During my time at the Microsoft Inspire conference in Washington DC, I attended three Vision Keynotes presented by senior Microsoft leaders. The first Vision Keynote focused on the anticipated paradigm shift from cloud/mobile technology environment to Intelligent... Read more
In February 2018, the Australian Data Privacy Act will change. The amended Act imposes new mandatory obligations on nearly all businesses to notify individuals and the regulator (OAIC) when cyber security incidents compromise personal information. All CEOs and... Read more
Overnight on the 28th of June, a new ransomware cyber-attack (dubbed 'GoldenEye', previously referred to as 'Petya') started to spread throughout Ukraine, parts of Europe and America. Several Australian companies have also reported being impacted by the ransomware... Read more
What is Ransomware?
Ransomware is malicious software (malware) that runs on your computer and either locks you out, or encrypts your files until you pay a ransom. Ransomware has been around since the late 1990s, and aided by the internet has been plaguing more and... Read more
When you are talking about networking in business, usually with your IT provider, you might find that the terms "hub", "switch", and "router" are being used interchangeably when they should not be. The reason for the confusion is understandable. Besides looking... Read more