Understanding Changes in Domain Name Registration
19 March 2025
Navigating the New Landscape of .au Domain Name Registration
The AuDa, the regulating body for .au domain names are running eligibility checks to confirm each Registrant is eligible to hold an .au domain name at the time of renewal.  The ABN/ACN number associated with the registration must be eligible to hold the Domain registration. Where AuDa deems an ineligibility exists a Change of Registrant (CoR) will need to be actioned to maintain the registration for your Domain to an entity t...
Securing Customer Personal Data
11 March 2025
Recently a Client was impacted by a data breach via a service provider, in the form of a compromised email account.  The breach involved information around names, addresses TFN’s & DOB etc. The Australian Signals Directorate has an Information leaflet regarding the Securing of Customer Personal Data, for small to medium businesses.  The information includes the Legislative requirements for protection of personal data and Key data security practice. Below is the Checklist...
Protecting Confidential Records in Your Business
27 February 2025
Protecting Confidential Records in Your Business Protecting confidential records in your business is more crucial than ever. At Loyal I.T. Solutions, we recognise that safeguarding sensitive information isn’t just a technical necessity; it’s a pillar of trust between you, your employees, and your clients. Australian Laws on Data Storage Businesses in Australia must comply with stringent data protection laws. The Privacy Act 1988 outlines obligations that extend beyond mere comp...
Phishing Emails
11 June 2024
What is Phishing? Phishing is a social engineering technique to acquire data, such as bank account details, login credentials or credit card numbers.  It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, an instant message, or a text message. How to recognise Phishing If scammers get that information, they could get access to your email, bank, or other accounts.  They could sell your information to other scammers. Scammers launch t...
Cybersecurity Assessment and Response
23 February 2024
Carrying Out a Cybersecurity Assessment: A Guide for Small and Medium Businesses We all know that some of the biggest issues facing us in this technological age are scams, hacks, and data breaches. We’ve seen many examples of big businesses in the news that have had their data breached. And we certainly see plenty of examples of simple impersonations on social media. It’s an area of business that has to be taken very seriously. There are regulations about storing (or not storing...
Mastering Mobile Security
7 February 2024
Effortless Mobile Security: Unleashing the Power of Managed Services Smartphones are as common in business, if not more common, than computers in business. And the use of tablets is also prolific. Just like all pieces of equipment used in business, having the asset brings with it another piece of governance and maintenance. The most common areas we see for concern with mobile devices are security of data, downtime through loss or damage, and processes when an employee leaves a company. T...
Log a Job or an Enquiry

Log a Job or an Enquiry

reception@loyalit.com.au

Resources Helpful Fact Sheets???

These haven't been updated in a while, are they still CURRENT?

Download Our Fact Sheets