woman standing in front of a cityscape
Secure your business

Secure your business Articles

Secure your business
Inside the Telstra Security Report 2018

Find out what you need to know to effectively manage your organisation's risk in 2018. Cybercrime is growing with industry sources predicting that its global damages will rise ...

Two men watching security footage
Secure your business

Secure your business Articles

Secure your business
Where's our data? Secure steps for cloud storage

In any digital transition, your team is bound to ask exactly where the data is - like you, they'll want to know it's safe and secure. The first part of your answer is easy: the...

Microphone
Secure your business

Secure your business Articles

Secure your business
How managed security meets the challenges of 2017

General Manager of Telstra’s Managed Security Services, Thomas King, discusses the vital role managed security services play in Telstra’s efforts to help contribute to a cyber ...

man in home office on computer
Secure your business

Secure your business Articles

Secure your business
SOCs: Telstra’s commitment to cyber safe Australia

Managed security services are a vital part of any cyber security strategy, so Telstra has launched two brand new Security Operations Centres (SOCs) in Melbourne and Sydney to c...

Telstra Security Operations Centre
Secure your business

Secure your business Articles

Secure your business
Data security demands a comprehensive approach

As Australia’s new data-breach disclosure law comes into effect, it’s high time to consider a comprehensive data-security solution. Data and intellectual property theft have be...

Man working in data server space
Secure your business

Secure your business Articles

Secure your business
Cyber resilience: Managing risk in a digital world

Smart businesses understand that cyber security means more than firewalls and encryption, it’s about people. Understanding risk and managing it is essential for any successful...

Female using tablet in skyline
Secure your business

Secure your business Articles

Secure your business
Oversharing or over sharing? Millennials and data privacy

The security of personal information submitted online is a hot-button issue. We investigate how generation Y approaches privacy. Millennials are a driving force in today’s di...

Telstra Security Report 2018
Secure your business

Secure your business Articles

Secure your business
Telstra Security Report 2018

Learn how some of the industry's brightest minds are using and managing data effectively

Image depicts online shopper holding credit card on laptop
Secure your business

Secure your business Articles

Secure your business
Five cyber security trends to watch in 2017

Leaders know their businesses can’t leave cyber security strategy to the last minute – because without it, the next attack might wipe out the company’s future. The Internet ...

Social privacy in a public world
Secure your business

Secure your business Articles

Secure your business
Social privacy in a public world

In an increasingly public world, privacy remains essential, says renowned US cryptographer Bruce Schneier.

Cyber security begins in the C-suite
Secure your business

Secure your business Articles

Secure your business
Cyber security begins in the C-suite

Keeping data and processes secure is not just an IT issue – it’s a business issue, and it needs company-wide engagement.

The white hats: Three ways hacking improves security
Secure your business

Secure your business Articles

Secure your business
The white hats: Three ways hacking improves security

Who knew hacking could be the answer to rising concerns about cyber security?

Seven steps to securing the cloud
Secure your business

Secure your business Articles

Secure your business
Seven steps to securing the cloud

Cloud security is about more than strong passwords and keeping hackers out – it’s about knowing who has access in the first place.

Cyber security: Are your people the problem?
Secure your business

Secure your business Articles

Secure your business
Cyber security: Are your people the problem?

Chief information officers typically take a high-tech approach to cyber security, unwisely ignoring a crucial, familiar presence: staff. Australia has a remarkably high cyber-a...

With big data comes great responsibility
Secure your business

Secure your business Articles

Secure your business
With big data comes great responsibility

As customers grasp just how much organisations value their data, trust becomes key to retaining their loyalty. Big companies are capturing ever more user data – petabytes of th...

Beware anywhere
Secure your business

Secure your business Articles

Secure your business
Beware anywhere

Smartphones and tablets have already expanded the boundaries of organisations – physically and digitally. Now BYOD policies are stretching them further. Which means the range o...

Out of the shadows
Secure your business

Secure your business Articles

Secure your business
Out of the shadows

Cloud-related security has been front of mind with organisations for a long time. But while much of the concern has been around the sanctity of data housed in public data centr...

Security conscious? Watch these three groups
Secure your business

Secure your business Articles

Secure your business
Security conscious? Watch these three groups

There are many threats to information security. Telstra security specialist Jeremy Requena focuses on the people challenges businesses face.

Why effective privacy and security strategies drive business outcomes
Secure your business

Secure your business Articles

Secure your business
Why effective privacy and security strategies drive business outcomes

The scale of data being collected by businesses today has made cyber security more important than ever to commercial success.

Security on the move: Keeping mobile businesses safe
Secure your business

Secure your business Articles

Secure your business
Security on the move: Keeping mobile businesses safe

The absence of mobile and shadow IT policy may be stifling your business productivity. Telstra’s Hugh Stodart looks at the security challenges.

Cyber security through sound strategy
Secure your business

Secure your business Articles

Secure your business
Cyber security through sound strategy

Australian business is facing unprecedented data security challenges. However, there are effective ways organisations can prepare for and respond to these threats.

DNA of data loss
Secure your business

Secure your business Articles

Secure your business
DNA of data loss

Don’t get caught out: Five surprising facts you may not know about backup and disaster recovery.

Ben Bernanke: “It’s good to be boring”
Secure your business

Secure your business Articles

Secure your business
Ben Bernanke: “It’s good to be boring”

In 2008 when the global economy was on the brink of collapse, Ben Bernanke kept a level head and helped to pull it back to safety.

Access data on the go
Secure your business

Secure your business Articles

Secure your business
Access data on the go

Does your mobile workforce need easy access to sensitive client data? Telstra’s Next IP® Network gives you enterprise-grade security without compromising staff flexi...

Securing precious resources
Secure your business

Secure your business Articles

Secure your business
Securing precious resources

The mining, oil and gas sectors face some particular challenges when it comes to identifying IT risks and protecting its data.

Planning your response to a security incident before it happens
Secure your business

Secure your business Articles

Secure your business
Planning your response to a security incident before it happens

76% of Australian companies have an incident response plan in place – but in today’s digital economy, just having a plan isn’t enough. It’s clear from our findings in the Tels...