Michael Feldbauer

(Page 1 of 2)   
« Prev
  
1
  2  Next »

I have been telling people this for years and now I feel somewhat vindicated but apparently, no one cares... Even with the Cambridge Analytica fallout and subsequent #DeleteFacebook campaigns, people still don’t seem to be concerned that what they post online will remain for life. Although I have seen a few people want to delete their history being concerned about the recent scandal the ...

With the recent events of cyclone Marcus hitting Darwin and causing some major damage, many business owners may have been caught off guard. The amount of destruction to key infrastructure such as power supply, water and road access caused significant outages in a number of areas where access to even assess damage was an issue. Restoration of power in certain areas took days and even then was not ...

Cybercriminals are finding new tactics and ways to infiltrate systems on a daily basis. When security professionals figure out one way to prevent a breach, the criminals have already found multiple new ways to circumvent the protocols in place. Staying on top of the latest threats and tactics is essential for any MSP that wants to make sure their clients are protected. With those realities ...

Remember when you were in school, there was always someone that their reputation came before them and not always in a good way.. Well much like school the internet has the same thing and a much longer memory. If your PC or mail server gets hacked and sends tens of thousands of emails the public IP address of your internet connection will get a bad reputation to the point other systems may not ...
It is amazing to see the terms that are defined for different types of attack as below. A more targeted form of phishing is known as ‘spear-phishing’. Rather than emailing many people at once, these emails are more targeted and are usually only sent to one person, and made to look like it’s from someone you know, and that the topic is relevant to you. Spear-phishing is used to ...

SMS Phishing


Phishing - (the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.) Phishing is not just limited to emails. Many cyber criminals are now phishing people via text message.People more likely to click on a link in an SMS than they are in an email- it feels more ...

As a kid and even in my twenties I loved a good SPAM sandwich or SPAM on toast. Now after 30 years in the ICT Industry SPAM has a whole different meaning and is certainly not as appetising as it used to be. Spam email is a form of commercial advertising which is economically viable because email is a very cost-effective medium for the sender. If just a fraction of the recipients of a spam message ...

What is VoIP


What is VoIP VoIP stands for Voice over Internet Protocol. It is also referred to as IP Telephony, Internet Telephony and Internet Calling. It is an alternative way of making phone calls that can be very cheap or completely free. The ‘phone’ part is not always present anymore, as you can communicate without a telephone set. VoIP has been named the most successful technology of the ...

Privacy Changes


PRIVACY CHANGESData breach notification will become mandatory as of February 2018 for all Australian entities required to comply with the Privacy Act 1988. When Federal Parliament passed the Privacy Amendment (Notifiable Data Breaches) Act 2017 last year, it started a process that means from February 22, 2018, all entities covered by the Australian Privacy Principles will have clear obligations ...

Why HTTPS Should Be Enabled on Your Website It’s good for search.Google’s algorithm requires sites to essentially battle it for top search rankings, two websites that could both rank for a user’s query, essentially running toward the finish line of top results. But what happens if there’s a tie? Do the sites battle it out in a “sudden death” round?It all goes ...
www.techsolutions.com.au www.brisbanetechsolutions.com.au www.broometechsolutions.com.au www.arafura.com.au www.connectedoffice.com.au www.connectedphone.com.au www.cctvcloud.com.au www.vbackup.com.au cybersecurity www.itblog.com.au atsg