Current Blogs

Notifiable Data Breach Report - July to September 2018

November 14th, 2018 Dean Calvert cyber-security, support

It has now been almost nine months since the Notifiable Data Breach Scheme was introduced in Australia. It is too early to tell whether the Scheme has an impact on the way businesses across the country look at their data security. The quarterly statistics released do however shed some light on the

Turning it on and off again: Why it's more than a joke.

September 18th, 2018 Dean Calvert cyber-security, support

A common joke about IT support is about the question "have you tried turning it off and on again?". The truth is it's not as much of a joke as you may think.

4 Tips to decoding a Phishing email

Being able to tell the difference between a legitimate email and one that is “phishing” for your credentials can save yourself and your business thousands of dollars. Phishing emails can be quite convincing, which is what leads to the high number of people falling victim to them every year.

What is a Phishing email

Phishing is quickly becoming the most popular way hackers will try to gain sensitive information. In fact, 64 per cent of the data breaches reported to the Office of the Australian Information Commissioner between the 1 April 2018 and 30 June 2018 involved the compromising of credentials through

Firewalls don’t make good movie stars

You’ve probably seen all manner of movies where the “hackers” are bypassing firewalls and security systems, and talking about it at the same time, whilst they endeavour to infiltrate heavily defended government and commercial systems.

Earning Frequent Faker Points

It's confession time - I fly a lot. It's one of the parts of my job that is both a blessing and a curse. I've been fortunate enough to see some lovely parts of the world as well as spend nights in some rather dodgy places, and have had my fair share of radiation thanks to travelling near the upper

When an email is not what it seems

It’s becoming more and more dangerous to take things at face value these days. People, photos on menus of food for sale, even some cars – we find ourselves needing to do more homework before taking the plunge and risk getting suckered in. Email too has certainly become one of those communication

This is how computer security is like a good western

Chances are you’ve come across a few western movies in your time – it’s almost part of growing up, seeing those Saturday afternoon reruns. Part of the magic of a great western is the title – it’s just enough to raise your interest, your intrigue and get you wanting to watch to find out what it’s