Get the most out of your I.T. infrastructure without a physical server
Posted by Kaylene Giff
on 9 February 2021
If your business operates from the cloud, you will likely not have a server on premises. This means your laptop, PC's, tablets and/or personal devices become the front-line interface to the internet and core business applications.
To ensure optimal productivity and security, it is recommended businesses adapt a 'fleet management' regime, including:
Managing the age of hardware by replacing devices based on a planned lifecycle
Implement a managed se...
Posted in:Computer hardwareSecurityComputer Software |
Vulnerability Scans - Isolate the weak security points in your IT systems
Posted by Michael Trimblett
on 18 January 2021
A Vulnerability Scan is a relatively simple way to test your IT systems risk to scams, theft or sabotage. It's an application that, when applied correctly and with the right advice, is an extremely efficient and effective strategy for SMB's.
With the cloud becoming the norm, your user-interface and other systems and devices become your frontline cyber-security guards by default. Therefore, it is now more imperative than ever to ensure you are 'sure and secure'.
A Vulnera...
Posted in:SecurityServicesITIT ConsultingComputer SoftwareNetworking Security |
'Bulletproof' solution to remote access security.
Posted by Michael Trimblett
on 8 December 2020
One of the Essential Eight in Business Cyber Security
Multi-Factor Authentication (MFA) is typically described as a bulletproof solution to remote access security.
It is an effective way to add an additional security 'gate' to deter unwanted access to remote databases or sensitive information. Many of you may already have seen some version of MFA when you log into your bank account or when you re-log into your email account (such as Office 365) - once you have logged in with you...
I.T. hardware; essential for security and productivity
Posted by Michael Trimblett
on 21 October 2020
Governments and authorities in Australia are escalating their focus on cyber-security, including introducing more guidance, advice and mandatory reportable incidents.
If your organisation is covered by the Privacy Act 1988, then the NDB (Notifiable Data Breach) scheme applies. In simple terms, any suspected or known cyber attack must be notified to affected individuals and the OAIC (Office of the Australian Information Commission).
The real aim though is to mitigate the risk of cyber at...
Posted in:Computer hardwareSecurityServicesITIT ConsultingComputer SoftwareNetworking Security |
The Essential Eight-cyber security mitigation strategy
Posted by Michael Trimblett
on 19 August 2020
Before we talk specifically about the The Australian Cyber Security Centre's (ACSC) recommended Essential Eight-cyber security mitigation strategy; let's put the situation in perspective.
Reports are continuing to reveal facts and stats on cyber security that are increasingly alarming for small and medium sized businesses (SMB's). There are more incidents and more dollars being lost than ever before. Let me take you through a few points.
Recently, The Australian Cyber Securi...
Posted in:SecurityServicesITIT ConsultingComputer SoftwareNetworking Security |
Phishing Emails - Don't Get Caught!
Posted by Kaylene Giff
on 11 May 2020
Have you been a victim of phishing?
Do you know how to recognise a phishing email?
Now that so many of us are working from home and other locations, the threat is becoming more prevalent with over 7,000 phishing scams reported in 2020 so far.
Phishing is the simplest and most common method of computer-based social engineering. A phishing attack involves crafting an email that appears legitimate but in fact contains links to fake websites or to download malicious content...
Posted in:Security |