Search
Close this search box.

BLOG

Wireless Communications Insights

We want to share our passion and expertise with you!

Keep up-to-date with the latest knowledge, thoughts & opinions on all things ICT & Telecommunications …

Devices connected to storage in the data center , tablet, phone home devices with an online . Cloud technology, computing. Generative AI.

Social Distancing for Computers

Like humans, computers can catch viruses. However, while it might take months or years for a network of humans to completely spread a virus, a network of computers can be infected within minutes. The average small business has a computer network in which every device can speak to every other

Read More »
Blog echidna.guest

echidna.guest

We all have experienced it when visiting an office, the sign-in book. It comes in many shapes and forms, sometimes accompanied by a receptionist or a bell to ring. Often seen as an obligatory requirement to know who is on site, it is part of the visitor experience that is

Read More »
hacker 1446193 1920 1619x1080

What Hackers Want

What Hackers Want Nine Questions to Ask Yourself If you’re going to secure your business against cyber crime, it helps to first know what needs securing. Taking a moment to think like a hacker could be the difference between a cyber incident which is merely an annoyance and one which

Read More »
shutterstock 1402830170 1536x978

Why Antivirus Isn’t Enough

Why Anivirus isn’t Enough Antivirus software is an important part of every business’ cyber security solution, but it cannot be relied on to protect you from the wide variety of threats you face whenever you use the Internet. Here are three ways hackers can bypass malware scanning software. By Using

Read More »
shutterstock 1063994870 1536x922

Your Mobile Device Is A Target! And Here’s Why..

It’s no surprise that in the last few years, the amount we use our mobile devices (smartphones and tablets) has significantly increased. I know from looking at my iPhone’s screen time stats that I spend a significant amount of the day using all the great apps and tools that help

Read More »
Cybersecurity Images 1536x1024

Critical Vulnerability Found In Windows DNS Servers

‘SIGRed’, a 17-year old flaw in Windows Server, has been discovered by Check Point researcher Sagi Tzadik. If this vulnerability is exploited by an attacker, it will grant them Domain Administrator rights and full access to the entire corporate network. The vulnerability affects Windows Server versions 2003-2019. All of these

Read More »
Futuristic computer lab illuminates data in a row for speed generated by AI

We Are SA’s First Certified Secure SD-WAN Specialists

Today, many Australian businesses are adapting their network to leverage cloud-based services. In line with these changes, the conversation of WAN deployment has moved away from MPLS to SD-WAN deployments to take advantage of high bandwidth links and application prioritisation. Wireless Communications have assisted many customers with their migration to

Read More »
header padlock

Microsoft 2020 Security Updates

As part of continual security improvement, Microsoft planned to release a set of security updates which included automatic changes to certain security settings, having the potential to make breaking changes to business computers and networks. The changes were originally planned to be included in the March 2020 monthly Windows updates

Read More »
shutterstock 1452139706 1536x972

Be careful before you post that photo!

Modern cameras are a marvel. The quality of image that a new mobile phone camera can capture would be almost unthinkable a few short years ago. However, this quality makes it easy to accidentally reveal sensitive information when you post a photo to the Internet. An image you post to

Read More »
shutterstock 1045098334SMALL

Email Scams in 2020

The days of fake lotteries and Nigerian princes are not yet over, but a different type of scam is on the rise. These new scams take a more aggressive approach to parting victims from their money, and threaten personal or professional embarrassment unless a fee is paid, usually in a

Read More »
Night Office: Young Handsome Man in Working on Desktop Computer. Digital Entrepreneur Typing Code

Configuring Avaya for Remote Workers/Work From Home

Acquiring the Avaya Communicator Installation Files Wireless have made Communicator available to download from the following address: https://syn04ce.syd7.hostyourservices.net/~wireless/files/avaya-communicator-2.1.4.0.msi Installing Avaya Communicator The Avaya Softphone is a standard MSI installer package, savvy IT administrators may choose to automate this procedure, otherwise there are only minimal choices to make during installation and

Read More »
Businessman using smart phone to connect data information on cloud computing and communication online network. Business big data technology and internet social media concept.

The Internet of Things

The Internet of Things – When Smart Devices Aren’t So Smart The Internet has changed the world over the past 30 years, and mostly for the better. Increased connectivity, increased convenience, and increased information is all available at our fingertips, 24 hours a day. So, it is only natural that

Read More »
Digital Security Password Protection

Making Passwords Easier

Passwords are hard to use… Too often, people are forced to choose between creating passwords that are easy to guess and passwords that are easy to remember. The problem becomes even worse when you consider the number of passwords a person uses from day to day, to access almost everything

Read More »
The Concept of Digital Technology and Cloud Security in Todays Highly Connected World Environment

Cyber Security 101

“Hackers hone their skills while consumers remain complacent” -Symantec, November 2016 press release. What is Cyber Security? Cyber Security is the practice of protecting systems, networks and programs from cyber threats. Why is Cyber Security important? While the digital era offers enormous opportunity for all of us, this increased connectivity

Read More »
closeup of Sales receipts on table ,

3 Smart Australian Business Tax Tips

As the clock counts down to Australian tax time there is often a feeling of apprehension mixed with relief for many businesses. True, there are dark days ahead and the desperate claw through boxes of receipts and checking to see the latest updates on taxation laws and allowances – but

Read More »
Cyber attack with unrecognizable hooded hacker using virtual reality, digital glitch effect

Darknet Glossary

The biggest ransomware cyber attack in the history of the Internet occurred in May 2017. It disabled the British healthcare system (NHS), crippled Spain’s largest mobile phone network (Telefonica) and disrupted train services throughout Germany – among many more victims worldwide. The ransomware, called WannaCry, is a form of malware that

Read More »
Explore the intricate world of big data with this stunning vector illustration, showcasing the binary code that powers our digital age.

Five Hacks Your Business Needs to Know About

Cloud computing and the Internet of Things are a magnificent leap for mankind and are set to be the future of the Internet as more manufacturers, business and enterprises are adopting these technologies. The ability to be connected and to make our lives easier and faster utilising the Internet of

Read More »
A light emitting diode or LED are small, durable and need little power.

Is South Australian NBN Right for Your Business?

The National Broadband Network (NBN) is one of the most advanced and expensive technical projects in Australian history – but is it the best option for your business? We’ve broken down the NBN facts to help you understand what is happening, why it’s happening and whether it will help you. So, first things first, what is

Read More »
Small wooden sleigh with Christmas presents on a laptop.

Christmas Gift Ideas For Tech Heads

Are you stuck for Christmas gift ideas for that tech-savvy guy or gal in your life? You know the person we’re talking about. They’re the ones sporting the latest model iPhone paired with the matching watch that does everything except the wash the dishes. Connected to multiple other devices (think

Read More »
WirelessComms 2016TelstraAwardWinner S

Telstra Business Partner of the Year 2016: Wireless Communications

Wireless Communications has been named the 2016 Telstra Business Partner of the Year nationally, in recognition of their approach to expert, tailored ICT solutions for business. Wireless Communications, based in Adelaide, South Australia, was named ahead of telecommunications businesses right around Australia, an achievement General Manager Nathan Freeman says reinforces

Read More »
sky clouds 1200x480

What is “The Cloud”?

Is it condensed water vapour floating high above us? Is it just a trendy tech thing? Is it safe? ‘The Cloud’. It’s possibly the most talked about but least understood technological advancement of this century. But ‘the Cloud’ is a safe, affordable, reliable and fast offsite data storage solution revolutionising

Read More »