Telstra DOT | A renewed warning

About three years ago I wrote a blog post warning of the dangers and limitations of the Telstra DOT (Digital Office Technology) service.  More recently with the continued roll-out of the National Bro... [read more]

Data breaches are on the rise, but that won't force companies to up cyber security

Article courtesy of ABC News.   Data breaches are on the rise, but that won’t force companies to up cyber security By... [read more]

50,000+ emails, data breach at major Australian shipping company

In what might be the first report made under the new mandatory data breach laws an Australian shipping company has revealed that tens of thousands of it’s emails were auto-forwarded without per... [read more]

How one click of the mouse cost a Melbourne business over $80,000

Last week I received some news that I never wanted to hear, one of our customers was targeted for an email scam which cost them big time and we were being tasked with working out the who/what/where/wh... [read more]

Probably the most important blog post we'll make this year: What you need to know about the new Australian mandatory data breach notification laws.

In a little more than two weeks time, on February 23rd 2018 all Australian Businesses with a turnover of 3 million dollars or more will be required to notify the Office of the Australia Information Co... [read more]

Negotiating with a Ransomware operator

In a recent post from Sonicwall, one security expert describes how he negotiated with Ransomware operator. The SonicWall Capture Labs Threat Research Team has conducted an experimental dialog with a r... [read more]


It seems that the latest round of Malware although disguised as Ransomware is nothing more than an encrypting virus with no possibility of decryption. In the first hours of the attack, researchers bel... [read more]

Massive GoldenEye Ransomware Campaign Slams worldwide users

Bitdefender has identified a massive ransomware campaign that is currently unfolding worldwide. Preliminary information shows that the malware sample responsible for the infection is an almost identic... [read more]

How do you protect your digital intellectual property?

In 2015 Adelaide firm Codan discovered that the design plans for their world-class metal detectors had been stolen by Chinese hackers and cheap imitations were now being sold all around the world; and... [read more]

Take the quiz: Can you tell if these are a scam or real?

How well tuned is your B.S. detector?  Take the quiz to find out. [read more]

1 4 5 6 7 8 9

Our Services

Managed IT Support

Our fixed price Managed IT Support Programs will increase your businesses competitiveness and efficiency with our I.T. Professionals on call for you 24/7.

Same Day On-Site Support

Class leading response times ensure your that when things do go wrong we’ll be there in a hurry so you can get on with doing what your business does best.

Security and Data Protection

Custom designed security and data backup systems protect your business from emerging threats and gives you peace of mind.

Hardware and Software

We supply, install and maintain hardware and software from all major vendors including Hewlett-Packard, Microsoft, IBM, Intel and Dell all with our 30 day reconfiguration guarantee.