<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">

	<channel>
		<title><![CDATA[ICT Insight | Darwin Blog - Articles]]></title>
		<link>https://www.itblog.com.au</link>
		<description><![CDATA[Technology blog site for Darwin and Northern Territory based companies to read about technology without all the heavy technical details. We aim to provide useful articles, advice and information to assist in working out where your business needs to be with Information Technology and Communications in the workplace. Topics that we will cover, SPAM, Exploits, Security, CCTV General IT, Cloud, Mobile Devices, Telephony, Communications, Software, Business Process and many more topics that you need to assist in developing your business.]]></description>
		<language>en-us</language>
		<copyright><![CDATA[https://www.itblog.com.au]]></copyright>
		<generator>N/A</generator>
		<webMaster>help@web365.com.au</webMaster>
		<lastBuildDate>Mon, 02 Mar 2020 20:48:22 ACST</lastBuildDate>
		<ttl>20</ttl>
		<item>
			<title><![CDATA[Once it&#039;s out there you can never get it back.......]]></title>
			<link>https://www.itblog.com.au/articles/23/1/Once-its-out-there-you-can-never-get-it-back/Page1.html</link>
			<description><![CDATA[<p>I have been telling people this for years and now I feel somewhat vindicated but apparently, no one cares...</p>
<p>Even with the Cambridge Analytica fallout and subsequent #DeleteFacebook campaigns, people still don&rsquo;t seem to be concerned that what they post online will remain for life.</p>
<p>Although I have seen a few people want to delete their history being concerned about the recent scandal the majority of users haven&rsquo;t altered their settings and advertisers appear to be staying put.</p>
<p>The recent focus has been on Facebook due to the Cambridge Analytica issues however the bigger issue I see is Google who basically scrapes, searches and indexes everything on the internet.</p>
<p>They are like the sleeping giant sitting back watching everything, never missing out on anything that is published, just waiting for the right time to pounce as they will have recorded every site you have been to, everything you have ever searched for and every place you have been.</p>
<p>Now with over 55% of the worlds smartphones running Andriod over IOS, the release of Google Home devices, integration with other smart appliances who is really collecting more data, google of Facebook.</p>
<p>At least with Facebook you have a choice as to what you post, Google collects everything you do as I cannot think of anyone I know that does not use Google Searchr</p>
<p>Something to think about maybe ??</p>
<p>Never forget that anything you post, comment on, respond to or like will be stored for life as part of your digital footprint.</p>
<p>Now to remove the tin foil hat and back to work..</p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Sat, 14 Apr 2018 06:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/23/1/Once-its-out-there-you-can-never-get-it-back/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[Keeping Your Business Running in a Disaster]]></title>
			<link>https://www.itblog.com.au/articles/22/1/Keeping-Your-Business-Running-in-a-Disaster/Page1.html</link>
			<description><![CDATA[<p>With the recent events of cyclone Marcus hitting Darwin and causing some major damage, many business owners may have been caught off guard.</p>
<p>The amount of destruction to key infrastructure such as power supply, water and road access caused significant outages in a number of areas where access to even assess damage was an issue.</p>
<p>Restoration of power in certain areas took days and even then was not fully functional with ongoing outages as further repairs were undertaken.</p>
<p>During the cyclone we assisted a number of business clients that had plans in place fill up generators that had been running, ensuring systems were still online as sites with multiple offices outside of Darwin still needed to be operational and finally then work with business to assess damage and provide recovery strategies.</p>
<p>Many people were prepared, not just two days before but had a plan in place, systems ready to go and equipment on standby.</p>
<p>Some of these clients came unstuck with simple things such as below;</p>
<p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Keys to refuel generators</p>
<p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Blocked building access due to fallen trees</p>
<p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Building access due to failed security system batteries</p>
<p>No matter how much planning you undertake there are a couple of small things that are bound to trip you up. We at Territory Technology Solutions have modified our Disaster Recovery Plans due to a number of small issues we ran into.</p>
<p>Like the equipment needed to keep the business going Disaster Recovery Plans should be constantly tested and they should evolve with the business, risks need to be assessed that may impact the ability for the plan to be enacted.</p>
