How to Free Up IT Resources

Business success comes from many things, one of which is capitalising on opportunities, except it is harder to do so if you are resource constrained. This article explores ways to free up information technology (IT) resources to drive productivity and evolution. Continue reading

What Not To Do On A Work Computer

What not to do on a work computer

This article shares things employees should avoid doing on work computers, whether they are working remotely or in the office. These tips help both you and your work control security and data access. Continue reading

Seven Common IT Myths Debunked

IT Myths Debunked

Sometimes myths are harmless, but when it comes to business IT myths, not knowing the truth can be damaging. Make smarter tech decisions with accurate information and a better understanding of IT. This article debunks seven common business IT myths. Continue reading

Why You Shouldn’t Use SMS as your 2FA

2FA / MFA Issues

Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It has become the norm and if you are not doing this for all your online accounts then you should start straight away (check out our article on Why 2FA is Important). As with most things security wise, hackers have figured out how to get around the SMS code, too. This article shows you how they do it and how to stay safe. Continue reading

3 Ways You Can Get Infected With Ransomware

What to do if you are hit by ransomware

There’s been a lot in the news over the last few weeks about ransomware attacks. As the media can give people the wrong impression let me clear up some things for you. Continue reading

4 Signs You Are Not Budgeting Enough for IT

Tech Budget

Every business wants to be cost-conscious as saving money in one area can make funds available to expand, develop new products or pay people more. That all makes good business sense. Continue reading

Everyone Plays a Role To Prevent Cybersecurity Issues

Cyber Security

Hollywood films would have us believe that cyberattacks are elaborately planned and use expensive, sophisticated tools developed by hackers and geeks is sophisticated labs. But in real life, most hacks are nothing like that as the first steps cybercriminals take are to simply fool a human to gain access. Continue reading

What You Can Do When Your Warranty Runs Out

Expired Warranty

All technology you buy today comes with a warranty of some sort. In Australia you will get a default warranty and may even be offered a third party warranty option. But it is inevitable that your desktop will die immediately after the warranty runs out. Don’t worry though as you still have options. Continue reading

What to Do If You Get Hit With Ransomware

What to do if you are hit by ransomware

If you get hit with ransomware there will be a number of indications, including:

  • A screen telling you that your business files are encrypted.
  • You can’t open any of your documents.
  • Your files may have a weird extension of different icon.
  • there will be instructions for how to pay up to recover your files.

This blog article details a number of steps you can take instead of paying the ransom straight away. Continue reading