Remember The Golden Rule If you aren’t 100% sure, don’t open it, don’t click it, stop and ask for help. Security Update June 2022 We are actively monitoring an emerging threat that is being exploited in the wild. This threat will result in you seeing a huge increase in scam…
Search Results for:
So, what did 2021 look like for Health IT? For more tips and how-to’s, visit our tech blog Staff Our team has grown to 15 vaccinated geeks. Some of our staff have now been with us for 10-14 years!Danny and Chris are now managing their own teams as Project Manager…
Supply Chain Attacks in Healthcare For more tips and how-to’s, visit our tech blog There’s a lot of chat around supply chain delays in the lead-up to Christmas, but we wanted to bring your attention to a threat with a similar name. Today, we are talking about supply chain attacks.We…
New ACSC report highlights top cyber threats and trends For more tips and how-to’s, visit our tech blog ACSC (Australian Cyber Security Centre) recently released their second Annual Cyber Threat Report, providing an overview of the key cyber threats affecting Australia.Below, we summarise some of the top threats to the…
Staff cybersecurity training and awareness For more tips and how-to’s, visit our tech blog Last month we talked about being proactive around backups, data protection and business continuity. Another crucial step to ensuring your data is secure is regular and effective staff training and awareness.Did you know that 38% of…
Why is the Healthcare industry more at risk from Cyber-criminals? For more tips and how-to’s, visit our tech blog Did you know that personal medical data is worth ten to twenty times more to a cybercriminal than any other data type? This statistic is one of the prime reasons that…
What are the Essential Eight? The Essential Eight is split into 3 categories: Prevent malware delivery and execution Limit the extent of cybersecurity incidents Recover data and system availability Cybersecurity can feel overwhelming to start with, it’s filled with jargon, and then there are the fearmongering headlines in the media.…
Phones and Internet Get online and stay connected with Health IT Upgrade your phone system Health IT can supply you world class Yealink phones at much better pricing than traditional telephony.Our phone solutions eliminate the need for a traditional office telephone system. The main advantage to this is reduced costs…
Internet in tubes For more tips and how-to’s, visit our tech blog Virtual Private Networks (VPNs) have been talked about a lot lately whenever the topic of internet security comes up. Put simply, a VPN is a private connection between you and a website that can’t be spied on or…
Moving beyond the password with 2FA For more tips and how-to’s, visit our tech blog In 2013, Intel began World Password Day to promote users to keep strong passwords to protect our ever-sprawling online identities. Since then, the mindset of many tech communities has shifted. 2013 saw some of the…