<p>For us during the cyclone the availability of fuel was a key issue to keep our generators going as the service stations in the immediate proximity of the building were all out of action with no power.</p>
<p>We have now made changes to our plan and spent $300 to have available 200 Litres of fuel in house, which will provide another 48 hours of operation.</p>
<p>There are many things to consider, plan for and continually test. Territory Technology Solutions has been providing such services for our clients for the last 19 years and have established a huge knowledge bank of data that may assist you and your business.</p>
<p>Contact us on 08 8944 2222 to discuss options that may assist you.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Sat, 14 Apr 2018 05:30:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/22/1/Keeping-Your-Business-Running-in-a-Disaster/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[2018 Cyber Attack Trends from Webroot]]></title>
			<link>https://www.itblog.com.au/articles/21/1/2018-Cyber-Attack-Trends-from-Webroot/Page1.html</link>
			<description><![CDATA[<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">Cybercriminals&nbsp;are finding new tactics and ways to infiltrate systems on a daily basis. When security professionals figure out one way to prevent a breach, the criminals have already found multiple new ways to circumvent the protocols in place. Staying on top of the latest threats and tactics is essential for any MSP that wants to make sure their clients are protected.</p>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">With those realities in mind,&nbsp;<a href="https://www.webroot.com/us/en" style="box-sizing: border-box; background-color: transparent; color: #008d4a;">Webroot</a>&nbsp;recently released its&nbsp;<a href="https://www-cdn.webroot.com/6515/2168/8585/Webroot_2018_Threat_Report_US.pdf" style="box-sizing: border-box; background-color: transparent; color: #008d4a;">2018 Webroot Threat Report</a>. It presents analysis, findings, and insights from the Webroot Threat Research team on the state of cyber threats. The company claims that the report analyzed more than 27 billion URLs, 600 million domains, 4.3 billion IP addresses, 62 million mobile apps, 15 billion file behavior records, and 52 million connected servers.</p>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">The report definitely shows that attackers are learning just as quickly as security professionals, and are finding new ways to breach networks. Some of the most common attacks were analyzed in the report, including polymorphic attacks, cryptojacking, ransomware, and phishing.</p>
<h3 style="box-sizing: border-box; font-family: sofia-pro, sans-serif; font-weight: bold; line-height: 1.1em; color: #555555; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">Polymorphic attacks</h3>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">As security programs and professionals continue to learn how to find and detect malware, attackers are finding new ways to hide it. Polymorphic attacks can be especially difficult to combat because the signatures that can be used to identify it are constantly updating and changing. According to the report, more than 94% of all malicious executables are polymorphic. Supporting this claim is the fact that in 2017, 93% of the malware encountered was seen on only one machine, meaning the signature changed enough from machine to machine that each variant was only able to be detected once.</p>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">The report claims that upgrading all business devices to Windows 10, which offers greater security than previous versions, is a great way to combat the spread of polymorphic attacks.&nbsp; According to the report, combined with advanced endpoint protection that uses behavioral analysis and machine learning, adopting Windows<br style="box-sizing: border-box;" />10 can greatly reduce enterprises&rsquo; vulnerability to cyberattacks.</p>
<h3 style="box-sizing: border-box; font-family: sofia-pro, sans-serif; font-weight: bold; line-height: 1.1em; color: #555555; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">Cyrptojacking</h3>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">As a relatively new threat on the scene, crytpojacking is quickly becoming a very serious threat. Based on early reports, this threat is becoming quite popular because it is highly profitable and easy to implement. Instead of hijacking someone&rsquo;s files in exchange for money, like ransomware attacks, the attacker simply utilizes the victims CPU power to mine crytpocurrency. Since this form of attack is mostly invisible to the end user, the system could be compromised for quite some time before it is found.</p>
<h3 style="box-sizing: border-box; font-family: sofia-pro, sans-serif; font-weight: bold; line-height: 1.1em; color: #555555; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">Ransomware</h3>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">Although<span>&nbsp;</span><a href="https://www.channele2e.com/technology/security/ransomware-should-you-pay-the-ransom/" style="box-sizing: border-box; background-color: transparent; color: #008d4a;">ransomware</a><span>&nbsp;</span>has been around for a while, it is still an extremely popular form of attack. Just last year we witnessed the most widespread ransomware attacks to date. WannaCry and NotPetya were both extremely destructive and together they were able to&nbsp;infect more than 200,000 machines in more than 100 countries, all within just 24 hours.</p>
