27.10.2020 Views

Defence Business Issue 52 OCT-DEC 2020

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Oct - Dec <strong>2020</strong> <strong>Defence</strong> <strong>Business</strong> COVID-19 CASE STUDIES 31<br />

All travellers arriving in Australia, including Australian citizens, are subject to<br />

mandatory quarantine for 14 days at a designated facility, such as a hotel, in their port<br />

of arrival. See Coronavirus (COVID-19) advice for travellers. You may be required to<br />

pay for the costs of your quarantine. To find out more about quarantine requirements,<br />

contact the relevant state or territory government health department.<br />

Visa applications and travel ban waivers are now very much a combined process, you<br />

can’t get one without the other.<br />

To date, Migration Solutions has successfully obtained close to 50 travel ban waivers<br />

in the <strong>Defence</strong>, Health, Sport, Agriculture, Food Processing and Electrical Trades.<br />

We have also assisted many Australian citizens and residents with applications to<br />

depart Australia.<br />

Whilst the application process for obtaining a travel ban waiver is not always easy,<br />

it is not impossible. It is important to understand what is required and to submit all<br />

the necessary documentation with the waiver request. This is particularly important<br />

when trying to recruit internationally to address: current or future workforce needs;<br />

if requiring service technicians from overseas for the delivery or commissioning of<br />

new technology, machinery, plant or equipment; or to transfer specialised skills and<br />

knowledge to local workforce.<br />

As a proud member of the DTC for 15 years, Migration Solutions is happy to discuss<br />

visas and travel ban waivers with other DTC members as a complimentary service.<br />

"If you are not granted an<br />

exemption, you should not<br />

continue with your travel plans,<br />

as you will not be permitted to<br />

board a flight to Australia."<br />

TAKE IT TO<br />

THE BANK<br />

We’ve got your cyber<br />

security locked-up<br />

MERCURY INFORMATION SECURITY SERVICES ARE A LEADING PROVIDER OF INFORMATION<br />

SECURITY SERVICES, ADVICE AND CONSULTING THAT ALLOWS YOU TO CONCENTRATE ON<br />

RUNNING YOUR BUSINESS. AMONG THE SERVICES WE PROVIDE ARE THE FOLLOWING:<br />

PROFESSIONAL & AUGMENTED<br />

ASSURANCE SERVICES<br />

Our Professional Assurance Services offers<br />

traditional cybersecurity mitigation activities,<br />

individually or in a suite. Delivered in a consulting<br />

approach and tailored specifically to your<br />

organisation, this service provides a detailed<br />

snapshot of issues and risks that face your<br />

organisation. It is comprised of activities that<br />

include; Penetration Testing, Social Engineering,<br />

Design and Architecture Reviews and a range<br />

of others.<br />

The Augmented Assurance Services provided via<br />

our automated digital assurance platform offers<br />

ongoing vulnerability analysis and reporting.<br />

Delivered as a subscription-based service, this is<br />

an enhanced system that allows you to maintain<br />

the security posture of your organisation using<br />

our latest technology for continuous evaluation<br />

and analysis.<br />

If you’d like to find out more about Mercury Information<br />

Services or discuss your specific needs please contact us<br />

through our website by visiting www. mercuryiss.com.au<br />

SPECIALISED SECURITY PLATFORMS<br />

Mercury offers a range of specialised online<br />

cyber security platforms. The easy to use<br />

platforms provide reliable and ongoing<br />

assessments in a number of specialised areas<br />

depending on your organisation’s requirements.<br />

These include:<br />

SOC (Security Operations Centre) Checker<br />

> A custom assessment platform designed to<br />

evaluate the effectiveness of your SOC<br />

Threat Hunter<br />

> Automated identification and isolation of<br />

potential risks prior to intrusion.<br />

SigKnight<br />

> Wireless intrusion detection and<br />

countermeasures

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!