Phone: +613 9415 6320

Rock IT

We're thinkers. This is our blog.

5 things to consider when choosing the best Managed Service Provider

How to choose the best Managed IT Service Provider in Melbourne – top 5 five Choosing a Managed Security Service Provider (MSSP) can be a daunting task. If you have an existing relationship you know you’ve either outgrown their capabilities or something has gone wrong in the relationship. 1-Knowledgeable Account Manager Knowledge is absolutely key.

Increased cyber attacks must trigger equivalent action

Recent and widely publicised cyber attacks must be the impetus for a renewed and more concerted and coordinated global commitment to strengthen cyber security capabilities. In May 2017, the WannaCry ransomware attacks struck, underscoring the potentially disastrous consequences for health care facilities and their patients when medical records and medical devices are compromised. June 2017

Telstra Bill Scam – watch out

There’s a new, very well constructed, scam email making the rounds – this time it’s a Telstra look-alike bill. The well-formatted email will look familiar to existing Telstra customers and asks users to click through to an attached bill. Although there are no attachments: just a link is provided. The fake Telstra bill. Source: MailGuard.

Rock IT Partners with rhipe – Press Release

Download the whole case study here: Rhipe-CaseStudy-RockIT Rhipe’s cloud expertise strikes a chord with Rock IT The intangible nature of cloud services makes distributing them a specialised skill, and Rhipe’s history of strong successes long ago convinced Nik Devidas that the company was the best partner to provide that skill. As co-founder and managing director

Why deleting your Google history is a must-do

How comfortable with Google having a copy of everything you’ve searched… ever? Unless you move to a private search engine DuckDuckGo, then your search engine still likely has a copy of everything you’ve ever searched. Let’s take Google for example. Check out your Google Search History: searches, locations, interests. They’ve recorded it all. Deleting your Google

Turn On Encryption In Facebook Messenger NOW!

Facebook Messenger’s ‘Secret Conversations’ allow end-to-end encryption, but the feature is opt-in. Here’s how to turn it on and use it. End-to-end encryption means that your conversations are encrypted from one device to another so the conversation can’t be accessed by anyone other than the sender and the intended receiver. Facebook’s new encryption, appropriately, is

Top 10 ways to protect your end-user data

Security is a hot topic thanks to a visible escalation in cybersecurity risks, but end-user data is often overlooked. With an increasingly mobile workforce, sensitive data is now found on all manner of devices, including laptops and mobiles – and it must be secured. Protect your business by ensuring that you and your staff follow

Rock IT Ranked Among World’s Most Elite 501 Managed Service Providers

Rock IT Ranked Among World’s Most Elite 501 Managed Service Providers   12th Annual MSP 501 Identifies Top Forward-Thinking Global MSPs & Leading Trends in Managed Services   JUNE 18, 2019: Rock IT has been named as one of the world’s premier managed service providers on the prestigious 12th-annual Channel Futures MSP 501 rankings.  

Rock IT is ranked as a leading MSP again!

12th Annual MSP 501 Identifies Top Forward-Thinking Global MSPs & Leading Trends in Managed Services JUNE 18, 2019: Rock IT has been named as one of the world’s premier managed service providers on the prestigious 12th-annual Channel Futures MSP 501 rankings. Every year, MSPs worldwide complete an extensive survey and application to report their product

Enable Google two-step verification

Enable Google two-step verification This is the simplest way to get additional security around your Google accounts. It’s simple, easy to use and will stop the bad guys/girls getting in!! To get started, go to the Security page in settings. Click 2-Step Verification and then the Get Started button to sign in to your Google account and turn on two-step verification.

Multi factor authentication (MFA) is gaining popularity

As concerns about password security grow, multi factor authentication is an increasingly favoured way to protect an organisation. How does Multi-Factor Authentication (MFA) work? Single-factor authentication is your classic username & password combination. (Read here why that’s such a critical combination) MFA adds in another layer of security on top of your username & password,

FBI Ransomware Alert & mitigation steps

In an FBI and Department of Homeland Security (DHS) alert, the government agencies warned cybersecurity professionals about SamSam MSIL/Samas.A ransomware attacks. Within the alert, the government agencies recommended that organizations take these 14 steps to mitigate the risk of SamSam ransomware infection. Here’s the mitigation guidance, word for word from the FBI and DHS memo: 1.

Five Common Security Scams

Five Common Security Scams Phishing: Emails aimed at luring recipients to click on an embedded link, which could trigger a malware installation, or surrendering confidential information such as passwords or credit card numbers. Spear-Phishing: Attackers gather specific personal data and often impersonate friends or business associates, including mimicking their email addresses (a tactic called “spoofing”) to craft an especially realistic

WhatsApp video call could compromise your account – update WhatsApp!

Google Project Zero security researcher Natalie Silvanovich has published a report showing a vulnerability in WhatsApp that could have allowed an attacker to take control of a video call remotely. The technical details can be found in Natalie’s blog or a summary here. The quick summary for this blog is this: Hacker only need your phone number

Latest Windows 10 update wipes user data; highlights lack of backups

Such is the state of computing these days, software providers are continually releasing security and bug patches. Microsoft has what’s known as “Patch Tuesday”, which is a monthly release of security and bug fixes. The quality of these updates is often questionable as well, with the latest October 2018 (1809) release leaving some users reporting

Cybersecurity mid-year update 2018

100% security is now almost accepted in the online community. If you want to communicate with the outside world then you have to allow traffic in and out of your network. Here’s the key summaries from one of our security vendors, Webroot, for the first half of 2018: » Ransomware attacks moved beyond brute force

What the Facebook hack means for you…

In September 2018, Facebook announced that its engineering team had discovered a security issue affecting 50 million accounts. A hacker could, potentially, take over your Facebook account and use it as if they’d logged in as you. Facebook says: Since we’ve only just started our investigation, we have yet to determine whether these accounts were misused

#Ransomware stat 2: Construction/Manufacturing is the top targeted vertical for hackers this year. help navigating Cybersecurity? Contact the SMB Cybersecurity experts:

#Ransomware stat 1: SMBs paid $301 MILLION to hackers in the last year. help navigating Cybersecurity? Contact the SMB Cybersecurity experts:

Ransomware is everywhere – so what can you do?

Ransomware is everywhere these days. According to a recent study, 94% of IT providers reported ransomware bypassed top-of-the-line anti-virus software. If ransomware makes it past your front line of defense, what’s your next move? Protect your business with these tips