Headlines keep saying that the Internet of Things, billions of web-enabled devices that share information via cloud services, is coming. The fact is, it’s already here. From mining companies using thousands of sensors on plant and machinery to refine their maintenance schedules through to the IP camera that your business just installed beside the front
Did you know that the average user looks at their mobile device more than 50 times per day? It’s more than you’d think, but if you count the number of times you do it, you’ll see it’s an accurate figure. That’s up from a 2013 Deloitte study that calculated 33 looks per day in 2014
Computer One has been listed as one of the Top 10 Australian-based Managed Service Providers by industry ratings website MSP Mentor. In its annual survey, MSP Mentor ranks 501 MSP’s globally by their turnover, number of staff, technology and client verticals, industry involvement and more. The top MSP 501 companies ranked this year include organizations
Well it was a long night, but the Computer One team and more than 100 other Brisbane CEO’s and their Executive teams stayed out in the cold underneath the Story Bridge last night to raise money for the 9,700 homeless in our city. Thankfully, it was neither too cold nor too wet so the night
Tonight, three members of the Computer One team will sleep outside in the elements underneath the Story Bridge in order to raise money for the homeless of Brisbane. But we won’t be alone. More than 100 CEO’s and executive teams from across the city will also be there as part of the annual St Vinnies CEO
Since 2013, the Australian Signals Directorate has published a list of 4 critical strategies to adopt if you want to mitigate 85% of the risk from cyberattacks. Do you know what they are? No. 2 on the list is “Patch Applications”. Apply security patches to prevent criminals from entering your network through known flaws that
Last month FACC, a European supplier to Boeing and Airbus fired its CEO after he played an unwitting part in the loss of €41.9 million. The sacking came after the company fired its CFO in January for the same event dubbed “the Fake President Incident”. The fraud came about after an email, purportedly from the CEO was
As revealed in IT News, the QLD Government is expecting to roll out a whole of government approach to vulnerability scanning by October 2016. The initiative comes on the heels of a breach last year of the Department of Education and its TAFE. Hackers made off with data collected from the complaints portal including details
One of Amazon’s Sydney Data Centres went down over the weekend thanks to a severe storm. It shut down websites for some of Australia’s biggest web businesses. Domain, The Iconic and Domino’s were severely affected and Carsales plus REA Group were affected to a lesser extent. One of the biggest cloud companies, AWS is built
By now you will have heard of the Panama Papers, the massive set of 11.5 million documents that was stolen from the law firm, Mossack Fonseca in Panama that details the work they’ve been doing for clients of all types. The firm certainly seems to have been comfortable working in an ethically questionable fashion, but
When shopping around for an Infrastructure-as-a-Service provider, it’s sometimes hard to see the forest for the trees. There’s a lot of talk on GB’s, Ghz, RAM, VM’s and IOPS, and a lot of spin around multi-tenanted, single-tenanted, dedicated resources, uptimes, hypervisors, desktop delivery and storage tiers. It’s a lot of information to process, and it
When you’re presented with the opportunity to hire a new IT resource or to outsource to a Managed IT Service Provider, which direction should you head? Do you interview, hire and train a new staff member or pay a little more per hour (but possibly less overall across the course of a year) to recruit
Who? Me? As a Managed IT Service provider looking at the state of affairs in multi-stage chained attacks we can say this: if you want to be an effective hacker, take a persuasive writing course. That’s also the lesson delivered in a report last week by US-based Proofpoint, a leading Security-as-a-service vendor shows that automated
Office 365 is now in its 5th year of officialdom, but it’s a product with some decent pedigree, stretching all the way back to Microsoft’s purchase of Hotmail in 1997 for around $400 million. In its efforts to produce a productivity suite that fits all users: individual, small business and corporate, Microsoft has introduced a bit
Let’s get one thing on the table, right up-front. The cloud is safe. Safe to store your documents, safe for your email and your business applications, and safe for everyday use. Unfortunately, “The Cloud” is a rather generic term for a range of different solutions delivered by various service providers. Thanks to that diversity and