fbpx
Menu Close

Search Results for:

New ACSC report highlights top cyber threats and trends

New ACSC report highlights top cyber threats and trends For more tips and how-to’s, visit our tech blog ACSC (Australian Cyber Security Centre) recently released their second Annual Cyber Threat Report, providing an overview of the key cyber threats affecting Australia. Below, we summarise some of the top threats to the healthcare sector, then discuss how we can protect your organisation and data. Three cyber threats you need to be aware of: Exploitation of the pandemic environment: COVID-19 provided malicious actors with the perfect backdrop to exploit the fears of everyday Australians and health organisations. Tactics included spear-phishing emails which…

Staff cybersecurity training and awareness

Staff cybersecurity training and awareness For more tips and how-to’s, visit our tech blog Last month we talked about being proactive around backups, data protection and business continuity. Another crucial step to ensuring your data is secure is regular and effective staff training and awareness. Did you know that 38% of security breaches reported to the OAIC from January to June 2020 were related to human error? You need to think of your  staff as the last line of defence against cybercriminals. If they all don’t follow safe and secure practices, then the risks of being targeted by a cyber-attack…

Why is the healthcare industry more at risk from cyber-criminals?

Why is the Healthcare industry more at risk from Cyber-criminals? For more tips and how-to’s, visit our tech blog Did you know that personal medical data is worth ten to twenty times more to a cybercriminal than any other data type? This statistic is one of the prime reasons that healthcare is the most targeted industry for hackers. However, just like you can minimise your chances of a home break-in by installing security locks, cameras or a big Doberman in the front yard, there are some easy steps that you can take to protect and back up your data to…

ASD Essential Eight

Keeping your business safe with the ASD Essential Eight What are the Essential Eight? The Essential Eight is split into 3 categories: Prevent malware delivery and execution Limit the extent of cybersecurity incidents Recover data and system availability Cybersecurity can feel overwhelming to start with, it’s filled with jargon, and then there are the fearmongering headlines in the media. As part of our core values, we’re focused on security. We do everything to protect you, your reputation, your technology infrastructure, and your patient’s privacy from day one. This focus means we have built our cyber-security and data recovery strategy around…

Phones and PBX

Yealink telephones are world class. We use and supply these at much better pricing than traditional telephony. See also our hosted PBX. Our phone solutions eliminate the need for a traditional office telephone system. The main advantage to this is reduced costs in general, but with a hosted account through our provider mVoice, you can get personal 3-digit extensions, voicemail sent straight to your email, and super-easy call transferring, parking, and conferencing. All you require are IP enabled handsets, a router and suitable broadband connection. For more info, or for Health IT to assess if IP phones are right for…

VPNs in plain English and why you would need one

Internet in tubes For more tips and how-to’s, visit our tech blog Virtual Private Networks (VPNs) have been talked about a lot lately whenever the topic of internet security comes up. Put simply, a VPN is a private connection between you and a website that can’t be spied on or tracked. Often organisations like hackers, employers, and even government will be able to see which websites you’re accessing, where you’re logging on from, and what data is being sent back and forth between your computer and the web; this might include passwords, bank details, or medical info that should remain…

Do we still need passwords?

Moving beyond the password with 2FA For more tips and how-to’s, visit our tech blog In 2013, Intel began World Password Day to promote users to keep strong passwords to protect our ever-sprawling online identities. Since then, the mindset of many tech communities has shifted. 2013 saw some of the largest data breaches in recent memory including Target Corporation and Adobe Systems. The result of these breaches and many more was even more user details leaked to online hacker communities. The immediate response is to ensure your logins are as secure as possible, and it makes sense to update your…

5G and what it means for medical practices

faster, more reliable connections For more tips and how-to’s, visit our tech blog 5G is the next step in mobile internet. Similar to how you may already use 4G mobile data, business WiFi, or ethernet cables to get your internet, 5G aims to outclass other methods of internet connection by offering faster, more reliable bandwidth. Not to be confused with speed, bandwidth is how much information you receive every second, while speed is how fast that information is received or downloaded. Let’s compare it to filling a bathtub. If the bathtub faucet has a wide opening, more water can flow at…

How big is the internet, and how do we measure it?

A community of 4.6 billion For more tips and how-to’s, visit our tech blog This webpage takes up about 1 megabyte of space on our server. For context, that’s only about 1/8000th of a USB thumbdrive you might have in your pocket. You could save this page a thousand times before reaching a gigabyte of storage – a measure we’re more used to seeing these days. This page – and the server it sits on – could be imagined as a grain of sand on a beach that is the internet. There isn’t an upper limit to the amount of data…

Yealink custom ringtones

Customise your Yealink phone For more tips and how-to’s, visit our tech blog If you’re finding the default ringtones on your Yealink phone to be a bit bland, you can spice things up by uploading your own custom ringtone. According to Yealink, the ring tone file must be “PCMU audio format, mono channel, 8K sample rate, and 16 bit resolution” i.e. a .wav encoded with U-Law, at 8KHz & mono channel. The T46G (and similar models T49G,T48G,T29G) have a generous single file size limit of 8MB and a total file size limit of 20MB (older Yealinks are limited to 100KB total). I…