Mirror and Backups

IRIS ITNewsletter, Security

Running a mirror is now no longer a privilege, everyone who has a Microsoft subscription with OneDrive can set one up. There are now two considerations when trying to keep data and systems safe. It is now relatively cheap and easy to create a data mirror, using OneDrive. If your laptop is lost, for whatever reason, the data is not … Read More

Make BYOD safe!

Tamara El ZoubiSecurity

Make BYOD safe

What does BYOD mean? Bring Your Own Device It is when employees use their own personal device such as Notebook, Mobile or Tablet to connect to the organization network to access what they need to do their job. When Covid-19 hit and started creating havoc across the world, many companies had to switch to working remotely. This led to many … Read More

Technology Investment Boost & .au Domain Names

IRIS ITNewsletter

IT business handshake. Having a deal in technology industry

Technology Investment Boost At the time of writing, the federal government election is in full swing. The budget is offering Small Businesses incentives to invest in ICT solutions. As with all government handouts, it will be up to the applicant to examine the detail and watch for the ‘gotcha’s’. I remember being able to get a grant of $5000 for … Read More

Windows 11 and other Updates

IRIS ITIT Systems, Microsoft, Security

Windows 11

It is long running adage in ICT that it is better to be on the leading edge than the bleeding edge. It is not possible to anticipate how a system will behave in all circumstances and environments. Therefore, most organisations are better off not installing the first release of any product, from apps to operating systems (such a Windows 11). … Read More

How can we prevent Computer Viruses

IRIS ITIT Systems, Security

Computer Viruses How Can We Prevent Them

Anti-Virus Software: Can We Trust It Anymore? One of the downsides of ICT being available to everyone, is that people who wish to disrupt, or otherwise interfere with data and devices, have opportunities to do so. While I was living in the UK in the early 1990’s, I had the opportunity to attend a conference on virus writing. I chose … Read More

SCAMS and other Thieving Activities

IRIS ITGeneral

SCAMS and other Thieving Activities

Since the invention of the telephone, people have been trying to use technology to fool others into handing over their money. While most of us assume we are way too intelligent and aware to be fooled by a scam, SCAM WATCH reports that Australians have lost more than $211million to phone scams this year so far, and the figure is … Read More

September 2021 Newsletter

IRIS ITNewsletter

businessman using laptop

Today is Are You Ok Day, reach out to one another and ask the question, are you ok? A CONVERSATION CAN CHANGE A LIFE R U OK? inspire and empower everyone to meaningfully connect with the people around them and start a conversation with those in their world who may be struggling with life. You don’t need to be an expert … Read More

Cyber-attacks

IRIS ITSecurity

Cyber crime, cyber attack, hacking, computer desktop

Over the past twelve months there has been a lot of publicity about cyber-attacks. There is no doubt that there has been a significant increase in the prevalence of malicious activity online, but what exactly is a cyber-attack and what can you do to prevent being a victim? The term cyber-attack is a generic label which covers many different types … Read More

The importance of IT User Management

IRIS ITUser Management

User Management

Are you confident that you are managing your IT system users effectively? Do you have the right number of licences for the various pieces of software used in your business? Are you paying for licences you do not need, or do you potentially have people using unlicensed copies of software? What about users with multiple devices? How are you keeping … Read More