+61 2 9270 0666

Blog

Essential Eight Cyber Strategy

Get your security on track with the Essential Eight cyber strategy

There’s a ton of different ways to implement a cyber security strategy these days. Various vendors and suppliers have their own products and methods. With all the choices out there, the Essential Eight cyber strategy is a good place to start. With the Essential Eight, you’ll get a at least a starting point as a…
Read more

Telco Embargo for 2019 - What you need to know

Telco Embargo for 2019 – What you need to know

At the end of each year, all the carriers impose and industry-wide telco embargo on all non-emergency telecommunications work. As we move toward the Christmas period, the telco embargo for 2019 is fast approaching. This year, the embargo starts on December 13. What does the telco embargo mean? During the embargo, all the carriers will…
Read more

Office 365 Security Best Practices

Office 365 Security Best Practices

Even though Microsoft’s Office 365 is an easy-to-use platform, securing your data in the cloud is not that simple. Implementing a few Office 365 security best practices can at you’ll have your data in a safer place than it was yesterday. Office 365 is constantly evolving with new features being added every month. Keeping on…
Read more

Office 365 Email Security

The Facts on Office 365 Email Security

Out of the box, Microsoft’s Office 365 email security provides some good levels of protection around basic spam and malware filtering. If you want something more substantial that will suit your business, it’s most likely that you need to look at 3rd party products to fill the gap. The Office 365 suite isn’t a one-site…
Read more

Microsoft Azure Cloud

NetApp Cloud Volumes

Building a hybrid cloud environment just got a whole lot easier. Are you ready for tried and proven way of given your applications fast access to on premise data and replicating to the cloud for DR? Enter NetApp Cloud Volumes. It’s true that you can outsource infrastructure, applications and services through various as-a-service programs. You…
Read more

Compare Office 365 Enterprise

Office 365 Enterprise vs Office 365 Business Plans

Microsoft’s Office 365 offers tons of options for businesses of all sizes. For your business through, how do your choose between Office 365 Business packages and the Office 365 Enterprise options? Office 365 has more subscription plans than you can shake a stick at. We’re comparing two of the most popular subscriptions that we come…
Read more

Things to consider before choosing hyperconverged infrastructure

5 Things to consider before choosing Hyperconverged Infrastructure

Hyperconverged infrastructure (HCI) has come a long way over the last few years. A small handful of the vendors have been modernising many businesses by replacing the traditional technology stack with hyperconverged solutions. A hyperconverged solution could turn out to be a good investment. Some benefits you may see include a reduction in your overall…
Read more

Email Threat Intelligence Review of 2018

Email Threat Intelligence Review of 2018

As 2018 draws to a close we thought it might be worth a look back on the year to see if there’s anything we can learn from email threat intelligence activity for next calendar year. Our review is a frank and ‘matter-of-fact’ and based on our experiences. All the data presented here is what we’ve…
Read more

Mandatory Data Breach Laws

Mandatory data breach laws are here – are you ready?

It’s nearing 12 months ago when the Australian federal government introduced legislation to force mandatory data breach notifications on businesses in Australia. In that time, we’ve found only a small percentage that have taken a look at their systems and processes to see if they are at risk. Importantly, this new legislation isn’t an solely…
Read more