Blog
Why is Mobile Security Important & How To Protect Yourself
Mobile devices have become an important part of our lives. We use them to stay connected with friends and family, check the news, and shop for the latest trends. With so much personal information stored on our phones, it’s important to take steps to protect ourselves from mobile security threats. In this blog post, we…
Read MoreHow Often Do You Need a Cybersecurity Audit?
Every year, cyber fraud costs Australian businesses $33 billion dollars. And that’s only the self-reported losses – losses that are unreported could be double this amount. It’s hard to say what is the true cost to the business owner. Leaked customer details, hijacking of websites, stealing client payment information, lack of trust in your business…
Read MorePSTN & ISDN: What Are The Differences?
Difference Between PSTN & ISDN Much like any other form of technology, telecommunication networks have evolved and developed over time to meet new demands, requirements and functionalities. From basic analogue technology to modern-day video conferencing and messaging, phones have changed rapidly over the past few decades in Australia. We’ve covered all you need to know…
Read MoreWestpac Switches from Phone Systems to Microsoft Teams Calling
Westpac has become the first bank in Australia to replace their PABX and dedicated VoIP systems with Microsoft Teams Calling. Over 5000 branch office staff have been provided with iPhones in addition to the Microsoft Teams Calling application. The deployment was completed in August 2021 and fully operational across Westpac’s 840 branches. Westpac are Australia’s…
Read MoreHow To Prepare for Ransomware Attacks: 5 Questions to Ask Yourself
In 2020, there was a successful ransomware attack every eight minutes. The threat of a ransomware attack is growing more prodigious everyday, and we need to be alert and proactive to protect ourselves from more high-impact attacks. So what questions should you be asking, and what steps can be taken to mitigate the impact of…
Read MoreScam Text Messages: What Are They & How to Stop Them
Why you’re being inundated with so many scam messages? Australia is rife with conversation about the inundation of scam text messages we have all experienced recently; but why is it happening, and what you can do about it? Some scam text messages are easy to spot, with terrible typos and spelling or obviously fake website…
Read MoreTypes of Hackers & How They Attack You
There are so many types of hacks and hackers that it can sometimes feel impossible to keep up, but who are the main culprits and what are they up to? Black Hat Hackers Black hat hackers are known as the ‘bad hackers’; they are motivated by money but often, they just do it for…
Read MoreFacebook Outage: Technology is Fundamental to the Operation of Most Businesses
The Event Panic struck billions of people on Monday as Facebook, WhatsApp and Instagram all went down at the same time. One thing became very clear, very quickly – the world really relies on these services and the technology industry in general. In a matter of minutes, Facebook had completely disappeared from the internet and…
Read More7 Reasons Why Hackers Hack & How to Prevent It
Why Do Hackers Hack? By the end of 2025, there will be more than 75 billion devices connected to the internet, and every single one of them will be vulnerable to hackers. In 2019 an average of 4,800 websites were compromised each month and we can expect this number to continue to rise; but what…
Read MoreThe Impact of the Work Environment Due to COVID-19
It’s no secret that COVID-19 has changed so many things, for so many people, in such a small amount of time. Here in Australia, it has exponentially changed the way we work, how we work and where we work. This has come as a shock to some businesses who were unprepared for employees to have…
Read More