Posted in Cyber Security
Understanding Changes in Domain Name Registration
Posted by Katrina Woolcott
on 19 March 2025
)
Navigating the New Landscape of .au Domain Name Registration
The AuDa, the regulating body for .au domain names are running eligibility checks to confirm each Registrant is eligible to hold an .au domain name at the time of renewal. The ABN/ACN number associated with the registration must be eligible to hold the Domain registration. Where AuDa deems an ineligibility exists a Change of Registrant (CoR) will need to be actioned to maintain the registration for your Domain to an entity t...
The AuDa, the regulating body for .au domain names are running eligibility checks to confirm each Registrant is eligible to hold an .au domain name at the time of renewal. The ABN/ACN number associated with the registration must be eligible to hold the Domain registration. Where AuDa deems an ineligibility exists a Change of Registrant (CoR) will need to be actioned to maintain the registration for your Domain to an entity t...
Posted in:SecurityNewsServicesCyber SecurityDomains |
Securing Customer Personal Data
Posted by Katrina Woolcott
on 11 March 2025
)
Recently a Client was impacted by a data breach via a service provider, in the form of a compromised email account. The breach involved information around names, addresses TFN’s & DOB etc.
The Australian Signals Directorate has an Information leaflet regarding the Securing of Customer Personal Data, for small to medium businesses. The information includes the Legislative requirements for protection of personal data and Key data security practice.
Below is the Checklist...
Posted in:SecurityNewsCyber Security |
Protecting Confidential Records in Your Business
Posted by Michael Goodwin
on 27 February 2025
)
Protecting Confidential Records in Your Business
Protecting confidential records in your business is more crucial than ever. At Loyal I.T. Solutions, we recognise that safeguarding sensitive information isn’t just a technical necessity; it’s a pillar of trust between you, your employees, and your clients.
Australian Laws on Data Storage
Businesses in Australia must comply with stringent data protection laws. The Privacy Act 1988 outlines obligations that extend beyond mere comp...
Posted in:CommunitySecurityWindowsGosford ChamberITIT ConsultingCyber SecurityMicrosoftmental health |
Phishing Emails
Posted by Katrina Woolcott
on 11 June 2024
What is Phishing?
Phishing is a social engineering technique to acquire data, such as bank account details, login credentials or credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, an instant message, or a text message.
How to recognise Phishing
If scammers get that information, they could get access to your email, bank, or other accounts. They could sell your information to other scammers. Scammers launch t...
Posted in:ITCyber SecurityEmail |
Cybersecurity Assessment and Response
Posted by Michael Goodwin
on 23 February 2024
)
Carrying Out a Cybersecurity Assessment: A Guide for Small and Medium Businesses
We all know that some of the biggest issues facing us in this technological age are scams, hacks, and data breaches. We’ve seen many examples of big businesses in the news that have had their data breached. And we certainly see plenty of examples of simple impersonations on social media.
It’s an area of business that has to be taken very seriously. There are regulations about storing (or not storing...
Posted in:WindowsServicesITIT ConsultingComputer MaintenanceWindows UpdateCyber Securitybackuptabletmobile |
Mastering Mobile Security
Posted by Michael Goodwin
on 7 February 2024
)
Effortless Mobile Security: Unleashing the Power of Managed Services
Smartphones are as common in business, if not more common, than computers in business.
And the use of tablets is also prolific.
Just like all pieces of equipment used in business, having the asset brings with it another piece of governance and maintenance.
The most common areas we see for concern with mobile devices are security of data, downtime through loss or damage, and processes when an employee leaves a company.
T...
Posted in:WindowsServicesITIT ConsultingComputer MaintenanceWindows UpdateCyber Securitybackuptabletmobile |