Rock IT

We're thinkers. This is our blog.

Increased cyber attacks must trigger equivalent action

Recent and widely publicised cyber attacks must be the impetus for a renewed and more concerted and coordinated global commitment to strengthen cyber security capabilities. In May, the WannaCry ransomware attacks struck, underscoring the potentially disastrous consequences for health care facilities and their patients when medical records and medical devices are compromised. June brought yet

IT: investment or expense?

Why investment in your IT infrastructure will now save you money in the future   IT – from niche to necessity In 1998 only 63% of businesses had a computer and just 6% had an online presence.* Business owners at the time considered IT a luxury. By the mid-2000s, practically every business in Australia (97%)

ASIC to scrutinise directors who ignore cyber security

The corporate regulator is expected to step up its scrutiny of directors who fail to properly manage the risk of cyber attacks as a new report warns that within four years the cost of cybercrime globally will exceed $6 trillion annually. The MinterEllison Perspectives on Cyber Risk Report 2017 found that while awareness of the

Fix the weakest link in your cloud security

Shadow IT is the term used to describe IT systems that are built and used within businesses without explicit business approval. An example is an individual employee signing up for a cloud-based app without going through an approval process first. Why is this a problem? Relatively few organisations are able to track the cloud services

Hacking is getting easier

The Internet of Things is one of the biggest security risks faced by organisations today. Why? Whilst it is expected that the server farm you purchased is secure (whatever that means in this day and age), what are the expectations of the smartwatch your staff member brought in, or the $100 printer you have on

Beware iTunes scams

The ATO is reminding the public to be alert to scammers impersonating the ATO demanding iTunes gift cards as a form of tax debt payment. Staggering to believe, but a simple cold call to unsuspecting victims is working. The ruse is simple: cold call someone and pretend to be from the ATO, then demand payment

Tips for a solid disaster recovery plan

Disaster Recovery (DR) goes beyond just backing up. Backing up is simply taking a copy of your data and storing it. DR needs to factor in a lot more, such as: 1. Where will you restore your data to? 2. How will you restore your data if your equipment is not accessible? 3. How much

Don’t get complacent in the Cloud

Cloud security is getting better but that doesn’t mean you’re not at risk. WannaCry was one of the biggest and most widespread “attacks” ever seen, but it wasn’t so widespread as to take out the world. And that’s a concern because WannaCry has been widely described as amateur. Keeping data secure has never been harder than

What’s your plan B if your tech fails you whilst travelling?

Technology fails. That is an unfortunate truth about the gadgets and devices that run our businesses and our lives. What do you do if your tech fails you whilst you’re away from the office and home? There’s always the risk of damage and theft when you’re away – and whilst replacing the tech is inevitably