Australia Free Web Directory

ICT Blog | Computer & Internet website



Click/Tap
to load big map

ICT Blog

Phone: +61 8 8944 2222



Reviews

Add review



Tags

Click/Tap
to load big map

21.01.2022 In the last 10 days we have assisted numerous clients with the recovery of their Office 365 credentials after being hacked. The commonality being that none of them have been using Multi Factor Authentication (MFA). Easy to setup to provide extra security. Contact us to setup your second factor either via an Application of SMS which will add protection to your online services.



21.01.2022 With more people working from home over the past few months there has been a 200% escalation of SPAM / Phishing emails. Remember to be diligent and check the content and links before clicking anything.

18.01.2022 This one is better than the average phishing emails. Decent introduction email to lure you into clicking the link. Hovering over the link you see the address is unrelated to the link address however the landing page is an Office 365 look alike page prompting for your credentials.... Make sure you are diligent in checking all emails, hover over the links and do not just click through. Check and Re-Check before selecting the link.

17.01.2022 How protected is your Office 365 data and are you compliant ? Did you know that most companies have a requirement to retain email data for up to 5 years ? We can assist with Barracuda Networks Security Essentials ;- SPAM Protection Email Archiving... Cloud to Cloud Backup Phishing Protection Contact us NOW.... See more



16.01.2022 Multifactor Authentication is a integral way that we can stop unauthorised access to your network, accounts or services. Contact our team and discuss how this extra level of security will assist your business & accounts.

15.01.2022 When one 4G Antenna is not enough, add another. This site has recently upgraded their Cel-Fi Antenna and added a new Sierra 4G Modem to assist with both calls and data to the offices that have no other access to internet. Talk to us about improving your mobile services.

14.01.2022 What do you think is easier to hack, people or systems ? In this case, people. https://www.businessinsider.com.au/twitter-hack-social-engi Social Engineering is a big part of hacking a business or system which can be prevented through ongoing staff education. Talk to our team about Security Awareness Training that can assist staff understanding what to look out for. https://cybersafe.digital//Staff-Training-%26amp%3B-Educat



13.01.2022 Did you read about TikTok collecting unique device identifiers, called MAC addresses, from millions of Android devices without their users knowledge? It has been reported that TikTok collected the identifiers by using an added layer of encryption to conceal the practice, as it violated Google policies. This means that even if users chose to opt out of advert tracking TikTok were still able to track the users online and build up data profiles on them. Just think of what you d...o online and how comfortable you would be having someone looking over your shoulder the entire time. These data profiles that they built could then be combined with user data being collected by other apps on the mobile device and suddenly a very clear picture about the user starts to form. With other apps, the data collection may have started out with a purpose that the users were comfortable with, however with a lack of transparency, accountability, and regulation there suddenly becomes an enormous opportunity for misuse of this user data. If mobile devices used by your staff connect to your workplace in any way, ie emails, shared drives etc, the data that is collected by these apps could then potentially include information about your business. This data could then be used by malicious actors to gain access into your systems. There is a layer of protection that you can add to mobile devices to help reduce the risks faced by your business, Lookout Mobile Endpoint Security works behind the scenes on a mobile device, dynamically monitoring to get visibility into the entire spectrum of risk associated with the device and then reporting back in real-time so you can respond quickly and effectively.

10.01.2022 Don't be the next victim, consult with our team of experts about protecting your systems and access.

09.01.2022 A recent spear-phishing campaign has been spotted spreading a remote access tool (RAT), which is a legitimate tool used for troubleshooting and tech support. Attackers use the ongoing coronavirus pandemic as a lure, as well as malicious documents, to convince victims to execute the RAT all under the guise of COVID-19 Statistics. Make sure you dont open anything that is not a valid subscription that you have signed up for. Dont open any attachments that you are not expecting.

09.01.2022 Do you have a copy of your emails in the case items are lost or accidentally deleted before your daily backup ? Email Archiving is the key, contact us about how this will benefit your business.

06.01.2022 With more people working at home the amount of "Voice Message" emails that we receive daily is on the rise. Needless to say this is SPAM and if you hover over the link it is a website in South Africa. Check, check and check again before clicking any links that are not familiar.



06.01.2022 Australian network and security attacks on the rise, what are you doing about your CyberSecurity Protection ? Speak to the team Territory Technology Solutions for guidance and support.

05.01.2022 CCTV systems are like everything else, they need regular maintenance. Cameras need to be cleaned regularly to ensure you are capturing usable video. See the before and after images from a recent clean. There is not a great deal of difference in the day however at night the changes are very noticeable. Contact us to book in your next service.

04.01.2022 Just another reason you should have a WatchGuard Firewall.

03.01.2022 Who Else is watching your doobell ? "Systematic design flaws" have been discovered in leading internet-connected doorbell and security cameras. Vulnerabilities in devices manufactured by Ring, Nest, SimpliSafe, and eight other companies relating to the removal of active user accounts. The flaws allow a shared account to remain in place and continue accessing the video feed despite appearing to have been removed.... The flaws could allow malicious actors to covertly record audio and video from vulnerable devices indefinitely, invading the privacy of victims on their very own doorsteps.

02.01.2022 Probably best not to leave your passwords in plain sight. Maybe use a password manager instead. During a broadcast interview conducted via a Zoom video chat, the cameraman no doubt imagined he or she was getting a terrific angle pointing over the reporter’s shoulder.... Unfortunately, however, the view didn’t just show the interviewee on the screen but also a monitor with stuck-on login credentials.

02.01.2022 This is just beginning of what may become a Business CyberSecurity Revolution to ensure all business has a minimum protection standard. http://ow.ly/iiDe50AeNdG COVID-19 has seen an increase in exploits of 40-50% with over 90% being delivered by email and 50% of them specifically engineered for the the recipient. The time has come for CyberSecurity to be the at the forefront of every business with an Internet Connection.

Related searches