Why partner with an IT solution provider
An IT solution provider can add significant value to your business in various ways. Here are some key contributions and added values that an IT solution provider brings to a...
Essential Eight Brief
OverviewThe Essential Eight is a cyber self-assessment (security) maturity tool “to help organizationsmitigate cyber security incidents caused by various cyber threats” and have been designed toprotect Microsoft Windows-based internet-connected networks....
Why is compliance and governance necessary?
One of the central adages of Information Technology is that there should always be one version of the truth. What this means is that systems should measure and control a...
Mirror and Backups
Running a mirror is now no longer a privilege, everyone who has a Microsoft subscription with OneDrive can set one up. There are now two considerations when trying to keep...
Make BYOD safe!
What does BYOD mean? Bring Your Own Device It is when employees use their own personal device such as Notebook, Mobile or Tablet to connect to the organization network to...
Technology Investment Boost & .au Domain Names
Technology Investment Boost At the time of writing, the federal government election is in full swing. The budget is offering Small Businesses incentives to invest in ICT solutions. As with...
Windows 11 and other Updates
It is long running adage in ICT that it is better to be on the leading edge than the bleeding edge. It is not possible to anticipate how a system...
How can we prevent Computer Viruses
Anti-Virus Software: Can We Trust It Anymore? One of the downsides of ICT being available to everyone, is that people who wish to disrupt, or otherwise interfere with data and...