Phone: (03) 9415 6320

Rock IT

We're thinkers. This is our blog.

Australia’s cyber defences ‘relatively weak, uncoordinated’

Caitlin Devidas

Australia’s cyber defences ‘relatively weak, uncoordinated’, former ASIO boss David Irvine warns. A former spy boss has warned the country’s ability to counter cyber threats and criminal activity is “relatively weak and uncoordinated”, with current efforts scattered across the states and Commonwealth. David Irvine, who ran ASIO until 2014 and was also the head of the

HP Notebook Computer and Mobile Workstation Battery Safety Recall and Replacement Program

Caitlin Devidas

Important Safety Announcement    In cooperation with various government regulatory agencies HP has announced a worldwide voluntary safety recall and replacement program for certain notebook and mobile workstation batteries.   The potentially affected batteries were shipped with certain HP notebooks and mobile workstations sold worldwide from December 2015 through December 2017. These batteries were also

What do Hackers even want?

Nik Devidas

It’s an interesting question because not all Hackers are the same. Some want to steal your data for their own purposes, some are seeking a ransom and some want to block your service to benefit them in some way. Some hackers are motivated by money; some are doing it for the notoriety. Firstly – who

Phishing attacks more efficient than data breaches: Google

Caitlin Devidas

A Google study found that phishing attacks are more efficient than data breaches at getting criminals into victim’s account and that the average person still has can’t pick a good pass word. The recent study was carried out in conjunction with University of California at Berkley and the International Computer Science Institute. Researchers conducted a year-long

Increased cyber attacks must trigger equivalent action

Caitlin Devidas

Recent and widely publicised cyber attacks must be the impetus for a renewed and more concerted and coordinated global commitment to strengthen cyber security capabilities. In May, the WannaCry ransomware attacks struck, underscoring the potentially disastrous consequences for health care facilities and their patients when medical records and medical devices are compromised. June brought yet

IT: investment or expense?

Caitlin Devidas

Why investment in your IT infrastructure will now save you money in the future   IT – from niche to necessity In 1998 only 63% of businesses had a computer and just 6% had an online presence.* Business owners at the time considered IT a luxury. By the mid-2000s, practically every business in Australia (97%)

ASIC to scrutinise directors who ignore cyber security

Caitlin Devidas

The corporate regulator is expected to step up its scrutiny of directors who fail to properly manage the risk of cyber attacks as a new report warns that within four years the cost of cybercrime globally will exceed $6 trillion annually. The MinterEllison Perspectives on Cyber Risk Report 2017 found that while awareness of the

Fix the weakest link in your cloud security

Caitlin Devidas

Shadow IT is the term used to describe IT systems that are built and used within businesses without explicit business approval. An example is an individual employee signing up for a cloud-based app without going through an approval process first. Why is this a problem? Relatively few organisations are able to track the cloud services

Beware iTunes scams

Nik Devidas

The ATO is reminding the public to be alert to scammers impersonating the ATO demanding iTunes gift cards as a form of tax debt payment. Staggering to believe, but a simple cold call to unsuspecting victims is working. The ruse is simple: cold call someone and pretend to be from the ATO, then demand payment