Author:
Yener Adal
Yener is the founder and Managing Director of Intuitive IT. Prior to running his own business Yener worked for a number of corporate organisations where he gained invaluable experience and skills, as well as an understanding of how IT can complement and improve business outcomes.
Filter by category
Can You Spot A LinkedIn Fake Sales Bot?
LinkedIn has emerged as an invaluable platform for professionals worldwide, enabling users to connect, network, and explore various business opportunities. Since launching in Australia in 2010, LinkedIn has grown in popularity as the preferred way to stay in touch with your business contacts. However, with its increased popularity, LinkedIn is attracting the attention of scammers and fraudsters. Often it's as simple as a connection with someone you know, inviting you to connect via outreach. For ...
Is Your Business’s Cybersecurity Haunted by Hidden Skeletons?
Disney has released its latest movie, Haunted Mansion, in time to entertain the kids during the September school holidays. And if you’re like me growing up in Melbourne, going to see a scary movie wasn’t the only haunted experience you could have. For generations, riding the Ghost Train at Luna Park was terrifying when I was younger. This ride with its ghastly ghouls petrified me…but enjoying a chocolate ice cream on Acland Street afterward was ...
Why Access Management Is Critical For Cybersecurity
It's easy to forget how connected we are both at home and at work. As you leave your car in the station car park and jump on the 7.04 a.m. train to Parliament, you'll likely have already used a handful of cloud-based apps to start your working day - anything from Google Suite to Slack. With the rapid pace of change across digital workplaces, the risk of cyber threats continues to escalate. Poor cybersecurity hygiene ...
Secure Your Business with Cybersecurity Awareness Month
Australians held their breath last month, captivated by the Matildas advancing to the semi-finals at the World Cup. We all watched in awe as their strong defence showed how structured routines are essential for success. Likewise, cybersecurity requires robust defence to protect your digital assets. As you know, defenders block the opponent's advances, intercept passes, and secure the team's territory. In cybersecurity, firewalls, encryption, and intrusion detection systems act as the defensive line, intercepting and ...
Where is the future of work? And how Technology can help your business work from home.
Where is the future of work? Is it fully remote? Is it 100% in the office? Or is it Hybrid? Talking to our clients, it doesn’t appear there is one definitive answer. It’s a matter of what works for your business and client base. We’ll take you through what some of our clients are doing and what are some key considerations to ensure your business has a productive workforce. Can technologies support a hybrid work ...
Data Privacy Laws: Protect Your Business and Customers
Not a month goes by without the clear and present danger of another cyberattack on an Australian business. In the last few weeks, millions of Australians have had their data stolen by hackers attacking Latitude Financial. Many Aussies would be surprised to learn that Latitude Financial held sensitive documents dating as far back as 2005 from the previous owner, GE Capital Finance. Simple, interest-free purchases made at The Good Guys or JB Hi-Fi have now ...
7 Ways to Transform Your Customer’s Digital Experience
"ANZ kills cash…" screams the media as the headline is splashed across news sites and your feed. "Why you soon won't be able to withdraw cash…" Is this the end of cash? Are we all expected to now pay contactless with our smartphones or watches? Well, the move to a cashless society continues to gain pace - with only 27% of all transactions completed by cash post-pandemic. Aside from the convenience of not carrying physical ...
What is Essential 8?
What is Essential 8? The inception of the Essential 8 aimed to foster robust security and operational protocols among Australian government bodies, departments, local councils, and other entities operating in the public domain. Many private enterprises consider the Essential Eight an advantageous starting point for evaluating security measures and establishing a fundamental groundwork for cybersecurity. The custodianship of the Essential Eight is under the Australian Cyber Security Centre (ACSC) purview. What are the eight mitigation ...
Microsoft Windows 8.1 Support Has Ended: Now What?
Have you heard of Bankcard? Before VISA and MasterCard, Bankcard was Australia's answer to credit cards. Bankcard dominated the credit card space for several years, with over five million customers at its peak in 1984. But in 1986, a dispute arose between the major banks on whether to include Bankcard in their introduction of EFTPOS. At the time, several banks were actively promoting MasterCard leading to the start of Bankcard's demise. The banks' withdrawal of ...
How we use Business Intelligence (Power BI)
As organisations want to understand their businesses better, more and more conversations are around Business Intelligence or BI. The more meetings we have around BI, the more we realise that outside a specific scope of existing reports and data, owners and management aren't really sure what other insights they need. So inevitably, the question of how we use Power BI or Google Looker in our business is asked. Here is one way we use Business ...