'Bulletproof' solution to remote access security.
Posted by Michael Trimblett
on 8 December 2020
One of the Essential Eight in Business Cyber Security
Multi-Factor Authentication (MFA) is typically described as a bulletproof solution to remote access security.
It is an effective way to add an additional security 'gate' to deter unwanted access to remote databases or sensitive information. Many of you may already have seen some version of MFA when you log into your bank account or when you re-log into your email account (such as Office 365) - once you have logged in with you...
I.T. hardware; essential for security and productivity
Posted by Michael Trimblett
on 21 October 2020
Governments and authorities in Australia are escalating their focus on cyber-security, including introducing more guidance, advice and mandatory reportable incidents.
If your organisation is covered by the Privacy Act 1988, then the NDB (Notifiable Data Breach) scheme applies. In simple terms, any suspected or known cyber attack must be notified to affected individuals and the OAIC (Office of the Australian Information Commission).
The real aim though is to mitigate the risk of cyber at...
Posted in:Computer hardwareServicesSecurityITIT ConsultingNetworking SecurityComputer Software |
The Essential Eight-cyber security mitigation strategy
Posted by Michael Trimblett
on 19 August 2020
Before we talk specifically about the The Australian Cyber Security Centre's (ACSC) recommended Essential Eight-cyber security mitigation strategy; let's put the situation in perspective.
Reports are continuing to reveal facts and stats on cyber security that are increasingly alarming for small and medium sized businesses (SMB's). There are more incidents and more dollars being lost than ever before. Let me take you through a few points.
Recently, The Australian Cyber Securi...
Posted in:ServicesSecurityITIT ConsultingNetworking SecurityComputer Software |
Phishing Emails - Don't Get Caught!
Posted by Kaylene Giff
on 11 May 2020
Have you been a victim of phishing?
Do you know how to recognise a phishing email?
Now that so many of us are working from home and other locations, the threat is becoming more prevalent with over 7,000 phishing scams reported in 2020 so far.
Phishing is the simplest and most common method of computer-based social engineering. A phishing attack involves crafting an email that appears legitimate but in fact contains links to fake websites or to download malicious content...
Posted in:Security |
Meet our Staff
Posted by Kaylene Giff
on 20 February 2020
Loyal I.T. Community
Apart from being known as the leading provider of I.T. solutions to businesses, Loyal I.T. Solutions are also a significant part of the local community. Our charitable commitment teamed with our employee's individual efforts are a constant reminder of how we act out the Loyal I.T. values. To highlight these efforts, we will be bringing you a blog series for you to get to know the fabulous team that is Loyal I.T. Solutions. To kick things off, let's start w...
Apart from being known as the leading provider of I.T. solutions to businesses, Loyal I.T. Solutions are also a significant part of the local community. Our charitable commitment teamed with our employee's individual efforts are a constant reminder of how we act out the Loyal I.T. values. To highlight these efforts, we will be bringing you a blog series for you to get to know the fabulous team that is Loyal I.T. Solutions. To kick things off, let's start w...
Posted in:Team NewsCommunity |
Supporting the Community that Supports Us
Posted
on 10 July 2019
At Loyal I.T. Solutions, all staff are encouraged to get involved with our local community. It is one of the core values in our Code of Honour, and we have many initiatives for staff to dedicate time or resources to help support the community that supports us. Some of our initiatives include:
Blood and Plasma Donations
Every quarter, a number of staff on our team head down to the local Red Cross to donate blood or plasma. Plasma can be used in 18 different treatments, some of which...
Posted in:Team NewsMiscITCommunity |