Blog

Merry Christmas and a Happy New Year

To all our customers and friends, We would like to take this opportunity to thank you for your ongoing friendship and support throughout 2017. We wish you a very merry and safe Christmas, New Year and Holiday Period. With 2018 being around the corner lets have a quick look with what is happening. The biggest…
Read more

Preparing for the Notifiable Data Breaches Mandatory Reporting Scheme

Mandatory Reporting of a Notifiable Data Breach – The Office of the Australian Information Commissioner (OAIC). The OAIC is a Federal Government body and its 3 primary functions are as follows: Privacy functions, conferred by the Privacy Act and other laws. Freedom of information functions, in particular, oversight of the operation of the Freedom of Information Act 1982 (FOI…
Read more

People Centric Security (PCS)

User behaviour accounts for over 50% of information leaks, yet traditional security systems have failed to address this issue. The fundamental reason for this is the treatment of users as “kids” within such systems. This has resulted in teething security challenges relating to data classification, lack of top management commitment and a high rate of…
Read more

Improving employee productivity through technology

What would you do with an extra hour each day? Here are 10 tips for using technology to help your SMB work more efficiently, cut costs, improve customer satisfaction and stay ahead of the competition.

SMB organisations are being targeted by cyber crime

There is no doubt that the SMB Market is the target for Cybercriminals. There is also no doubt that 2018 will be a bigger year for Cybercrime than 2017. Have a look at the chart below from Jan this year. As we can see Cyber Crime is the Number 1 motivation by a mile as…
Read more

Why Your Company Needs An Internet Use Policy

With computers and Internet access such an integral part of every business, and the Internet filled with everything from gambling to x-rated websites, it is critical that every business has an Internet Use Policy in place. This policy can help prevent your employees from accidentally or intentionally causing harm to your company or your company’s…
Read more

New attacks via corrupted Word, Excel, Publisher and Outlook documents

APT28 is Malware from a well-known Russian Cybercrime Business. The striking characteristic is that it is able to drop a payload individually designed for: Windows Linux Mac devices Note: Apple is very locked down and to develop Malware for Mac costs a fortune, but when they hit the designated target, it’s jackpot time for Cybercriminals.…
Read more

Cloud Computing – How Will it Affect You?

We are always on the watch for the ‘next best thing’ when it comes to technology and the Internet. Certainly no one can doubt that Cloud Computing and the next generation of the Internet has had a dramatic affect on how people interact and connect with each other – both from an individual standpoint and…
Read more

Microsoft Office 365 hit by Phishing Scam

Reports have emerged of a new phishing scam targeting Australian users of Microsoft Office 365 products, potentially crippling businesses during the busy pre-Christmas season. It is understood that both individuals and businesses across the country have been targeted in recent days by an email purporting to be from Microsoft, which tells recipients to upgrade their…
Read more

4 Tips For Getting the Most Out of Your Technology Investment

How many times have you purchased new software or hardware, and avoided the help menu or user manual? Experts reason that about 90 percent of all features included with software go unused. Much of this comes down to lack of training for individuals using the technology – they use what they know and need most,…
Read more