Services
Employee Awareness Education
Cybersecurity Audits
Endpoint Security
Advanced Monitoring & Reporting
Office Relocation
IT Strategic Roadmaps
NDS Management
IT Procurement
Software Selection & Implementation
IT Migration Service
Cloud Computing
Hybrid Cloud
Data Backup
Data Recovery
Private Cloud Services
Sovereign Cloud Services
Software as a service (SaaS)
Public Cloud Services
IT Strategy
Office Migration
Endpoint Detection & Response
Security Operations Center (SOC)
Cyber Security Monitoring
Managed IT Support
Managed Services Provider
Managed IT Services
IT Projects
IT Support
Cyber Security
IT Consulting
Industries
Small-Medium Business
Care Industry
Success Stories
About Us
Meet the team
Blog
Success Stories
1300 10 10 40
Contact Us
1300 10 10 40
Contact Us
Contact Us
Menu
Close
Services
Industries
About Us
Success Stories
Blog
Contact
The Tech Blog
Welcome to The Technology Blog, where we keep you up-to-speed with all things IT in business so you’ll never be left behind. Grab a coffee; we’re going in.
Industries
Cyber Security
Information Technology
Software
IT Services
Education
Bio-tech
Community
Aged Care
Business
Bring Your Own Device, But Not Your Own Risks: A Guide to BYOD Policies
IT Services
September 19, 2024
by
Anna Furlong
Information Technology
Aug 22, 2024
by
Liam Furlong
AI Update: AI Readers
AI Update: AI Readers
Information Technology
Oct 3, 2022
by
Liam Furlong
Cyber Security
Jul 17, 2024
by
Liam Furlong
Strengthening Cyber Security for Remote Workers: Lessons from APT40’s Tactics
Strengthening Cyber Security for Remote Workers: Lessons from APT40’s Tactics
Cyber Security
Oct 3, 2022
by
Liam Furlong
Cyber Security
Jun 18, 2024
by
Anna Furlong
Protecting Yourself from Data Breaches: The Ticketmaster Incident
Protecting Yourself from Data Breaches: The Ticketmaster Incident
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
May 16, 2024
by
Liam Furlong
The Importance of 3-2-1 Backups: Lessons from the UniSuper-Google Cloud Incident
The Importance of 3-2-1 Backups: Lessons from the UniSuper-Google Cloud Incident
Cyber Security
Oct 3, 2022
by
Liam Furlong
Cyber Security
May 16, 2024
by
Anna Furlong
Confidence vs. Reality: Unpacking the 2024 Cisco Report
Confidence vs. Reality: Unpacking the 2024 Cisco Report
Cyber Security
Oct 3, 2022
by
Anna Furlong
Software
Mar 6, 2024
by
Liam Furlong
The Project Management App Showdown: Choosing the Right Tool for Your Team
The Project Management App Showdown: Choosing the Right Tool for Your Team
Software
Oct 27, 2021
by
Liam Furlong
Feb 6, 2024
by
Liam Furlong
Cybersecurity Insights from the Microsoft Midnight Breach
Cybersecurity Insights from the Microsoft Midnight Breach
by
Liam Furlong
Cyber Security
Jan 16, 2024
by
Anna Furlong
Lessons from 'The Iconic': Securing Your Supply Chain
Lessons from 'The Iconic': Securing Your Supply Chain
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Dec 7, 2023
by
Anna Furlong
$41.6m Cybersecurity Boost for SMBs
$41.6m Cybersecurity Boost for SMBs
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
See more
Cyber Security
Jul 17, 2024
by
Liam Furlong
Strengthening Cyber Security for Remote Workers: Lessons from APT40’s Tactics
Strengthening Cyber Security for Remote Workers: Lessons from APT40’s Tactics
Cyber Security
Oct 3, 2022
by
Liam Furlong
Cyber Security
Jun 18, 2024
by
Anna Furlong
Protecting Yourself from Data Breaches: The Ticketmaster Incident
Protecting Yourself from Data Breaches: The Ticketmaster Incident
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
May 16, 2024
by
Liam Furlong
The Importance of 3-2-1 Backups: Lessons from the UniSuper-Google Cloud Incident
The Importance of 3-2-1 Backups: Lessons from the UniSuper-Google Cloud Incident
Cyber Security
Oct 3, 2022
by
Liam Furlong
Cyber Security
May 16, 2024
by
Anna Furlong
Confidence vs. Reality: Unpacking the 2024 Cisco Report
Confidence vs. Reality: Unpacking the 2024 Cisco Report
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Jan 16, 2024
by
Anna Furlong
Lessons from 'The Iconic': Securing Your Supply Chain
Lessons from 'The Iconic': Securing Your Supply Chain
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Dec 7, 2023
by
Anna Furlong
$41.6m Cybersecurity Boost for SMBs
$41.6m Cybersecurity Boost for SMBs
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Dec 7, 2023
by
Liam Furlong
ACSC 2022-2023 Report: Key Insights for Cybersecurity in Business
ACSC 2022-2023 Report: Key Insights for Cybersecurity in Business
Cyber Security
Oct 3, 2022
by
Liam Furlong
Cyber Security
Jan 11, 2024
by
Anna Furlong
What is Endpoint Security?
