Wifi Security Flaw Detected that Leaves Devices Vulnerable – Patch Your Wifi Soon

“All Your Wifi Connected Devices Are Potentially Vulnerable” That’s the conclusion from James Walker, MD of Computer One after reviewing international research that also prompted the US Department of Homeland Security to issue an official warning. What’s the story? Well, a wifi security flaw has been discovered and it’s serious. The flaw could be used […]

Read More >


Blockchain Rising – Microsoft the Latest Corporation to Adopt Blockchain Technology

Blockchain isn’t going away anytime soon. The transformational technology is an increasingly hot topic in tech circles, and more and more enterprises are looking to invest in the concept. We’ve already introduced you to the basics of blockchain; a flexible and theoretically invulnerable form of decentralised distributed ledger. While the concept has been used for […]

Read More >


Infrastructure-as-a-Service: How IaaS Providers Create Fast, Resilient Networks

Infrastructure-as-a-Service is predicted to be the fastest growing aspect of cloud computing in the near future, and organisations are more likely than ever to trust IaaS providers for reliable and flexible infrastructure. Notwithstanding some clear cut disasters, cloud computing is now a very effective option for all metro businesses in Australia. By eschewing the capital […]

Read More >


How Unified Communications and IP Phone Systems Can Boost Efficiency

Time is crucial in modern business operations, and yet it is still commonplace for larger businesses to use ISDN or PSTN lines and other antiquated communication methods when better options are available. While there can be a large-ish initial outlay on unified communications and IP phone systems, the long-term savings and marketing benefits cannot be […]

Read More >


Is Your Network Safe from Invasion? Why You Should Consider an IT Security Audit

While most organisations in 2017 have adopted security programs that successfully defend against cyber attacks, malware can still infect networks by way of unexpected sources. Personal USB drives, phones and laptops are used to access repositories of company information, but many organisations have not conducted an IT security audit that evaluates the risks they pose. […]

Read More >