Vulnerability Scans - Isolate the weak security points in your IT systems

Posted by Michael Trimblett on 18 January 2021
A Vulnerability Scan is a relatively simple way to test your IT systems risk to scams, theft or sabotage. It's an application that, when applied correctly and with the right advice, is an extremely efficient and effective strategy for SMB's. With the cloud becoming the norm, your user-interface and other systems and devices become your frontline cyber-security guards by default. Therefore, it is now more imperative than ever to ensure you are 'sure and secure'. A Vulnera...
Posted in:ServicesSecurityITIT ConsultingNetworking SecurityComputer Software  

'Bulletproof' solution to remote access security.

Posted by Michael Trimblett on 8 December 2020
One of the Essential Eight in Business Cyber Security Multi-Factor Authentication (MFA) is typically described as a bulletproof solution to remote access security. It is an effective way to add an additional security 'gate' to deter unwanted access to remote databases or sensitive information. Many of you may already have seen some version of MFA when you log into your bank account or when you re-log into your email account (such as Office 365) - once you have logged in with you...
 

I.T. hardware; essential for security and productivity

Posted by Michael Trimblett on 21 October 2020
Governments and authorities in Australia are escalating their focus on cyber-security, including introducing more guidance, advice and mandatory reportable incidents. If your organisation is covered by the Privacy Act 1988, then the NDB (Notifiable Data Breach) scheme applies. In simple terms, any suspected or known cyber attack must be notified to affected individuals and the OAIC (Office of the Australian Information Commission). The real aim though is to mitigate the risk of cyber at...
Posted in:Computer hardwareServicesSecurityITIT ConsultingNetworking SecurityComputer Software  

The Essential Eight-cyber security mitigation strategy

Posted by Michael Trimblett on 19 August 2020
Before we talk specifically about the The Australian Cyber Security Centre's (ACSC) recommended Essential Eight-cyber security mitigation strategy; let's put the situation in perspective. Reports are continuing to reveal facts and stats on cyber security that are increasingly alarming for small and medium sized businesses (SMB's). There are more incidents and more dollars being lost than ever before. Let me take you through a few points. Recently, The Australian Cyber Securi...
Posted in:ServicesSecurityITIT ConsultingNetworking SecurityComputer Software  

Phishing Emails - Don't Get Caught!

Posted by Kaylene Giff on 11 May 2020
Have you been a victim of phishing? Do you know how to recognise a phishing email?   Now that so many of us are working from home and other locations, the threat is becoming more prevalent with over 7,000 phishing scams reported in 2020 so far. Phishing is the simplest and most common method of computer-based social engineering.  A phishing attack involves crafting an email that appears legitimate but in fact contains links to fake websites or to download malicious content...
Posted in:Security  

Meet our Staff

Posted by Kaylene Giff on 20 February 2020
Loyal I.T. Community
Apart from being known as the leading provider of I.T. solutions to businesses, Loyal I.T. Solutions are also a significant part of the local community. Our charitable commitment teamed with our employee's individual efforts are a constant reminder of how we act out the Loyal I.T. values. To highlight these efforts, we will be bringing you a blog series for you to get to know the fabulous team that is Loyal I.T. Solutions. To kick things off, let's start w...
Posted in:Team NewsCommunity  

Log a Job
Or an Enquiry

help@loyalit.com.au

Loyal IT
Latest news

3 October 2023
Introduction Project management is an essential aspect of any business. It helps businesses manage their projects more ef...
Read All Latest News

Our Clients
say

It was the best #@!*# thing we ever did, changing over to you guys.

Larry Clayton
Read All Testimonials

Resources Helpful
fact sheets

Download Our Fact Sheets

Sign Up for Newsletter