Posted in Cyber Security
Security and the .au domain
Posted by Deb Cashion
on 28 April 2022
)
In a recent blog, we introduced you to the new .au domain namespaces (see this blog here).
In that blog we discussed that purchasing your .au domain namespace will secure the safety and security of your company brand. Now we'd like to take the opportunity to explain why this purchase is important for your brand and business.
Let’s say for example, Loyal I.T. Solutions decide not to buy their .au domain namespace before 20th September 2022. After that date, if&nbs...
Posted in:SecurityCyber Security |
Cyber Security Business Connect and Protect Central Coast – project completion
Posted by Deb Cashion
on 19 April 2022
)
For those who have been following our blogs, you will no doubt be aware that Loyal I.T. Solutions undertook a project for cyber awareness over the last 12 months. The project wrapped up in late March and it was a resounding success!
Funded by a Federal Government grant (Department of Industry, Science, Energy and Resources), the project aimed to initiate an awareness campaign and set small to medium businesses up to make improvements in their cyber security.
The campaign offered free assess...
Posted in:SecurityServicesCyber Security |
.au Domain Awareness
Posted by Deb Cashion
on 13 April 2022
)
Background
On the 24th March 2022, the Australian Domain Administration (auDA) released a new website namespace with the “.au” shorter and more memorable namespace (for example “yourcompany.au”).
Application Process
If you have an existing domain (for example “yourcompany.com.au”, “yourcompany.org.au” or “yourcompany.net.au”) you will be given priority access to apply to purchase the corresponding “.au” domain ...
Posted in:SecurityITUrgentCyber Security |
Web filtering and ‘Defence in Depth’
Posted by Deb Cashion
on 17 February 2022
)
What is it?
Web or Domain Name System (DNS) filtering is the process of using the DNS to block malicious websites or filter out harmful or inappropriate content.
Web filtering is a line of security within an organisation. Using a similar system to the military strategy of ‘Defence in Depth’, multiple layers of controls are used to ensure security. Web filtering is a complimentary measure to other cyber security controls in a ‘Defence in Depth’ strategy. ...
Posted in:Networking SecurityCyber Security |
Signs you are being a victim of cybercrime
Posted by Deb Cashion
on 19 January 2022
)
Signs of hacking
Modern society is electronic – a place where our banking, social life, mail, shopping and work is in cyber space. This comes with many dangers, the most alarming being hacking. The good news is that Loyal I.T. Solutions has an application called Perch, that tracks and monitors activities, known as Security Event and Incident Management (SEIM). To see Perch in action and the versatility of the SEIM, check out the Cyber Security Business Connect and Protect video.&...
Posted in:SecurityNetworking SecurityCyber Security |
Be cyber aware this holiday season
Posted by Michael Trimblett and Deb Cashion
on 9 December 2021
)
Australians are set to spend over $11 billion on Christmas presents this year, with a significant proportion to come from online sales - toys, jigsaw puzzles and board games are set to top the list of most popular gifts, according to research from the Australian Retailers Association (ARA). Buying online means that Australians are turning to the internet in a big way - an average of 48% of Christmas presents are likely to be purchased online, with 58% of people saying they’ll purchase m...
Posted in:SecurityCyber Security |