Blog
Blog
Blog


de.iterate and Source partner to help Australian Businesses improve Privacy Act compliance
de.iterate and Source partner to help Australian Businesses improve Privacy Act compliance
de.iterate and Source partner to help Australian Businesses improve Privacy Act compliance
December 6, 2023

de.iterate and Source are excited to announce that they are partnering to help Australian businesses streamline their Privacy Act compliance, and improve their cyber security.
de.iterate and Source are excited to announce that they are partnering to help Australian businesses streamline their Privacy Act compliance, and improve their cyber security.
de.iterate and Source are excited to announce that they are partnering to help Australian businesses streamline their Privacy Act compliance, and improve their cyber security.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

The Intersection of SOC 2 and ISO 27001: Which is Right for My Company?
The Intersection of SOC 2 and ISO 27001: Which is Right for My Company?
The Intersection of SOC 2 and ISO 27001: Which is Right for My Company?
November 10, 2023

Both the SOC 2 and ISO 27001 frameworks are robust and reputable, but how do they intersect, and more importantly, which one is the best fit for your company? Learn more now.
Both the SOC 2 and ISO 27001 frameworks are robust and reputable, but how do they intersect, and more importantly, which one is the best fit for your company? Learn more now.
Both the SOC 2 and ISO 27001 frameworks are robust and reputable, but how do they intersect, and more importantly, which one is the best fit for your company? Learn more now.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

The Difference Between SOC 1, SOC 2 and SOC 3
The Difference Between SOC 1, SOC 2 and SOC 3
The Difference Between SOC 1, SOC 2 and SOC 3
November 10, 2023

SOC 1, SOC 2 & SOC 3 reports play a critical role in ensuring that organisations adhere to vital data security compliance benchmarks. But what is the difference between them?
SOC 1, SOC 2 & SOC 3 reports play a critical role in ensuring that organisations adhere to vital data security compliance benchmarks. But what is the difference between them?
SOC 1, SOC 2 & SOC 3 reports play a critical role in ensuring that organisations adhere to vital data security compliance benchmarks. But what is the difference between them?
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

Decoding the SOC 2 Common Criteria List
Decoding the SOC 2 Common Criteria List
Decoding the SOC 2 Common Criteria List
November 10, 2023

There are 5 Trust Services Criteria for assessing an organisation's security in the context of SOC 2 compliance. The standards used to evaluate these are called the Common Criteria.
There are 5 Trust Services Criteria for assessing an organisation's security in the context of SOC 2 compliance. The standards used to evaluate these are called the Common Criteria.
There are 5 Trust Services Criteria for assessing an organisation's security in the context of SOC 2 compliance. The standards used to evaluate these are called the Common Criteria.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

What is SOC 2? A Guide for the Uninitiated
What is SOC 2? A Guide for the Uninitiated
What is SOC 2? A Guide for the Uninitiated
November 10, 2023

Developed by the AICPA, SOC 2 is a framework that outlines how service based organisations should protect data from unauthorised access, security incidents & other vulnerabilities.
Developed by the AICPA, SOC 2 is a framework that outlines how service based organisations should protect data from unauthorised access, security incidents & other vulnerabilities.
Developed by the AICPA, SOC 2 is a framework that outlines how service based organisations should protect data from unauthorised access, security incidents & other vulnerabilities.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

Top 10 Questions to Ask Your IT Provider to Ensure the Essential 8 is Implemented Properly
Top 10 Questions to Ask Your IT Provider to Ensure the Essential 8 is Implemented Properly
Top 10 Questions to Ask Your IT Provider to Ensure the Essential 8 is Implemented Properly
October 25, 2023

With cyberattacks on the rise, here are 10 questions to ask your IT provider to ensure effective implementation of the Essential Eight in your business. Learn more now.
With cyberattacks on the rise, here are 10 questions to ask your IT provider to ensure effective implementation of the Essential Eight in your business. Learn more now.
With cyberattacks on the rise, here are 10 questions to ask your IT provider to ensure effective implementation of the Essential Eight in your business. Learn more now.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

What is de.iterate?
What is de.iterate?
What is de.iterate?
October 11, 2023

de.iterate streamlines the compliance process to make privacy and cybersecurity simple and stress-free for growing – all through a single, integrated platform that is easy for employees to understand and use.
de.iterate streamlines the compliance process to make privacy and cybersecurity simple and stress-free for growing – all through a single, integrated platform that is easy for employees to understand and use.
de.iterate streamlines the compliance process to make privacy and cybersecurity simple and stress-free for growing – all through a single, integrated platform that is easy for employees to understand and use.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

Australian Government Response to Privacy Act Review Report: What it Actually Means for Businesses
Australian Government Response to Privacy Act Review Report: What it Actually Means for Businesses
Australian Government Response to Privacy Act Review Report: What it Actually Means for Businesses
October 3, 2023

In the biggest overhaul of Australia’s privacy laws in decades, the Government published a response to Privacy Act Review Report. Discover what it means for businesses.
In the biggest overhaul of Australia’s privacy laws in decades, the Government published a response to Privacy Act Review Report. Discover what it means for businesses.
In the biggest overhaul of Australia’s privacy laws in decades, the Government published a response to Privacy Act Review Report. Discover what it means for businesses.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

Australian Government Publishes Response to Privacy Act Review Report
Australian Government Publishes Response to Privacy Act Review Report
Australian Government Publishes Response to Privacy Act Review Report
September 28, 2023

In the biggest overhaul of Australia’s privacy laws in decades, the Government published a response to Privacy Act Review Report, agreeing to 38 proposals, agreeing in principle to 68 & noting 10.
In the biggest overhaul of Australia’s privacy laws in decades, the Government published a response to Privacy Act Review Report, agreeing to 38 proposals, agreeing in principle to 68 & noting 10.
In the biggest overhaul of Australia’s privacy laws in decades, the Government published a response to Privacy Act Review Report, agreeing to 38 proposals, agreeing in principle to 68 & noting 10.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

de.iterate Launches Australia’s Only Platform for Stress-free Privacy Act Compliance
de.iterate Launches Australia’s Only Platform for Stress-free Privacy Act Compliance
de.iterate Launches Australia’s Only Platform for Stress-free Privacy Act Compliance
September 13, 2023

de.iterate is excited to announce the launch of its brand new Privacy Act compliance solution.
de.iterate is excited to announce the launch of its brand new Privacy Act compliance solution.
de.iterate is excited to announce the launch of its brand new Privacy Act compliance solution.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

What are the Australian Privacy Principles?
What are the Australian Privacy Principles?
What are the Australian Privacy Principles?
September 1, 2023

The Australian Privacy Principles (or APPs) are the bedrock of Australia’s privacy protection framework, and are deeply rooted in the Privacy Act 1988. Any organisation or agency covered by the Privacy Act needs to uphold the APPs when it comes to personal information.
The Australian Privacy Principles (or APPs) are the bedrock of Australia’s privacy protection framework, and are deeply rooted in the Privacy Act 1988. Any organisation or agency covered by the Privacy Act needs to uphold the APPs when it comes to personal information.
The Australian Privacy Principles (or APPs) are the bedrock of Australia’s privacy protection framework, and are deeply rooted in the Privacy Act 1988. Any organisation or agency covered by the Privacy Act needs to uphold the APPs when it comes to personal information.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

Does Your Business Need the Essential Eight?
Does Your Business Need the Essential Eight?
Does Your Business Need the Essential Eight?
August 23, 2023

The Essential Eight is an extremely valuable tool for business owners, but they should feel empowered to take the reins on how the strategies apply to their own cybersecurity control requirements
The Essential Eight is an extremely valuable tool for business owners, but they should feel empowered to take the reins on how the strategies apply to their own cybersecurity control requirements
The Essential Eight is an extremely valuable tool for business owners, but they should feel empowered to take the reins on how the strategies apply to their own cybersecurity control requirements
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

de.iterate Named a Finalist in the Australian Defence Industry Awards 2023
de.iterate Named a Finalist in the Australian Defence Industry Awards 2023
de.iterate Named a Finalist in the Australian Defence Industry Awards 2023
August 21, 2023

The team at de.iterate is excited to announce that we’ve been shortlisted for the Australian Defence Industry Awards 2023. De.iterate is a finalist in the Cyber Business of the Year category.
The team at de.iterate is excited to announce that we’ve been shortlisted for the Australian Defence Industry Awards 2023. De.iterate is a finalist in the Cyber Business of the Year category.
The team at de.iterate is excited to announce that we’ve been shortlisted for the Australian Defence Industry Awards 2023. De.iterate is a finalist in the Cyber Business of the Year category.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

Privacy Act Reforms: What Business Owners Need to Know
Privacy Act Reforms: What Business Owners Need to Know
Privacy Act Reforms: What Business Owners Need to Know
August 10, 2023

Privacy Act reforms will these reforms will increase the types of information governed by the Act and the obligations of small businesses. Learn more about what you need to do to comply.
Privacy Act reforms will these reforms will increase the types of information governed by the Act and the obligations of small businesses. Learn more about what you need to do to comply.
Privacy Act reforms will these reforms will increase the types of information governed by the Act and the obligations of small businesses. Learn more about what you need to do to comply.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

