linkedin  twitter  facebook  email-3

New data breach notification laws - do you have a plan?

In November 2017, HP researched 528 SMB's (10 - 99 employees) in Australia and found that 57% of them admitted to not undertaking any sort of IT security risk assessment in the last 12 months, despite a series of high profile breaches in that time. That's 57% of businesses that did not have any idea  as to how at risk their business was to a breach.

Read More →

Ransomware is everywhere

Our Business Continuity partner Datto recently published their annual State of the Channel Ransomware Report with findings that confirm Ransomware has truly become an unforgiving (and often costly) intrusion on SME's. And it's not going away any time soon.

Read More →

Security for your mobile team

 
For the purposes of this post, consider a mobile team to be anyone that can do any of the  following via any type of  mobile device (smartphones, tablets, laptops, PDA's and so on): 

 

Read More →

Why OneDrive, Dropbox & Google Drive aren't so good for business

When it comes to cloud storage for business, your security & productivity are paramount.
OneDrive, Dropbox, Google Drive & other similar cloud providers are affordable (often free) & easy to use, but dig a little deeper and you'll see where they fall down in these two key areas and can cause more harm than good for business users.

Read More →

Do you know the seven cybercrime threats to your business?

With cybercrime being such a lucrative business, it's no wonder a new threat pops up every other day. McAfee's 2014 report noted that the cybercrime industry is said to now be costing the global economy anywhere between $375b - $500b annually (& growing). 
Sadly the phenomenal amount of illegal activity this equates to can easily instill fear in any business owner, or person responsible for protecting business information.
To remain alert, it's important to understand the seven different types of cybercrime threats to your business - all of which fall under the term 'malware' - a digital threat.

Read More →

Your office action plan to avoid virus infection

You can never be too careful when it comes to protecting your business data, and email is one of the first lines of defence you should focus on.

Print off a copy of our action plan, or share it with your colleagues so that you can work together to avoid a virus hitting your computer network.

 

 

 

Read More →

Hoax emails - our 'best practice' tips to keep your network safe

Recently an email from Australia Post arrived in the inbox of one of our customers.
It looked real enough, but alarm bells rang when it asked the reader to click on a link.
The safe URL links that Australia Post embed in their emails begin with auspost.com.au

Read More →

Sandworm attack exploits Windows Operating System

The Sandworm attack is the latest in cyber espionage which is targeting Windows Operating Systems.

What has happened?

The Windows Operating System has a vulnerability which has been targeted by a cyber-espionage group from Russia called Sandworm.

The vulnerability affects all versions of Windows from Windows Vista Service Pack 2 right up to Windows 8.1 and Windows Server versions 2008 and 2012.
Without getting too technical, it relates to Microsoft technology that allows rich data from one document to be embedded in another, or a link to a document to be embedded in another. 

Read More →

Beware the humble USB drive

In recent posts, we’ve looked at what a transition to the cloud would mean for your day-to-day operations, and we’ve surveyed the current landscape of mobile printing.

In both, we briefly touched on security, but there is something more to add when it comes to security of your network in addition to cloud – portable storage drives, and in particular the ‘unassuming’ USB drive.

Read More →

Heartbleed: Everything You Need to Know

According to a recent article on Mashable, two months after the Heartbleed threat there are more than 300,000 web servers still vulnerable.  So in case you've missed the information on this security threat, we've broken down what it is and what you can do to fix it if you are affected.

What is Heartbleed?

By now, you've probably heard of the Heartbleed bug, but what exactly is Heartbleed... and more importantly, what can you do to protect yourself?

Read More →