Blog

Blog

Blog

de.iterate and Source partner to help Australian Businesses improve Privacy Act compliance

de.iterate and Source partner to help Australian Businesses improve Privacy Act compliance

de.iterate and Source partner to help Australian Businesses improve Privacy Act compliance

December 6, 2023

de.iterate and Source are excited to announce that they are partnering to help Australian businesses streamline their Privacy Act compliance, and improve their cyber security.

de.iterate and Source are excited to announce that they are partnering to help Australian businesses streamline their Privacy Act compliance, and improve their cyber security.

de.iterate and Source are excited to announce that they are partnering to help Australian businesses streamline their Privacy Act compliance, and improve their cyber security.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

The Intersection of SOC 2 and ISO 27001: Which is Right for My Company?

The Intersection of SOC 2 and ISO 27001: Which is Right for My Company?

The Intersection of SOC 2 and ISO 27001: Which is Right for My Company?

November 10, 2023

Both the SOC 2 and ISO 27001 frameworks are robust and reputable, but how do they intersect, and more importantly, which one is the best fit for your company? Learn more now.

Both the SOC 2 and ISO 27001 frameworks are robust and reputable, but how do they intersect, and more importantly, which one is the best fit for your company? Learn more now.

Both the SOC 2 and ISO 27001 frameworks are robust and reputable, but how do they intersect, and more importantly, which one is the best fit for your company? Learn more now.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

The Difference Between SOC 1, SOC 2 and SOC 3

The Difference Between SOC 1, SOC 2 and SOC 3

The Difference Between SOC 1, SOC 2 and SOC 3

November 10, 2023

SOC 1, SOC 2 & SOC 3 reports play a critical role in ensuring that organisations adhere to vital data security compliance benchmarks. But what is the difference between them?

SOC 1, SOC 2 & SOC 3 reports play a critical role in ensuring that organisations adhere to vital data security compliance benchmarks. But what is the difference between them?

SOC 1, SOC 2 & SOC 3 reports play a critical role in ensuring that organisations adhere to vital data security compliance benchmarks. But what is the difference between them?

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

Decoding the SOC 2 Common Criteria List

Decoding the SOC 2 Common Criteria List

Decoding the SOC 2 Common Criteria List

November 10, 2023

There are 5 Trust Services Criteria for assessing an organisation's security in the context of SOC 2 compliance. The standards used to evaluate these are called the Common Criteria.

There are 5 Trust Services Criteria for assessing an organisation's security in the context of SOC 2 compliance. The standards used to evaluate these are called the Common Criteria.

There are 5 Trust Services Criteria for assessing an organisation's security in the context of SOC 2 compliance. The standards used to evaluate these are called the Common Criteria.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

What is SOC 2? A Guide for the Uninitiated

What is SOC 2? A Guide for the Uninitiated

What is SOC 2? A Guide for the Uninitiated

November 10, 2023

Developed by the AICPA, SOC 2 is a framework that outlines how service based organisations should protect data from unauthorised access, security incidents & other vulnerabilities.

Developed by the AICPA, SOC 2 is a framework that outlines how service based organisations should protect data from unauthorised access, security incidents & other vulnerabilities.

Developed by the AICPA, SOC 2 is a framework that outlines how service based organisations should protect data from unauthorised access, security incidents & other vulnerabilities.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

Top 10 Questions to Ask Your IT Provider to Ensure the Essential 8 is Implemented Properly

Top 10 Questions to Ask Your IT Provider to Ensure the Essential 8 is Implemented Properly

Top 10 Questions to Ask Your IT Provider to Ensure the Essential 8 is Implemented Properly

October 25, 2023

With cyberattacks on the rise, here are 10 questions to ask your IT provider to ensure effective implementation of the Essential Eight in your business. Learn more now.

With cyberattacks on the rise, here are 10 questions to ask your IT provider to ensure effective implementation of the Essential Eight in your business. Learn more now.

With cyberattacks on the rise, here are 10 questions to ask your IT provider to ensure effective implementation of the Essential Eight in your business. Learn more now.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

What is de.iterate?

What is de.iterate?

What is de.iterate?

October 11, 2023

de.iterate streamlines the compliance process to make privacy and cybersecurity simple and stress-free for growing – all through a single, integrated platform that is easy for employees to understand and use.

de.iterate streamlines the compliance process to make privacy and cybersecurity simple and stress-free for growing – all through a single, integrated platform that is easy for employees to understand and use.

de.iterate streamlines the compliance process to make privacy and cybersecurity simple and stress-free for growing – all through a single, integrated platform that is easy for employees to understand and use.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

Australian Government Response to Privacy Act Review Report: What it Actually Means for Businesses

Australian Government Response to Privacy Act Review Report: What it Actually Means for Businesses

Australian Government Response to Privacy Act Review Report: What it Actually Means for Businesses

October 3, 2023

In the biggest overhaul of Australia’s privacy laws in decades, the Government published a response to Privacy Act Review Report. Discover what it means for businesses.

In the biggest overhaul of Australia’s privacy laws in decades, the Government published a response to Privacy Act Review Report. Discover what it means for businesses.

In the biggest overhaul of Australia’s privacy laws in decades, the Government published a response to Privacy Act Review Report. Discover what it means for businesses.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

Australian Government Publishes Response to Privacy Act Review Report

Australian Government Publishes Response to Privacy Act Review Report

Australian Government Publishes Response to Privacy Act Review Report

September 28, 2023

In the biggest overhaul of Australia’s privacy laws in decades, the Government published a response to Privacy Act Review Report, agreeing to 38 proposals, agreeing in principle to 68 & noting 10.

In the biggest overhaul of Australia’s privacy laws in decades, the Government published a response to Privacy Act Review Report, agreeing to 38 proposals, agreeing in principle to 68 & noting 10.

In the biggest overhaul of Australia’s privacy laws in decades, the Government published a response to Privacy Act Review Report, agreeing to 38 proposals, agreeing in principle to 68 & noting 10.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

de.iterate Launches Australia’s Only Platform for Stress-free Privacy Act Compliance

de.iterate Launches Australia’s Only Platform for Stress-free Privacy Act Compliance

de.iterate Launches Australia’s Only Platform for Stress-free Privacy Act Compliance

September 13, 2023

de.iterate is excited to announce the launch of its brand new Privacy Act compliance solution.

de.iterate is excited to announce the launch of its brand new Privacy Act compliance solution.

de.iterate is excited to announce the launch of its brand new Privacy Act compliance solution.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

What are the Australian Privacy Principles?

What are the Australian Privacy Principles?

What are the Australian Privacy Principles?

September 1, 2023

The Australian Privacy Principles (or APPs) are the bedrock of Australia’s privacy protection framework, and are deeply rooted in the Privacy Act 1988. Any organisation or agency covered by the Privacy Act needs to uphold the APPs when it comes to personal information.

The Australian Privacy Principles (or APPs) are the bedrock of Australia’s privacy protection framework, and are deeply rooted in the Privacy Act 1988. Any organisation or agency covered by the Privacy Act needs to uphold the APPs when it comes to personal information.

The Australian Privacy Principles (or APPs) are the bedrock of Australia’s privacy protection framework, and are deeply rooted in the Privacy Act 1988. Any organisation or agency covered by the Privacy Act needs to uphold the APPs when it comes to personal information.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

Does Your Business Need the Essential Eight?

Does Your Business Need the Essential Eight?

Does Your Business Need the Essential Eight?

August 23, 2023

The Essential Eight is an extremely valuable tool for business owners, but they should feel empowered to take the reins on how the strategies apply to their own cybersecurity control requirements

The Essential Eight is an extremely valuable tool for business owners, but they should feel empowered to take the reins on how the strategies apply to their own cybersecurity control requirements

The Essential Eight is an extremely valuable tool for business owners, but they should feel empowered to take the reins on how the strategies apply to their own cybersecurity control requirements

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

de.iterate Named a Finalist in the Australian Defence Industry Awards 2023

de.iterate Named a Finalist in the Australian Defence Industry Awards 2023

de.iterate Named a Finalist in the Australian Defence Industry Awards 2023

August 21, 2023

The team at de.iterate is excited to announce that we’ve been shortlisted for the Australian Defence Industry Awards 2023. De.iterate is a finalist in the Cyber Business of the Year category.

The team at de.iterate is excited to announce that we’ve been shortlisted for the Australian Defence Industry Awards 2023. De.iterate is a finalist in the Cyber Business of the Year category.

The team at de.iterate is excited to announce that we’ve been shortlisted for the Australian Defence Industry Awards 2023. De.iterate is a finalist in the Cyber Business of the Year category.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

Privacy Act Reforms: What Business Owners Need to Know

Privacy Act Reforms: What Business Owners Need to Know

Privacy Act Reforms: What Business Owners Need to Know

August 10, 2023

Privacy Act reforms will these reforms will increase the types of information governed by the Act and the obligations of small businesses. Learn more about what you need to do to comply.

Privacy Act reforms will these reforms will increase the types of information governed by the Act and the obligations of small businesses. Learn more about what you need to do to comply.

