Adoption of cloud SaaS applications as a whole can reduce IT overhead costs be 20 – 30%1. The big one’s like Microsoft Office 365 and Google G-Suite are making a massive impact and the advantages are plenty; ease of use, … Read More

The Australian Cyber Security Centre, ASD Essential 8 places application whitelisting right up the top as a mitigation strategy to prevent malware delivery and execution. In fact; it’s their #1 recommended mitigation strategy. Refer https://www.cyber.gov.au/publications/essential-eight-explained for further detail.   Application … Read More

In my last article, I spoke about the need to leverage new technology for seizing new opportunities while also minimizing the unnecessary complexity of managing infrastructure and networks. This is where we’re seeing the relationship between organisations and IT vendors … Read More

  We’ve never had it so good in terms of our new tech capabilities. But it’s a double edge sword when we consider that our competitors also have access to the same technology that we do. In order to stay … Read More

In a data-driven world, your organisation’s ability to leverage value out of the data you collect could be your long term competitive advantage. Even further, your ability to spot useful data sets in every area of your business can be … Read More

There may be a big difference between how you see your organisation’s technology, and how your customers and employees experience it. While we’re in the head office, tethered directly to underlying systems and infrastructure, our customers could be in any … Read More

We hear a lot about being in the era of digital transformation, but there are still many Australian businesses who are dragging their feet when it comes taking on their own transformation journey. This can probably be put down to … Read More

Where tech professionals used to feel like they were speaking a foreign language to their non-tech colleagues, a lot has changed over the past decade. All of us own mobile phones, internet routers, laptops, and tablets, and we all use … Read More

The Internet of Things (IoT) is proving to be a real game changer in terms of the sheer volumes and variety of data we can now collect. Gartner has forecasted that 14.2 billion connected things will be in use in … Read More

Whether we like it or not, the greatest threats to our network security are the people we trust the most. Most other threats such as DDoS attacks, malware, and ransomware attack from outside of the firewall, but an insider threat … Read More

Far too often, employees are not adopting appropriate, responsible use of technology. This hinders their ability to contribute to the common goal of the business, and it can also expose the business to potentially harmful cyber threats or legal implications. An Acceptable Use Policy is … Read More

The explosion of smartphones, tablets and Internet of Things (IoT) devices is transforming the way we communicate, consume services, and manage our personal lives. The combination of mobile devices and cloud-based apps is also changing the very nature of our … Read More

1 2 3 4 5