What is a data breach? A data breach describes an incident where information is accessed, lost, altered, disclosed or destroyed without authorisation. It’s a security breach that could occur due to deliberate or accidental reasons. The result is a loss of personal data, or a compromise of the integrity or confidentiality of that data. […]
What is email phishing? The easiest way to remember what “phishing” is, is to think of it as cybercriminals “fishing” for your information. They do this by sending fraudulent emails (like those in your junk folder, or the sneaky ones that sometimes make it into your inbox), to lure you into providing things like passwords, […]
We’re making our way back into the office, going to the gym, and even getting on the beers. With this comes concerns about getting from A to B and complying with physical distancing in the process. To help give commuters peace of mind, a free, mobile-responsive minisite known as RideSpace has been fast-tracked and made […]
It comes after the Australian Competition and Consumer Commission (ACCC) proposed laws that would force tech heavyweights Google and Facebook to pay domestic news outlets for their content, including payment for links and snippets. Google and Facebook have called the regulations “unworkable” and have threatened to withdraw key services from the country, should the government […]
What does a VPN do? The internet was created for easy information exchange, and it has done a tremendous job of that – if only the majority of Facebook users could decipher fact from opinion. But if the internet was a coin, ease of use is on one side – and security the other. While […]
Zoombombing. It’s Not Made-Up. Picture this. You’re in the middle of an Zoom call – whether it’s the sale of the year, a performance review or simply a run-of-the-mill meeting with your team – when suddenly, someone in the call starts spewing profanities. No, it’s not Steven from accounting spilling his coffee on his trackies […]
Biometrics as Passwords? Biometrics is a feature many of us are already familiar with. Every time you unlock your smartphone with fingerprint or facial recognition, or ask Siri for a weather update, you’re using the technology. Previously, the security aspect of biometrics was exclusive to ‘offline’ services, such as unlocking your smartphone or logging into […]
Scamwatch reports over 2,000 coronavirus-related scam reports Scamwatch has reported over $700,000 in losses from businesses around Australia since the coronavirus pandemic due to phishing. While businesses continue to soldier on as the coronavirus shows no signs of stopping, the serious threat of ransomware is evolving tremendously. Don’t trust ‘myGov’ links Scammers are pretending […]
Communication is key to remote work With remote work, communication is key to ensure the success of your operation. Because of this, platforms such as Slack, Zoom and Microsoft Teams have become invaluable tools in helping companies manage products, arrange meetings and exchange information despite kilometres of distance. However, with so many tools to choose […]
Will peace of mind prevent an attack from happening? Not necessarily – but putting effective safety measures in place to protect your company’s data, especially while remote access to data is 100% necessary, can help you avert a breach that could cost your company an abundance of resources, time and money to fix. Reports from […]
Explore our resources
Your one source for IT news, information, webinars, workshops and guides to help you get the most from your organisational technology.
ISDN disconnection and what it means to you
ISDN has been a staple for telephone in businesses for many years, but Telstra has announced the cessation of this technology….
IT security basics for everyday businesses
In our latest paper, ‘IT security basics for everyday businesses’ we demystify IT security and share budget-friendly tips, so you can begin putting basic security measures in place. It’s remarkably easy.
An in-depth case study into how we helped MOIRA during an unparalleled period of growth navigate an office relocation and improve efficiencies across their IT infrastructure and security. Upon doing so, building a strong relationship and continuing to provide Managed IT Services.