A week out from the 2015 Sydney to Hobart yacht race the weather models were looking very tough for the boats and crew. A big low looked likely to develop on day 2 just as the majority of the fleet was entering Bass Strait, bringing with it steep headwinds, rolling ocean and more than a
21-01-2015. A major Australian fashion brand owner needed a fresh approach to its IT Support, so it approached Computer One in mid-2015. What was the problem? Internal research had shown that the company’s IT team was stretched with the volume of low-level help issues it resolved on an everyday basis. Strategically important projects were being
19-01-2016. Recently, a fast-paced IT project came from an unlikely source. A respected and long standing charitable organisation that offers literally dozens of services to the Brisbane and wider South East Queensland community. With over 500 staff, the company is also a service hub for related centres located around Southeast QLD, providing an Infrastructure-as-a-Service product
We’re seeing a rise in signature-less attacks. “What’s a signature-less attack?” you say. It’s where malware that is designed to sit on your system, actively breaching your data security, is unable to be detected because the “signature” that the code produces has not been seen by anti-virus software teams with enough frequency to be captured
Millions of dollars in productivity are lost every single day in Australia thanks to various kinds of ransomware that encrypt company data in a practically unbreakable format and demand payment before releasing it. And that’s just the attacks that declare themselves. Millions more damage is being done by signatureless malware hidden inside your trusted applications.
Space researchers infer the existence of a black hole, not by observing it directly, but by observing what’s happening around it. Changes in surrounding matter, warping of light, or a larger than normal burst of x-rays can all indicate the presence of a black hole in a galaxy. Each black hole is different, but it
We don’t provide endorsements lightly. We regard ourselves as a vendor-agnostic managed IT service provider, focused on the needs of the end-user and the business requirements and able to specify exactly the right solution in each case because we’re not tied to recommending only a certain brand or product That’s why it’s important that we
For several months we have been hard at work behind-the-scenes preparing a new version of the Computer One website. Today we are proud to announce its launch. It contains a more complete description of the IT services we offer and maintains the easy links to our desktop support services. Our thanks go out to our clients
QH&M Birt is one of Australia’s busiest civil contractors. They prepare mine sites for commercial operation and build roads and dams in the kind of environments where roads and dams have never been seen before and in some of the most remote locations in the country It’s not all about big earthmoving machinery though. Lots
19-08-2015 – Be careful where you step. That’s the message from Microsoft as it releases an out-of-cycle patch with all the urgency it can muster. IT News reports that the patch covers Internet Explorer 7 to 11, running on Windows Vista and newer supported versions of the desktop operating system, and also Windows Server 2008
There’s a growing trend, widely recognised, that your employees are happy to connect their mobile device to the corporate network to give them the flexibility to work remotely and be available even when they’re not in the office. To make the most of that trend, the role of IT is to make the business and
30-07-2015 – We get a lot of IT support calls from clients affected by some malware that has interrupted their workflow and stolen or corrupted data. Most often, the attack vector was a link in an email. It happens so often that I thought I would post about it. But it’s not just a professional
28-07-2015. IT News reports that code already present on Android phones from version 2.2 onwards is vulnerable to memory corruption and can be exploited to fully compromise the device. The security researcher who discovered the code, Joshua Drake from Zimperium, says that specially crafted exploits only need the phone number of the phone in order
14-07-2015 – It’s been coming for a while but the day has finally arrived. After 12 years of patches and updates, Microsoft has pulled out the rug from underneath Server 2003 support. If you’re still using it, you’re on your own. What’s the problem? Are you at risk? If your server has exposure to Internet or
18-06-2015 – We are pleased to announce today an expansion of our role at Keolis Downer Rail, the company behind the Gold Coast Light Rail service. Previously we have provided a Managed IT Service which includes: Network Architecture for the project – Computer One designed the business computing network from the ground up before any