fbpx
Menu Close

Search Results for:

Should you shut down your computer every day?

Should You Shut Down Your Computer Every Day? For more tips and how-to’s, visit our tech blog Does Shutting Down or Restarting your computer every day help performance? While every machine will be slightly different, there are things you can do to help your computer last longer. Often software manufacturers will put out updates that get applied when your computers is restarted, and generally shutting down your computer at least once or twice a week is recommended to get these updates. There are, of course, some caveats. When to leave your computer on First and foremost, servers should stay on…

Should you Upgrade to Windows 11?

Should You Upgrade To Windows 11? For more tips and how-to’s, visit our tech blog Windows 11 launched on 5th October 2021 and has steadily been patched and installed on a wider number of computers. If you’ve bought a new laptop or desktop recently it will likely come pre-loaded with Windows 11, even on Windows mobile phones and especially tablets. But is Microsoft’s new Operating System going to make you super efficient? The answer, as you’d expect, is: …Sometimes…? Performance Microsoft has touted more attention to ‘focused’ or foreground apps when using Windows 11. This should mean you get better…

5 Ways hackers target your mobile devices

5 Ways hackers target your mobile devices For more tips and how-to’s, visit our tech blog Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable and can be used from anywhere. We’re seeing the takeover of many activities that used to be performed on traditional computers. Now, people are using mobile devices instead. Even at Health IT we’re using portable devices more often. Microsoft estimates that up to 80% of the workload in many enterprise organizations is now done via mobile devices. Over half of all web searches are…

Security Update June 2022 – Invoice Scams, Shared Document Scams, and 2FA Bombing

Remember The Golden Rule If you aren’t 100% sure, don’t open it, don’t click it, stop and ask for help. Security Update June 2022 We are actively monitoring an emerging threat that is being exploited in the wild. This threat will result in you seeing a huge increase in scam and malicious emails. Here are some things to be on the lookout for to help keep you and your business safe! Invoice Scams A quite common method that scammers are currently using is to send a fake invoice. This can be trying to do two things: Get you to pay/send…

What did 2021 look like for Health IT?

So, what did 2021 look like for Health IT? For more tips and how-to’s, visit our tech blog Staff Our team has grown to 15 vaccinated geeks. Some of our staff have now been with us for 10-14 years! Danny and Chris are now managing their own teams as Project Manager and Service Manager respectively. This year we focused on our staff with a massive HR review & reform. In the review, we found that everybody agrees that Health IT is a great place to work, with solid core values and focus.  Our staff love working here and looking after…

Supply Chain Attacks in Healthcare

Healthcare IT consulting

Supply Chain Attacks in Healthcare For more tips and how-to’s, visit our tech blog There’s a lot of chat around supply chain delays in the lead-up to Christmas, but we wanted to bring your attention to a threat with a similar name. Today, we are talking about supply chain attacks. We are going to run through what these challenges mean to your business and how you can keep your organisation secure. What is a supply chain attack? A supply chain attack transpires when a cybercriminal targets an organisation via security vulnerabilities in its supply chain. However, this vendor or provider…

New ACSC report highlights top cyber threats and trends

New ACSC report highlights top cyber threats and trends For more tips and how-to’s, visit our tech blog ACSC (Australian Cyber Security Centre) recently released their second Annual Cyber Threat Report, providing an overview of the key cyber threats affecting Australia. Below, we summarise some of the top threats to the healthcare sector, then discuss how we can protect your organisation and data. Three cyber threats you need to be aware of: Exploitation of the pandemic environment: COVID-19 provided malicious actors with the perfect backdrop to exploit the fears of everyday Australians and health organisations. Tactics included spear-phishing emails which…

Staff cybersecurity training and awareness

Staff cybersecurity training and awareness For more tips and how-to’s, visit our tech blog Last month we talked about being proactive around backups, data protection and business continuity. Another crucial step to ensuring your data is secure is regular and effective staff training and awareness. Did you know that 38% of security breaches reported to the OAIC from January to June 2020 were related to human error? You need to think of your  staff as the last line of defence against cybercriminals. If they all don’t follow safe and secure practices, then the risks of being targeted by a cyber-attack…

Why is the healthcare industry more at risk from cyber-criminals?

Why is the Healthcare industry more at risk from Cyber-criminals? For more tips and how-to’s, visit our tech blog Did you know that personal medical data is worth ten to twenty times more to a cybercriminal than any other data type? This statistic is one of the prime reasons that healthcare is the most targeted industry for hackers. However, just like you can minimise your chances of a home break-in by installing security locks, cameras or a big Doberman in the front yard, there are some easy steps that you can take to protect and back up your data to…

ASD Essential Eight

StorageCraft Ransomware Ready eBook Cover

Keeping your business safe with the ASD Essential Eight What are the Essential Eight? The Essential Eight is split into 3 categories: Prevent malware delivery and execution Limit the extent of cybersecurity incidents Recover data and system availability Cybersecurity can feel overwhelming to start with, it’s filled with jargon, and then there are the fearmongering headlines in the media. As part of our core values, we’re focused on security. We do everything to protect you, your reputation, your technology infrastructure, and your patient’s privacy from day one. This focus means we have built our cyber-security and data recovery strategy around…