Mitigate Risk articles

Articles about protecting your data and systems to protect your clients and business.

undraw_typewriter_i8xd
Home       Mitigate Risk       Page 9
Oh no I forgot my phone

5 Critical Steps You Must Do When Your Mobile Phone Is Missing

You're sitting in a taxi, frantically checking your pockets, your bag…where did you put it? Then, suddenly, it dawns on you. As your plane levelled at 35,000 feet, you slid your smartphone into the seatback pocket.  But now you are cruising home along the Monash Freeway (sorry, crawling along the Monash). And you can't believe you have left it onboard. It's 2022, and no one wants to go to an airport. Tullamarine is no different. The ...

How Often Do You Need to Train staff on Cybersecurity Awareness?

Phishing training is a critical component of cybersecurity awareness in businesses across Melbourne. But the following scenario is unfortunately all too common. Your staff have completed their annual phishing training, which teaches employees how to spot phishing emails. As a result, you're feeling good about it and expect your people to be extra vigilant. That is until about 5-6 months later… when your company suffers a costly ransomware infection due to an errant click on ...
Intuitive IT provides advice on Cybersecurity Insurance

How Using the SLAM Method Can Improve Phishing Detection

Phishing is usually the number one topic to cover when it comes to cyber security training for your staff… and for a good reason.  Over the past few decades, phishing has been the primary method for cyber attacks on businesses and individuals in Melbourne and the wider world. For example, phishing emails often launch ransomware attacks, credential theft, and database breaches. Phishing has remained an ever-present threat simply because it is effective - scammers continually ...

What is SMS Spam and Phishing (Smishing)?

How many random text messages do you receive today, as opposed to a couple of years ago? For most Melbournians, these text messages are much more frequent in 2022. This SMS increase is because retailers and similar businesses have decided it's more effective to bypass your crowded email inbox and text you directly! They probably urge you to sign up for SMS alerts for shipment tracking and sale news. The medical industry is doing something ...
A-cyberpunk-wifi-router-with-a-face-with-lots-of-security

Increase your Home Network Security; to protect your business.

Did you know that the typical home now contains an average of 10.37 devices connected to the internet? The number of internet-connected devices in the house has been growing enormously over the past decade. Homes across Melbourne contain a wide range of phones, laptops and tablets… but half of that average figure consists of IoT devices. IoT stands for Internet of Things. Essentially, that means any other type of 'smart device' which connects to your home ...
DALL·E-2022-08-03-10.31.55-business-person-in-a-cave-looking-out-the-entrance-in-anticipation-of-spring-coming-digital-art

Intuitive IT Business Apple Mac Support

After a whirlwind July, we’ve entered the last month of winter. The days are noticeably longer, and the idea of spring doesn’t seem like a pipe dream. If you’re one of the five people that didn’t travel to Europe during July, then you’ll be like me, hanging out for the warmer weather! One of my favourite new technologies is Dall-e-2 (pronounced Dali). You provide a text prompt, and the AI behind the scenes will generate four ...
multifactor authentication

Which form of MFA should you use?

Melbourne business owners: don’t be complacent! Digital credential theft has been happening all over the world and you are no exception. This form of theft is the reason behind most cases of data breaches in the last few years! So, what is credential theft? Credential theft occurs when someone steals your password to important cloud-based data and other business processes. It is one of the fastest and simplest ways for a hacker to infect your ...
an-oil-painting-of-a-modern-sleek-laptop-computer-infected-with-little-green-viruses.-a-black-crow-is-perched-on-top-of-the-screen-dark-background thanks to dall-e 2

8 Signs Your Computer is Infected with Malware

Malware consists of viruses, trojans, adware, spyware, ransomware, key loggers, etc. These are applications that run malicious code and are used by hackers to steal valuable data. It is often not easy to identify malware unless you are familiar with some of its typical signs. If a computer on your office network is infected and it is ignored, in no time the malware infects all the computers on the same network. This is because malware ...
scammer hand reaching out

Protect your business from Tax Time scams

Happy New Financial Year to everyone! We sure hope it will be a happy one. We’ve found the last 12 months more difficult than we initially thought. It was all meant to be rainbows and happy times as we emerged from lockdown. However, we discovered business was reluctant to spend and commit and the cost of business rising, combined with the effects of the “Great Resignation” have caused consternation among business owners we’ve spoken with. ...
know your process before you automate it

IT trends to look forward to in 2017

Monthly IT Support Update - February 2017 Hi all, Well, 2017 is well and truly underway and it’s looking to be another big year in IT. There are going to be a few major areas to watch and take note of this year. I’ll give a brief overview of these below, as well as what they could mean for your business. Social media presence There were and still are plenty of organisations that believe social ...