Blog

What exactly is unified communications?

What exactly is unified communications?

Relying solely on your phone for business communication made perfect sense decades ago. But if you carried that over today, it would be inefficient. This is because business communications now must include mobility, instant messages, and video conferencing.

Your passwords are not secure

Your passwords are not secure

A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case according to the National Institute of Standards and Technology (NIST). On the hook for the password best practices that we still use today — the combination of letters, capitalizations, and numbers — NIST admits that the existing guidelines were misguided.

5 computer tips that add hours to your day

5 computer tips that add hours to your day

There are only so many hours in the workday, so making the most of your time is vital. If distracting websites, unorganized files, and cluttered inboxes prevent you from getting work done, consider using these tips to better manage your time and stay productive at work.

Digital Workspace | A performHR Case Study

Digital Workspace | A performHR Case Study

PerformHR is a HR outsourcing company based in Newcastle, while they have over 30 employees their office is unlikely to have more than a few staff there at any moment.

Google Pixel 2 | Google banks on AI being next big thing

Google Pixel 2 | Google banks on AI being next big thing

Google is taking the fight for top smartphone to Apple. Google has taken the view that new hardware advances and features are levelling off and the next fight for the top of the smartphone pack will be around AI (Artificial Intelligence).

How to avoid entrepreneurial hackers

How to avoid entrepreneurial hackers

Another Windows security vulnerability has been released, and it looks as though it will be only a few weeks before the next one arrives. How do we know this? Because a group of hackers is openly selling their secrets to whoever will pay. Read on to learn how to protect yourself from this dangerous group of cyber criminals.

Mandatory Single Touch Payroll is coming | Is your system compliant?

Mandatory Single Touch Payroll is coming | Is your system compliant?

By the 1st of July 2018 the ATO will require all business with 20+ employees to have Single Touch Payroll (STP). Single Touch Payroll is an Australian government initiative that changes the way businesses report on employee payments such as salary or wages, pay as you go (PAYG) withholding and superannuation.

iPhone X and 8 is announced | Should I upgrade?

iPhone X and 8 is announced | Should I upgrade?

So the new generation iPhone, the iPhone X, has been announced but is it worth upgrading from your existing phone? We have a look at some of the new features to see if it is worthwhile. While the announced iPhone 8 and 8 Plus don't look too different from previous generations they do get most of the upgrades too, the iPhone X, however, looks and is a completely new phone.

Preventing Ransomware Attacks | User Security Awareness

Preventing Ransomware Attacks | User Security Awareness

Ransomware is a lucrative enterprise for members of the shady underbelly of the internet. It is projected to have a damage cost of $5 billion in 2017. While email filtering, antivirus, firewalls and security updates all have their very important place in protecting businesses, the end user remains the key piece in preventing attacks.

Profitability linked to IT maturity

Profitability linked to IT maturity

For many years, most organisations look at IT infrastructure spend as a required expense which should be minimised, and the ROI should be stretched over as many years as is safe without introducing undue risk to the business. Intuitively, you would think that spending 100k on infrastructure for 5 years would be more cost effective than 100k for 3 years.