We hear a lot about being in the era of digital transformation, but there are still many Australian businesses who are dragging their feet when it comes taking on their own transformation journey. This can probably be put down to … Read More

Put Your Backup Data to Work with Nimble and Veeam Software The Nimble Secondary Flash Array represents a new type of secondary data storage optimized for both capacity and performance. It adds high-performance flash storage to a capacity-optimized architecture for … Read More

We talked with IT Manager Simon Burley to delve into PPK Group’s approach to securing their IT systems using Sophos Cloud. Tell us a little bit about PPK? PPK Group was established back in December 1994 and was originally focused … Read More

Aruba delivers highly secure and reliable wireless with ease of connectivity for students, staff and guests Villanova College is an independent Catholic school educating 1,250 students across its Junior, Middle and Senior schools. Located in Coorparoo, a Southern suburb of … Read More

Simply put, they’re all fancy names for stuff you don’t want on your computer or to happen to you. 1. Virus: Any bad software used to be a virus; however, we use the term “malware” now. The word “virus” is used to … Read More

Cost and lost business associated with data breaches and lawsuits continue to increase every year. As long as valuable information exists, criminals will attempt to steal it using a wealth of traditional, as well as ever more sophisticated attacks. Traditional … Read More

USB Keys are an extremely convenient and cost effective method of transporting data. In the business space, they are often used is with professionals, managers and executives who take their work home. They transfer the files to a USB key, … Read More

Click below to read this Executive Brief by Frost and Sullivan, sponsored by IBM. Virtualization for MidSize Businesses: Keep your foot on the Accelerator

The Australian released an article today stating the FBI warns around 50 of the Fortune 500 companies are among thousands of individual and company’s still infected by an internet virus that could see tens of thousands lose their internet service on … Read More

Why do businesses maintain the behaviour of buying multiple security vendor products when more cost effective, industry proven, consolidated alternatives exist? Unified Threat Management (UTM) takes away the need for complicated, mulit-vendor security implementations for most small and medium sized … Read More

1 2