Phone: (03) 9415 6320

Rock IT

We're thinkers. This is our blog.

Rock IT Ranked Among World’s Most Elite 501 Managed Service Providers

Nik Devidas

Rock IT Ranked Among World’s Most Elite 501 Managed Service Providers   12th Annual MSP 501 Identifies Top Forward-Thinking Global MSPs & Leading Trends in Managed Services   JUNE 18, 2019: Rock IT has been named as one of the world’s premier managed service providers on the prestigious 12th-annual Channel Futures MSP 501 rankings.  

Australia’s cyber defences ‘relatively weak, uncoordinated’

Caitlin Devidas

Australia’s cyber defences ‘relatively weak, uncoordinated’, former ASIO boss David Irvine warns. A former spy boss has warned the country’s ability to counter cyber threats and criminal activity is “relatively weak and uncoordinated”, with current efforts scattered across the states and Commonwealth. David Irvine, who ran ASIO until 2014 and was also the head of the

HP Notebook Computer and Mobile Workstation Battery Safety Recall and Replacement Program

Caitlin Devidas

Important Safety Announcement    In cooperation with various government regulatory agencies HP has announced a worldwide voluntary safety recall and replacement program for certain notebook and mobile workstation batteries.   The potentially affected batteries were shipped with certain HP notebooks and mobile workstations sold worldwide from December 2015 through December 2017. These batteries were also

What do Hackers even want?

Nik Devidas

It’s an interesting question because not all Hackers are the same. Some want to steal your data for their own purposes, some are seeking a ransom and some want to block your service to benefit them in some way. Some hackers are motivated by money; some are doing it for the notoriety. Firstly – who

Phishing attacks more efficient than data breaches: Google

Caitlin Devidas

A Google study found that phishing attacks are more efficient than data breaches at getting criminals into victim’s account and that the average person still has can’t pick a good pass word. The recent study was carried out in conjunction with University of California at Berkley and the International Computer Science Institute. Researchers conducted a year-long

Increased cyber attacks must trigger equivalent action

Caitlin Devidas

Recent and widely publicised cyber attacks must be the impetus for a renewed and more concerted and coordinated global commitment to strengthen cyber security capabilities. In May, the WannaCry ransomware attacks struck, underscoring the potentially disastrous consequences for health care facilities and their patients when medical records and medical devices are compromised. June brought yet

IT: investment or expense?

Caitlin Devidas

Why investment in your IT infrastructure will now save you money in the future   IT – from niche to necessity In 1998 only 63% of businesses had a computer and just 6% had an online presence.* Business owners at the time considered IT a luxury. By the mid-2000s, practically every business in Australia (97%)

ASIC to scrutinise directors who ignore cyber security

Caitlin Devidas

The corporate regulator is expected to step up its scrutiny of directors who fail to properly manage the risk of cyber attacks as a new report warns that within four years the cost of cybercrime globally will exceed $6 trillion annually. The MinterEllison Perspectives on Cyber Risk Report 2017 found that while awareness of the

Fix the weakest link in your cloud security

Caitlin Devidas

Shadow IT is the term used to describe IT systems that are built and used within businesses without explicit business approval. An example is an individual employee signing up for a cloud-based app without going through an approval process first. Why is this a problem? Relatively few organisations are able to track the cloud services