Unauthorised Mobile Porting/SIM Swap
Criminals attempt to gain ownership of mobile numbers in order to access online accounts such banking, email, superannuation, and government portals such as MyGov etc. Criminals do this in order to gain access to SMS codes (2-step verification) that we often have sent to our mobiles. This may happen one of two ways: Unauthorised Mobile Porting – porting is a legitimate service that allows customers to transfer a mobile number from one telecommunication provider (telco) to another without changing or [...]
What is Cloud Computing?
Simply put, cloud computing (“the cloud”) is the is the on-demand availability of computer system resources, especially data storage (cloud storage) and computing power, without direct active management by the user. Cloud computing dates back to the 1950s, and over the years, it has evolved through many phases that were first pioneered by IBM. Typically, you only pay for cloud services you use, helping you lower your operating costs, run your infrastructure more efficiently and scale as your business need change. Cloud computing [...]
Identity theft is on the rise
Having your identity stolen can be both financially and emotionally devastating with the impact lasting for years. All scams have the potential for identity theft and protecting yourself from scams also means keeping your personal information safe. Most people associate scams with attempts to trick you out of money however, your personal information is also valuable to scammers who steal your personal details to commit fraudulent activities. They may even sell your information onto other scammers for further illegal use. [...]
Top 10 Office 365 Benefits for your Business
1. Familiarity The majority of Australian businesses are familiar with Microsoft. A key benefit of Office 365 is how familiar the interface will be for your business and team. Think about the usual Microsoft applications: Word, Excel, Powerpoint, etc. The Office 365 platform incorporates all of these systems, ensuring that the adjustment period will be minimal. 2. Always Accessible If your business has ever suffered from downtime due to a server failure or system update, you will appreciate how accessible [...]
How much personal data is left on your old devices?
The majority of us have a technology graveyard somewhere in our home or office. What’s a technology graveyard? It’s that (probably dusty) container filled will all of your old devices: laptops, phones, hard drives. Do you know what files are stored on those devices? They are likely holding a whole lot of data like photos, documents, and emails. Now think a little more carefully: are these files confidential? Do they contain personally identifiable information? Perhaps they are simply embarrassing? [...]
What is SMiShing and how can you protect your business against it?
As the world evolves to become more digital, so do scammers. While many diligent business leaders are aware of phishing or email scams, few have heard of SMiShing. SMiShing is an adapted form of phishing, wherein scammers utilise SMS messages to achieve their goals. Just like phishing, scammers will imitate large and trusted corporations to obtain personal information from people. Criminals prefer SMiShing as users tend to trust text messages more than their emails, viewing them as more personal [...]