Financing Your School’s 1:1 Technology Program

By Angie Jones | April 13, 2022

As our world becomes increasingly dependent on technology, schools are desperately trying to keep pace within the classroom. Most students today don’t even remember a time before smart phones! As a result, schools are introducing more digital tools into their curriculums to strengthen the relationship between their students and the learning content. For many schools, […]

What Is .au Direct and What Does It Mean for Your Domain?

By Angie Jones | March 31, 2022

Great news Australia, a new category of domain name has just launched! As of the 24th of March 2022, .au direct names can now be obtained from select auDA accredited registrars. Not sure what this means for you? Read on as we answer all your most asked questions and look at what this means for […]

Benefits and Challenges of 1:1 Technology in the Classroom

By Angie Jones | March 23, 2022

There’s no doubt that the use of technology in the classroom has grown exponentially in the last decade. In a 2016 study by Pearson Education, 64% of Australia schools stated they were already working towards using majority online resources. Six years later, and access to computing devices has become essential to facilitate learning in both […]

Right Fit for Risk and ISO27001 Implementation: What is the DESE ISMS Scheme?

By Melissa Hoarau | March 23, 2022

The DESE ISMS Scheme – A Quick Overview The Department of Education, Skills and Employment’s (DESE, ‘the Department) new Information Security Management Scheme calls for all providers of employment skills, training, and disability employment services to gain ISO27001 and Right Fit for Risk accreditation. The objective of this scheme is to ensure that providers are […]

Internal Vs Outsourced IT Support: What’s right for your business?

By Angie Jones | March 14, 2022

For many organisations, choosing between an internal IT support team or outsourcing to a Managed Service Provider (MSP) can be a daunting decision. Get it right and you hardly even notice, get it wrong and it’s a never ending nightmare of error messages, frozen screens and viruses. So which decision is the right one? Well, […]

‘Peek Performance’ – Here’s everything you missed from Apple’s March Keynote

By Angie Jones | March 14, 2022

Apple has kicked off 2022 by unveiling an array of exciting new products during their Peek Performance keynote. Some of the highlights include a desktop Mac complete with new M1 Ultra processor and Studio Display, the third generation of iPhone SE and fifth generation iPad Air. Read on for a quick recap of all the […]

Do you need an email threat scan?

By Melissa Hoarau | January 25, 2022

Here’s a not-so-fun fact: 95% of organisations have Office 365 mailboxes that are harbouring malicious emails. Many of these socially engineered attacks can slip through your existing defences, landing in your users’ inboxes and leaving your organisation open to potential risks. Furthermore, viruses and phishing attempts can slip through your gateways and, if left undetected, […]

EWOTEE Ep 8: Regular Backups

By Melissa Hoarau | December 10, 2021

Regular Backups Hi everyone, and welcome to the final episode of eight weeks of the essential eight! In this episode we’ll be discussing regular backups, why they’re considered essential, and how you can achieve maturity level one. Let’s begin! The ACSC defines this strategy as: Regular backups of important new/changed data, software, and configuration settings, stored disconnected, […]

EWOTEE Ep 7: Multi-factor Authentication

By Melissa Hoarau | December 3, 2021

Hi everyone and welcome to episode 7 of eight weeks of the essential eight. In this episode we’re going to discuss multi-factor authentication (AKA MFA), why it’s considered essential, and the maturity level one requirements. The ACSC defines this strategy as: Multi-factor authentication including for VPNs, RDP, SSH and other remote access, and for all users […]

EWOTEE Ep 6: MS Office Macros

By Melissa Hoarau | December 2, 2021

Hi everyone, and welcome to this week’s episode of eight weeks of the essential eight. In this episode we’re going to discuss the essential eight mitigation strategy ‘configure Microsoft Office macros’, why it’s considered essential, and how to implement maturity level one requirements. Let’s begin! The ACSC defines this strategy as: Configure Microsoft Office macro […]