<h3 style="box-sizing: border-box; font-family: sofia-pro, sans-serif; font-weight: bold; line-height: 1.1em; color: #555555; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">Phishing</h3>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">One of the<span>&nbsp;</span><a href="https://www.msspalert.com/cybersecurity-breaches-and-attacks/phishing/google-docs-gmail-phishing-attack-need-know/" style="box-sizing: border-box; background-color: transparent; color: #008d4a;">most successful</a><span>&nbsp;</span>phishing attacks occurred&nbsp;during 2017. The email that claimed to be a Google Doc from a trusted contact claimed a lot of victims. The main reason it was so successful was that it was highly targeted, and used social engineering to convince the user the email was from a legitimate source. The report from Webroot also found that almost 25% of phishing sites used IP masking, which makes it more difficult to discern the actual IP address of the domain. Another common tactic is to use benign domain names and replace a single web page with phishing content. When inserted as a disconnected, isolated page (i.e. no pages on the site point to the phishing page, nor does the phishing page point to any other pages on the site), it is nearly impossible for crawlers to detect the phishing threat.</p>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">There are several more insights into the latest threats and how to combat them within the report. You can<span>&nbsp;</span><a href="https://www-cdn.webroot.com/6515/2168/8585/Webroot_2018_Threat_Report_US.pdf" style="box-sizing: border-box; background-color: transparent; color: #008d4a;">view the report</a>from Webroot on<span>&nbsp;</span><a href="https://www-cdn.webroot.com/6515/2168/8585/Webroot_2018_Threat_Report_US.pdf" style="box-sizing: border-box; background-color: transparent; color: #008d4a;">their website</a>. However, they recommend, not only making sure operating systems are completely up to date, but organizations should also be using automated, real-time decisionmaking based on continuously-updated threat intelligence, contextual analysis and advanced endpoint and network protection. When coupled with strong user security training, any organization can materially reduce its exposure to unacceptable risk, according to Webroot.</p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Sat, 14 Apr 2018 05:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/21/1/2018-Cyber-Attack-Trends-from-Webroot/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[Internet Reputation]]></title>
			<link>https://www.itblog.com.au/articles/19/1/Internet-Reputation/Page1.html</link>
			<description><![CDATA[<p>Remember when you were in school, there was always someone that their reputation came before them and not always in a good way..</p>
<p>Well much like school the internet has the same thing and a much longer memory.</p>
<p>If your PC or mail server gets hacked and sends tens of thousands of emails the public IP address of your internet connection will get a bad reputation to the point other systems may not accept email from you.</p>
<p>Your public facing Website may get hacked and hidden pages are created that can be used for delivering malicious content via the emails I have warned you not to open.</p>
<p>These types of issues can be very harmful to your Internet Reputation which will impact access to sites, email and a number of things you depend on daily.&nbsp; Many smart firewalls will now simply block connections to sites purely based on reputation scoring.</p>
<p>Sites such as the below are used to check how your IP Address, Email Domain and WebPages appear to the outside world, many you can subscribe to for automatic alerting if you are added and it is key to protecting your Internet Reputation;</p>
<p>WatchGuard Reputation Enabled Defense - Firewall based reporting &amp; blocking for IP Addresses, Countries (Geo) and Content.<br /><a>http://www.reputationauthority.org/</a></p>
<p>SPAM Database lookup - Check to see if your IP Address is listed a SPAM Sender.<br /><a href="https://www.dnsbl.info/dnsbl-details.php">https://www.dnsbl.info/dnsbl-details.php</a><br /><a href="http://www.mxtoolbox.com">http://www.mxtoolbox.com</a></p>
<p>BrightCloud Threat Intelligence - Website &amp; Content Reputation<br /><a href="http://www.brightcloud.com/tools/url-ip-lookup.php">http://www.brightcloud.com/tools/url-ip-lookup.php</a></p>
<p>There are lots more ways to check, this is to provide a snippet of what can prevent you accessing or emailing content.</p>
<p>Contact us further if you need assistance in checking your Internet Reputation - helpme@itblog.com.au</p>