Privacy Act reforms will these reforms will increase the types of information governed by the Act and the obligations of small businesses. Learn more about what you need to do to comply.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

What is the Privacy Act?

What is the Privacy Act?

What is the Privacy Act?

August 10, 2023

The Privacy Act regulates how businesses & government agencies handle personal information. It ensures customer privacy is protected. Learn more about your obligations as a small business.

The Privacy Act regulates how businesses & government agencies handle personal information. It ensures customer privacy is protected. Learn more about your obligations as a small business.

The Privacy Act regulates how businesses & government agencies handle personal information. It ensures customer privacy is protected. Learn more about your obligations as a small business.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

14 Essential Cyber Security & Data Governance Tips for Small Businesses

14 Essential Cyber Security & Data Governance Tips for Small Businesses

14 Essential Cyber Security & Data Governance Tips for Small Businesses

August 10, 2023

Cyber security & data governance isn’t just for large corporations and governments. SMEs are also vulnerable. Here are some simple but effective ways to boost your business’ cybersecurity.

Cyber security & data governance isn’t just for large corporations and governments. SMEs are also vulnerable. Here are some simple but effective ways to boost your business’ cybersecurity.

Cyber security & data governance isn’t just for large corporations and governments. SMEs are also vulnerable. Here are some simple but effective ways to boost your business’ cybersecurity.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

What is the GDPR (or General Data Protection Regulation)?

What is the GDPR (or General Data Protection Regulation)?

What is the GDPR (or General Data Protection Regulation)?

August 10, 2023

The GDPR is the strongest set of privacy and security laws in the world. Proposed reforms to the Privacy Act in Australia are set to bring our laws in line with the GDPR. Learn about your obligations as a small business.

The GDPR is the strongest set of privacy and security laws in the world. Proposed reforms to the Privacy Act in Australia are set to bring our laws in line with the GDPR. Learn about your obligations as a small business.

The GDPR is the strongest set of privacy and security laws in the world. Proposed reforms to the Privacy Act in Australia are set to bring our laws in line with the GDPR. Learn about your obligations as a small business.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

What is the Essential 8?

What is the Essential 8?

What is the Essential 8?

August 10, 2023

Developed by the ASCS, the Essential 8 are a set of mitigation strategies that can be used by organisations to protect themselves against possible cyberattacks and protect sensitive information in line with the Privacy Act.

Developed by the ASCS, the Essential 8 are a set of mitigation strategies that can be used by organisations to protect themselves against possible cyberattacks and protect sensitive information in line with the Privacy Act.

Developed by the ASCS, the Essential 8 are a set of mitigation strategies that can be used by organisations to protect themselves against possible cyberattacks and protect sensitive information in line with the Privacy Act.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

Which Essential Eight Maturity Level Does Your Business Need?

Which Essential Eight Maturity Level Does Your Business Need?

Which Essential Eight Maturity Level Does Your Business Need?

August 10, 2023

Organisations should achieve an Essential Eight maturity level that is appropriate to their risk profile, taking into account all possible risks and the costs involved in enhancing their security measures

Organisations should achieve an Essential Eight maturity level that is appropriate to their risk profile, taking into account all possible risks and the costs involved in enhancing their security measures

Organisations should achieve an Essential Eight maturity level that is appropriate to their risk profile, taking into account all possible risks and the costs involved in enhancing their security measures

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

The Problem With Traditional Information Security Management Compliance

The Problem With Traditional Information Security Management Compliance

The Problem With Traditional Information Security Management Compliance

December 2, 2022

The traditional approach to information security management compliance is complex, convoluted & time-consuming. The solution? Integrated, sustainable compliance.

The traditional approach to information security management compliance is complex, convoluted & time-consuming. The solution? Integrated, sustainable compliance.

The traditional approach to information security management compliance is complex, convoluted & time-consuming. The solution? Integrated, sustainable compliance.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

Supply Chain Governance: A Growing Imperative

Supply Chain Governance: A Growing Imperative

Supply Chain Governance: A Growing Imperative

December 2, 2022

Robust supply chain governance is essential to winning large-scale, highly profitable government projects—particularly in the military and defence industries.

Robust supply chain governance is essential to winning large-scale, highly profitable government projects—particularly in the military and defence industries.

Robust supply chain governance is essential to winning large-scale, highly profitable government projects—particularly in the military and defence industries.

AL

Andrew Lawrence

Andrew Lawrence

Andrew Lawrence

CEO

CEO

CEO

© de.iterate Pty Ltd, 2021-2023

© Secureroo Pty Ltd, 2023