What is the Privacy Act?
What is the Privacy Act?
What is the Privacy Act?
August 10, 2023

The Privacy Act regulates how businesses & government agencies handle personal information. It ensures customer privacy is protected. Learn more about your obligations as a small business.
The Privacy Act regulates how businesses & government agencies handle personal information. It ensures customer privacy is protected. Learn more about your obligations as a small business.
The Privacy Act regulates how businesses & government agencies handle personal information. It ensures customer privacy is protected. Learn more about your obligations as a small business.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

14 Essential Cyber Security & Data Governance Tips for Small Businesses
14 Essential Cyber Security & Data Governance Tips for Small Businesses
14 Essential Cyber Security & Data Governance Tips for Small Businesses
August 10, 2023

Cyber security & data governance isn’t just for large corporations and governments. SMEs are also vulnerable. Here are some simple but effective ways to boost your business’ cybersecurity.
Cyber security & data governance isn’t just for large corporations and governments. SMEs are also vulnerable. Here are some simple but effective ways to boost your business’ cybersecurity.
Cyber security & data governance isn’t just for large corporations and governments. SMEs are also vulnerable. Here are some simple but effective ways to boost your business’ cybersecurity.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

What is the GDPR (or General Data Protection Regulation)?
What is the GDPR (or General Data Protection Regulation)?
What is the GDPR (or General Data Protection Regulation)?
August 10, 2023

The GDPR is the strongest set of privacy and security laws in the world. Proposed reforms to the Privacy Act in Australia are set to bring our laws in line with the GDPR. Learn about your obligations as a small business.
The GDPR is the strongest set of privacy and security laws in the world. Proposed reforms to the Privacy Act in Australia are set to bring our laws in line with the GDPR. Learn about your obligations as a small business.
The GDPR is the strongest set of privacy and security laws in the world. Proposed reforms to the Privacy Act in Australia are set to bring our laws in line with the GDPR. Learn about your obligations as a small business.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

What is the Essential 8?
What is the Essential 8?
What is the Essential 8?
August 10, 2023

Developed by the ASCS, the Essential 8 are a set of mitigation strategies that can be used by organisations to protect themselves against possible cyberattacks and protect sensitive information in line with the Privacy Act.
Developed by the ASCS, the Essential 8 are a set of mitigation strategies that can be used by organisations to protect themselves against possible cyberattacks and protect sensitive information in line with the Privacy Act.
Developed by the ASCS, the Essential 8 are a set of mitigation strategies that can be used by organisations to protect themselves against possible cyberattacks and protect sensitive information in line with the Privacy Act.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

Which Essential Eight Maturity Level Does Your Business Need?
Which Essential Eight Maturity Level Does Your Business Need?
Which Essential Eight Maturity Level Does Your Business Need?
August 10, 2023

Organisations should achieve an Essential Eight maturity level that is appropriate to their risk profile, taking into account all possible risks and the costs involved in enhancing their security measures
Organisations should achieve an Essential Eight maturity level that is appropriate to their risk profile, taking into account all possible risks and the costs involved in enhancing their security measures
Organisations should achieve an Essential Eight maturity level that is appropriate to their risk profile, taking into account all possible risks and the costs involved in enhancing their security measures
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

The Problem With Traditional Information Security Management Compliance
The Problem With Traditional Information Security Management Compliance
The Problem With Traditional Information Security Management Compliance
December 2, 2022

The traditional approach to information security management compliance is complex, convoluted & time-consuming. The solution? Integrated, sustainable compliance.
The traditional approach to information security management compliance is complex, convoluted & time-consuming. The solution? Integrated, sustainable compliance.
The traditional approach to information security management compliance is complex, convoluted & time-consuming. The solution? Integrated, sustainable compliance.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO

Supply Chain Governance: A Growing Imperative
Supply Chain Governance: A Growing Imperative
Supply Chain Governance: A Growing Imperative
December 2, 2022

Robust supply chain governance is essential to winning large-scale, highly profitable government projects—particularly in the military and defence industries.
Robust supply chain governance is essential to winning large-scale, highly profitable government projects—particularly in the military and defence industries.
Robust supply chain governance is essential to winning large-scale, highly profitable government projects—particularly in the military and defence industries.
AL

Andrew Lawrence
Andrew Lawrence
Andrew Lawrence
CEO
CEO
CEO
© de.iterate Pty Ltd, 2021-2023
© Secureroo Pty Ltd, 2023