What is a managed service? An MS is a remote service that takes care of your specialised day-to-day operations. A managed service provider (MSP) has the capabilities to provide the necessary infrastructure and IT support for businesses that can’t afford – or don’t want – to pay for in-house talent. When you outsource […]
What do you get for your money? This year, the IT support sector is expected to grow 9% compared to last year. This is partially due to the impact of coronavirus, but it’s expected that remote partnerships are here to stay thanks to the flexibility and value-for-money they deliver. When you outsource IT support […]
Change to logistics and processes is another challenge, especially when giving your company a technological overhaul. For existing companies, changing mindsets is not easy, whilst for a startup, the challenge is delivering your software and processes in such a way that the staff base quickly gets onboard. ZD Net explains how Australia has a vibrant and […]
What is Gootkit? Gootkit is Java-script based malware that’s been around for more than half a decade, but has recently innovated itself to present more threats to users online. The Gootkit malware family is most notable for banking credential theft, but performs a range of malicious activities, including keystroke capturing, video recording, email and password […]
What is a data breach? A data breach describes an incident where information is accessed, lost, altered, disclosed or destroyed without authorisation. It’s a security breach that could occur due to deliberate or accidental reasons. The result is a loss of personal data, or a compromise of the integrity or confidentiality of that data. […]
What is email phishing? The easiest way to remember what “phishing” is, is to think of it as cybercriminals “fishing” for your information. They do this by sending fraudulent emails (like those in your junk folder, or the sneaky ones that sometimes make it into your inbox), to lure you into providing things like passwords, […]
We’re making our way back into the office, going to the gym, and even getting on the beers. With this comes concerns about getting from A to B and complying with physical distancing in the process. To help give commuters peace of mind, a free, mobile-responsive minisite known as RideSpace has been fast-tracked and made […]
It comes after the Australian Competition and Consumer Commission (ACCC) proposed laws that would force tech heavyweights Google and Facebook to pay domestic news outlets for their content, including payment for links and snippets. Google and Facebook have called the regulations “unworkable” and have threatened to withdraw key services from the country, should the government […]
What does a VPN do? The internet was created for easy information exchange, and it has done a tremendous job of that – if only the majority of Facebook users could decipher fact from opinion. But if the internet was a coin, ease of use is on one side – and security the other. While […]
Zoombombing. It’s Not Made-Up. Picture this. You’re in the middle of an Zoom call – whether it’s the sale of the year, a performance review or simply a run-of-the-mill meeting with your team – when suddenly, someone in the call starts spewing profanities. No, it’s not Steven from accounting spilling his coffee on his trackies […]
Explore our resources
Your one source for IT news, information, webinars, workshops and guides to help you get the most from your organisational technology.
ISDN disconnection and what it means to you
ISDN has been a staple for telephone in businesses for many years, but Telstra has announced the cessation of this technology….
IT security basics for everyday businesses
In our latest paper, ‘IT security basics for everyday businesses’ we demystify IT security and share budget-friendly tips, so you can begin putting basic security measures in place. It’s remarkably easy.
An in-depth case study into how we helped MOIRA during an unparalleled period of growth navigate an office relocation and improve efficiencies across their IT infrastructure and security. Upon doing so, building a strong relationship and continuing to provide Managed IT Services.