Blog

Cybersecurity insights and updates for Australian small businesses

You Need to Watch Out for Reply-Chain Phishing Attacks
Cybersecurity

You Need to Watch Out for Reply-Chain Phishing Attacks

Phishing. It seems you can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one...
Jake September 30, 2022 5 min read
What Should You Do to Reduce Risk When Your Mobile Device Goes Missing?
Cybersecurity

What Should You Do to Reduce Risk When Your Mobile Device Goes Missing?

Few things invoke instant panic like a missing smartphone or laptop. These devices hold a good part of our lives. This includes...
Jake September 25, 2022 5 min read
Microsoft Productivity Score Overview
Microsoft

Microsoft Productivity Score Overview

Productivity can be challenging to track, no matter where employees are working. How do you know they’re using their tools as effectively...
Jake September 20, 2022 5 min read
Helpful Tips for Keeping Your Shared Cloud Storage Organized
Cloud

Helpful Tips for Keeping Your Shared Cloud Storage Organized

Cloud file storage revolutionized the way we handle documents. No more having to email files back and forth. No more wondering which...
Jake September 15, 2022 5 min read
6 Important IT Policies Any Size Company Should Implement
IT Management

6 Important IT Policies Any Size Company Should Implement

Many small businesses make the mistake of skipping policies. They feel that things don’t need to be so formal. They’ll just tell...
Jake September 10, 2022 5 min read
6 Discontinued Technology Tools You Should Not Be Using Any Longer
IT Management

6 Discontinued Technology Tools You Should Not Be Using Any Longer

One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out....
Jake September 5, 2022 4 min read
How Using the SLAM Method Can Improve Phishing Detection
Cybersecurity

How Using the SLAM Method Can Improve Phishing Detection

There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade...
Jake August 31, 2022 5 min read
5 Things You Should Never Do on a Work Computer
Cybersecurity

5 Things You Should Never Do on a Work Computer

Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your...
Jake May 31, 2022 5 min read
Alarming Phishing Attack Trends to Beware of in 2022
Cybersecurity

Alarming Phishing Attack Trends to Beware of in 2022

In 2020, 75% of companies around the world experienced a phishing attack. Phishing remains one of the biggest dangers to your business’s...
Jake May 25, 2022 5 min read
Important Steps to Take Before You Recycle a Mobile Phone Number 
Cybersecurity

Important Steps to Take Before You Recycle a Mobile Phone Number 

It’s not unusual to change a mobile number from time to time. For example, when you move, you may want a number...
Jake May 20, 2022 5 min read