Tuesday, February 5th, 2019 by Gina Thompson
Public WiFi networks can be a blessing – whether you’re quickly taking care of some business on your laptop while you have a coffee, or you’re sending some holiday snaps home while on a trip abroad. However, as convenient as that free WiFi access is, there can be security risks associated with using public WiFi networks that you should know about. You don’t need to stop using public WiFi altogether but there are a few things you should keep in mind before you connect. We’ve put together a handy guide to help you stay safe while you surf the ‘net – all you need is a little bit of reasoning and resilience. |
Wednesday, March 14th, 2018 by Erin Kavanagh
As you use your computers, phones, and tablets, you’ll start to accumulate a lot of data on the internal storage. Whether its music, lists and notes, contact information, important documents, or those photos from your once-in-a-lifetime holiday – losing it would be awful. We all like to think we’re careful and it’ll never happen to us, but the truth is no matter how careful you are, you never know when your phone will drop out of your pocket and break, your iPad will be lost or stolen, you accidentally open an email containing a virus, or that cup of coffee decides to just tip itself over the laptop keyboard. With World Backup Day on the 31st of March, we thought there was no better time to share some top tips for backing up your data effectively and putting in place a recovery plan in case of emergency. |
Monday, January 8th, 2018 by Gina Thompson
You may have seen our previous blog with tips on how to keep one eye open for the scammers. Now it’s time to talk about a different kind of scam which utilises a kind of software known as Remote Access. In 2017 alone, the Australian Competition & Consumer Commission (ACCC)’s Scamwatch reported over $2 million lost to Remote Access scams and the amount lost each month has continued to rise. To keep you in the know, we’ve put together all you need to know about what Remote Access is, how it’s being used in scams, and what to do if you suspect you’ve been targeted. |