Notifiable Data Breaches Scheme
By now you would’ve seen press around changes to the Privacy Act of 1988 requiring all Australian operated entities to report all breaches of personal data to their constituents. In theory, the transparency between yourselves and your customers will help to breed more trust. However, this poses key questions around how you manage, access, report on and store your personal data.
If you’re like most organisations, you probably have an exponentially growing size of data you are holding on. You probably have multiple sites where you store this data and have some sort of software (or not) to help you manage and retain this. You’re also probably investing in lots of different applications which have different types of data held on their platform (SaaS/PaaS) and/or the types of files you keep.
With the new regulations in place, the question is simple – are you confident that you are across all data workloads that your organisation is holding, storing and accumulating? Do you have a clear action plan to communicate these changes to your constituents?
Counterparts and our Software Availability solutions partner Veeam have a simple mantra to helping you solve this – Know, Manage and Protect your data.
Knowing where your data is, what types of files you are storing and where you are storing these workloads are incredibly important if you are to calculate the potential risk of being compromised. If you aren’t already across this, this step should not just help you with compliance regulations but also potentially result in efficiency savings through reduced storage and infrastructure costs.
Managing your data is the next step; as you need to set up policies and processes to know that your organisation is regularly backing up and archiving key pieces of information as required. It’s also knowing that you have wider visibility over your entire data workload capabilities and can accurately forecast and make decisions around your data protection strategy.
Protecting your data is the final piece through a combination of automated, policy driven software that helps you aggregate and orchestrate data flows across your organisation, resulting in the consolidation and/or accurate distribution of data workloads where you want it. It also involves ensuring your security infrastructure is on point to prevent the actual compromise from occurring.
If you’re like most organisations, you probably have an exponentially growing size of data you are holding on. You probably have multiple sites where you store this data and have some sort of software (or not) to help you manage and retain this. You’re also probably investing in lots of different applications which have different types of data held on their platform (SaaS/PaaS) and/or the types of files you keep.
With the new regulations in place, the question is simple – are you confident that you are across all data workloads that your organisation is holding, storing and accumulating? Do you have a clear action plan to communicate these changes to your constituents?
Counterparts and our Software Availability solutions partner Veeam have a simple mantra to helping you solve this – Know, Manage and Protect your data.
Knowing where your data is, what types of files you are storing and where you are storing these workloads are incredibly important if you are to calculate the potential risk of being compromised. If you aren’t already across this, this step should not just help you with compliance regulations but also potentially result in efficiency savings through reduced storage and infrastructure costs.
Managing your data is the next step; as you need to set up policies and processes to know that your organisation is regularly backing up and archiving key pieces of information as required. It’s also knowing that you have wider visibility over your entire data workload capabilities and can accurately forecast and make decisions around your data protection strategy.
Protecting your data is the final piece through a combination of automated, policy driven software that helps you aggregate and orchestrate data flows across your organisation, resulting in the consolidation and/or accurate distribution of data workloads where you want it. It also involves ensuring your security infrastructure is on point to prevent the actual compromise from occurring.

Counterparts Technology is a trusted advisor and implementer with great pedigree in solving complex technology problems to improve overall business outcomes. Our strength in Consulting & Advisory and providing comprehensive security services to organisations across Australia means you can trust that you are partnering with the right people.Our structured security approach includes:
We would welcome the opportunity to discuss your current security status. To book this please contact us at security@counterparts.com or at 1300 533 354.
In addition you can connect with us on LinkedIn and through our website to understand who we are and how we’ve been helping other organisations manage security challenges.
- Endpoint protection
- Perimeter protection
- Proactive Threat Monitoring
- IoT & Print Security
- End User testing and training
- Board/Executive preparedness
- Breach simulation and training
- Risk assessment and mitigation
- Insurance and Legal recommendations
We would welcome the opportunity to discuss your current security status. To book this please contact us at security@counterparts.com or at 1300 533 354.
In addition you can connect with us on LinkedIn and through our website to understand who we are and how we’ve been helping other organisations manage security challenges.