Phone: +613 9415 6320

Rock IT

We're thinkers. This is our blog.

HP Notebook Computer and Mobile Workstation Battery Safety Recall and Replacement Program

Important Safety Announcement    In cooperation with various government regulatory agencies HP has announced a worldwide voluntary safety recall and replacement program for certain notebook and mobile workstation batteries.   The potentially affected batteries were shipped with certain HP notebooks and mobile workstations sold worldwide from December 2015 through December 2017. These batteries were also

What do Hackers even want?

It’s an interesting question because not all Hackers are the same. Some want to steal your data for their own purposes, some are seeking a ransom and some want to block your service to benefit them in some way. Some hackers are motivated by money; some are doing it for the notoriety. Firstly – who

What the Privacy Act Amendments mean for Australian Businesses

The information in this article should be treated as a guide only and not legal advice. Please seek professional legal advice should you require further clarification. The quick summary The Privacy Amendment (Notifiable Data Breaches) Bill 2016 was passed by the Senate as an amendment to the Australian Privacy Act 1988 (Cth) and will come

Phishing attacks more efficient than data breaches: Google

A Google study found that phishing attacks are more efficient than data breaches at getting criminals into victim’s account and that the average person still has can’t pick a good pass word. The recent study was carried out in conjunction with University of California at Berkley and the International Computer Science Institute. Researchers conducted a year-long

CEO Emails may be the weak link in your cyber security

A study by F-Secure has found that 30% of CEOs have used their company’s email to register for a service that was breached. This exposed their passwords and other pertinent details. There’s never been a better time to take “password hygiene” more seriously, with 30% of CEO’s of “world-class” companies having their password leaked. How?

Beware this Office 365 spam

“Your Outlook Email Storage Is At Risk Final Warning“ Below is a look at a common scam getting around. It looks legitimate enough and preys on people’s FOMO: Fear Of Missing Out. Take a closer look You’ll see that the email didn’t come from Microsoft 100% full? How are you receiving this email! Does Microsoft

Get your business back up and running after a Cyberattack

It’s not just the big guys getting breached – it’s the small companies too. And whilst you may have some pretty good security measures in place (check out our top 3 tips), there is currently no way of being 100% secure online. So what can you do if you are compromised in some way? Restore

Why can’t I use the same password for all my accounts?

It’s a reasonable question – if your password is strong, it shouldn’t matter…. right? In 2013 Yahoo had a security breach that affected all 3 billion user accounts. 3 billion accounts. That’s 3 billion passwords. There probably weren’t even 3 billion people on the internet in 2013 – but there were that many Yahoo accounts.

Rock IT’s top 3 Cybersecurity tips

Here’s our top 3 tips to keeping you and your business safe: Always update Every software vendor releases software updates and it’s not just about new features. More often than not these updates include known security patches Most “hacks” or breaches at the moment (including the massive Equifax data breach) are simply a result of

How to create a strong password

The US-based National Institute of Standards and Technology (NIST) is a government agency, producing guidelines that Australia’s own Australian Securities and Investments Commission (ASIC) tends to recommend. Of importance in 2017 are the NIST password recommendations. The salient point is below: What does this means for password selecting? Make it random But random passwords are