insider threats

The Growing Danger of Insider Threats

Cybercrime exists and is becoming more of a dangerous reality to businesses across the world. Why? Because it’s profitable. Malicious actors are making money out of businesses and organisations, and as long as they can keep doing that cybercrime isn’t going anywhere. Most criminals are external to a business, lurking…
Read More
crypto ransomware

The Crypto Ransomware Threat

The wild world of cybersecurity continues to throw curveballs at businesses and their data with the growing prevalence of crypto ransomware. This malicious software, or malware, sneaks into your computer and locks up the files on there with some serious encryption so you can’t use them. A ransom is then…
Read More
human operated ransomware

What is Human Operated Ransomware

There’s a cyber threat that should be at the forefront of most organisations’ cyber security efforts: human operated ransomware. It consists of hands-on-keyboard attacks by financially motivated malicious actors, accessing internal corporate networks and deploying ransomware. They then use these to encrypt the organisation’s data, extorting them to pay a…
Read More
disaster recovery

Disaster Recovery: More Important than Ever

There’s a buzzword that’s emerging as the business world adapts to the post-pandemic environment: resilience. The rush to work from home, the unprecedented drop in customer activity and a rise in cybercrime and online criminal activity has created a perfect storm. Organisations in Brisbane and around the world without sufficient…
Read More

Let’s Talk Data Security

Govern and Streamline Your Existing Data, While Improving Ease of Accessibility It’s question time. Sit down and think about data security: are your productivity and collaboration applications secure? A lot of business owners we ask answer straight away: ‘our day-to-day applications and services are locked down like a fortress’. But…
Read More
backup archive

Backup and Archive

Tricky Computer Terms: Backup and Archive Alright kids, gather around the Smile IT campfire of knowledge. It’s time for the computer terminology equivalent of Kum Ba Yah, so dust off the thinking caps and prepare yourself for enlightenment. Today we’re focusing on two members of the IT vocabulary that we…
Read More
replication

What is Replication?

Tricky Computer Terms: Replication When I take my car to the mechanics, he’ll rattle off a long monologue about what’s right with it and what’s wrong with it. It normally ends with “She’ll be ‘right mate.” And it’s always met with a blank stare from me as I try and…
Read More