QLD announces vulnerability scanning across the entire government

Continuous Vulnerability Management - a shadowy figure is hidden by digital data

As revealed in IT News, the QLD Government is expecting to roll out a whole of government approach to vulnerability scanning by October 2016. The initiative comes on the heels of a breach last year of the Department of Education and its TAFE. Hackers made off with data collected from the complaints portal including details

How to Choose the Right IaaS Provider

A stopwatch measures the recovery time for an IaaS provider

When shopping around for an Infrastructure-as-a-Service provider, it’s sometimes hard to see the forest for the trees. There’s a lot of talk on GB’s, Ghz, RAM, VM’s and IOPS, and a lot of spin around multi-tenanted, single-tenanted, dedicated resources, uptimes, hypervisors, desktop delivery and storage tiers. It’s a lot of information to process, and it

Humans make the best attack vector

Who? Me? - a businessman feigns surprise

Who?  Me? As a Managed IT Service provider looking at the state of affairs in multi-stage chained attacks we can say this: if you want to be an effective hacker, take a persuasive writing course. That’s also the lesson delivered in a report last week by US-based Proofpoint, a leading Security-as-a-service vendor shows that automated

Office 365 tips and traps for the unwary

Office 365 Migration Brisbane, Sydney, Melbourne, Australia - image

Office 365 is now in its 5th year of officialdom, but it’s a product with some decent pedigree, stretching all the way back to Microsoft’s purchase of Hotmail in 1997 for around $400 million. In its efforts to produce a productivity suite that fits all users: individual, small business and corporate, Microsoft has introduced a bit

Your Law Firm and the Cloud

Cloud for Law firms - A man walks in the rain under an umbrella

Let’s get one thing on the table, right up-front. The cloud is safe. Safe to store your documents, safe for your email and your business applications, and safe for everyday use. Unfortunately, “The Cloud” is a rather generic term for a range of different solutions delivered by various service providers. Thanks to that diversity and

Computer One helps a Major SEQ Charity

IT support for charities - children do sit-ups in a park

19-01-2016.  Recently, a fast-paced IT project came from an unlikely source. A respected and long standing charitable organisation that offers literally dozens of services to the Brisbane and wider South East Queensland community. With over 500 staff, the company is also a service hub for related centres located around Southeast QLD, providing an Infrastructure-as-a-Service product

Signatureless attacks are here to stay

Detect hackers - a hacker stands in the shadows, with no visible face

We’re seeing a rise in signature-less attacks. “What’s a signature-less attack?” you say. It’s where malware that is designed to sit on your system, actively breaching your data security, is unable to be detected because the “signature” that the code produces has not been seen by anti-virus software teams with enough frequency to be captured

Can You Spot Fake Emails?

Phishing email examples - Can you spot the fake?

Millions of dollars in productivity are lost every single day in Australia thanks to various kinds of ransomware that encrypt company data in a practically unbreakable format and demand payment before releasing it. And that’s just the attacks that declare themselves.  Millions more damage is being done by signatureless malware hidden inside your trusted applications.

Exinda’s Network Orchestrator can Improve Your Network Performance by 200-300%

Exinda Network Orchestrator - Computer One provides an endorsement

We don’t provide endorsements lightly. We regard ourselves as a vendor-agnostic managed IT service provider, focused on the needs of the end-user and the business requirements and able to specify exactly the right solution in each case because we’re not tied to recommending only a certain brand or product That’s why it’s important that we