Phone: (03) 9415 6320

Rock IT

We're thinkers. This is our blog.

What the Privacy Act Amendments mean for Australian Businesses

Nik Devidas

The information in this article should be treated as a guide only and not legal advice. Please seek professional legal advice should you require further clarification. The quick summary The Privacy Amendment (Notifiable Data Breaches) Bill 2016 was passed by the Senate as an amendment to the Australian Privacy Act 1988 (Cth) and will come

Phishing attacks more efficient than data breaches: Google

Caitlin Devidas

A Google study found that phishing attacks are more efficient than data breaches at getting criminals into victim’s account and that the average person still has can’t pick a good pass word. The recent study was carried out in conjunction with University of California at Berkley and the International Computer Science Institute. Researchers conducted a year-long

Beware this Office 365 spam

Nik Devidas

“Your Outlook Email Storage Is At Risk Final Warning“ Below is a look at a common scam getting around. It looks legitimate enough and preys on people’s FOMO: Fear Of Missing Out. Take a closer look You’ll see that the email didn’t come from Microsoft 100% full? How are you receiving this email! Does Microsoft

Get your business back up and running after a Cyberattack

Nik Devidas

It’s not just the big guys getting breached – it’s the small companies too. And whilst you may have some pretty good security measures in place (check out our top 3 tips), there is currently no way of being 100% secure online. So what can you do if you are compromised in some way? Restore

Why can’t I use the same password for all my accounts?

Nik Devidas

It’s a reasonable question – if your password is strong, it shouldn’t matter…. right? In 2013 Yahoo had a security breach that affected all 3 billion user accounts. 3 billion accounts. That’s 3 billion passwords. There probably weren’t even 3 billion people on the internet in 2013 – but there were that many Yahoo accounts.

Increased cyber attacks must trigger equivalent action

Caitlin Devidas

Recent and widely publicised cyber attacks must be the impetus for a renewed and more concerted and coordinated global commitment to strengthen cyber security capabilities. In May, the WannaCry ransomware attacks struck, underscoring the potentially disastrous consequences for health care facilities and their patients when medical records and medical devices are compromised. June brought yet

Don’t get complacent in the Cloud

Caitlin Devidas

Cloud security is getting better but that doesn’t mean you’re not at risk. WannaCry was one of the biggest and most widespread “attacks” ever seen, but it wasn’t so widespread as to take out the world. And that’s a concern because WannaCry has been widely described as amateur. Keeping data secure has never been harder than

What’s your plan B if your tech fails you whilst travelling?

Caitlin Devidas

Technology fails. That is an unfortunate truth about the gadgets and devices that run our businesses and our lives. What do you do if your tech fails you whilst you’re away from the office and home? There’s always the risk of damage and theft when you’re away – and whilst replacing the tech is inevitably

Erase yourself from the Internet

Caitlin Devidas

It’s a very tough proposition to completely erase yourself from the internet. Think that you’re not on there because you don’t have Facebook? Well, read our article about Google location services… you’re on the internet! So unless you’ve actually been off the grid “for real”, there’s a few things you can do. But be warned

WannaCry? No need to, Rock IT can help with Ransomware and WannaCrypt.

Caitlin Devidas

A new strain of Ransomware called WannaCrypt (appropriately dubbed WannaCry) is at large and creating a media storm. It is concerning many computer users worldwide, but here are some tips to assist with managing it. Firstly, what is it? WannaCrypt is a type of Ransomware. Ransomware encrypts computer files so that they are unreadable. The