The Australian Cyber Security Centre, ASD Essential 8 places application whitelisting right up the top as a mitigation strategy to prevent malware delivery and execution. In fact; it’s their #1 recommended mitigation strategy. Refer https://www.cyber.gov.au/publications/essential-eight-explained for further detail. Application … Read More
In my last article, I spoke about the need to leverage new technology for seizing new opportunities while also minimizing the unnecessary complexity of managing infrastructure and networks. This is where we’re seeing the relationship between organisations and IT vendors … Read More
We’ve never had it so good in terms of our new tech capabilities. But it’s a double edge sword when we consider that our competitors also have access to the same technology that we do. In order to stay … Read More
In a data-driven world, your organisation’s ability to leverage value out of the data you collect could be your long term competitive advantage. Even further, your ability to spot useful data sets in every area of your business can be … Read More
There may be a big difference between how you see your organisation’s technology, and how your customers and employees experience it. While we’re in the head office, tethered directly to underlying systems and infrastructure, our customers could be in any … Read More
We hear a lot about being in the era of digital transformation, but there are still many Australian businesses who are dragging their feet when it comes taking on their own transformation journey. This can probably be put down to … Read More
The shift from IT manager to business consultant
Where tech professionals used to feel like they were speaking a foreign language to their non-tech colleagues, a lot has changed over the past decade. All of us own mobile phones, internet routers, laptops, and tablets, and we all use … Read More
The Internet of Things (IoT) is proving to be a real game changer in terms of the sheer volumes and variety of data we can now collect. Gartner has forecasted that 14.2 billion connected things will be in use in … Read More
Whether we like it or not, the greatest threats to our network security are the people we trust the most. Most other threats such as DDoS attacks, malware, and ransomware attack from outside of the firewall, but an insider threat … Read More
Far too often, employees are not adopting appropriate, responsible use of technology. This hinders their ability to contribute to the common goal of the business, and it can also expose the business to potentially harmful cyber threats or legal implications. An Acceptable Use Policy is … Read More
How to Create a Mobile Workplace
The explosion of smartphones, tablets and Internet of Things (IoT) devices is transforming the way we communicate, consume services, and manage our personal lives. The combination of mobile devices and cloud-based apps is also changing the very nature of our … Read More
EOFY Smart Technology Choices
There’s no better time than now to solve all those problems you’ve been putting off due to capital expense outlays. With the federal government offering a $20,000 tax incentive for small businesses, and the many end-of-year sales promotions in the … Read More