So, what did 2021 look like for Health IT? For more tips and how-to’s, visit our tech blog Staff Our team has grown to 15 vaccinated geeks. Some of our staff have now been with us for 10-14 years!Danny and Chris are now managing their own teams as Project Manager…
Search Results for:
Supply Chain Attacks in Healthcare For more tips and how-to’s, visit our tech blog There’s a lot of chat around supply chain delays in the lead-up to Christmas, but we wanted to bring your attention to a threat with a similar name. Today, we are talking about supply chain attacks.We…
New ACSC report highlights top cyber threats and trends For more tips and how-to’s, visit our tech blog ACSC (Australian Cyber Security Centre) recently released their second Annual Cyber Threat Report, providing an overview of the key cyber threats affecting Australia.Below, we summarise some of the top threats to the…
Staff cybersecurity training and awareness For more tips and how-to’s, visit our tech blog Last month we talked about being proactive around backups, data protection and business continuity. Another crucial step to ensuring your data is secure is regular and effective staff training and awareness.Did you know that 38% of…
Why is the Healthcare industry more at risk from Cyber-criminals? For more tips and how-to’s, visit our tech blog Did you know that personal medical data is worth ten to twenty times more to a cybercriminal than any other data type? This statistic is one of the prime reasons that…
Keeping your business safe with the ASD Essential Eight What are the Essential Eight? The Essential Eight is split into 3 categories: Prevent malware delivery and execution Limit the extent of cybersecurity incidents Recover data and system availability Cybersecurity can feel overwhelming to start with, it’s filled with jargon, and…
Phones and Internet Get online and stay connected with Health IT Upgrade your phone system Health IT can supply you world class Yealink phones at much better pricing than traditional telephony.Our phone solutions eliminate the need for a traditional office telephone system. The main advantage to this is reduced costs…
Internet in tubes For more tips and how-to’s, visit our tech blog Virtual Private Networks (VPNs) have been talked about a lot lately whenever the topic of internet security comes up. Put simply, a VPN is a private connection between you and a website that can’t be spied on or…
Moving beyond the password with 2FA For more tips and how-to’s, visit our tech blog In 2013, Intel began World Password Day to promote users to keep strong passwords to protect our ever-sprawling online identities. Since then, the mindset of many tech communities has shifted. 2013 saw some of the…
A community of 5.3 billion For more tips and how-to’s, visit our tech blog This webpage takes up about 1 megabyte of space on our server.For context, that’s only about 1/8000th of a USB thumbdrive you might have in your pocket. You could save this page a thousand times before reaching…