<p></p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Sun, 04 Feb 2018 12:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/19/1/Internet-Reputation/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[Spear-Phishing]]></title>
			<link>https://www.itblog.com.au/articles/18/1/Spear-Phishing/Page1.html</link>
			<description><![CDATA[<p>It is amazing to see the terms that are defined for different types of attack as below.</p>
<p><img src="http://www.itblog.com.au/content_images/images/SPAM Examples/Phishing vs Spear-Phising.jpg" alt="" constrain="true" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p></p>
<p>A more targeted form of phishing is known as &lsquo;spear-phishing&rsquo;. Rather than emailing many people at once, these emails are more targeted and are usually only sent to one person, and made to look like it&rsquo;s from someone you know, and that the topic is relevant to you. <br /><br />Spear-phishing is used to target employees by impersonating senior executives asking for funds transfers. This is also known as &lsquo;wire fraud&rsquo;.<br /><br />They usually ask the target to make a wire funds transfer for them- or confidential information (eg tax details). By making the email appear to come from a very senior person, they are hoping you&rsquo;ll action it quickly without verifying the request.</p>
<p>In recent weeks through our Helpdesk we have seen a huge increase in very personalised emails for smaller amounts of money targeting small companies.&nbsp; <br /><br />Many businesses have lost large amounts of money due to spear-phishing- eg Irish airline, Ryanair, lost $5 million to this type of scam.<br /><br />Raising awareness of these scam emails with employees (especially Personal Assistants or payment authorisers) is important to reduce this risk. If you receive a request like this, simply call the person (on a known number) to confirm they requested the transfer.<br /><br /></p>
<p><img src="http://www.itblog.com.au/content_images/images/SPAM Examples/Spear-Phishing.png" alt="Spear Phishing Example" constrain="true" style="display: block; margin-left: auto; margin-right: auto;" /></p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Wed, 24 Jan 2018 08:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/18/1/Spear-Phishing/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[SMS Phishing]]></title>
			<link>https://www.itblog.com.au/articles/17/1/SMS-Phishing/Page1.html</link>
			<description><![CDATA[<p><strong>Phishing - </strong>(the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.)</p>
<p>Phishing is not just limited to emails. Many cyber criminals are now phishing people via text message.<br /><br />People more likely to click on a link in an SMS than they are in an email- it feels more personal and intended for them.<br /><br /></p>
<p><img src="http://www.itblog.com.au/content_images/images/SPAM Examples/SMSPhising.JPG" alt="SMS Phishing" constrain="true" /></p>
<p>In some cases we have seen malware / malicious applications delivered using this method.&nbsp;</p>
<p>The phone is then hijacked and the hackers monitor access to accounts such as online banking and then logon using your credentials.</p>
<p>To prevent this you need to check the content for validity, remember the Banks, Government and other Large Corporates will not as for personal details via SMSM.</p>
<p>Virus protection should also be installed on your mobile devices.</p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Wed, 24 Jan 2018 08:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/17/1/SMS-Phishing/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[What is SPAM and how do I avoid it?]]></title>
			<link>https://www.itblog.com.au/articles/16/1/What-is-SPAM-and-how-do-I-avoid-it/Page1.html</link>
			<description><![CDATA[<p>As a kid and even in my twenties I loved a good SPAM sandwich or SPAM on toast.</p>
<p>Now after 30 years in the ICT Industry SPAM has a whole different meaning and is certainly not as appetising as it used to be.</p>
<p>Spam email is a form of commercial advertising which is economically viable because email is a very cost-effective medium for the sender. If just a fraction of the recipients of a spam message purchase the advertised product, the spammers are making money and the spam problem is perpetuated.</p>
<p>Spammers harvest recipient addresses from publicly accessible sources, use programs to collect addresses on the web, and simply use dictionaries to make automated guesses at common usernames at a given domain.</p>
<p>At the present more than 95% of email messages sent worldwide is believed to be spam, making spam fighting tools increasingly important to all users of email.</p>
<p>Did you know that good / clean emails are referred to as HAM..&nbsp;</p>
<p><strong>Spam and viruses</strong></p>
<p>Spam is increasingly sent from computers infected by computer viruses. Virus-makers and spammers are combining their efforts to compromise innocent computer users&rsquo; systems and converting them into spam-sending &ldquo;drones&rdquo; or &ldquo;zombies&rdquo;. These malicious programs spread rapidly and generate massive amounts of spam pretending to be sent from legitimate addresses.</p>
