Computer network engineer working

The Types of Managed Services Your IT Provider Can Offer

What is a managed service?   An MS is a remote service that takes care of your specialised day-to-day operations. A managed service provider (MSP) has the capabilities to provide the necessary infrastructure and IT support for businesses that can’t afford – or don’t want – to pay for in-house talent.   When you outsource […]

Nathan |
Lady using phone in front of laptop

IT Support Pricing: Where Does Your Budget Go?

What do you get for your money? This year, the IT support sector is expected to grow 9% compared to last year. This is partially due to the impact of coronavirus, but it’s expected that remote partnerships are here to stay thanks to the flexibility and value-for-money they deliver.   When you outsource IT support […]

Nathan |
Man talking in front of laptop

How to Help Employees Get Onboard with New Tech Tools

Change to logistics and processes is another challenge, especially when giving your company a technological overhaul. For existing companies, changing mindsets is not easy, whilst for a startup, the challenge is delivering your software and processes in such a way that the staff base quickly gets onboard. ZD Net explains how Australia has a vibrant and […]

Chloe Richards |

What is Gootkit & How is it Poisoning Search?

What is Gootkit? Gootkit is Java-script based malware that’s been around for more than half a decade, but has recently innovated itself to present more threats to users online. The Gootkit malware family is most notable for banking credential theft, but performs a range of malicious activities, including keystroke capturing, video recording, email and password […]

Nathan |
Map of Australia

Breaking Down the Data Breaches on the Aussie Government

What is a data breach? A data breach describes an incident where information is accessed, lost, altered, disclosed or destroyed without authorisation. It’s a security breach that could occur due to deliberate or accidental reasons. The result is a loss of personal data, or a compromise of the integrity or confidentiality of that data.   […]

Nathan |
Man sitting at pc looking over emails

Email Phishing: What it is & How to Stay Safe

What is email phishing? The easiest way to remember what “phishing” is, is to think of it as cybercriminals “fishing” for your information. They do this by sending fraudulent emails (like those in your junk folder, or the sneaky ones that sometimes make it into your inbox), to lure you into providing things like passwords, […]

Nathan |
Melbourne Tram - Melbourne CBD

RideSpace: The Predictive Modelling Technology for Victoria’s Commuters

We’re making our way back into the office, going to the gym, and even getting on the beers. With this comes concerns about getting from A to B and complying with physical distancing in the process. To help give commuters peace of mind, a free, mobile-responsive minisite known as RideSpace has been fast-tracked and made […]

Nathan |

If Google Breaks Up With Australia, Will Bing Be Ready?

 It comes after the Australian Competition and Consumer Commission (ACCC) proposed laws that would force tech heavyweights Google and Facebook to pay domestic news outlets for their content, including payment for links and snippets. Google and Facebook have called the regulations “unworkable” and have threatened to withdraw key services from the country, should the government […]

Nathan |
Protecting Your Privacy with a VPN

Protecting Your Privacy with a VPN

What does a VPN do? The internet was created for easy information exchange, and it has done a tremendous job of that – if only the majority of Facebook users could decipher fact from opinion. But if the internet was a coin, ease of use is on one side – and security the other.  While […]

Nathan |

What Is Zoombombing? And How to Prevent It

Zoombombing. It’s Not Made-Up. Picture this. You’re in the middle of an Zoom call – whether it’s the sale of the year, a performance review or simply a run-of-the-mill meeting with your team – when suddenly, someone in the call starts spewing profanities. No, it’s not Steven from accounting spilling his coffee on his trackies […]

Nathan |

Explore our resources

Your one source for IT news, information, webinars, workshops and guides to help you get the most from your organisational technology.

ISDN disconnection and what it means to you

ISDN has been a staple for telephone in businesses for many years, but Telstra has announced the cessation of this technology….

READ BLOG

IT security basics for everyday businesses

In our latest paper, ‘IT security basics for everyday businesses’ we demystify IT security and share budget-friendly tips, so you can begin putting basic security measures in place. It’s remarkably easy.

DOWNLOAD E-BOOKLET

MOIRA Casestudy

An in-depth case study into how we helped MOIRA during an unparalleled period of growth navigate an office relocation and improve efficiencies across their IT infrastructure and security. Upon doing so, building a strong relationship and continuing to provide Managed IT Services.

READ CASE STUDY