Computing Australia Top Tech Blogs | Tech News and tips
COMPUTING AUSTRALIA WRITES
TECH BLOG
COMPUTING AUSTRALIA WRITES
TECH BLOG

Blog

Why Does the Hospitality Sector Need to Invest in Cybersecurity?

With evolving technologies, hospitality industries are now reliant on the use of internet and electronic devices for the daily functioning of the business. This convenience also comes with vulnerabilities. Being online means, you may be open to cyber-attacks. Our cybersecurity team in Perth has years of experience in helping hospitality businesses stay secure.

What do Cyber Breaches Cost SMBs?

Report Cyber was introduced on July 1, 2019, to enable Australian SMBs to report cyber issues (it replaced ACORN – Australian Cybercrime Online Reporting Network). If you thought you would never use Report Cyber, have a look at the statistics for SMBs in the first quarter of its operations.

How To Prevent Ex-employees From Compromising Your Business

In a previous post, we have spoken about how employee mobiles can pose a security risk. But what about ex-employees? They are one of the biggest threats to small and medium-sized businesses. Ex-employees can cause threats to your business unknowingly or with malicious intent. It is important to understand how to prevent ex-employees from compromising your business to keep your business secure.

Employee Mobile Security in the Workplace– Risks and How to Fight Them

Mobile phones are no longer just phones; they are constant companions. For most people, it is the last thing they look at before going to sleep, and the first thing their eyes seek when they wake up in the morning. Smartphones are not used for just personal purposes; they are increasingly involved in the workplace too.

Cybersecurity Training – your staff are your best defence

Studies on cybersecurity events show that between 70 and 90% of data breaches are caused by simple human error. Shocking information, right! Recently the huge hike in cybercrime rates also proves that no business is immune to the risk of a cyber-attack. That is why cybersecurity training is vital for employees. Training your employees is a great way to provide an extra layer of resilience to cyber-attack.

SSL Does Not Mean A Website Is Secure

The SSL encryption can defend against hackers who're trying to intrude on your internet activity and also protect your data. But that doesn't mean all the SSL certified sites are safe; even cybercriminals use encryption now. They use SSL to hide malware, and if your firewall isn't scanning SSL-encrypted traffic, then your network is vulnerable.

The BIG Guide to Productivity Apps

Mobile phones are no longer just phones; they are constant companions. For most people, it is the last thing they look at before going to sleep, and the first thing their eyes seek when they wake up in the morning. Smartphones are not used for just personal purposes; they are increasingly involved in the workplace too.

The Business Guide to Multi-Factor Authentication

We all lock our houses when we are not home, and these days we add an extra layer of security like a card or thumbprint reader that must be used in combination with the key for unlocking. It’s the same for your personal data stored in your device or online. With cybercrime events on an increasing trend, it’s essential to take extra measures to protect your data from criminals.

5-Minute HelpDesk -How do I Recover Deleted Emails in Outlook?

We receive frequent calls from panicked customers when they accidentally delete emails from Outlook. You don’t need to panic because deleted mails can be recovered. Did you know that emails emptied from the ‘deleted folder’ can also be retrieved in some cases? Our IT helpdesk in Perth shows you how.

10 Sure Ways You’re Most Likely To Get Hacked

Hackers are always trying to find weaknesses in your business, and when found, they will attack. A cyberattack causes immense loss to a business – time, money, goodwill, trust of customers and for small businesses, sometimes the loss of business itself.

Go to Top