Map of Australia

Breaking Down the Data Breaches on the Aussie Government

What is a data breach? A data breach describes an incident where information is accessed, lost, altered, disclosed or destroyed without authorisation. It’s a security breach that could occur due to deliberate or accidental reasons. The result is a loss of personal data, or a compromise of the integrity or confidentiality of that data.   […]

Nathan |
Man sitting at pc looking over emails

Email Phishing: What it is & How to Stay Safe

What is email phishing? The easiest way to remember what “phishing” is, is to think of it as cybercriminals “fishing” for your information. They do this by sending fraudulent emails (like those in your junk folder, or the sneaky ones that sometimes make it into your inbox), to lure you into providing things like passwords, […]

Nathan |
Melbourne Tram - Melbourne CBD

RideSpace: The Predictive Modelling Technology for Victoria’s Commuters

We’re making our way back into the office, going to the gym, and even getting on the beers. With this comes concerns about getting from A to B and complying with physical distancing in the process. To help give commuters peace of mind, a free, mobile-responsive minisite known as RideSpace has been fast-tracked and made […]

Nathan |

If Google Breaks Up With Australia, Will Bing Be Ready?

 It comes after the Australian Competition and Consumer Commission (ACCC) proposed laws that would force tech heavyweights Google and Facebook to pay domestic news outlets for their content, including payment for links and snippets. Google and Facebook have called the regulations “unworkable” and have threatened to withdraw key services from the country, should the government […]

Nathan |
Protecting Your Privacy with a VPN

Protecting Your Privacy with a VPN

What does a VPN do? The internet was created for easy information exchange, and it has done a tremendous job of that – if only the majority of Facebook users could decipher fact from opinion. But if the internet was a coin, ease of use is on one side – and security the other.  While […]

Nathan |

What Is Zoombombing? And How to Prevent It

Zoombombing. It’s Not Made-Up. Picture this. You’re in the middle of an Zoom call – whether it’s the sale of the year, a performance review or simply a run-of-the-mill meeting with your team – when suddenly, someone in the call starts spewing profanities. No, it’s not Steven from accounting spilling his coffee on his trackies […]

Nathan |

Using Fingerprint & Facial Biometrics as Passwords

Biometrics as Passwords? Biometrics is a feature many of us are already familiar with. Every time you unlock your smartphone with fingerprint or facial recognition, or ask Siri for a weather update, you’re using the technology. Previously, the security aspect of biometrics was exclusive to ‘offline’ services, such as unlocking your smartphone or logging into […]

Nathan |
Email Phishing

Email Phishing During Coronavirus

Scamwatch reports over 2,000 coronavirus-related scam reports Scamwatch has reported over $700,000 in losses from businesses around Australia since the coronavirus pandemic due to phishing. While businesses continue to soldier on as the coronavirus shows no signs of stopping, the serious threat of ransomware is evolving tremendously.   Don’t trust ‘myGov’ links Scammers are pretending […]

Nathan |
Microsoft Teams vs. Zoom and Other Applications

Microsoft Teams vs. Zoom and Other Applications

Communication is key to remote work With remote work, communication is key to ensure the success of your operation. Because of this, platforms such as Slack, Zoom and Microsoft Teams have become invaluable tools in helping companies manage products, arrange meetings and exchange information despite kilometres of distance. However, with so many tools to choose […]

Nathan |
knowledge security breaches and malware attacks

Peace of Mind – What is it Worth to You?

Will peace of mind prevent an attack from happening? Not necessarily – but putting effective safety measures in place to protect your company’s data, especially while remote access to data is 100% necessary, can help you avert a breach that could cost your company an abundance of resources, time and money to fix.  Reports from […]

Nathan |

Explore our resources

Your one source for IT news, information, webinars, workshops and guides to help you get the most from your organisational technology.

ISDN disconnection and what it means to you

ISDN has been a staple for telephone in businesses for many years, but Telstra has announced the cessation of this technology….

READ BLOG

IT security basics for everyday businesses

In our latest paper, ‘IT security basics for everyday businesses’ we demystify IT security and share budget-friendly tips, so you can begin putting basic security measures in place. It’s remarkably easy.

DOWNLOAD E-BOOKLET

MOIRA Casestudy

An in-depth case study into how we helped MOIRA during an unparalleled period of growth navigate an office relocation and improve efficiencies across their IT infrastructure and security. Upon doing so, building a strong relationship and continuing to provide Managed IT Services.

READ CASE STUDY