Author:
Yener Adal
Yener is the founder and Managing Director of Intuitive IT. Prior to running his own business Yener worked for a number of corporate organisations where he gained invaluable experience and skills, as well as an understanding of how IT can complement and improve business outcomes.
Filter by category
How Often Do You Need to Train staff on Cybersecurity Awareness?
Phishing training is a critical component of cybersecurity awareness in businesses across Melbourne. But the following scenario is unfortunately all too common. Your staff have completed their annual phishing training, which teaches employees how to spot phishing emails. As a result, you're feeling good about it and expect your people to be extra vigilant. That is until about 5-6 months later… when your company suffers a costly ransomware infection due to an errant click on ...
How Using the SLAM Method Can Improve Phishing Detection
Phishing is usually the number one topic to cover when it comes to cyber security training for your staff… and for a good reason. Over the past few decades, phishing has been the primary method for cyber attacks on businesses and individuals in Melbourne and the wider world. For example, phishing emails often launch ransomware attacks, credential theft, and database breaches. Phishing has remained an ever-present threat simply because it is effective - scammers continually ...
What is SMS Spam and Phishing (Smishing)?
How many random text messages do you receive today, as opposed to a couple of years ago? For most Melbournians, these text messages are much more frequent in 2022. This SMS increase is because retailers and similar businesses have decided it's more effective to bypass your crowded email inbox and text you directly! They probably urge you to sign up for SMS alerts for shipment tracking and sale news. The medical industry is doing something ...
Increase your Home Network Security; to protect your business.
Did you know that the typical home now contains an average of 10.37 devices connected to the internet? The number of internet-connected devices in the house has been growing enormously over the past decade. Homes across Melbourne contain a wide range of phones, laptops and tablets… but half of that average figure consists of IoT devices. IoT stands for Internet of Things. Essentially, that means any other type of 'smart device' which connects to your home ...
Notebook battery-saving Life Hacks
Laptops (or Notebooks) are great because you can use them anywhere, thanks to the internal battery. However, once your notebook starts getting a little older, or you’ve spent too much time at the cafe, and there’s no power point in sight, battery life becomes a problem… Laptop owners often neglect battery health, and as your battery's lifespan gets shorter, you’ll probably wish you had it serviced earlier. Thankfully, there are several things you can do ...
Intuitive IT Business Apple Mac Support
After a whirlwind July, we’ve entered the last month of winter. The days are noticeably longer, and the idea of spring doesn’t seem like a pipe dream. If you’re one of the five people that didn’t travel to Europe during July, then you’ll be like me, hanging out for the warmer weather! One of my favourite new technologies is Dall-e-2 (pronounced Dali). You provide a text prompt, and the AI behind the scenes will generate four ...
5 Ways Microsoft 365 Can Enhance Your Hybrid Office
"Hybrid office" is a relatively fresh buzzword you'll hear used in offices all across Melbourne. A hybrid office means a workplace that caters to a mix of office-based and home-based employees… and now, it's the reality for many Melbourne businesses. This article published by Melbourne University in 2020 predicted that more businesses would have to adapt to hybrid or flexible post-pandemic. Moreover, this study, also by Melbourne University, showed that 70% of people working from home would ...
Which form of MFA should you use?
Melbourne business owners: don’t be complacent! Digital credential theft has been happening all over the world and you are no exception. This form of theft is the reason behind most cases of data breaches in the last few years! So, what is credential theft? Credential theft occurs when someone steals your password to important cloud-based data and other business processes. It is one of the fastest and simplest ways for a hacker to infect your ...
Should You Invest in a Second Monitor?
Imagine this: you are enjoying a nice cup of coffee and croissants from Lune (yum!) while sitting at your desk and enjoying the view of the Melbourne skyline from your office. Then, you look at your monitor and realise you have a mighty task of sorting out tabs/windows currently open. It gets worse if you must split the screen into two for two apps so that you can see both beside each other. Oh! What ...
Beware! 5 Types of Mobile Attacks That Breach Your Phone
Smartphones, iPads and tablets have become an integral part of life and are preferred by people to access the web/apps or communicate with others. These devices have become so popular because of their portability, they can connect to the internet from anywhere! In Melbourne, one of the most used apps is the PTV, which has live updates about trains, trams and buses. Every morning, people are seen using it to get an ETA on their ...