.au Domain Awareness

Posted by Deb Cashion on 13 April 2022
.au Domain Awareness
Background On the 24th March 2022, the Australian Domain Administration (auDA) released a new website namespace with the “.au” shorter and more memorable namespace (for example “yourcompany.au”).   Application Process If you have an existing domain (for example “yourcompany.com.au”, “yourcompany.org.au” or “yourcompany.net.au”) you will be given priority access to apply to purchase the corresponding “.au” domain ...
Posted in:SecurityITUrgentCyber Security  

Web filtering and ‘Defence in Depth’

Posted by Deb Cashion on 17 February 2022
Web filtering and ‘Defence in Depth’
What is it?  Web or Domain Name System (DNS) filtering is the process of using the DNS to block malicious websites or filter out harmful or inappropriate content.   Web filtering is a line of security within an organisation. Using a similar system to the military strategy of ‘Defence in Depth’, multiple layers of controls are used to ensure security. Web filtering is a complimentary measure to other cyber security controls in a ‘Defence in Depth’ strategy. ...
Posted in:Networking SecurityCyber Security  

Working effectively from home – Part Two “Connectivity and Security”

Posted by Deb Cashion on 3 February 2022
Working effectively from home – Part Two “Connectivity and Security”
Working from home seems to be here to stay, as even after the stay-at-home orders ended in 2021, 40% of the people who transitioned into working from home stayed in that position. Loyal I.T. has researched the needs and solutions for working from home to ensure that staff are working effectively, safely, and productively. Last week we discussed your business hardware requirements (click here to read this) and this week we are covering connectivity and security.
  Connectivity ...
Posted in:SecurityNetworking Security  

Work effectively from home – Part One “Hardware”

Posted by Deb Cashion on 27 January 2022
Work effectively from home – Part One “Hardware”
Working from home is nothing new. The Australian Productivity Commission reminds us that in the Industrial Revolution most people worked from home and thanks to the pandemic, we have re-discovered working from home (full time or partially) and it’s becoming the new “norm”. With this, comes a responsibility to ensure the home office is set up appropriately. Safe Work Australia has guidelines on setting up a workspace at home, including ergonomics, safety, good lighting ...
Posted in:Computer hardware  

Signs you are being a victim of cybercrime

Posted by Deb Cashion on 19 January 2022
Signs you are being a victim of cybercrime
Signs of hacking Modern society is electronic – a place where our banking, social life, mail, shopping and work is in cyber space. This comes with many dangers, the most alarming being hacking. The good news is that Loyal I.T. Solutions has an application called Perch, that tracks and monitors activities, known as Security Event and Incident Management (SEIM).  To see Perch in action and the versatility of the SEIM, check out the Cyber Security Business Connect and Protect video.&...
Posted in:SecurityNetworking SecurityCyber Security  

Bundle up at the end of the year

Posted by Deb Cashion on 16 December 2021
Bundle up at the end of the year
We here at Loyal I.T. Solutions understand that the end of the year comes along so quickly, that you barely have a chance to take a breath, let alone buy office hardware. To help you with your decision making we have bundled up some great packages, to make that end of year buying so much easier. These packages are all loaded with Windows 10 Professional, which is compatible to a possible future upgrade to Windows 11, and are devices we regularly provide and stand by. Have a look a...
Posted in:Computer hardware  

Log a Job
Or an Enquiry

help@loyalit.com.au

Loyal IT
Latest news

11 June 2024
What is Phishing? Phishing is a social engineering technique to acquire data, such as bank account details, login crede...
Read All Latest News

Our Clients
say

Robert explained the work in simple terms, so it was easy for me to understand. He took the time to find out about my business so we could apply the strategies to mitigate any cyber security incide...

Joolz
Read All Testimonials

Resources Helpful
fact sheets

Download Our Fact Sheets

Sign Up for Newsletter