User Avatar

About michael

This author has not yet filled in any details.
So far michael has created 83 blog entries.

Good Cybersecurity is Always a Challenge.

2022-08-30T10:06:51+10:00Tuesday, 30 August, 2022|disruption, protection, Security|

Business email compromise is a technique whereby the attacker obtains access to a business email account and imitates the owner’s identity to defraud the business and its employees. BEC focus their efforts on employees who have authority with bank accounts or employee personal information. The attack is often a request to transfer money by an electronic transfer or wire. Often including no attachments or links meaning one has to be very diligent in looking for the clues.

Remote access, be sure, be safe

2022-07-09T09:55:18+10:00Saturday, 9 July, 2022|Security|

When it comes to scams, cyber criminals use remote access tools to enter your device and steal data. It is important to be vigilant against such scams. Remote access benefits need to be supported by good cyber security protocols so that the risk to intrusion and theft is minimised.

Zero Trust Security

2022-05-19T13:01:54+10:00Thursday, 19 May, 2022|Security|

It is paramount that you have the best possible security for your Australian business. With big data being the next gold rush, business owners must protect their information like a dragon hoarding its treasure; which is where zero trust security comes in. But what is it? How does it work? And how can you apply it to your Australian business?

Managed IT Service

2022-02-02T22:40:59+10:00Thursday, 23 December, 2021|Support|

What are the average IT support costs in Australia? What are the monthly contract, packages & hourly rates pricing? Personal, small business & companies.

Go to Top