Skip to content

Category: Security

Why Disaster Recovery Is The New Backup

Jan 15, 2020

During the "WannaCry" ransomware outbreak of 2017, Australia initially proved itself to be that “lucky country” once again.

Read More

5 Things in IT Security Leading Companies Get Right!

Dec 12, 2019

5 things in IT security Leading Companies got right in 2019 PLUS 5 things you need to know about IT...

Read More
Failure to BCC

Failure to BCC: This one email mistake could cost you millions!

Oct 10, 2019

The Sydney Morning Herald recently ran a story on one company’s million-dollar e-mail mishap. Their big blunder? They loaded 300...

Read More
Dark Web

The Dark Web – The Underbelly of the Internet

Aug 1, 2019

Did you know that…when you use a search engine like Google, Bing (or even, dare we say it, Yahoo) you...

Read More

Technology facilitated abuse & the dark side of technology!

Jul 25, 2019

We all love social media, right? But while you’re happily scrolling through memes, hash tagging and trying out filters, some people are experiencing the sinister side of social media and today’s technology.

Read More
Microsoft End of Life Announcements

Windows 7 & Exchange Server 2010 End of Life – All your options!

Jun 28, 2019

What do Microsoft’s end of life and end of extended support deadlines for Windows 7 and Windows Exchange Server 2010...

Read More

Top Five Technology Strategy Trends for NFPs

May 15, 2019

Our Top Five Technology Strategy Trends for NFPs from Transform 2019! May 8-9, 2019, 500 technology-focused not-for-profit sector representatives amassed...

Read More

Hardware Lifecycle Management – Why it’s more important than ever!

Apr 8, 2019

How tightening up your approach across the 5 stages of your hardware lifecycle will help your business protect your assets...

Read More

Defining your approach to mobility (Flexibility vs. Security)

Mar 29, 2019

With any tightening of security technologies or practices, there is always going to be a flow-on effect to end users. Today’s super-sophisticated mobile devices and technology platforms give people the power to read, chat, share, view, download, or book pretty much anything in one click or swipe, and pretty much every one of us from aged 2 to 80 love it!

Read More
Email and endpoint protection

Next-generation email and endpoint protection – The game has changed!

Mar 4, 2019

[vc_row][vc_column][vc_column_text] Want to be able to trust your inbox again? Here’s how!   With next-generation email and endpoint protection, of course! Email...

Read More

Mobile Device Management: Keeping your data on the downlow

Feb 14, 2019

Getting something to “go viral” is undoubtedly the holy grail of social media success! Maximum reach and hopefully maximum impact. Our devices and digital platforms are intuitively designed to help us share, post, communicate and collaborate without limit, but while that maybe be great for your most recent dancing cat video, it’s not so great for sensitive company data your team members might access or store on their devices.

Read More

Shining a Light on Shadow IT

Nov 15, 2018

Are you carefully and strategically planning to make or expand your move into the cloud? STOP right there! There’s something important we think you need to know! No matter what stage of the cloud adoption journey you think you’re at, there’s an 87% chance some of your data is already in the cloud.

Read More
1 2 3 4 5