IT Management articles

A list of all our IT business support articles under the category of IT Management

undraw_typewriter_i8xd
Home       IT Management       Page 2

Data Privacy Laws: Protect Your Business and Customers

Not a month goes by without the clear and present danger of another cyberattack on an Australian business. In the last few weeks, millions of Australians have had their data stolen by hackers attacking Latitude Financial.  Many Aussies would be surprised to learn that Latitude Financial held sensitive documents dating as far back as 2005 from the previous owner, GE Capital Finance.  Simple, interest-free purchases made at The Good Guys or JB Hi-Fi have now ...

Microsoft Windows 8.1 Support Has Ended: Now What?

Have you heard of Bankcard? Before VISA and MasterCard, Bankcard was Australia's answer to credit cards. Bankcard dominated the credit card space for several years, with over five million customers at its peak in 1984.  But in 1986, a dispute arose between the major banks on whether to include Bankcard in their introduction of EFTPOS. At the time, several banks were actively promoting MasterCard leading to the start of Bankcard's demise.  The banks' withdrawal of ...

Microsoft Forms: Powerful Way to Survey

I'm sure this always happens to you as it does to me. Your father-in-law sends you an email. He has been out that morning off Mornington, fishing. He's "bagged out" on whiting and snapper and wants to share his haul with you. So in his email, he tells you to check out the attached photo.  Except the attachment is missing.  Always.  So you go back and forth until he works out how to attach an ...

Employee Monitoring Software: Should You Track Every Keystroke?

As we enter the pandemic's third year, most Melbourne businesses have adopted remote or hybrid working arrangements.  So whether your employees are commuting into Southern Cross or logging in from Box Hill, keeping tabs on productivity and morale is a delicate balancing act. The majority of companies across Australia now support some remote work, with statistics showing that: 24% of companies are 100% remote 31% support hybrid office/remote working 45% currently don't allow employees to ...

What can I do to make sure my IT costs remain low without compromising our data and security?

Managing IT costs is crucial for businesses of all sizes. As technology continues to play an increasingly important role in daily operations, investing heavily in IT infrastructure and security measures can be tempting. However, excessive spending on IT can quickly drain a business's resources, leaving little room for growth and innovation. To strike the right balance between cost reduction and data security, companies need to adopt effective strategies that can help reduce IT costs while ...

Future Tech Revealed: What’s New at CES 2023?

A quick peek around your home office will uncover a range of gadgets and tech purchases made over the last few years. When we were all stuck at home, you may have invested in new Apple AirPods, upgraded your TV or finally set up your desk with a second monitor to avoid hunching over and squinting at your tiny laptop screen. Perhaps you even put a TV in your home office to watch the footy ...

Overcoming App Fatigue: Understanding the Risks

The volume of app notifications and messages we receive daily makes it easy to feel helpless. You'll remember during the lockdowns how much time was spent at your computer on Zoom calls, while your smartphone was reminding you of your next meeting, all the while trying to homeschool.  You might have thought things would return to normal. But instead, there continues to be a rise in the number of apps and web tools you need ...

5 Steps For Effective Vulnerability Management

As I sat down to write these tips to manage security vulnerabilities, my smartphone flashed a news notification that criminals had carried out another cyberattack on an Australian company.  A financial institution, no less...Latitude Financial.  Cyberattacks on major Australian companies dominated headlines in late 2022. But, consider how cybercriminals attacked large organisations like Medibank Private and Optus. With the resources they have to manage their IT securely, how were they still exposed?  What does this ...

Cybersecurity Insurance Requirements

If there's one thing that's been keeping me up at night more than the thought of running out of coffee, and what is going to happen to the Roy children in Succession, it's the importance of cybersecurity insurance. I mean, who doesn't love a good insurance policy? It's like a security blanket for your digital assets - except way less cuddly and way more necessary. Lately, I've been talking a lot about how in the ...

Data protection for your business

Instinctively, you reach into your pocket to grab your iPhone.  The bride and groom are about to cut their wedding cake as the sun dips behind the hills.  You jostle to get into position, ready to grab the photo.  Then, raising the iPhone to take a stunning image, it greets you with a blank, black screen.  You tap furiously on the screen, forcing the power button to wake it.  Nothing happens.  Panic sets in.  You're ...