Exciting news for Computer One as we expand our presence into Europe and the UK.
Category: Blog
Want to achieve ISO27001 certification but struggling to make headway? Computer One has you covered.
Many established organisations find it challenging to match their current security policies with ISO27001 standards. Without expert guidance, they worry about needing to overhaul their security systems completely. This concern can lead to inaction.
That’s where Computer One can help. Read on…
How to conduct your own Essential Eight Maturity Level One Assessment.
Here’s an easy guide to self-assessing your organisation to Essential Eight Maturity Level One.
Level Up Your Business: A Step-by-Step Guide to Implementing the M365 Maturity Model
Microsoft 365 is not just a set of tools; it’s a dynamic ecosystem that, when leveraged effectively, can be a catalyst for transformation and growth in your organisation.
Learn how to use Microsoft’s Maturity Model to get more out of your investment.
Are you following Best Practice in your Disaster Recovery and Business Continuity preparation?
Disaster Recovery and Business Continuity are two much-discussed topics, with universal agreement among executives as to their importance. In practical terms, however, most organisations’ DR and BC plans are not regularly reviewed for their currency or stress-tested for their ease of implementation in an emergency.
Here’s our guide to the best practice in setting, reviewing and regularly testing your DR and BC plan.
Going to market for a new ICT partner? Here’s a useful RFP template with step-by-step instructions
If you’re about to go to market for a new ICT partner, you can increase your chances of making a good selection by starting with our free RFP template.
Written with non-IT people in mind, the document is full of time-saving tips that will help you produce a professional-quality briefing for potential service providers and save thousands on the cost of a professional RFP writer.
Expansion on Strategy 3: Fostering Relationships with Individual Board Members
To secure funding for their initiatives, Technology Leaders must build relationships with individual board members. This strategy involves understanding their priorities, addressing their concerns, and creating advocates for the proposed initiatives. Learn more…
A breach of your systems is highly likely. How will your organisation detect and respond to it?
These days a breach of your systems is no longer unthinkable. Now the battleground has shifted to early detection and response. Two technologies can assist you to defend your network: EDR and SIEM. Discover their essential features and how they work together to dramatically improve your security posture and ability to detect and respond to a breach.
Building High-Performing ICT Teams: A Step-by-Step Guide for Experienced IT Leaders
Follow these seven strategies to elevate your ICT team’s performance. Transform your department into your company’s cornerstone with this essential guide for IT leaders.
A How-to on Partnering within the Enterprise for CIO’s and CFO’s
Discover how to combat ‘Shadow IT’, fostering collaboration and transforming the IT function from a perceived obstacle to a pivotal, integrated enterprise partner.
“Are we there yet?” How an independent evaluation of your Technology Roadmap can shave years off realising your goals
An independent review of your Technology Roadmap ensures alignment with evolving business needs, provides fresh insights, and mitigates biases, bolstering board and CEO confidence and accelerating the attainment of your IT goals.
It’s 2023: How many new cybersecurity acronyms have you learned?
Computer One just launched one of the most comprehensive acronyms glossary on the Web. You’re welcome to use this ever expanding resource.
Criminals behind Medibank cyber attack exposes thousands of customers’ health data
Hands down, the Medibank breach might just well be the worst cyber attack in Australia to date. Here are the gory details.
What is the LockBit Ransomware?
The LockBit ransomware has attacked thousands of companies worldwide, a vast number of which are small to medium-sized businesses. Australian authorities have issued an alert following an increase in LockBit attacks in the country. Here’s how to fight it.
Everything you ever wanted to know about Managed IT Services
The demand for managed IT services is skyrocketing. Whether for operational, strategic, financial, or security benefits, more and more companies are partnering with MSPs. Learn how you can get more value for your business.