<p>It&rsquo;s important for all computer owners to install and maintain anti-virus software to avoid having their computer infected and possibly become a source of spam without their knowing.</p>
<p>&nbsp;</p>
<p><strong>Effects of spam</strong></p>
<p>Aside from the amount of junk arriving in the Inboxes of millions of innocent email users every day, spam can have a more indirect and serious effect on email services and their users.</p>
<p>Hijacking of real users&rsquo; addresses or email accounts is also common. Typically these messages will have the From field showing something like &ldquo;Australian ATO Collections&rdquo; <a href="mailto:info@hotmail.com">info@hotmail.com</a> and it is very important to check that the email address has some relationship to the identity the email is coming from.</p>
<p>Several email users have been affected by falsified messages claiming to be from the service&rsquo;s administrators, stating that users&rsquo; account are closed and require some action by the user to be reopened. Such messages often contain viruses and should be ignored or deleted.</p>
<p>When hijackers succeed in sending spam via an email services, it can be temporarily blocked by other services and private domains who try to protect themselves. Providers such as Arafura Connect do everything we can to prevent this, but it&rsquo;s important that email users protect their own account with strong passwords to prevent their account being hijacked.</p>
<p>&nbsp;</p>
<p><strong>Phishing</strong></p>
<p>An increasingly common phenomenon is &ldquo;phishing&rdquo;, where messages appearing to be sent from e.g. legitimate financial institutions attempt to trick recipients into &ldquo;verifying&rdquo; sensitive data (such as credit card information) on fraudulent web sites.</p>
<p>Legitimate services will rarely (if ever) send messages requesting you to click a link and provide personal or sensitive information. Be sure to verify the source of the message before complying with such a request.</p>
<p>Check out our article here for more details on the embedded content.</p>
<p><a href="http://www.itblog.com.au/articles/11/1/False-Emails---How-To-Check/Page1.html">http://www.itblog.com.au/articles/11/1/False-Emails---How-To-Check/Page1.html</a></p>
<p></p>
<p></p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Wed, 17 Jan 2018 17:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/16/1/What-is-SPAM-and-how-do-I-avoid-it/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[What is VoIP]]></title>
			<link>https://www.itblog.com.au/articles/15/1/What-is-VoIP/Page1.html</link>
			<description><![CDATA[<p><strong>What is VoIP</strong></p>
<p>VoIP stands for Voice over Internet Protocol. It is also referred to as IP Telephony, Internet Telephony and Internet Calling. It is an alternative way of making phone calls that can be very cheap or completely free. The &lsquo;phone&rsquo; part is not always present anymore, as you can communicate without a telephone set. VoIP has been named the most successful technology of the last decade. <br />VoIP has a lot of advantages over the traditional phone system, one of the biggest being it can be typically connected over any Public internet service.<br />The main reason for which people are so massively turning to VoIP technology is the cost. In businesses, VoIP is a way to cut down communication cost, add more features to communication and interaction between employees and with customers so that to render the system more efficient and of better quality. For individuals, VoIP is not only the things that have revolutionised voice calling worldwide, but it is also a means to have fun communicating through computers and mobile devices for free.</p>
<p><br />One of the pioneering services that made VoIP so popular is Skype. It has allowed people to share instant messages and make voice and video calls for free worldwide. <br />Many corporate phone systems support VoIP out of the box with some configuration you can have your office connected for fixed monthly fee including calls.</p>
<p><br /><strong>The VoIP Trend</strong><br />VoIP is a relatively new technology and it has already achieved wide acceptance and use. There is still a lot to improve and it is expected to have major technological advances in VoIP in the future. It has so far proved to be a good candidate for replacing the POTS (Plain Old Telephone System) and ISDN (Integrated Digital Services Network) <br /><br />It, of course, has drawbacks along with the numerous advantages it brings; and its increasing use worldwide is creating new considerations surrounding its regulations and security.<br />The public is getting more and more conscious of the advantages they can reap from VoIP at home or in their businesses.</p>
<p>Combined with the rollout of the NBN and Telstra&rsquo;s decision to cut all copper networks VoIP is the logical choice for Business to move forward.<br /><br />For more information contact Territory Technology Solutions - 08 89442222 to discuss what can be done with your existing phone system.</p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Sun, 14 Jan 2018 15:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/15/1/What-is-VoIP/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[Privacy Changes]]></title>
