1300 786 746

Blog

Digital Transformation for Medium Sized Businesses Sydney

Collaboration via Video is a winner for 2018 but is has to be easy.

Hi, To all and best wishes for 2018, Go Systems has been involved in both telephony and video conferencing for a long time. We have been looking for a solution that will do a great job for all our clients in 2018. Let’s face it, you can waste a lot of time in travel and…
Read more

Part 2 of 2 – Our top 7 Cyber Security predictions for 2018

4. State-sponsored attacks will increase.  The usual suspects for state-sponsored attacks — North Korea, Iran, and Russia — don’t have much to lose by continuing their attempts to extort, steal, spy and disrupt by infiltrating information systems. All are already heavily sanctioned, and the consequences — at least those we know about — in response to…
Read more

Part 1 of 2 – Our top 7 Cyber Security predictions for 2018

2017 was the worst year yet for cyber security with more phishing scams, ransomware, state-sponsored attacks, and new attack vectors. Given what’s happened in 2017 — the Equifax breach, (application vulnerability on one of their websites led to a data breach that exposed about 143 million consumers) state-sponsored attacks, Russian manipulation of social media, Wannacry, and more phishing scams…
Read more

Merry Christmas and a Happy New Year

To all our customers and friends, We would like to take this opportunity to thank you for your ongoing friendship and support throughout 2017. We wish you a very merry and safe Christmas, New Year and Holiday Period. With 2018 being around the corner lets have a quick look with what is happening. The biggest…
Read more

Preparing for the Notifiable Data Breaches Mandatory Reporting Scheme

Mandatory Reporting of a Notifiable Data Breach – The Office of the Australian Information Commissioner (OAIC). The OAIC is a Federal Government body and its 3 primary functions are as follows: Privacy functions, conferred by the Privacy Act and other laws. Freedom of information functions, in particular, oversight of the operation of the Freedom of Information Act 1982 (FOI…
Read more

People Centric Security (PCS)

User behaviour accounts for over 50% of information leaks, yet traditional security systems have failed to address this issue. The fundamental reason for this is the treatment of users as “kids” within such systems. This has resulted in teething security challenges relating to data classification, lack of top management commitment and a high rate of…
Read more

Improving employee productivity through technology

What would you do with an extra hour each day? Here are 10 tips for using technology to help your SMB work more efficiently, cut costs, improve customer satisfaction and stay ahead of the competition.

SMB organisations are being targeted by cyber crime

There is no doubt that the SMB Market is the target for Cybercriminals. There is also no doubt that 2018 will be a bigger year for Cybercrime than 2017. Have a look at the chart below from Jan this year. As we can see Cyber Crime is the Number 1 motivation by a mile as…
Read more

Why Your Company Needs An Internet Use Policy

With computers and Internet access such an integral part of every business, and the Internet filled with everything from gambling to x-rated websites, it is critical that every business has an Internet Use Policy in place. This policy can help prevent your employees from accidentally or intentionally causing harm to your company or your company’s…
Read more

New attacks via corrupted Word, Excel, Publisher and Outlook documents

APT28 is Malware from a well-known Russian Cybercrime Business. The striking characteristic is that it is able to drop a payload individually designed for: Windows Linux Mac devices Note: Apple is very locked down and to develop Malware for Mac costs a fortune, but when they hit the designated target, it’s jackpot time for Cybercriminals.…
Read more