Posted in Cyber Security
Our Mariners Sponsorship
Posted by Michael Goodwin
on 15 October 2025
)
F3 Derby Kicks Off the New Season
As the 2025/26 A-League season kicks off, excitement is building across the Central Coast, and none more so than ahead of the M1 Derby clash between our Central Coast Mariners and the Newcastle Jets. Rivalry has always fuelled great days of football, and this fixture is a highlight both on and off the pitch.
Honours, History & Momentum
The Mariners have established themselves among Australia’s elite, collecting silverware and making history along ...
| Posted in:SecurityServicesITComputer SoftwareCyber SecurityApplicationsAICentral CoastCentral Coast Mariners |
Essential Email Security for SMEs
Posted by Michael Goodwin
on 18 September 2025
)
Essential Email Security for SMEs
Email is probably the most used communication medium in business. It's how we connect, collaborate, and get things done every day. But, as essential as email is, it also carries some real risks. One sneaky email can really throw a spanner in the works. We talk about this a lot and it’s because the threat from Cybercrime grows everyday, and the potential impact on your business and for your clients can be incredibly serious.
Why Email Security is N...
| Posted in:SecurityServicesITComputer SoftwareCyber SecurityApplicationsAICentral Coast |
Understanding Changes in Domain Name Registration
Posted by Katrina Woolcott
on 19 March 2025
)
Navigating the New Landscape of .au Domain Name Registration
The AuDa, the regulating body for .au domain names are running eligibility checks to confirm each Registrant is eligible to hold an .au domain name at the time of renewal. The ABN/ACN number associated with the registration must be eligible to hold the Domain registration. Where AuDa deems an ineligibility exists a Change of Registrant (CoR) will need to be actioned to maintain the registration for your Domain to an entity t...
The AuDa, the regulating body for .au domain names are running eligibility checks to confirm each Registrant is eligible to hold an .au domain name at the time of renewal. The ABN/ACN number associated with the registration must be eligible to hold the Domain registration. Where AuDa deems an ineligibility exists a Change of Registrant (CoR) will need to be actioned to maintain the registration for your Domain to an entity t...
| Posted in:SecurityNewsServicesCyber SecurityDomains |
Securing Customer Personal Data
Posted by Katrina Woolcott
on 11 March 2025
)
Recently a Client was impacted by a data breach via a service provider, in the form of a compromised email account. The breach involved information around names, addresses TFN’s & DOB etc.
The Australian Signals Directorate has an Information leaflet regarding the Securing of Customer Personal Data, for small to medium businesses. The information includes the Legislative requirements for protection of personal data and Key data security practice.
Below is the Checklist...
| Posted in:SecurityNewsCyber Security |
Protecting Confidential Records in Your Business
Posted by Michael Goodwin
on 27 February 2025
)
Protecting Confidential Records in Your Business
Protecting confidential records in your business is more crucial than ever. At Loyal I.T. Solutions, we recognise that safeguarding sensitive information isn’t just a technical necessity; it’s a pillar of trust between you, your employees, and your clients.
Australian Laws on Data Storage
Businesses in Australia must comply with stringent data protection laws. The Privacy Act 1988 outlines obligations that extend beyond mere comp...
| Posted in:CommunitySecurityWindowsGosford ChamberITIT ConsultingCyber SecurityMicrosoftmental health |
Phishing Emails
Posted by Katrina Woolcott
on 11 June 2024
What is Phishing?
Phishing is a social engineering technique to acquire data, such as bank account details, login credentials or credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, an instant message, or a text message.
How to recognise Phishing
If scammers get that information, they could get access to your email, bank, or other accounts. They could sell your information to other scammers. Scammers launch t...
| Posted in:ITCyber SecurityEmail |





