Defence Business Issue 52 OCT-DEC 2020
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Oct - Dec <strong>2020</strong> <strong>Defence</strong> <strong>Business</strong> COVID-19 CASE STUDIES 31<br />
All travellers arriving in Australia, including Australian citizens, are subject to<br />
mandatory quarantine for 14 days at a designated facility, such as a hotel, in their port<br />
of arrival. See Coronavirus (COVID-19) advice for travellers. You may be required to<br />
pay for the costs of your quarantine. To find out more about quarantine requirements,<br />
contact the relevant state or territory government health department.<br />
Visa applications and travel ban waivers are now very much a combined process, you<br />
can’t get one without the other.<br />
To date, Migration Solutions has successfully obtained close to 50 travel ban waivers<br />
in the <strong>Defence</strong>, Health, Sport, Agriculture, Food Processing and Electrical Trades.<br />
We have also assisted many Australian citizens and residents with applications to<br />
depart Australia.<br />
Whilst the application process for obtaining a travel ban waiver is not always easy,<br />
it is not impossible. It is important to understand what is required and to submit all<br />
the necessary documentation with the waiver request. This is particularly important<br />
when trying to recruit internationally to address: current or future workforce needs;<br />
if requiring service technicians from overseas for the delivery or commissioning of<br />
new technology, machinery, plant or equipment; or to transfer specialised skills and<br />
knowledge to local workforce.<br />
As a proud member of the DTC for 15 years, Migration Solutions is happy to discuss<br />
visas and travel ban waivers with other DTC members as a complimentary service.<br />
"If you are not granted an<br />
exemption, you should not<br />
continue with your travel plans,<br />
as you will not be permitted to<br />
board a flight to Australia."<br />
TAKE IT TO<br />
THE BANK<br />
We’ve got your cyber<br />
security locked-up<br />
MERCURY INFORMATION SECURITY SERVICES ARE A LEADING PROVIDER OF INFORMATION<br />
SECURITY SERVICES, ADVICE AND CONSULTING THAT ALLOWS YOU TO CONCENTRATE ON<br />
RUNNING YOUR BUSINESS. AMONG THE SERVICES WE PROVIDE ARE THE FOLLOWING:<br />
PROFESSIONAL & AUGMENTED<br />
ASSURANCE SERVICES<br />
Our Professional Assurance Services offers<br />
traditional cybersecurity mitigation activities,<br />
individually or in a suite. Delivered in a consulting<br />
approach and tailored specifically to your<br />
organisation, this service provides a detailed<br />
snapshot of issues and risks that face your<br />
organisation. It is comprised of activities that<br />
include; Penetration Testing, Social Engineering,<br />
Design and Architecture Reviews and a range<br />
of others.<br />
The Augmented Assurance Services provided via<br />
our automated digital assurance platform offers<br />
ongoing vulnerability analysis and reporting.<br />
Delivered as a subscription-based service, this is<br />
an enhanced system that allows you to maintain<br />
the security posture of your organisation using<br />
our latest technology for continuous evaluation<br />
and analysis.<br />
If you’d like to find out more about Mercury Information<br />
Services or discuss your specific needs please contact us<br />
through our website by visiting www. mercuryiss.com.au<br />
SPECIALISED SECURITY PLATFORMS<br />
Mercury offers a range of specialised online<br />
cyber security platforms. The easy to use<br />
platforms provide reliable and ongoing<br />
assessments in a number of specialised areas<br />
depending on your organisation’s requirements.<br />
These include:<br />
SOC (Security Operations Centre) Checker<br />
> A custom assessment platform designed to<br />
evaluate the effectiveness of your SOC<br />
Threat Hunter<br />
> Automated identification and isolation of<br />
potential risks prior to intrusion.<br />
SigKnight<br />
> Wireless intrusion detection and<br />
countermeasures