What is Endpoint Security?
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Oct 17, 2023
by
Anna Furlong
The Importance of Penetration Testing for Businesses: Protect Your Company from Cyber Threats
The Importance of Penetration Testing for Businesses: Protect Your Company from Cyber Threats
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Oct 17, 2023
by
LastPass Data Breach Update
LastPass Data Breach Update
Cyber Security
Oct 3, 2022
by
Cyber Security
Oct 17, 2023
by
Anna Furlong
Cyber Security - How scared should you actually be?
Cyber Security - How scared should you actually be?
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Oct 17, 2023
by
Anna Furlong
Cyber Governance - what today's leaders cannot afford to ignore.
Cyber Governance - what today's leaders cannot afford to ignore.
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Oct 17, 2023
by
Anna Furlong
What is Cyber Security?
What is Cyber Security?
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Oct 17, 2023
by
Anna Furlong
Who is Follina and What Has She Done With Microsoft?
Who is Follina and What Has She Done With Microsoft?
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Oct 17, 2023
by
Anna Furlong
What is Log4j & Why Should You Care?
What is Log4j & Why Should You Care?
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Jul 16, 2024
by
Anna Furlong
What is the Essential Eight Maturity Model?
What is the Essential Eight Maturity Model?
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Oct 17, 2023
by
Anna Furlong
2FA Vs. MFA: What Should You Choose?
2FA Vs. MFA: What Should You Choose?
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Oct 17, 2023
by
Anna Furlong
Peace of Mind – What is it Worth to You?
Peace of Mind – What is it Worth to You?
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Oct 17, 2023
by
Anna Furlong
Email Phishing During Coronavirus
Email Phishing During Coronavirus
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Oct 17, 2023
by
Anna Furlong
Protecting Your Privacy with a VPN
Protecting Your Privacy with a VPN
Cyber Security
Oct 3, 2022
by
Anna Furlong
Cyber Security
Oct 17, 2023
by
Anna Furlong
Phishing Email: What it is & How to Stay Safe
Phishing Email: What it is & How to Stay Safe
Cyber Security
Oct 3, 2022
by
Anna Furlong
IT for Business
See more
Business
Nov 1, 2023
by
Anna Furlong
Changes to the Privacy Act for Aussie SMBs
Changes to the Privacy Act for Aussie SMBs
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
What is VoIP?
What is VoIP?
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
Business Continuity Planning
Business Continuity Planning
Business
Aug 30, 2022
by
Anna Furlong
Business
Jan 11, 2024
by
Anna Furlong
Critical Infrastructure Act: What it Means For Your Business
Critical Infrastructure Act: What it Means For Your Business
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
You Can Now Nab Your .au Domain
You Can Now Nab Your .au Domain
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
Should You Choose Mac or PC For Your Business?
Should You Choose Mac or PC For Your Business?
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
Making the Most of the Australian Tax Breaks for Tech Innovation
Making the Most of the Australian Tax Breaks for Tech Innovation
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
What is a Digital Identity & Do You Need One?
What is a Digital Identity & Do You Need One?
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
Go Digital: What the Federal Budget Means For Your Business
Go Digital: What the Federal Budget Means For Your Business
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
Get Ready to Register: .au is Coming
Get Ready to Register: .au is Coming
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
Hybrid Working Tools for Australian Businesses
Hybrid Working Tools for Australian Businesses
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
What’s With the Current Hardware Shortage in Australia?
What’s With the Current Hardware Shortage in Australia?
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
Why is Cloud Computing Better Than On Premise?
Why is Cloud Computing Better Than On Premise?
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
What is Ransomware & How Does it Work?
What is Ransomware & How Does it Work?
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
Microsoft Teams vs. Zoom and Other Applications
Microsoft Teams vs. Zoom and Other Applications
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
What Is Zoombombing? And How to Prevent It
What Is Zoombombing? And How to Prevent It
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
If Google Breaks Up With Australia, Will Bing Be Ready?
If Google Breaks Up With Australia, Will Bing Be Ready?
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
Anna Furlong
Making the Customer Website Experience a Good One
Making the Customer Website Experience a Good One
Business
Aug 30, 2022
by
Anna Furlong
Business
Oct 17, 2023
by
5 Reasons Why Outsourced IT Services Will Increase the Efficiency of Your Business
5 Reasons Why Outsourced IT Services Will Increase the Efficiency of Your Business
Business
Aug 30, 2022
by
Information Technology
See more
Information Technology
Aug 22, 2024
by
Liam Furlong
AI Update: AI Readers
AI Update: AI Readers
Information Technology
Oct 3, 2022
by
Liam Furlong
Information Technology
Oct 17, 2023
by
Anna Furlong
The Virtual IT Department get's ISO 27001:2022 Certified
The Virtual IT Department get's ISO 27001:2022 Certified
Information Technology
Oct 3, 2022
by
Anna Furlong
Information Technology
Feb 29, 2024
by
Anna Furlong
What is Virtualisation?
