We want to share our passion & expertise with you!
Keep up-to-date with the latest knowledge, thoughts & opinions on all things ICT & Telecommunications
…
Adapt S1
Wireless Communications was selected as the Adapt S1 South Australia and Northern Territory Partner. We are very humbled that our continued strength in Data and IP with Telstra over the years has given our business the opportunity to bring this revolutionary product to you. Below is the Press Release regarding this incredible product from CRN. Telstra has released a new secure access service edge (SASE) offering, ADAPT S1, as part of its Adaptive Networks[…]
Read moreSocial Distancing For Computers
Social Distancing for Computers Like humans, computers can catch viruses. However, while it might take months or years for a network of humans to completely spread a virus, a network of computers can be infected within minutes. The average small business has a computer network in which every device can speak to every other device. Workstations can connect to networked security cameras, security cameras can connect to servers, servers can connect to printers, printers[…]
Read moreGet more out of Guest Sign-in
We all have experienced it when visiting an office, the sign-in book. It comes in many shapes and forms, sometimes accompanied by a receptionist or a bell to ring. Often seen as an obligatory requirement to know who is on site, it is part of the visitor experience that is often disregarded in importance. However, used correctly this can be a rich source of information to not only improve the visitor experience, but also your[…]
Read moreWhat Hackers Want
What Hackers Want – Nine Questions to Ask Yourself If you’re going to secure your business against cyber crime, it helps to first know what needs securing. Taking a moment to think like a hacker could be the difference between a cyber incident which is merely an annoyance and one which is life-changing. So, what does your business have that a hacker could want? Money With any luck, your business is making some profit,[…]
Read moreWhy Antivirus Isn’t Enough
Why Antivirus Isn’t Enough Antivirus software is an important part of every business’ cyber security solution, but it cannot be relied on to protect you from the wide variety of threats you face whenever you use the Internet. Here are three ways hackers can bypass malware scanning software. By Using Undetectable Malware Some hackers are talented programmers, able to create a brand-new piece of malware that no antivirus company has ever seen before. Many[…]
Read moreYour Mobile Device is a Target! And here’s why..
Your Mobile Device is a target! And here’s why… It’s no surprise that in the last few years, the amount we use our mobile devices (smartphones and tablets) has significantly increased. I know from looking at my iPhone’s screen time stats that I spend a significant amount of the day using all the great apps and tools that help me navigate a busy day and be productive. In the last couple of years, the[…]
Read moreCritical Vulnerability found in Windows DNS Servers
‘SIGRed’, a 17-year old flaw in Windows Server, has been discovered by Check Point researcher Sagi Tzadik. If this vulnerability is exploited by an attacker, it will grant them Domain Administrator rights and full access to the entire corporate network. The vulnerability affects Windows Server versions 2003-2019. All of these servers with the DNS role need to have Windows updates applied immediately, or if that is not possible, the workaround suggested by Microsoft applied and[…]
Read moreWireless Communications – South Australia’s first certified Secure SD-WAN specialists
Wireless Communications South Australia’s first certified Secure SD-WAN specialists Today, many Australian businesses are adapting their network to leverage cloud-based services. In line with these changes, the conversation of WAN deployment has moved away from MPLS to SD-WAN deployments to take advantage of high bandwidth links and application prioritisation. Wireless Communications have assisted many customers with their migration to SD WAN by understanding the customer’s links, their high priority traffic, applications and their cloud environment.[…]
Read moreMicrosoft Security Updates
As part of continual security improvement, Microsoft planned to release a set of security updates which included automatic changes to certain security settings, having the potential to make breaking changes to business computers and networks. The changes were originally planned to be included in the March 2020 monthly Windows updates but were then postponed to later this year. However recently Microsoft advised that the planned automatic security setting changes have been indefinitely postponed and that[…]
Read moreBe Careful Before you Post that Photo
Be careful before you post that photo! Modern cameras are a marvel. The quality of image that a new mobile phone camera can capture would be almost unthinkable a few short years ago. However, this quality makes it easy to accidentally reveal sensitive information when you post a photo to the Internet. An image you post to Facebook or your company blog might look like this one of Jeffrey Wong, of the Hawaii Emergency[…]
Read moreEmail Scams in 2020
Email Scams in 2020 The days of fake lotteries and Nigerian princes are not yet over, but a different type of scam is on the rise. These new scams take a more aggressive approach to parting victims from their money, and threaten personal or professional embarrassment unless a fee is paid, usually in a cryptocurrency such as Bitcoin or Litecoin. Often, they will claim that they have hacked the victim’s computer and taken sensitive[…]
