Cyber Security Business Connect and Protect Central Coast – project completion
Posted by Deb Cashion
on 19 April 2022
For those who have been following our blogs, you will no doubt be aware that Loyal I.T. Solutions undertook a project for cyber awareness over the last 12 months. The project wrapped up in late March and it was a resounding success!
Funded by a Federal Government grant (Department of Industry, Science, Energy and Resources), the project aimed to initiate an awareness campaign and set small to medium businesses up to make improvements in their cyber security.
The campaign offered free assess...
Posted in:SecurityServicesCyber Security |
.au Domain Awareness
Posted by Deb Cashion
on 13 April 2022
Background
On the 24th March 2022, the Australian Domain Administration (auDA) released a new website namespace with the “.au” shorter and more memorable namespace (for example “yourcompany.au”).
Application Process
If you have an existing domain (for example “yourcompany.com.au”, “yourcompany.org.au” or “yourcompany.net.au”) you will be given priority access to apply to purchase the corresponding “.au” domain ...
Posted in:SecurityITUrgentCyber Security |
Web filtering and ‘Defence in Depth’
Posted by Deb Cashion
on 17 February 2022
What is it?
Web or Domain Name System (DNS) filtering is the process of using the DNS to block malicious websites or filter out harmful or inappropriate content.
Web filtering is a line of security within an organisation. Using a similar system to the military strategy of ‘Defence in Depth’, multiple layers of controls are used to ensure security. Web filtering is a complimentary measure to other cyber security controls in a ‘Defence in Depth’ strategy. ...
Posted in:Networking SecurityCyber Security |
Working effectively from home – Part Two “Connectivity and Security”
Posted by Deb Cashion
on 3 February 2022
Working from home seems to be here to stay, as even after the stay-at-home orders ended in 2021, 40% of the people who transitioned into working from home stayed in that position. Loyal I.T. has researched the needs and solutions for working from home to ensure that staff are working effectively, safely, and productively. Last week we discussed your business hardware requirements (click here to read this) and this week we are covering connectivity and security.
Connectivity ...
Connectivity ...
Posted in:SecurityNetworking Security |
Work effectively from home – Part One “Hardware”
Posted by Deb Cashion
on 27 January 2022
Working from home is nothing new. The Australian Productivity Commission reminds us that in the Industrial Revolution most people worked from home and thanks to the pandemic, we have re-discovered working from home (full time or partially) and it’s becoming the new “norm”.
With this, comes a responsibility to ensure the home office is set up appropriately. Safe Work Australia has guidelines on setting up a workspace at home, including ergonomics, safety, good lighting ...
Posted in:Computer hardware |
Signs you are being a victim of cybercrime
Posted by Deb Cashion
on 19 January 2022
Signs of hacking
Modern society is electronic – a place where our banking, social life, mail, shopping and work is in cyber space. This comes with many dangers, the most alarming being hacking. The good news is that Loyal I.T. Solutions has an application called Perch, that tracks and monitors activities, known as Security Event and Incident Management (SEIM). To see Perch in action and the versatility of the SEIM, check out the Cyber Security Business Connect and Protect video.&...
Posted in:SecurityNetworking SecurityCyber Security |