Search
Close this search box.

Social Distancing for Computers

Devices connected to storage in the data center , tablet, phone home devices with an online . Cloud technology, computing. Generative AI.

Like humans, computers can catch viruses. However, while it might take months or years for a network of humans to completely spread a virus, a network of computers can be infected within minutes. The average small business has a computer network in which every device can speak to every other device. Workstations can connect to … Read more

echidna.guest

Blog echidna.guest

We all have experienced it when visiting an office, the sign-in book. It comes in many shapes and forms, sometimes accompanied by a receptionist or a bell to ring. Often seen as an obligatory requirement to know who is on site, it is part of the visitor experience that is often disregarded in importance. However, … Read more

What Hackers Want

hacker 1446193 1920 1619x1080

What Hackers Want Nine Questions to Ask Yourself If you’re going to secure your business against cyber crime, it helps to first know what needs securing. Taking a moment to think like a hacker could be the difference between a cyber incident which is merely an annoyance and one which is life-changing. So, what does … Read more

Why Antivirus Isn’t Enough

shutterstock 1402830170 1536x978

Why Anivirus isn’t Enough Antivirus software is an important part of every business’ cyber security solution, but it cannot be relied on to protect you from the wide variety of threats you face whenever you use the Internet. Here are three ways hackers can bypass malware scanning software. By Using Undetectable Malware Some hackers are … Read more

Your Mobile Device Is A Target! And Here’s Why..

shutterstock 1063994870 1536x922

It’s no surprise that in the last few years, the amount we use our mobile devices (smartphones and tablets) has significantly increased. I know from looking at my iPhone’s screen time stats that I spend a significant amount of the day using all the great apps and tools that help me navigate a busy day … Read more

Critical Vulnerability Found In Windows DNS Servers

Cybersecurity Images 1536x1024

‘SIGRed’, a 17-year old flaw in Windows Server, has been discovered by Check Point researcher Sagi Tzadik. If this vulnerability is exploited by an attacker, it will grant them Domain Administrator rights and full access to the entire corporate network. The vulnerability affects Windows Server versions 2003-2019. All of these servers with the DNS role … Read more

We Are SA’s First Certified Secure SD-WAN Specialists

Futuristic computer lab illuminates data in a row for speed generated by AI

Today, many Australian businesses are adapting their network to leverage cloud-based services. In line with these changes, the conversation of WAN deployment has moved away from MPLS to SD-WAN deployments to take advantage of high bandwidth links and application prioritisation. Wireless Communications have assisted many customers with their migration to SD WAN by understanding the … Read more

Microsoft 2020 Security Updates

header padlock

As part of continual security improvement, Microsoft planned to release a set of security updates which included automatic changes to certain security settings, having the potential to make breaking changes to business computers and networks. The changes were originally planned to be included in the March 2020 monthly Windows updates but were then postponed to … Read more

Be careful before you post that photo!

shutterstock 1452139706 1536x972

Modern cameras are a marvel. The quality of image that a new mobile phone camera can capture would be almost unthinkable a few short years ago. However, this quality makes it easy to accidentally reveal sensitive information when you post a photo to the Internet. An image you post to Facebook or your company blog … Read more

Email Scams in 2020

shutterstock 1045098334SMALL

The days of fake lotteries and Nigerian princes are not yet over, but a different type of scam is on the rise. These new scams take a more aggressive approach to parting victims from their money, and threaten personal or professional embarrassment unless a fee is paid, usually in a cryptocurrency such as Bitcoin or … Read more