Email Phishing Scams Are More Sophisticated & Prevalent Than Ever

According to Verizon’s 2018 Data Breach Investigations Report, 92.4% of malware is delivered by email. Up until now, phishing emails have been easy to spot because they come from suspicious email addresses and include poor grammar and formatting – when you think of a phishing scam, you probably picture one of those poorly worded emails […]

Read More >


5 Common Attack Vectors & the Ultimate Solution to Combat Them

An attack vector is the means by which a hacker gains access to your computer or network server, in order to engineer a malicious outcome. Through various attack methods, hackers can exploit system vulnerabilities of all sorts (including the human element, i.e. your staff). In this post, we will explore 5 common attack vectors and […]

Read More >


Using Office 365? You’re probably wasting (some of) your money

Office 365 is a great suite of software, but most business are stuck using only the basics that it offers: Word, Excel, Outlook and PowerPoint. Don’t be fooled by the name. The traditional Office applications are now licensed differently, but Office 365 is so much more than just “Office”. Every version of Office 365 comes […]

Read More >


Reusing Old Passwords Spells Future Trouble

Do you reuse the same password like Mark Zuckerberg did? Here’s a lesson from recent history that is worth bearing in mind the next time you have to set a password. Humans are creatures of comfort. Through our everyday decision-making we actively avoid making our lives more difficult, and that’s not a bad thing… generally. […]

Read More >


The Essential 8 from AustCyber

What Are the Essential 8? The Essential 8 are a prioritised list of mitigation strategies that help organisations of all sorts to protect their systems against cyber threats. Although no standalone mitigation strategy is guaranteed to prevent cyber incidents, when implemented together the former Australian Signals Directorate estimated that 85% of cyberattacks could have been […]

Read More >


Online Threats – The 5 Most Vulnerable Job Titles In Your Staff & How to Protect Them

When it comes to online threats, certain job titles are more vulnerable than others. If you run a business, it is essential that you identify these vulnerabilities. It is also crucial that you have preventative measures in place to mitigate the risks of cyber attacks. In this post, we will cover the 5 most vulnerable […]

Read More >


Stop Email Threats with Barracuda Essentials for Office 365

In the modern world, the likelihood of data breaches and security threats is ever-increasing. Email, in particular, is the leading threat vector for ransomware, phishing, data theft and other attacks. Unfortunately, most businesses simply don’t have the time or the resources to come up with solutions to address these threats – as a result, they […]

Read More >


Phishing, Spear-Phishing and Whaling – What’s the Difference?

Gone are the days of the benign Nigerian prince sending poorly worded emails promising you untold millions. Cyber attackers have amped up their approach to malicious emails, combining highly personalized approaches with expertly designed corporate email spoofs. These emails are known as ‘Whaling’ and are the close, more sinister cousin of ‘Spear Phishing’. They’re now […]

Read More >


Get Your Strategic Digital Transformation Underway with Computer One

When was the last time you evaluated the efficiency of your business processes? And what about the last time you researched how the latest technology could help you to gain competitive advantage while reducing cost? Like many businesses, your answer is probably along the lines of ‘not sure’ or ‘can’t remember’. If you want to […]

Read More >


The Rise of the Guest Network. How we Predict Threats and Restrict Information Access based on Device Types and Users

20 years ago, it was easy to create and administer your own company network. You cabled the computers (typically desktops) in a daisy chain or to a central switch, connected to a modem and accessed the early wonders of Internet and email. There was no such thing as ransomware, data theft was confined to government […]

Read More >