Blog

Falling for phishing emails and ransomware attacks has become increasingly common. Why and how people continue to fall for these scams, despite knowing they are out there, often comes down to being too busy to take the time to assess their actions. Attention to detail is...

You never know what's going to happen, all you can do is plan for the worst case scenario. This is why backing up your data is crucial. When starting this process, there are two things you need to determine first What data do I have that...

It’s no secret that the biggest buzzword in the tech world is “Cloud”. If you’re a business owner, IT Consultant or Software Vendor you should be looking at leveraging the capabilities the Cloud. If not, you will get left behind. I'll be honest I love Google....

The changeover to the National Broadband Network (NBN) should be easy but as many businesses are finding this just isn’t the case. Phone systems which rely on the Public Switched Telephone Network (PSTN) or Integrated Services Digital Network (ISDN) either have to be replaced or “Retro-fitted” to...

I am sure that most people would have heard of the Yahoo data breach in 2013, the eBay breach of 2014 or just last year, the Equifax breach. In all cases personal information of subscribers including usernames / email address and passwords were stolen and...

Our first IT Champion Training Program of 2018 focused on Security and keeping your business data safe in an online world. Here's a quick recap of what we covered: New IT Security Laws From the 22 February, businesses with a turnover of more than $3 million are...

The Situation The IT Industry has been rocked by critical vulnerabilities in the CPU architectures of Intel, ARM, AMD and IBM. These are hardware exploits and affect most common operating systems like Windows, Mac OSX, iOS, Linux, ChromeOS, Cloud Hosts like Azure, Amazon, Google and a vast...

Remote access for staff is a great business enabler - but are you opening yourself to a world of hurt? An open method of remote access, usually the inbuilt Windows Remote Desktop allows for connections to servers and desktops to allow road warriors to access...

ATTENTION. Imagine being the employee who authorises a money transfer because an email, which you thought was legit, told you to do so. Your error has cost the business you work for thousands of dollars. Or,  imagine clicking on a download link in a well crafted...

Passwords, pin codes, fingerprint readers, smart phones, banking, ATMs, personal and work email, internet services- as we become more and more connected as a society we must increase our vigilance around security. Unfortunately following this methodology causes no end of frustrations as we not only have...