Increasing cyber threats to digital businesses

Cybersecurity | IT support

As a result, KPMG points out five key challenges now facing online businesses that you should consider:

Ramp up technology to link front, middle and back offices
Streamline how customers deal with your business online
Improve your digital connection with your suppliers and service providers
Rethink your talent pipeline to look internally as well as externally
Ensure digital technology enhances the resilience and agility of your business.

Does your business need an MSP?

Managed IT Services in Sydney

For many businesses, taking care of their tech needs themselves is the option that makes the most economical sense to them. But, this DIY practice could end up costing them more and risk their customer information and other company data.


Their business will be less efficient having Jane, in accounting, who’s good at figuring out technical problems, spending her time assisting with things she is not best at. Managed services providers (MSPs) are a way for businesses,

Should I move my business to the Cloud?

Cloud computing

Can I move my business into the cloud – and is it safe? Here are my practical thoughts about “the Cloud”.

Moving your business to the cloud can be economical if you have a large team and growing, or if you are just using File Storage and Email Services.

Cloud Systems offer a multitude of Security Features, and normally have teams of technicians dedicated to maintenance and security.

Moving existing infrastructure to the cloud is recommended to be implemented in stages. We help businesses execute that move. We tailor the systems to their needs and in line with the best security protocols.

Which cloud services do you already use in your business?

#cloudcomputing #smallbusinesses #office365 #business

Plans for mandatory ransomware reporting

Sophos Ransomware Protection

The Federal Government has announced its plans to combat ransomware including new offences and a mandatory notification obligation for victims of a ransomware attack.

The Parliamentary Joint Committee on Intelligence and Security (PJCIS) has recommended the amending Bill be split so that certain requirements and powers become law while risk management program rules come back to parliament in a second Bill which also include a range of significant amendments.

Staff Security and Data Handling Policy

Data Security

CB Computers recommends that you work closely with your IT Provider to establish a Security and Data Handling Policy for your staff. This should include information about password policies, email phishing, data sharing, personal device usage with company data, phone scams, Social Media accounts, and Multifactor Authentication (2FA). The weakest link in many cases is human error. You can combat this today by giving your staff the insight into how to stay protected.

Business security threat: Password removal in less than 5 minutes

How To Reset Windows 10 Password Easily in 3 Minutes

Here is some holiday time food for thought. Employees may be taking their work devices home at this time. But are these devices secure and protected?

Did you know that devices that are not encrypted can have their passwords easily removed? This could be a big problem if it is lost or stolen.

This YouTube video shows how anyone with even limited IT skills can remove a password:

Your valuable Company data is now available for the hacker to view and distribute as they please. This type of malicious activity can also be done on Apple devices and not just PC.

To find out more about how to you can protect your mobile devices and other vulnerable systems in your Organisation, feel free to reach out to discuss your IT security.