AI
App Security
Artificial Intelligence
Chatbots
Christmas
Cloud computing
Cloud Services
Compliance
Conference Centre
Configuration
Consulting services
cybercrime
Cybersecurity
cyber security
data
Data Privacy
datasecurity
Education
Health/Aged Care
Integrated Applications
Integration Services
lastpass
malware
Managed IT Services
Managed Services
mfa
microsoft
Mining/Utilities
mobile malware
Network & Security
Network Upgrade
Next Gen Workplace
Not-for-Profit
Not for profit
Office 365
Optimised IT Infrastructure
passwords
Phishing
Professional Services
secure by design
security
Security Audit
Software Updates
User Privacy
Wholesale/Distribution
Vulnerabilities in technology are an unfortunate side effect of innovation. For example, when software companies release an update, it can contain weaknesses in the code, which hackers can use to exploit. Once this is realised the vulnerabilities are addressed with … Read More
No business wants to incur a cyberattack or data breach, but in the current online environment, it can be difficult to avoid them completely. According to an IBM Security report 83% of businesses have experienced at least one data breach. … Read More
The misconfiguration of cloud apps and online security protocols is often overlooked when businesses are planning their cyber risk mitigation strategies. Apps located in the cloud are generally easy to access and sign up for, and the consumer often ignores … Read More
Client Profile Alexandra Park Conference Centre provides chef prepared catering, comfortable accommodation, activity programs and experiences, and conference rooms for any type of group. There are four accommodation areas, multiple meeting rooms and 10 hectares that includes an oval, a … Read More
During the first months of 2022, malware attacks targeting mobile devices surged by an incredible 500%. This escalation is alarming both in its size, and because many mobile device holders and owners are not protecting their devices. Mobile device users tend … Read More
Data privacy and the protection of data has been evolving since the inception of the internet. With significant volumes of information being shared online, governments and industry bodies have been impelled to formulate and enforce privacy regulations to protect individuals … Read More
At the beginning of each year 1 in 4 people create personal resolutions that they hope to act upon for better self-improvement. This practice can also be useful for organisations as they look to improve their current technological practices. In this article, … Read More
Cybersecurity insurance might be a new concept for some small and medium-sized businesses. It first appeared in the 1990s to provide insurance coverage for larger organisations, and it initially covered areas such as errors made during data processing, and online … Read More
Nov 30 2022
A Checklist for Digital Offboarding of Employees
With most workplaces reliant on digital technology, employees will inevitably leave a digital trace from some of their work-related practices. From the moment that they join, an employee will be digitally connected to your organisation, via a company email address, … Read More
Once user credentials became a necessity for online activity their security, or lack thereof, became a serious concern very shortly after. Up to 81% of online security events occur due to weak or stolen user credentials, and unfortunately employees continue … Read More
The coronavirus pandemic has changed the way that many workplaces operate. The traditional practice of staff gathering in a centralised location has changed as this became impractical. Other solutions were sought and implemented, including remote online working and hybrid offices. … Read More
The abbreviation DNS stands for Domain Name System. The DNS is an online database which contains information about where a website exists on the internet. This information is stored in records known as DNS records which are human-friendly names which … Read More