What does a VPN do? The internet was created for easy information exchange, and it has done a tremendous job of that – if only the majority of Facebook users could decipher fact from opinion. But if the internet was a coin, ease of use is on one side – and security the other. While […]
Zoombombing. It’s Not Made-Up. Picture this. You’re in the middle of an Zoom call – whether it’s the sale of the year, a performance review or simply a run-of-the-mill meeting with your team – when suddenly, someone in the call starts spewing profanities. No, it’s not Steven from accounting spilling his coffee on his trackies […]
Biometrics as Passwords? Biometrics is a feature many of us are already familiar with. Every time you unlock your smartphone with fingerprint or facial recognition, or ask Siri for a weather update, you’re using the technology. Previously, the security aspect of biometrics was exclusive to ‘offline’ services, such as unlocking your smartphone or logging into […]
Scamwatch reports over 2,000 coronavirus-related scam reports Scamwatch has reported over $700,000 in losses from businesses around Australia since the coronavirus pandemic due to phishing. While businesses continue to soldier on as the coronavirus shows no signs of stopping, the serious threat of ransomware is evolving tremendously. Don’t trust ‘myGov’ links Scammers are pretending […]
Communication is key to remote work With remote work, communication is key to ensure the success of your operation. Because of this, platforms such as Slack, Zoom and Microsoft Teams have become invaluable tools in helping companies manage products, arrange meetings and exchange information despite kilometres of distance. However, with so many tools to choose […]
Will peace of mind prevent an attack from happening? Not necessarily – but putting effective safety measures in place to protect your company’s data, especially while remote access to data is 100% necessary, can help you avert a breach that could cost your company an abundance of resources, time and money to fix. Reports from […]
With this increase comes an inflation of costs associated with this technique. Whether you’re working in-house or your business has switched to remote work due to restrictions, ransomware poses a serious threat to users across the world, particularly big businesses and tech companies with a lot to lose. By infecting computers or mobile devices, this […]
Greater scalability With a horde of businesses across Australia forced to shut down and make the switch to remote operations due to the COVID-19 outbreak, having a secure location to store data that still remains accessible out of the office is more important now than ever. The hybrid model can be quite effective in remedying […]
Working from home used to be a perk, with most companies carrying out this policy in an attempt to increase work productivity on various occasions. The reality of the situation is that now, work from home is becoming more of a necessity than a luxury, but what if your company isn’t ready for it? Luckily, […]
Encrypt your data Software updates and password protection isn’t enough to protect you from hackers and cyber threats anymore. And data encryption isn’t simply reserved for tech gurus – modern tools make it possible for anyone to encrypt information online. For example, Office 365 uses encryption in two ways: in the service, and as a […]
Explore our resources
Your one source for IT news, information, webinars, workshops and guides to help you get the most from your organisational technology.
ISDN disconnection and what it means to you
ISDN has been a staple for telephone in businesses for many years, but Telstra has announced the cessation of this technology….
IT security basics for everyday businesses
In our latest paper, ‘IT security basics for everyday businesses’ we demystify IT security and share budget-friendly tips, so you can begin putting basic security measures in place. It’s remarkably easy.
An in-depth case study into how we helped MOIRA during an unparalleled period of growth navigate an office relocation and improve efficiencies across their IT infrastructure and security. Upon doing so, building a strong relationship and continuing to provide Managed IT Services.