Should You Upgrade To Windows 11? For more tips and how-to’s, visit our tech blog Windows 11 launched on 5th October 2021 and has steadily been patched and installed on a wider number of computers. If you’ve bought a new laptop or desktop recently it will likely come pre-loaded with…
Search Results for:
5 Ways hackers target your mobile devices For more tips and how-to’s, visit our tech blog Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable and can be used from anywhere. We’re seeing the takeover of many activities that…
Remember The Golden Rule If you aren’t 100% sure, don’t open it, don’t click it, stop and ask for help. Security Update June 2022 We are actively monitoring an emerging threat that is being exploited in the wild. This threat will result in you seeing a huge increase in scam…
So, what did 2021 look like for Health IT? For more tips and how-to’s, visit our tech blog Staff Our team has grown to 15 vaccinated geeks. Some of our staff have now been with us for 10-14 years!Danny and Chris are now managing their own teams as Project Manager…
Supply Chain Attacks in Healthcare For more tips and how-to’s, visit our tech blog There’s a lot of chat around supply chain delays in the lead-up to Christmas, but we wanted to bring your attention to a threat with a similar name. Today, we are talking about supply chain attacks.We…
New ACSC report highlights top cyber threats and trends For more tips and how-to’s, visit our tech blog ACSC (Australian Cyber Security Centre) recently released their second Annual Cyber Threat Report, providing an overview of the key cyber threats affecting Australia.Below, we summarise some of the top threats to the…
Staff cybersecurity training and awareness For more tips and how-to’s, visit our tech blog Last month we talked about being proactive around backups, data protection and business continuity. Another crucial step to ensuring your data is secure is regular and effective staff training and awareness.Did you know that 38% of…
Why is the Healthcare industry more at risk from Cyber-criminals? For more tips and how-to’s, visit our tech blog Did you know that personal medical data is worth ten to twenty times more to a cybercriminal than any other data type? This statistic is one of the prime reasons that…
Keeping your business safe with the ASD Essential Eight What are the Essential Eight? The Essential Eight is split into 3 categories: Prevent malware delivery and execution Limit the extent of cybersecurity incidents Recover data and system availability Cybersecurity can feel overwhelming to start with, it’s filled with jargon, and…
Phones and Internet Get online and stay connected with Health IT Upgrade your phone system Health IT can supply you world class Yealink phones at much better pricing than traditional telephony.Our phone solutions eliminate the need for a traditional office telephone system. The main advantage to this is reduced costs…