Industry News

Illustration of a cloud raining binary code over a city skyline at sunset | Computer One

Major Breaches Underscore Need for Sound Data Encryption Strategy

Published November 30, 2017
With the Notifiable Data Breaches scheme to be enacted within months, the data encryption practices of major companies are becoming subject to greater scrutiny. Companies will be required to disclose all relevant data breaches that occur after the 22nd of February 2018, meaning organisations will need to be proactive with their data encryption policies to avoid […]
Home Automation. A user holds a phone controlling many IoT devices

IoT security standards must be tightened to prevent successful attacks

Published November 2, 2017
Forbes predicts that by 2025, we’ll have over 80 billion smart devices on the internet. Although IoT simplifies numerous tasks at work and home, there are a number of security risks that come with the technology. Anyone who purchases IoT appliances should be aware of these risks. The information in this post is adapted from […]
Hands holding phone with free WiFi signal on screen | Computer One

Wifi Security Flaw Detected that Leaves Devices Vulnerable - Patch Your Wifi Soon

Published October 18, 2017
“All Your Wifi Connected Devices Are Potentially Vulnerable” That’s the conclusion from James Walker, MD of Computer One after reviewing international research that also prompted the US Department of Homeland Security to issue an official warning. What's the story? Well, a wifi security flaw has been discovered and it’s serious. The flaw could be used […]
Glowing blue chain links on a dark background | Computer One

Blockchain Rising - Microsoft the Latest Corporation to Adopt Blockchain Technology

Published October 18, 2017
Blockchain isn’t going away anytime soon. The transformational technology is an increasingly hot topic in tech circles, and more and more enterprises are looking to invest in the concept. We’ve already introduced you to the basics of blockchain; a flexible and theoretically invulnerable form of decentralised distributed ledger. While the concept has been used for […]
Server room with rows of racks in a white hallway | Computer One

Infrastructure-as-a-Service: How IaaS Providers Create Fast, Resilient Networks

Published October 11, 2017
Infrastructure-as-a-Service is predicted to be the fastest growing aspect of cloud computing in the near future, and organisations are more likely than ever to trust IaaS providers for reliable and flexible infrastructure. Notwithstanding some clear cut disasters, cloud computing is now a very effective option for all metro businesses in Australia. By eschewing the capital expense […]
Close-up of hands dialing on a desk phone | Computer One

Boost your efficiency with Unified Communications and IP Phone Systems

Published October 10, 2017
Time is crucial in modern business operations, and yet it is still commonplace for larger businesses to use ISDN or PSTN lines and other antiquated communication methods when better options are available. While there can be a large-ish initial outlay on unified communications and IP phone systems, the long-term savings and marketing benefits cannot be […]
Hands inserting a USB drive into a laptop | Computer One

Is Your Network Safe from Invasion? Why You Should Consider an IT Security Audit

Published October 6, 2017
While most organisations in 2017 have adopted security programs that successfully defend against cyber attacks, malware can still infect networks by way of unexpected sources. Personal USB drives, phones and laptops are used to access repositories of company information, but many organisations have not conducted an IT security audit that evaluates the risks they pose. […]
Man working on laptop in modern office | Computer One

Virtual CISO brings major security benefits

Published August 28, 2017
In an evolving cyber security landscape, businesses are searching for means to proactively mitigate the threat of network compromise. While large enterprises are able to hire permanent Chief Information Security Officers to enact overarching security plans, the salaries commanded by CISOs mean they are often out of reach for medium-sized businesses. Smaller organisations are now […]
Finger pressing a holographic "START FUTURE" button | Computer One

Where Are We Heading? Four Speculations on the Future of IT Consulting in Australia

Published August 24, 2017
The future of information technology is a moving target. New technologies play an ever-increasing role in how our businesses operate, and services and demands can change at an alarming rate. We have made four speculations on the future of IT consulting in Australia’s business landscape. Cyber Security Will Become a Primary Focus for Organisations Organisations […]
Row of locked padlocks with one unlocked red padlock on a binary code background | Computer One

What Is Application Whitelisting? How It Can Fortify Your Business Against Ransomware

Published August 22, 2017
Application Whitelisting (also know as Application Control) has been listed by the Australian Signals Directorate as the most effective strategy in mitigating cyber security threats. Despite this, organisations are often oblivious to the value of application whitelisting, or reticent to go through the process of adopting it. While it may not be a panacea to […]
1 11 12 13 14 15 20
The Computer One logo with blue background
6 time winner of the
Channel Futures MSP 501 Winner logo white | Computer One
Local Government Procurement Approved Contractor logo | Computer One
Q-Mark ISO 9001 certified logo | Computer OneQ-Mark ISO 27001 certified logo | Computer One
© 2026 Computer One Australia.
arrow-right linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram