Close Nav

All Blogs

IT News

Author: Cybernet

Test 1

Last 12 months

Tags

IT News

Number of blogs returned: 61 to 80 records of 130

64% of organizations have experienced one or more compromising endpoint attacks.


Thumbnail for 64% of organizations have experienced one or more compromising endpoint attacks.

Endpoints make up much of a company’s network and IT infrastructure. This is a collection of computers, mobile devices, servers, and smart gadgets. As well as other IoT devices that all connect to the company network. The number of endpoints ...

Posted at 30 November 22

VoIP has become the norm. But are you using it as effectively as you could?


Thumbnail for VoIP has become the norm. But are you using it as effectively as you could?

Just five or six years ago, VoIP was still considered a “different” type of business phone system. One that wasn’t the norm. But the pandemic changed that way of thinking. Now internet-based phone systems aren’t simply the nor ...

Posted at 29 November 22

Salespeople spend approximately 34% of their time on administrative tasks.


Thumbnail for Salespeople spend approximately 34% of their time on administrative tasks.

Data entry can be a real drag for salespeople. The time they spend on administrative tasks is time away from customer interactions. But that data is vital. It’s important to capture customer orders, quotes, needs, and more. Lead and sales re ...

Posted at 25 November 22

81% of security incidents happen due to stolen or weak passwords.


Thumbnail for 81% of security incidents happen due to stolen or weak passwords.

It seems that nearly as long as passwords have been around, they’ve been a major source of security concern. Eighty-one percent of security incidents happen due to stolen or weak passwords. Additionally, employees continue to n ...

Posted at 21 November 22

Insider attacks have increased by 44% over the last two years.


Thumbnail for Insider attacks have increased by 44% over the last two years.

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. B ...

Posted at 18 November 22

20% of surveyed businesses have experienced a data breach connected to a former employee.


Thumbnail for 20% of surveyed businesses have experienced a data breach connected to a former employee.

Digital footprints cover today's modern workplace. Employees begin making these the moment they're hired. They get a company email address and application logins. They may even update their LinkedIn page to connect to your company. When an ...

Posted at 11 November 22

Last holiday season, typo-squatting domains increased by 397%


Thumbnail for Last holiday season, typo-squatting domains increased by 397%

The holiday shopping season is taking off. This means that scammers have also revved up their engines. They're primed and ready to take advantage of all those online transactions. Don’t forget to stay safe online during the buying frenzy ...

Posted at 04 November 22

Important Information re recent Data Breaches


Thumbnail for Important Information re recent Data Breaches

On the back of the recent events that have been in the media surrounding the like of the Optus, AFP, Woolworths and Medibank data breaches, its now more concerning than ever we need to be aware of the not only the best practices to help minimise your ...

Posted at 26 October 22

Think your business is too small for hackers to worry about? Think again!


Thumbnail for Think your business is too small for hackers to worry about? Think again!

Have you felt more secure from cyberattacks because you have a smaller business? Maybe you thought that you couldn’t possibly have anything that a hacker could want? Didn’t think they even knew about your small business. Well, a new re ...

Posted at 14 October 22

Trying to keep up with software vulnerabilities is like playing a game of Whack-a-Mole.


Thumbnail for Trying to keep up with software vulnerabilities is like playing a game of Whack-a-Mole.

Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a software release with millions of lines of code. Then, hackers look for loopholes that allow them to breach a system through that code. The develop ...

Posted at 07 October 22

Microsoft 365 has so many apps and features that it’s easy to miss some.


Thumbnail for Microsoft 365 has so many apps and features that it’s easy to miss some.

Microsoft 365 is the most popular of all major office productivity software. It has 48.8% of the global market share, just edging out Google’s apps, by a couple of percentage points. It’s used by individuals, small & mid-sized busi ...

Posted at 30 September 22

Is your digital workplace looking like more of a disconnected cloud mess?


Thumbnail for Is your digital workplace looking like more of a disconnected cloud mess?

The pandemic has been a reality that companies around the world have shared. It required major changes in how they operate. No longer, did the status quo of having everyone work in the office make sense for everyone. Many organizations had to quickly ...

Posted at 26 September 22

Without IT policies in place, your office is like the Wild West


Thumbnail for Without IT policies in place, your office is like the Wild West

Many small businesses make the mistake of skipping policies. They feel that things don’t need to be so formal. They’ll just tell staff what’s expected when it comes up and think that’s good enough. But this way of thinking ...

Posted at 16 September 22

Do you still have a computer running Internet Explorer?


Thumbnail for Do you still have a computer running Internet Explorer?

One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools replace those that are obsolete.  Discontinued technology can leave computers and networks vulnera ...

Posted at 09 September 22

63% of high-growth companies utilize a “productivity anywhere” hybrid work approach. 63% of high-growth companies utilize a “productivity anywhere” hybrid work approach.


Thumbnail for 63% of high-growth companies utilize a “productivity anywhere” hybrid work approach. 63% of high-growth companies utilize a “productivity anywhere” hybrid work approach.

“Hybrid office” is the new buzzword you’ll hear used in business discussions. It’s the mix of having employees both working at the office and working from home. This has become more than a buzzword and is now the reality for m ...

Posted at 19 August 22

Did you just receive a text message from yourself?


Thumbnail for Did you just receive a text message from yourself?

How many text messages from companies do you receive today as compared to about two years ago? If you’re like many people, it’s quite a few more. This is because retailers have begun bypassing bloated email inboxes. They are urging con ...

Posted at 15 August 22

Guess which browser just bumped Firefox out of the #3 spot?


Thumbnail for Guess which browser just bumped Firefox out of the #3 spot?

One of the most important applications we choose is our internet browser. When on a computer or a mobile device, we work in that most of the time because many applications are now cloud-based, so accessing them means going through your browser. Ov ...

Posted at 05 August 22

Are virtual desktops a benefit over traditional hardware?


Thumbnail for Are virtual desktops a benefit over traditional hardware?

While many companies have moved most of their workflows to the cloud, there is still a key component of office operations that is location-based. This would be employee computers. Most companies still rely on desktops and laptops to allow employee ...

Posted at 05 August 22

About 36.5% of organizations were impacted by mobile malware in 2020


Thumbnail for About 36.5% of organizations were impacted by mobile malware in 2020

Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable and can be used from anywhere. We’re seeing the takeover of many activities that used to ...

Posted at 28 July 22

That last unexpected system reboot may not be a glitch.


Thumbnail for That last unexpected system reboot may not be a glitch.

Approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware attack. Malware is an umbrella term that encompasses many different types of malicious code. It can include: Viruses R ...

Posted at 26 July 22