Phone: (03) 9415 6320

Rock IT

We're thinkers. This is our blog.

The most commonly used password in 2020 is…

Nik Devidas

Passwords really are just a nuisance. We’ve written about plenty of security-related topics in this blog and nothing makes people’s eyes roll more than the need for unique passwords across all of your online accounts. “Use a Password Manager to make the job easier!” we said… “No”, says just about everyone. Unique passwords are a

7-steps towards Zero Trust

Nik Devidas

If you’re not across Zero Trust, then first read our introduction here. It’s actually a relatively old concept that is gaining mainstream legs on now in 2020. Here’s our 7-steps to get your business towards adopting Zero Trust   1 – Rethink the way you provide user-level access Highlight: provide users with application-only access, not

Zero Trust Security – the gold standard to keep you safe

Nik Devidas

Stopping an attacker bursting through the network perimeter is the “traditional” focus of organisations. The inside of the network is viewed as safe and users are given broad access to resources within it. The trouble with this approach is that unauthorised lateral movement within a network has become an enormous challenge for some organisations. What

Microsoft Office 365 is not backed up!

Nik Devidas

Everything in the world of backup was going just fine before the Cloud came along. Server rooms used to look the same: Racks with servers slotted in. The beauty of this setup (from a backup point of view) was that you could see where your data sat and therefore, you knew everything about the security

4 tips for a rock solid disaster recovery plan

Caitlin Devidas

First things first: Disaster Recovery (DR) is not backup. What is backup? Backing up is simply taking a copy of your data and storing it. Backup has a number of rules that you can follow, with a old favourite being the 3-2-1 rule: Have 3 copies of your data, on 2 different types of media

APRA says that financial institutions are making basic cyber security errors

Nik Devidas

Basic ‘cyber hygiene’ is an ongoing area of concern in the financial services sector. Since issuing their latest Cyber Security guidelines in July 2019, the Australian Prudential Regulation Authority has received 36 data breach notifications Executive board member Geoff Summerhayes warns that local financial services providers were still making basic errors. “With some cyber-incidents taking

12 days of Hackmas

Nik Devidas

schadenfreude n.Pleasure derived from the misfortunes of others. n.Malicious enjoyment derived from observing someone else’s misfortune. n.delight in another person’s misfortune Welcome to the 12 days of Hackmas where we go through 12 of the most surprising, amazing and disturbing Cyber hacks that have ever been pulled off. Why? Well it’s not all schadenfreude – there’s some great

Disney+ breach highlights why using the same password is a bad idea

Nik Devidas

Disney+ is the newest entry into the online streaming market, offering a wide range of old and new Disney content. Day 1 didn’t go so well with the service unable to keep up with the high demand. Week 1 got even worse when it was found that thousands of user accounts had been breached and

Meet the Aussie business that lost $2M by failing in 3 simple areas

Nik Devidas

It’s the worst nightmare of any business owner (or computer user for that matter). You log onto your computer, expecting it to work just the same as it always has, only to find a ransom note demanding something called Bitcoin. That’s exactly the state that The Heat Group, a large cosmetics company, found itself in

Should you cover your webcam just like Mark Zuckerberg does?

Nik Devidas

Yep. You absolutely should. And stuff chewing gum into your laptop microphone. There are cameras and lenses everywhere. On the side of buildings, in your phone and in your laptop. Do we even notice them anymore given they’re so prevalent? And the reality is, someone could be watching you at any moment – even when

Can your smart TV really be hacked?

Nik Devidas

It’s hard to fathom what really makes a TV smart, but the marketing geniuses at just about every manufacturer seem to think that a “Smart TV” is a TV that can connect to the internet and stream content. Basically it means Netflix etc. can be played via your TV remote. The reality now that many

Why are all the scammers from Nigeria?

Nik Devidas

Keen followers of my articles will recall a previous article named “Why do phishing email be writtened such bad english? Turns out it’s intentional…” In that article, I explored why phishing emails contained such terrible and obvious spelling and grammatical errors. But I didn’t address why so many scammers say that they’re from Nigeria. A

When a business gets security all wrong – what we learned

Nik Devidas

Note: We sat on this post for 24 months intentionally to give enough breathing space between the events laid out in the article, hoping that the business named got things right in the end… As reported on Smart Company, the Outdoor Media Association’s (OMA) had a ransomware “hack” in July 2017. Why do we say “hack”?

Cyber Insurance… here to stay, but ultimately is it worth it?

Nik Devidas

If your business works with an Insurance Broker, then chances are you’ve had a discussion about “Cyber Insurance”. What is Cyber Insurance? The past 10 years have seen massive changes in the way that companies communicate and do business. Many businesses have undergone some form of digital transformation which (should have) created improvements to their

Internet of Things – 10 stupid iot devices that we just didn’t need

Nik Devidas

Gosh, sometimes being human is just plain hard! Flicking a switch to turn on a light. Remembering how much water to drink. Wondering if your hair has been brushed with the correct force. What about working out where your cows are? The “Internet of Things” or IoT connects so called “Smart Devices” to the internet.

What can someone get from your laptop if you lose it?

Nik Devidas

It could happen to anyone. You’re busy working away at your local hipster cafe, distracted by the coffee that you’re now required to construct whilst trying to hold a conversation with your colleague. And whilst you’re asking yourself the question “why did I pay $8 for this experience” you notice something is missing. Your bag

5 things to consider when choosing the best Managed Service Provider

Nik Devidas

How to choose the best Managed IT Service Provider in Melbourne – top 5 five Choosing a Managed Security Service Provider (MSSP) can be a daunting task. If you have an existing relationship you know you’ve either outgrown their capabilities or something has gone wrong in the relationship. 1-Knowledgeable Account Manager Knowledge is absolutely key.

Increased cyber attacks must trigger equivalent action

Caitlin Devidas

Recent and widely publicised cyber attacks must be the impetus for a renewed and more concerted and coordinated global commitment to strengthen cyber security capabilities. In May 2017, the WannaCry ransomware attacks struck, underscoring the potentially disastrous consequences for health care facilities and their patients when medical records and medical devices are compromised. June 2017

Why deleting your Google history is a must-do

Nik Devidas

How comfortable with Google having a copy of everything you’ve searched… ever? Unless you move to a private search engine DuckDuckGo, then your search engine still likely has a copy of everything you’ve ever searched. Let’s take Google for example. Check out your Google Search History: searches, locations, interests. They’ve recorded it all. Deleting your Google

Turn On Encryption In Facebook Messenger NOW!

Nik Devidas

Facebook Messenger’s ‘Secret Conversations’ allow end-to-end encryption, but the feature is opt-in. Here’s how to turn it on and use it. End-to-end encryption means that your conversations are encrypted from one device to another so the conversation can’t be accessed by anyone other than the sender and the intended receiver. Facebook’s new encryption, appropriately, is

Latest Windows 10 update wipes user data; highlights lack of backups

Nik Devidas

Such is the state of computing these days, software providers are continually releasing security and bug patches. Microsoft has what’s known as “Patch Tuesday”, which is a monthly release of security and bug fixes. The quality of these updates is often questionable as well, with the latest October 2018 (1809) release leaving some users reporting