Blog

Cybersecurity insights and updates for Australian small businesses

7 VoIP Setup Tips for a More Productive Office
IT Management Productivity

7 VoIP Setup Tips for a More Productive Office

The global pandemic put a big emphasis on the need to run a business from anywhere. Enabling employees to work remotely requires...
Jake January 10, 2023 5 min read
5 Ways to Balance User Productivity with Solid Authentication Protocols
Cybersecurity Productivity

5 Ways to Balance User Productivity with Solid Authentication Protocols

One constant struggle in offices is the balance between productivity and security. If you give users too much freedom in your network,...
Jake January 5, 2023 5 min read
You Need to Watch Out for Reply-Chain Phishing Attacks
Cybersecurity

You Need to Watch Out for Reply-Chain Phishing Attacks

Phishing. It seems you can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one...
Jake September 30, 2022 5 min read
What Should You Do to Reduce Risk When Your Mobile Device Goes Missing?
Cybersecurity

What Should You Do to Reduce Risk When Your Mobile Device Goes Missing?

Few things invoke instant panic like a missing smartphone or laptop. These devices hold a good part of our lives. This includes...
Jake September 25, 2022 5 min read
Microsoft Productivity Score Overview
Microsoft

Microsoft Productivity Score Overview

Productivity can be challenging to track, no matter where employees are working. How do you know they’re using their tools as effectively...
Jake September 20, 2022 5 min read
Helpful Tips for Keeping Your Shared Cloud Storage Organized
Cloud

Helpful Tips for Keeping Your Shared Cloud Storage Organized

Cloud file storage revolutionized the way we handle documents. No more having to email files back and forth. No more wondering which...
Jake September 15, 2022 5 min read
6 Important IT Policies Any Size Company Should Implement
IT Management

6 Important IT Policies Any Size Company Should Implement

Many small businesses make the mistake of skipping policies. They feel that things don’t need to be so formal. They’ll just tell...
Jake September 10, 2022 5 min read
6 Discontinued Technology Tools You Should Not Be Using Any Longer
IT Management

6 Discontinued Technology Tools You Should Not Be Using Any Longer

One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out....
Jake September 5, 2022 4 min read
How Using the SLAM Method Can Improve Phishing Detection
Cybersecurity

How Using the SLAM Method Can Improve Phishing Detection

There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade...
Jake August 31, 2022 5 min read
5 Things You Should Never Do on a Work Computer
Cybersecurity

5 Things You Should Never Do on a Work Computer

Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your...
Jake May 31, 2022 5 min read