Buy in for new technology is difficult to achieve across organisations of all sizes. Whether you have an in-house IT team, outsourced provider or have a one man operation, rolling out new tech always comes with inherent challenges.
Passwords are the keys to our online kingdoms. What happens if someone else gains access to these keys? Your IT Security, online Security and in some cases personal security is instantly jeopardised. For the amount of importance a password represents, the fact is that people don’t dedicate nearly enough time to creating secure, unique and […]
The majority of us use laptops either at home, whilst commuting, or in the office. The thing is; more often than not you’re going to see that your battery lasts for a shorter period than it may have been originally described when you first bought it.
The Federal Government has confirmed that eight Australian Small Businesses have been hit bya huge Malware attack orchestrated globally on the weekend. Whilst the Prime Minister’s Cybersecurity Advisor has warned that the “game is not over” between hackers and cybersecurity companies.
IT providers often discuss the business case for Cloud Security. While there are mountains of data available, it’s always nice to see studies being conducted focused towards IT Experts and peers, around the globe. A recent study conducted by Schnieder Electric surveyed 300 IT decision makers and security managers on their adoption of the cloud, […]
Just think for a moment of a hacker breaking into someone’s account. Did your mind instantly go to a place where someone is sitting behind a computer in a dark, smoke-filled room bashing away on a keyboard to gain access to your files? Traditionally you’d be right but lately.
In the modern workplace, the lynchpin that holds most organisations together is their technology. Whether it be the phone system to engage with customers, to internal emails enabling you to communicate freely across your organisation. Managing your team and your technology can be a juggling act for some, trying to research and implement the latest […]
Australia Post has an interesting way of assessing their internal IT Security – internal phishing campaigns. These campaigns are designed to test staff and their awareness of Security issues; as well as the steps that they would take when they think they spot a nefarious email.
While humans love predictability, the world we live in is decidedly erratic. The unexpected can always happen – and when it does, can your business resume operations rapidly? The reality is that most small to medium businesses have rudimentary disaster recovery (DR) plans in place, if any at all.