			<link>https://www.itblog.com.au/articles/14/1/Privacy-Changes/Page1.html</link>
			<description><![CDATA[PRIVACY CHANGES<br /><br />Data breach notification will become mandatory as of February 2018 for all Australian entities required to comply with the Privacy Act 1988. When Federal Parliament passed the Privacy Amendment (Notifiable Data Breaches) Act 2017 last year, it started a process that means from February 22, 2018, all entities covered by the Australian Privacy Principles will have clear obligations to report eligible data breaches within 30 days. If an eligible data breach is confirmed, entities must provide a statement to each of the individuals whose data was breached or who are at risk, and notify the Office of the Australian Information Commissioner (OAIC).<br /><br /><br />]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Tue, 02 Jan 2018 06:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/14/1/Privacy-Changes/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[SSL Protected Websites, What and Why ?]]></title>
			<link>https://www.itblog.com.au/articles/13/1/SSL-Protected-Websites-What-and-Why-/Page1.html</link>
			<description><![CDATA[<p><strong>Why HTTPS Should Be Enabled on Your Website</strong></p>
<p><strong>It&rsquo;s good for search.</strong><br />Google&rsquo;s algorithm requires sites to essentially battle it for top search rankings, two websites that could both rank for a user&rsquo;s query, essentially running toward the finish line of top results. <br />But what happens if there&rsquo;s a tie? Do the sites battle it out in a &ldquo;sudden death&rdquo; round?<br />It all goes back to the idea that Google is constantly solving for the user, and makes frequent changes to its algorithm that create a better experience. Which is why our next point makes sense.<br /><br /><strong>It&rsquo;s better for users.</strong><br />SSL helps to prevent these &ldquo;man-in-the-middle&rdquo; attacks -- &ldquo;a form of eavesdropping where communication between two users is monitored and modified by an unauthorised party&rdquo; -- and keeps user information secure.<br /><br />That makes https especially important if your website accepts credit cards or has a login functionality. With so many of these hacking incidents making headlines, users want to know that your brand is making an effort to protect them from their private information being stolen or compromised.<br /><br />user privacy = important<br />https = good for privacy<br /><br /><strong>SSL is required for AMP</strong>.<br />A few pieces of vocabulary to break down here:<br /><br />&ldquo;AMP&rdquo; stands for Accelerated Mobile Pages. It&rsquo;s the technology that makes certain pages load almost instantaneously on mobile. So, when you search for something on your mobile device through Google, you might notice that some results have a lightning bolt icon next to it, that means that it&rsquo;s AMP-ready.<br /><br /></p>
<p><strong>Google is indexing mobile.</strong><br />So, that thing we just said about the importance of mobile? It turns out, Google is actually going to start indexing mobile, which means that its &ldquo;algorithms will eventually primarily use the mobile version of a site&rsquo;s content to rank pages from that site.&rdquo;<br />But in order for a mobile site to be indexable, Google recommends several best practices, one of which is to &ldquo;start by migrating to a secure site,&rdquo; especially &ldquo;if [you] don&rsquo;t support HTTPS yet.&rdquo;<br /><br /><strong>Not secure.</strong><br />To elaborate -- In 2017, Chrome 56 will start displaying &ldquo;not secure&rdquo; in the browser bar for any http (notice it&rsquo;s missing the &ldquo;s&rdquo;) sites that ask users for login or credit card information.<br /><br />I don&rsquo;t know about you, but when I&rsquo;m about to make an online purchase and see that the site isn&rsquo;t secure -- for example, that the padlock icon in the browser bar is broken -- I navigate my business elsewhere. And I&rsquo;m not alone. In fact, only 3% of online shoppers say they would enter their credit card information on a site without the green padlock.<br /><br />Imagine if Google starts doing that work for users before they can even get to checkout. If the number is as low as 3% now, before search engines start doing the legwork to label sites as &ldquo;not secure&rdquo; before anyone even visits them, you can see how traffic to those sites will suffer a huge blow -- as well as its digital sales revenue.</p>
<p>The long and the short of all the above is you need for your web site provider / developer to update your site, purchase a SSL Certificate and secure your website, don't act and miss out...</p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Thu, 28 Dec 2017 12:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/13/1/SSL-Protected-Websites-What-and-Why-/Page1.html</guid>
		</item>
	</channel>
</rss>