Industry News

Cyber-attacks are faster, broader, and more automated than ever. The best defence lies in reducing vulnerabilities in the attack surface that attackers can use.

Key Takeaways from the Fortinet Global Threat Landscape Report

Published April 13, 2026
This snapshot of FortiGuard’s 2025 Global Threat Landscape Report outlines how faster, automated attacks are impacting Australian businesses. Learn how attackers are scaling AI‑enabled threats and ransomware, and practical steps you can take to reduce your risk.
If you don't prepare ahead and test your plan, disaster might strike and it will all come crumbling down.

Too Few Companies Prepare For Disaster Recovery. How Does Your Plan Rate?

Published April 8, 2026
A good disaster recovery plan provides structure when everything else feels uncertain. It helps critical data stay protected, systems get restored faster and customers continue to be supported, even during major disruptions. Most importantly, it replaces panic with a rehearsed response.
Attack Vectors and Attack Surfaces - what's the difference? Red attack vector node connected in digital network | Computer One

Attack Vectors and Attack Surfaces Explained

Published March 16, 2026
An easy-to-understand guide to attack vectors, how cyber criminals break in, how the Jaguar Land Rover breach happened, and what businesses can do to protect themselves from modern threats like HELLCAT ransomware.
Man setting up his robot vacuum (robo-vac) with a smartphone app. Accidentally hacking servers.

The Accidental Robo-vac Hack

Published March 11, 2026
It sounds like a sci-fi tale, but just last month thousands of DJI robot vacuums worldwide became serious surveillance agents when an accidental breach occurred. With devices such as smart doorbells, voice assistants, fitness trackers, and even some fridges observing more of us as we go about our daily lives, the risk of privacy invasion is growing.  But it isn't confined to the home.
Hands of person using credit card reader

2026 Cybercrime Costs Rise 14% for Australian Small Businesses

Published March 6, 2026
75+ Australian businesses have disclosed payments they made to ransomware groups since June 2025. The real figure is likely much higher. With the cost of a data breach averaging $50,000+ for Australian small businesses, can your SMB afford to mitigate the fallout of a cyber-attack?
Mature businesswoman at workplace looking at camera in working environment. Internal staffing decisions vs outsourcing.

Pros and Cons of Internal IT versus Outsourced IT

Published March 4, 2026
If you’re weighing up whether to recruit an IT technician or partner with a Managed Services Provider (MSP), we’ve evaluated the options to help you choose what best fits your risk, budget, and growth plans. Choosing between hiring an internal IT technician or partnering with an MSP can significantly influence your risk posture, operational continuity, and cost predictability.
Businessman stopping falling dominos - representing cyber security as protection against threat actors to ensure business continuity.

Humans make the best attack vector

Published March 2, 2026
A report from US based Security-as-a-Service vendor, Proofpoint, shows a clear shift. Attackers now rely less on automated zero-day exploits and more on manipulating the weakest point in any network, the human. Humans are vulnerable in cybersecurity for a simple reason: we think, feel, assume, trust, rush, and make mistakes and attackers know exactly how to exploit those behaviours.
Image of two businessmen discussing project on tablet - ASD threat monitoring report

Underreported threats highlight gaps in ASD monitoring

Published February 19, 2026
The Australian Signals Directorate (ASD) has released its annual Commonwealth cyber security posture report for the 2024–25 financial year. The report highlighted significant gaps in cyber-threat reporting.
Small and Mid-Sized Business sitting in boardroom discussing reports

Lessons for SMBs in the Annual ASD Cyber Security Report

Published February 18, 2026
The Australian Signals Directorate’s (ASD) latest cyber security posture review shows gradual improvement across government in meeting its Essential Eight (E8) baseline, but progress is still slow.  If you're modernising your business, make sure your security foundation is ready.
Disaster Recovery cautionary tales - Be prepared with Computer One for IT management

Fatal Distraction: 7 Cautionary Tales for IT Managers

Published February 17, 2026
From failure to test a disaster recovery plan to slacking on back-ups there are a plethora of ways to drop the ball when it comes to IT management. Let these examples serve as humorous reminders that our choices in IT often have real-life consequences and why proven processes (and managed services) are so valuable to adopt and follow. 
1 2 3 20
The Computer One logo with blue background
6 time winner of the
Channel Futures MSP 501 Winner logo white | Computer One
Local Government Procurement Approved Contractor logo | Computer One
Q-Mark ISO 9001 certified logo | Computer OneQ-Mark ISO 27001 certified logo | Computer One
© 2026 Computer One Australia.
arrow-right linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram