KRACK WPA2 security vulnerability update

Late Monday a serious vulnerability in the Wi-Fi security protocol known as WPA2, was announced worldwide. This vulnerability has been named KRACK, a portmanteau of Key Renegotiation Attack. WPA2 is used universally as the most secure of the wireless encryption protocols, the previous protocols being WEP and WPA. This vulnerability applies also to WPA, and [...]

By | October 18th, 2017|Managed Services, Ransomware, Security|0 Comments

Is your email on the spam list?

Have you been meaning to change your password lately? Now is always a good time… As recently highlighted in a number of online blogs, the email addresses and passwords of 771 million people have been published online during a gigantic data leak… Personal data collected by a “spambot” called Onliner has been dumped on a [...]

By | September 7th, 2017|Managed Services, Ransomware, Security|0 Comments

New Locky Ransomware – what you need to know..

While Petya and WannaCry grabbed all the headlines recently, they were largely unsuccessful in that they made almost no money from ransoms – not so with Locky. The Locky ransomware was much more successful in this area, in what has been estimated as a $1 billion USD revenue for ransomware in 2016. Around the 1st [...]

By | September 6th, 2017|Managed Services, Ransomware, Security|0 Comments

Petya “Ransomworm” outbreak update

As another ransomware virus goes global, we continue to recommend measures to stay ahead of these attacks… As was the case with the recent WannaCry outbreak, this threat is a combination of a traditional ransomware attack and a worm that uses a vulnerability in Microsoft’s operating system to spread to other machines. However Petya is [...]

By | June 29th, 2017|Managed Services, Ransomware, Security|0 Comments

Upgrade now to Windows 10 for better security

As I watched the news and read various news articles relating to the WannaCry ransomware attacks over the last few weeks, I was struck by the details that emerged about large organisations using old, unsupported versions of Microsoft Windows desktop operating system (such as Windows XP). Windows XP was a very reliable operating system, and [...]

Are you eligible for the $20,000 asset write-off scheme?

Small business instant asset write-off scheme When Scott Morrison handed down the Budget 2017-2018 this month, it was to the mantra “about making those right choices, to secure the better days ahead” But what does this mean for small businesses? Good things if you’re in need of upgrading or adding new assets for the organisation. [...]

Don’t get harpooned by a Whaler…

"Whaling" is a social engineering attack achieved often with a bare minimum of technological assistance, a simple but effective scam where an organisation's authority figure such as a CEO/CIO/CFO is impersonated, usually by email, in order to authorise some form of illegitimate data or funds transfer. Some of the successful scams have been very simple, [...]

By | May 15th, 2017|Business Value, Managed Services, Security|0 Comments

Why you need to back up your mobile devices

There was a time when mobile phones were used exclusively for calling and texting. Now, they can do so much more. Regardless of your level of tolerance or skill for managing documents in such a small gadget, mobile devices allow you to send and receive email, download and upload media files, store data, and even [...]

Security, the key reason for Windows 10 migration

Why is Windows 10 migration so important? One of the key reasons is Security... Security improvements is the leading driver for enterprises to migrate to Windows 10 on PCs, according to a study by Gartner. The report found that 49 percent of respondents cited security improvements as the reason for deploying Windows 10 in their [...]

Mandatory data breach notification scheme…

Are you taking “reasonable steps” to protect your customer’s data? Within 12 months you will be required legally to report data breaches that occur within your business. Review our tips on how to avoid data breaches in the first place and what will be required in the event of a data breach… What is the [...]

By | April 27th, 2017|Business Value, Managed Services, Security|0 Comments