eStorm has partnered with Exclaimer!

By Melissa Hoarau | March 4, 2021

Get the most of your email signatures with eStorm and Exclaimer Did you know that around 269 billion emails are sent worldwide every day? Even with internal communication software such as Microsoft Teams and Slack, emails are still predominantly used for communication in businesses across the globe. Your email signature can be the first impression […]

A Quick Guide to Microsoft Teams Calling

By Melissa Hoarau | February 18, 2021

Take Your Business to the Next Level with Teams Calling! If you’re already an avid user of the Microsoft Teams software you’ve probably heard of the external calling capabilities you can utilise as an add on to the app. In the past, Microsoft’s calling plans were exorbitantly priced and furthermore were only available in 16 […]

Best Practices for Backing Up Your Data

By Melissa Hoarau | December 11, 2020

Cyber-crime and data loss are ever increasing in today’s technology-reliant society. The loss of important company data and client records can be damaging for businesses. If you are yet to experience some level of data loss, you may be considered one of the lucky ones.  There is always the risk of an accident or malicious […]

The Pros and Cons of Chromebooks: Are They Suitable for Students?

By Melissa Hoarau | November 23, 2020

eStorm has seen a rise in popularity for Chrome OS and G-Suite in classrooms, but many schools and teachers are still cautious about introducing Chromebooks to classrooms as they are not sure whether the device’s capabilities can meet the demanding needs of many school students. So teachers are able to make a more informed decision, […]

Apple M1

The Apple Silicon M1 Chip – Everything You Need To Know!

By Melissa Hoarau | November 16, 2020

Whether it be on the radio, the news, or from your co-workers and friends, you’ve probably heard whispers of excitement over the new Apple Silicon processor for Macs, officially announced on November 11. Or if you haven’t, you’re now probably wondering – what is the new Apple Silicon chip? For over a decade, Apple’s world […]

It is time to start teaching cybersecurity in schools

By eStorm | October 26, 2020

It is Australian Cyber Week and to celebrate, we’ve decided to dive into why teachers need to start teaching students about cybersecurity. We teach children about crossing the street and avoiding strangers from a young age, and it is now just as important that we do the same with cyber safety. Students are being introduced […]

Using Technology to Support Curriculum Development

By eStorm | October 19, 2020

Technology has changed our day-to-day lives, the way we work and study, and how we spend our leisure time. Technology has an important part to play in the design and development of a curriculum and has the potential to be an engaging and challenging experience for students. Utilising current technology in the classroom supports teachers […]

Pokemon Go’s plans to make 3D scans of the world

By eStorm | September 7, 2020

In 2016 we saw the world go crazy for Pokemon Go. The game sent hundreds of millions of people of all ages wandering the streets searching for virtual creatures. This game has paved the way for augmented reality in today’s technological landscape, and the ability to overlay computer-generated imagery onto real-world environments. Niantic (developers of […]

Is my business fit for managed cloud services?

By eStorm | September 7, 2020

The “Cloud” is a new and disruptive trend that has been gaining momentum in businesses for some time. With many businesses unsure how cloud computing and cloud services can fit into their business strategy. Managed Cloud Services may sound like a complex concept; however, it is simply storing your data offsite in a data centre […]

Is your business ready for the Essential Eight?

By eStorm | August 17, 2020

At the beginning of 2020, the Federal Government and the Australian Cyber Security Centre (ACSC) announced the Essential Eight (E8). The E8 is a strategy for businesses to mitigate cybersecurity incidents, protecting their systems against a range of adversaries. What is the “Essential Eight”? The ACSC has admitted that no single mitigation strategy guarantees total […]