IT Security: Are You Making These 5 Password Mistakes?

Passwords are the keys to our online kingdoms. What happens if someone else gains access to these keys? Your IT Security, online Security and in some cases personal security is instantly jeopardised. For the amount of importance a password represents, the fact is that people don’t dedicate nearly enough time to creating secure, unique and […]

Read more

Extend Your Laptop Battery Life

The majority of us use laptops either at home, whilst commuting, or in the office. The thing is; more often than not you’re going to see that your battery lasts for a shorter period than it may have been originally described when you first bought it.

Read more

200,000 PC’s Infected by Largest Ransomware Attack: WannaCry

The Federal Government has confirmed that eight Australian Small Businesses have been hit bya huge Malware attack orchestrated globally on the weekend. Whilst the Prime Minister’s Cybersecurity Advisor has warned that the “game is not over” between hackers and cybersecurity companies.

Read more

IT Experts Agree: Security is better in the cloud

IT providers often discuss the business case for Cloud Security. While there are mountains of data available, it’s always nice to see studies being conducted focused towards IT Experts and peers, around the globe. A recent study conducted by Schnieder Electric surveyed 300 IT decision makers and security managers on their adoption of the cloud, […]

Read more

The Harsh Effects of Social Engineering

Just think for a moment of a hacker breaking into someone’s account. Did your mind instantly go to a place where someone is sitting behind a computer in a dark, smoke-filled room bashing away on a keyboard to gain access to your files? Traditionally you’d be right but lately.

Read more

How a Managed IT Service Provider will help you convert

In the modern workplace, the lynchpin that holds most organisations together is their technology. Whether it be the phone system to engage with customers, to internal emails enabling you to communicate freely across your organisation. Managing your team and your technology can be a juggling act for some, trying to research and implement the latest […]

Read more

Why Australia Post ‘infected’ itself with Ransomware

Australia Post has an interesting way of assessing their internal IT Security – internal phishing campaigns. These campaigns are designed to test staff and their awareness of Security issues; as well as the steps that they would take when they think they spot a nefarious email.

Read more