Office 365 Built-In Security

Office 365 is a security-hardened service, designed following the Microsoft Security Development Lifecycle. Microsoft bring together the best practices from two decades of building enterprise software and managing online services to give you an integrated software-as-a-service solution. At the service level, Office 365 uses the defense-in-depth approach to provide physical, logical, […]

SOS settings for your phone: Why & how?

It has long been said that we humans only use ten per cent of our brains. Now that may well be a myth, but the same could certainly be said of our devices. Surely you have looked down at your top-of-the-range, latest-model mobile phone and thought, “Gosh, I’m holding decades […]

Coworking Spaces & IT: What you should be asking

In recent years, the concept of co-working spaces has expanded and communal working environments have become increasingly popular amongst workers and businesses alike. As an IT services provider, we have seen this trend first-hand and helped many businesses relocate. Evidently, for small or medium sized business there are numerous advantages […]

Notifiable Data Breach: What you need to know as an Australian Business

Two new data laws have been introduced, set to roll out early this year, which directly effect business owners. You can read about the first one over here if you missed it. Number two is the Notifiable Data Breach regulations, coming in to effect this February. What is NDB? It’s […]

One of Australia’s richest men lost $1 million from a preventable email scam.

Phishing: what is it and how can you prevent it?   Cybercrime can hit anyone, just ask John Kahibetzer the founder of Twynam Agricultural group, who is on the Forbes list of 50 richest Australians. Unlike may more complex cybercrime attacks that involve hacking, ransomware or spyware, Mr Kahibetzer was the victim of robbery via simple deception. […]

Global Data Protection Regulation: What is it and why should you care?

Any business with a customer or client base will be holding data about those people. Whether it’s a big CRM system with thousands of files recording everything from date of birth to how many kids someone has and in depth financial information, or a local shop with a Mailchimp list […]

Reduce Your Largest Attack Surface

Your end users are the most likely target for malware attacks. Keep your information safe with effective security awareness testing and training. Automate defense education for your users with routine campaigns, training, follow-up, and reporting.   Information security is only as secure as your weakest link Attackers relentlessly target end […]