Menu Close

Search Results for:

Should you Upgrade to Windows 11?

Windows 11 desktop showing the start menu in the centre

Should You Upgrade To Windows 11? For more tips and how-to’s, visit our tech blog Windows 11 launched on 5th October 2021 and has steadily been patched and installed on a wider number of computers. If you’ve bought a new laptop or desktop recently it will likely come pre-loaded with…

5 Ways hackers target your mobile devices

Mobile phone with security padlock icon

5 Ways hackers target your mobile devices For more tips and how-to’s, visit our tech blog Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable and can be used from anywhere. We’re seeing the takeover of many activities that…

What did 2021 look like for Health IT?

So, what did 2021 look like for Health IT? For more tips and how-to’s, visit our tech blog Staff Our team has grown to 15 vaccinated geeks. Some of our staff have now been with us for 10-14 years!Danny and Chris are now managing their own teams as Project Manager…

Supply Chain Attacks in Healthcare

Healthcare IT consulting

Supply Chain Attacks in Healthcare For more tips and how-to’s, visit our tech blog There’s a lot of chat around supply chain delays in the lead-up to Christmas, but we wanted to bring your attention to a threat with a similar name. Today, we are talking about supply chain attacks.We…

New ACSC report highlights top cyber threats and trends

Doctor using a tablet computer with healthcare icons spiralling out of it

New ACSC report highlights top cyber threats and trends For more tips and how-to’s, visit our tech blog ACSC (Australian Cyber Security Centre) recently released their second Annual Cyber Threat Report, providing an overview of the key cyber threats affecting Australia.Below, we summarise some of the top threats to the…

Staff cybersecurity training and awareness

Staff cybersecurity training and awareness For more tips and how-to’s, visit our tech blog Last month we talked about being proactive around backups, data protection and business continuity. Another crucial step to ensuring your data is secure is regular and effective staff training and awareness.Did you know that 38% of…

ASD Essential Eight

StorageCraft Ransomware Ready eBook Cover

Keeping your business safe with the ASD Essential Eight What are the Essential Eight? The Essential Eight is split into 3 categories: Prevent malware delivery and execution Limit the extent of cybersecurity incidents Recover data and system availability Cybersecurity can feel overwhelming to start with, it’s filled with jargon, and…

Phones and PBX

phone image

Phones and Internet Get online and stay connected with Health IT Upgrade your phone system Health IT can supply you world class Yealink phones at much better pricing than traditional telephony.Our phone solutions eliminate the need for a traditional office telephone system. The main advantage to this is reduced costs…