Phone: +613 9415 6320

Rock IT

We're thinkers. This is our blog.

Turn On Encryption In Facebook Messenger NOW!

Facebook Messenger’s ‘Secret Conversations’ allow end-to-end encryption, but the feature is opt-in. Here’s how to turn it on and use it. End-to-end encryption means that your conversations are encrypted from one device to another so the conversation can’t be accessed by anyone other than the sender and the intended receiver. Facebook’s new encryption, appropriately, is

Top 10 ways to protect your end-user data

Security is a hot topic thanks to a visible escalation in cybersecurity risks, but end-user data is often overlooked. With an increasingly mobile workforce, sensitive data is now found on all manner of devices, including laptops and mobiles – and it must be secured. Protect your business by ensuring that you and your staff follow

Rock IT Ranked Among World’s Most Elite 501 Managed Service Providers

Rock IT Ranked Among World’s Most Elite 501 Managed Service Providers   12th Annual MSP 501 Identifies Top Forward-Thinking Global MSPs & Leading Trends in Managed Services   JUNE 18, 2019: Rock IT has been named as one of the world’s premier managed service providers on the prestigious 12th-annual Channel Futures MSP 501 rankings.  

Rock IT is ranked as a leading MSP again!

12th Annual MSP 501 Identifies Top Forward-Thinking Global MSPs & Leading Trends in Managed Services JUNE 18, 2019: Rock IT has been named as one of the world’s premier managed service providers on the prestigious 12th-annual Channel Futures MSP 501 rankings. Every year, MSPs worldwide complete an extensive survey and application to report their product

Enable Google two-step verification

Enable Google two-step verification This is the simplest way to get additional security around your Google accounts. It’s simple, easy to use and will stop the bad guys/girls getting in!! To get started, go to the Security page in settings. Click 2-Step Verification and then the Get Started button to sign in to your Google account and turn on two-step verification.

Multi factor authentication (MFA) is gaining popularity

As concerns about password security grow, multi factor authentication is an increasingly favoured way to protect an organisation. How does Multi-Factor Authentication (MFA) work? Single-factor authentication is your classic username & password combination. (Read here why that’s such a critical combination) MFA adds in another layer of security on top of your username & password,

FBI Ransomware Alert & mitigation steps

In an FBI and Department of Homeland Security (DHS) alert, the government agencies warned cybersecurity professionals about SamSam MSIL/Samas.A ransomware attacks. Within the alert, the government agencies recommended that organizations take these 14 steps to mitigate the risk of SamSam ransomware infection. Here’s the mitigation guidance, word for word from the FBI and DHS memo: 1.

Five Common Security Scams

Five Common Security Scams Phishing: Emails aimed at luring recipients to click on an embedded link, which could trigger a malware installation, or surrendering confidential information such as passwords or credit card numbers. Spear-Phishing: Attackers gather specific personal data and often impersonate friends or business associates, including mimicking their email addresses (a tactic called “spoofing”) to craft an especially realistic

WhatsApp video call could compromise your account – update WhatsApp!

Google Project Zero security researcher Natalie Silvanovich has published a report showing a vulnerability in WhatsApp that could have allowed an attacker to take control of a video call remotely. The technical details can be found in Natalie’s blog or a summary here. The quick summary for this blog is this: Hacker only need your phone number

Latest Windows 10 update wipes user data; highlights lack of backups

Such is the state of computing these days, software providers are continually releasing security and bug patches. Microsoft has what’s known as “Patch Tuesday”, which is a monthly release of security and bug fixes. The quality of these updates is often questionable as well, with the latest October 2018 (1809) release leaving some users reporting

Cybersecurity mid-year update 2018

100% security is now almost accepted in the online community. If you want to communicate with the outside world then you have to allow traffic in and out of your network. Here’s the key summaries from one of our security vendors, Webroot, for the first half of 2018: » Ransomware attacks moved beyond brute force

What the Facebook hack means for you…

In September 2018, Facebook announced that its engineering team had discovered a security issue affecting 50 million accounts. A hacker could, potentially, take over your Facebook account and use it as if they’d logged in as you. Facebook says: Since we’ve only just started our investigation, we have yet to determine whether these accounts were misused

#Ransomware stat 2: Construction/Manufacturing is the top targeted vertical for hackers this year. help navigating Cybersecurity? Contact the SMB Cybersecurity experts:

#Ransomware stat 1: SMBs paid $301 MILLION to hackers in the last year. help navigating Cybersecurity? Contact the SMB Cybersecurity experts:

Ransomware is everywhere – so what can you do?

Ransomware is everywhere these days. According to a recent study, 94% of IT providers reported ransomware bypassed top-of-the-line anti-virus software. If ransomware makes it past your front line of defense, what’s your next move? Protect your business with these tips

Australia’s cyber defences ‘relatively weak, uncoordinated’

Australia’s cyber defences ‘relatively weak, uncoordinated’, former ASIO boss David Irvine warns. A former spy boss has warned the country’s ability to counter cyber threats and criminal activity is “relatively weak and uncoordinated”, with current efforts scattered across the states and Commonwealth. David Irvine, who ran ASIO until 2014 and was also the head of the

HP Notebook Computer and Mobile Workstation Battery Safety Recall and Replacement Program

Important Safety Announcement    In cooperation with various government regulatory agencies HP has announced a worldwide voluntary safety recall and replacement program for certain notebook and mobile workstation batteries.   The potentially affected batteries were shipped with certain HP notebooks and mobile workstations sold worldwide from December 2015 through December 2017. These batteries were also

What do Hackers even want?

It’s an interesting question because not all Hackers are the same. Some want to steal your data for their own purposes, some are seeking a ransom and some want to block your service to benefit them in some way. Some hackers are motivated by money; some are doing it for the notoriety. Firstly – who

What the Privacy Act Amendments mean for Australian Businesses

The information in this article should be treated as a guide only and not legal advice. Please seek professional legal advice should you require further clarification. The quick summary The Privacy Amendment (Notifiable Data Breaches) Bill 2016 was passed by the Senate as an amendment to the Australian Privacy Act 1988 (Cth) and will come

Phishing attacks more efficient than data breaches: Google

A Google study found that phishing attacks are more efficient than data breaches at getting criminals into victim’s account and that the average person still has can’t pick a good pass word. The recent study was carried out in conjunction with University of California at Berkley and the International Computer Science Institute. Researchers conducted a year-long

CEO Emails may be the weak link in your cyber security

A study by F-Secure has found that 30% of CEOs have used their company’s email to register for a service that was breached. This exposed their passwords and other pertinent details. There’s never been a better time to take “password hygiene” more seriously, with 30% of CEO’s of “world-class” companies having their password leaked. How?