fbpx

April 2020

6 Best Practices for Protecting Yourself from Coronavirus (and Other) Phishing Scams

2020-04-22T11:25:37+10:00Security|

6 Best Practices for Protecting Yourself from Coronavirus (and Other) Phishing Scams Phishing is a danger all the time, but especially so during time of uncertainty and stress. It’s often when people’s minds are elsewhere that they get caught with their defences down and fall for a phishing scam.

Comments Off on 6 Best Practices for Protecting Yourself from Coronavirus (and Other) Phishing Scams

Supporting Your Remote Workforce with Microsoft Teams During COVID-19

2020-04-20T09:01:10+10:00Microsoft Teams, Security|

Supporting Your Remote Workforce with Microsoft Teams During the COVID-19 Outbreak The world is facing a challenge with COVID-19 that hasn’t been seen in modern times. This is causing sudden changes in the way we live and work with the goal of reducing the risk of community spread.

Comments Off on Supporting Your Remote Workforce with Microsoft Teams During COVID-19

Introduction to Information Barriers in Microsoft Teams for Compliance

2020-04-14T08:51:23+10:00Microsoft Teams, SharePoint|

Introduction to Information Barriers in Microsoft Teams for Compliance Ensuring compliance with both data privacy and conflict of interest rules can be challenging. These guidelines often include restrictions on the sharing of information both inside and outside your organisation.

Comments Off on Introduction to Information Barriers in Microsoft Teams for Compliance

Why You Need to Be Using Multi-Factor Authentication Company wide

2020-04-06T08:08:27+10:00Security|

Why You Need to Be Using Multi-Factor Authentication Company wide Weak or stolen passwords are responsible for approximately 63% of all data breaches. This is why the purpose of many phishing campaigns is to steal user login credentials. Office 365 users have seen an increase in scams specifically designed to

Comments Off on Why You Need to Be Using Multi-Factor Authentication Company wide

March 2020

What is Microsoft Intune and How Can it Protect Your Office 365 Data and Endpoints?

2020-03-30T11:02:24+10:00Microsoft 365, Security|

What is Microsoft Intune and How Can it Protect Your Office 365 Data and Endpoints? Prior to the computer age, company files were in paper format and were stored in filing cabinets, which wasn’t great for sharing, editing, or finding easily, but did have the advantage of restricting access.

Comments Off on What is Microsoft Intune and How Can it Protect Your Office 365 Data and Endpoints?

How to Get Started with a Business Continuity Plan

2020-03-20T16:01:28+10:00Backup & Disaster Recovery, Featured|

How to Get Started with a Business Continuity Plan There are a number of threats that can cause operational issues to a business. Some are large enough to completely close a business down (like destruction of the physical building), while others are less severe but can still be costly, like

Comments Off on How to Get Started with a Business Continuity Plan

Top 5 Threats to Mobile Device Security

2020-03-02T10:57:02+10:00Mobile Device Management, Security|

Top 5 Threats to Mobile Device Security Smartphones have completed their evolution from wireless telephones to tiny “pocket computers” and statistics in a number of areas show that mobile use is outpacing desktop computer use. It seems that people prefer their portable devices to connect online over computers that are

Comments Off on Top 5 Threats to Mobile Device Security

February 2020

How to Handle Your Technology During an Office Move to Ensure it Stays Intact

2020-03-02T17:39:29+10:00Technology|

How to Handle Your Technology During an Office Move to Ensure it Stays Intact Any type of major move involves multiple moving parts and when you’re relocating your office, and several logistics to plan for. One of the biggest considerations is how to move your technology infrastructure.

Comments Off on How to Handle Your Technology During an Office Move to Ensure it Stays Intact