Social Engineering and the Hacker
Posted by Deb Cashion
on 10 February 2023
What is social engineering?
Social engineering, in the context of cyber security, is the psychological manipulation by a hacker, in hopes of people divulging private or secure information to them.
How do hackers use social engineering?
Hackers use social engineering to perform their hacks and scams utilising the key principles listed below.
Authority – the hacker will pretend to be a person of authority. This is prevalent in tax office scams, Microsoft h...
Posted in:SecurityNetworking SecurityCyber Security |
Secure your I.T. systems over Christmas
Posted by Deb Cashion
on 14 December 2022
Before you go on vacation you generally check that the power points are turned off, someone is going to collect the mail and that all the doors are securely locked. But what about your I.T. security? Cyber criminals do not take holidays - in fact cyber-attacks and hacks increase during the holiday and sale season.
This blog is a reminder of a to-do list of actions to ensure you have done, I.T. wise, before going on vacation.
Enable multi-factor authenticati...
This blog is a reminder of a to-do list of actions to ensure you have done, I.T. wise, before going on vacation.
Enable multi-factor authenticati...
Posted in:SecurityNetworking SecurityCyber Security |
Is a standing desk right for you?
Posted by Kaylene Giff and Deb Cashion
on 24 November 2022
The push towards better health and safety in workplaces has bought some advances to help alleviate stress and injuries to the body. One of these new advances is the Sit Stand (or Standing) Desk.
Believe it or not, the standing desk has been around for centuries. In fact, the great Leonardo Da Vinci used one in his studio in the 1400's.
These desks have had a resurgence in popularity recently and they are now more prevalent in the workplace, but are they suitable for you? Loyal I.T....
Posted in:Computer hardwareMiscIT |
Increasing your productivity by improving your workspace
Posted by Kaylene Giff and Deb Cashion
on 2 November 2022
Do you want to be more efficient without having to learn a new process? We understand that efficiency is important, just as simplicity is appreciated which is why we are bringing you five items of equipment to increase efficiency and productivity in your workspace.
Multiple screens
Jon Peddie Research did a long-term study on dual-monitor use versus single-monitor use over the course of 15 years and found that adding a second monitor increased user productivity by an average...
Posted in:Computer hardwareMisc |
Multi Factor Authentication is more important than ever!
Posted by Deb Cashion
on 27 October 2022
In these scary times of hackers targeting all individuals and businesses, it is more important than ever to up the ante in the security department and do all you can to keep yourself safe from a cyber-attack. With the recent announcement of possible changes in legislation, businesses could face astronomical fines for not providing relevant protection for their clients and clients' data.
An integral part of The Essential 8 is to introduce multiple layers of protection, such...
Posted in:Networking SecurityCyber Security |
Comparison – Desktop vs All In One
Posted by Kaylene Giff and Deb Cashion
on 20 October 2022
Modern technology has evolved so much that we may not be up to date with what is on offer. Some savvy consumers have taken the route with a desktop (or workstation) device, and some have opted for an all in one. But what is an all in one and how does it compare to the standard desktop workstation PC (or tower). This blog hopes to enlighten the reader on the basics.
The decision on whether your situation is best for an all in one or a desktop PC must also take into account yo...
Posted in:Computer hardwareMisc |