Password Security under the microscope

Password Security tips

Brian Krebs, founder of Krebs on Security, has authored a new post this week disclosing the potential harm that can come from reusing weak passwords, and it’s worth some fresh attention here. He focused on banking passwords, password reuse, the ease of swapping SIM information to gain access to a target’s mobile phone messaging, and

Solomon Islands see the light (almost)

Solomon Islands and PNG get fibre optic cable

Computerworld reported today that the undersea fibre cable that will connect Australia, Papua New Guinea and Solomon Islands together has been installed at the landing site in the nation’s capital, Honiara. The 4,700km four fibre pair will eventually connect Honiara, Port Moresby and Sydney to bandwidth that will revolutionise industries in both island nations. The

How safe is your network? You won’t know until you run an Information Security Audit

white collar criminal hiding behind acting mask

This week, reports ComputerWorld, an IT Consultant named Steven Oakes was jailed for 3 years for spying on the communications of a share recommendation firm called Port Phillip Publishing (PPP).  In a period from 2012 to 2016, the Victorian man used a device known as a Wi-Fi packet sniffer to copy and then decrypt messages

Computer One Partners with Global X to deliver IT Security Update

Phishing image

Recently, Computer One was hosted by leading Australian software developer for the legal and conveyancing sector, GlobalX, to jointly deliver an information security update for lawyers and conveyancers from around the country. The update covered today’s most prevalent attack vector – the email channel. In conjunction with David Hobley, GlobalX’s CIO, we delivered advice on

What kind of relationship should you have with your Managed IT provider (and how can you improve yours)?

What kind of relationship

What does a good relationship with your Managed IT provider look like? We examined our best client relationships and found these common attributes. Does your current IT relationship look like this or something else entirely? IT is “owned”. No provider is perfect. But the mark of a good provider is being able to admit that