Posted in Cyber Security

Understanding Changes in Domain Name Registration

Posted by Katrina Woolcott on 19 March 2025
Understanding Changes in Domain Name Registration
Navigating the New Landscape of .au Domain Name Registration
The AuDa, the regulating body for .au domain names are running eligibility checks to confirm each Registrant is eligible to hold an .au domain name at the time of renewal.  The ABN/ACN number associated with the registration must be eligible to hold the Domain registration. Where AuDa deems an ineligibility exists a Change of Registrant (CoR) will need to be actioned to maintain the registration for your Domain to an entity t...
Posted in:SecurityNewsServicesCyber SecurityDomains  

Securing Customer Personal Data

Posted by Katrina Woolcott on 11 March 2025
Securing Customer Personal Data
Recently a Client was impacted by a data breach via a service provider, in the form of a compromised email account.  The breach involved information around names, addresses TFN’s & DOB etc. The Australian Signals Directorate has an Information leaflet regarding the Securing of Customer Personal Data, for small to medium businesses.  The information includes the Legislative requirements for protection of personal data and Key data security practice. Below is the Checklist...
Posted in:SecurityNewsCyber Security  

Protecting Confidential Records in Your Business

Posted by Michael Goodwin on 27 February 2025
Protecting Confidential Records in Your Business
Protecting Confidential Records in Your Business Protecting confidential records in your business is more crucial than ever. At Loyal I.T. Solutions, we recognise that safeguarding sensitive information isn’t just a technical necessity; it’s a pillar of trust between you, your employees, and your clients. Australian Laws on Data Storage Businesses in Australia must comply with stringent data protection laws. The Privacy Act 1988 outlines obligations that extend beyond mere comp...
Posted in:CommunitySecurityWindowsGosford ChamberITIT ConsultingCyber SecurityMicrosoftmental health  

Phishing Emails

Posted by Katrina Woolcott on 11 June 2024
What is Phishing? Phishing is a social engineering technique to acquire data, such as bank account details, login credentials or credit card numbers.  It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, an instant message, or a text message. How to recognise Phishing If scammers get that information, they could get access to your email, bank, or other accounts.  They could sell your information to other scammers. Scammers launch t...
Posted in:ITCyber SecurityEmail  

Cybersecurity Assessment and Response

Posted by Michael Goodwin on 23 February 2024
Cybersecurity Assessment and Response
Carrying Out a Cybersecurity Assessment: A Guide for Small and Medium Businesses We all know that some of the biggest issues facing us in this technological age are scams, hacks, and data breaches. We’ve seen many examples of big businesses in the news that have had their data breached. And we certainly see plenty of examples of simple impersonations on social media. It’s an area of business that has to be taken very seriously. There are regulations about storing (or not storing...
Posted in:WindowsServicesITIT ConsultingComputer MaintenanceWindows UpdateCyber Securitybackuptabletmobile  

Mastering Mobile Security

Posted by Michael Goodwin on 7 February 2024
Mastering Mobile Security
Effortless Mobile Security: Unleashing the Power of Managed Services Smartphones are as common in business, if not more common, than computers in business. And the use of tablets is also prolific. Just like all pieces of equipment used in business, having the asset brings with it another piece of governance and maintenance. The most common areas we see for concern with mobile devices are security of data, downtime through loss or damage, and processes when an employee leaves a company. T...
Posted in:WindowsServicesITIT ConsultingComputer MaintenanceWindows UpdateCyber Securitybackuptabletmobile  
< Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Next >

Log a Job
Or an Enquiry

help@loyalit.com.au

Loyal IT
Latest news

19 March 2025
Navigating the New Landscape of .au Domain Name Registration
The AuDa, the regulating body for .au domain names are runni...
Read All Latest News

Our Clients
say

Adam demonstrated exceptional problem solving skills and knowledge to help us achieve a great outcome. He provided sound advice and was more than happy to share his expertise. We now has a stable, ...

Stephen King
Read All Testimonials

Resources Helpful
fact sheets

Download Our Fact Sheets

Sign Up for Newsletter