Posted in Cyber Security

Essential Email Security for SMEs

Posted by Michael Goodwin on 18 September 2025
Essential Email Security for SMEs
Essential Email Security for SMEs Email is probably the most used communication medium in business. It's how we connect, collaborate, and get things done every day. But, as essential as email is, it also carries some real risks. One sneaky email can really throw a spanner in the works. We talk about this a lot and it’s because the threat from Cybercrime grows everyday, and the potential impact on your business and for your clients can be incredibly serious. Why Email Security is N...
Posted in:SecurityServicesITComputer SoftwareCyber SecurityApplicationsAICentral Coast  

Understanding Changes in Domain Name Registration

Posted by Katrina Woolcott on 19 March 2025
Understanding Changes in Domain Name Registration
Navigating the New Landscape of .au Domain Name Registration
The AuDa, the regulating body for .au domain names are running eligibility checks to confirm each Registrant is eligible to hold an .au domain name at the time of renewal.  The ABN/ACN number associated with the registration must be eligible to hold the Domain registration. Where AuDa deems an ineligibility exists a Change of Registrant (CoR) will need to be actioned to maintain the registration for your Domain to an entity t...
Posted in:SecurityNewsServicesCyber SecurityDomains  

Securing Customer Personal Data

Posted by Katrina Woolcott on 11 March 2025
Securing Customer Personal Data
Recently a Client was impacted by a data breach via a service provider, in the form of a compromised email account.  The breach involved information around names, addresses TFN’s & DOB etc. The Australian Signals Directorate has an Information leaflet regarding the Securing of Customer Personal Data, for small to medium businesses.  The information includes the Legislative requirements for protection of personal data and Key data security practice. Below is the Checklist...
Posted in:SecurityNewsCyber Security  

Protecting Confidential Records in Your Business

Posted by Michael Goodwin on 27 February 2025
Protecting Confidential Records in Your Business
Protecting Confidential Records in Your Business Protecting confidential records in your business is more crucial than ever. At Loyal I.T. Solutions, we recognise that safeguarding sensitive information isn’t just a technical necessity; it’s a pillar of trust between you, your employees, and your clients. Australian Laws on Data Storage Businesses in Australia must comply with stringent data protection laws. The Privacy Act 1988 outlines obligations that extend beyond mere comp...
Posted in:CommunitySecurityWindowsGosford ChamberITIT ConsultingCyber SecurityMicrosoftmental health  

Phishing Emails

Posted by Katrina Woolcott on 11 June 2024
What is Phishing? Phishing is a social engineering technique to acquire data, such as bank account details, login credentials or credit card numbers.  It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, an instant message, or a text message. How to recognise Phishing If scammers get that information, they could get access to your email, bank, or other accounts.  They could sell your information to other scammers. Scammers launch t...
Posted in:ITCyber SecurityEmail  

Cybersecurity Assessment and Response

Posted by Michael Goodwin on 23 February 2024
Cybersecurity Assessment and Response
Carrying Out a Cybersecurity Assessment: A Guide for Small and Medium Businesses We all know that some of the biggest issues facing us in this technological age are scams, hacks, and data breaches. We’ve seen many examples of big businesses in the news that have had their data breached. And we certainly see plenty of examples of simple impersonations on social media. It’s an area of business that has to be taken very seriously. There are regulations about storing (or not storing...
Posted in:WindowsServicesITIT ConsultingComputer MaintenanceWindows UpdateCyber Securitybackuptabletmobile  
< Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Next >

Log a Job
Or an Enquiry

help@loyalit.com.au

Loyal IT
Latest news

18 September 2025
Essential Email Security for SMEs Email is probably the most used communication medium in business. It's how we conne...
Read All Latest News

Our Clients
say

Always happy with Loyal’s work...

Vicki Field
Read All Testimonials

Resources Helpful
fact sheets

Download Our Fact Sheets

Sign Up for Newsletter