Read moreConfiguring Avaya for Remote Workers/ Work From Home
Acquiring the Avaya Communicator Installation Files Wireless have made Communicator available to download from the following address: https://www.wirelesscommunications.com.au/files/avaya-communicator-2.1.4.0.msi Installing Avaya Communicator The Avaya Softphone is a standard MSI installer package, savvy IT administrators may choose to automate this procedure, otherwise there are only minimal choices to make during installation and the process is straight forward: Double Click the “Avaya-Communicator-2.1.4.0.msi” file to commence installation. If you are unable to run the installer,[…]
Read moreThe Internet of Things
The Internet of Things – When Smart Devices Aren’t So Smart The Internet has changed the world over the past 30 years, and mostly for the better. Increased connectivity, increased convenience, and increased information is all available at our fingertips, 24 hours a day. So, it is only natural that we would want to bring the Internet into our physical lives and purchase the latest smart appliances and gadgets for our homes and businesses. However,[…]
Read moreMaking Passwords Easier
Passwords are hard to use… Too often, people are forced to choose between creating passwords that are easy to guess and passwords that are easy to remember. The problem becomes even worse when you consider the number of passwords a person uses from day to day, to access almost everything in their personal and professional lives. The temptation is to use the same password for everything, perhaps with minor changes to get past all the[…]
Read moreCYBER SECURITY 101
CYBER SECURITY “Hackers hone their skills while consumers remain complacent” -Symantec, November 2016 press release. What is Cyber Security? Cyber Security is the practice of protecting systems, networks and programs from cyber threats. Why is Cyber Security important? While the digital era offers enormous opportunity for all of us, this increased connectivity is accompanied by greater exposure to cybercriminal activity. Due to our nation’s relative wealth and high use of technology, Australia is an attractive[…]
Read more3 Smart Australian Business Tax Tips
As the clock counts down to Australian tax time there is often a feeling of apprehension mixed with relief for many businesses. True, there are dark days ahead and the desperate claw through boxes of receipts and checking to see the latest updates on taxation laws and allowances – but there’s also that light at the end of the tunnel. Very soon it will all be over for another year. Yet your business (and[…]
Read moreWireless Communications Darknet Glossary
The biggest ransomware cyber attack in the history of the Internet occurred in May 2017. It disabled the British healthcare system (NHS), crippled Spain’s largest mobile phone network (Telefonica) and disrupted train services throughout Germany – among many more victims worldwide. The ransomware, called WannaCry, is a form of malware that locks the victim out of their systems and demands a ransom to be paid in return for their data, or access to their[…]
Read moreFive Hacks Your Business Needs to Know About
Cloud computing and the Internet of Things are a magnificent leap for mankind and are set to be the future of the Internet as more manufacturers, business and enterprises are adopting these technologies. The ability to be connected and to make our lives easier and faster utilising the Internet of Things, combined with the processing power and the storage capacity of the cloud lends our future a considerable degree of possibility. And with data[…]
Read moreIs South Australian NBN Right for Your Business?
The National Broadband Network (NBN) is one of the most advanced and expensive technical projects in Australian history – but is it the best option for your business? We’ve broken down the NBN facts to help you understand what is happening, why it’s happening and whether it will help you. So, first things first, what is the NBN? Simply put, the NBN is about providing all Australian homes and businesses with access to high-speed[…]
Read moreChristmas Gift Ideas For Tech Heads
Are you stuck for Christmas gift ideas for that tech-savvy guy or gal in your life? You know the person we’re talking about. They’re the ones sporting the latest model iPhone paired with the matching watch that does everything except the wash the dishes. Connected to multiple other devices (think iPad, Macbook) and all backed up to the most impressive (and complex looking) home office computer and entertainment system you’ve ever laid eyes on. They’re[…]
Read moreTelstra Business Partner of the Year 2016: Wireless Communications
Telstra Business Partner of the Year 2016: Wireless Communications Wireless Communications has been named the 2016 Telstra Business Partner of the Year nationally, in recognition of their approach to expert, tailored ICT solutions for business. Wireless Communications, based in Adelaide, South Australia, was named ahead of telecommunications businesses right around Australia, an achievement General Manager Nathan Freeman says reinforces their approach to customer-centred service. “This award gives us the confidence that we are doing all[…]
Read moreWhat is ‘The Cloud’?
What is ‘The Cloud’? Is it condensed water vapour floating high above us? Is it just a trendy tech thing? Is it safe? ‘The Cloud’. It’s possibly the most talked about but least understood technological advancement of this century. But ‘the Cloud’ is a safe, affordable, reliable and fast offsite data storage solution revolutionising the way we do business. What is ‘the Cloud’? Despite its name, ‘the Cloud’ isn’t mist floating above us in the[…]
Read more