What is Virtualisation?
Information Technology
Oct 3, 2022
by
Anna Furlong
Information Technology
Oct 17, 2023
by
Anna Furlong
What is VDI?
What is VDI?
Information Technology
Oct 3, 2022
by
Anna Furlong
Information Technology
Oct 17, 2023
by
Anna Furlong
Business Automation - Where to even start?
Business Automation - Where to even start?
Information Technology
Oct 3, 2022
by
Anna Furlong
Information Technology
Oct 17, 2023
by
Anna Furlong
Top 5 IT Trends for Business in 2023
Top 5 IT Trends for Business in 2023
Information Technology
Oct 3, 2022
by
Anna Furlong
Information Technology
Oct 17, 2023
by
Anna Furlong
What is Cloud Computing?
What is Cloud Computing?
Information Technology
Oct 3, 2022
by
Anna Furlong
Information Technology
Oct 17, 2023
by
Anna Furlong
Australian Businesses Vs. Digital Platforms: The Fight Continues
Australian Businesses Vs. Digital Platforms: The Fight Continues
Information Technology
Oct 3, 2022
by
Anna Furlong
Information Technology
Oct 17, 2023
by
Anna Furlong
What Lessons Can You Take From the Cyber Attack on Vodafone Portugal?
What Lessons Can You Take From the Cyber Attack on Vodafone Portugal?
Information Technology
Oct 3, 2022
by
Anna Furlong
Information Technology
Oct 17, 2023
by
Anna Furlong
Investing in Reactive Vs Proactive IT
Investing in Reactive Vs Proactive IT
Information Technology
Oct 3, 2022
by
Anna Furlong
Information Technology
Oct 17, 2023
by
Anna Furlong
Backing Up Your Business Data
Backing Up Your Business Data
Information Technology
Oct 3, 2022
by
Anna Furlong
Information Technology
Oct 17, 2023
by
Anna Furlong
Using Fingerprint & Facial Biometrics as Passwords
Using Fingerprint & Facial Biometrics as Passwords
Information Technology
Oct 3, 2022
by
Anna Furlong
IT Services
IT Services
Sep 25, 2024
by
Anna Furlong
Bring Your Own Device, But Not Your Own Risks: A Guide to BYOD Policies
Bring Your Own Device, But Not Your Own Risks: A Guide to BYOD Policies
IT Services
Oct 3, 2022
by
Anna Furlong
IT Services
Nov 1, 2023
by
Anna Furlong
Introducing Our 'Fundamental IT Checklist'
Introducing Our 'Fundamental IT Checklist'
IT Services
Oct 3, 2022
by
Anna Furlong
IT Services
Oct 17, 2023
by
Anna Furlong
What is a Managed Service Provider?
What is a Managed Service Provider?
IT Services
Oct 3, 2022
by
Anna Furlong
IT Services
Oct 17, 2023
by
Anna Furlong
5 Reasons Why Your Business Needs an IT Strategy
5 Reasons Why Your Business Needs an IT Strategy
IT Services
Oct 3, 2022
by
Anna Furlong
IT Services
Oct 17, 2023
by
Anna Furlong
What is Managed IT Services?
What is Managed IT Services?
IT Services
Oct 3, 2022
by
Anna Furlong
IT Services
Jan 11, 2024
by
Anna Furlong
How an MSP Can Save You Money
How an MSP Can Save You Money
IT Services
Oct 3, 2022
by
Anna Furlong
IT Services
Oct 17, 2023
by
Anna Furlong
5 Things Your IT Department Should Offer
5 Things Your IT Department Should Offer
IT Services
Oct 3, 2022
by
Anna Furlong
IT Services
Oct 17, 2023
by
Anna Furlong
The Types of Managed Services Your IT Provider Can Offer
The Types of Managed Services Your IT Provider Can Offer
IT Services
Oct 3, 2022
by
Anna Furlong
IT Services
Oct 17, 2023
by
Anna Furlong
IT Support Pricing: Where Does Your Budget Go?
IT Support Pricing: Where Does Your Budget Go?
IT Services
Oct 3, 2022
by
Anna Furlong
IT Services
Oct 17, 2023
by
What is a Virtual CIO & Why Should You Care?
What is a Virtual CIO & Why Should You Care?
IT Services
Oct 3, 2022
by
Industries
See more
Industries
Mar 14, 2024
by
Anna Furlong
Technological Innovation in Education
Technological Innovation in Education
Industries
Oct 3, 2022
by
Anna Furlong
Industries
Oct 17, 2023
by
Aged Care and the Desperate Need for IT Innovation
Aged Care and the Desperate Need for IT Innovation
Industries
Oct 3, 2022
by
Subscribe to our newsletter for great monthly business resources.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Join Us!
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Join Us!