<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=455441907967559&amp;ev=PageView&amp;noscript=1">

News & Views

Your Guide to the ASD Essential 8 Strategies (And How to Implement Them)

by John Lane - Nov 29, 2018

Cybersecurity attacks are a major threat to every business. That said, many businesses aren’t aware of the basics of how to protect themselves against these common threats. A breach in security can be catastrophic for a business’s reputation and bottom line.

Read Post
0 Comments

TAGS: cyber security, essential 8, strategy, it strategy, implementation, tips, webinar, risk, it security

Phishing Attacks: How to Instantly Spot an Email Scam

by John Lane - Sep 25, 2018

Not only are phishing scams incredibly common, they're also getting more believable and effective as time goes on. According to one recent study, a massive 76% of all organisations said that they experienced phishing attacks in 2017. Not only that, but the frequency rate of those attacks actually took a massive 65% leap compared to 2016.

Read Post
0 Comments

TAGS: cyber security, phishing, scam, how to, it security

Why an Information Technology Audit Is More Important Than You Probably Think

by John Lane - Aug 29, 2018

Being able to leverage the full power of modern technology is critical to the success of any business, but it's also a far more proactive affair than a lot of people realise.

Read Post
0 Comments

TAGS: hybrid IT, hybrid cloud, digital workplaces, public cloud, private cloud, It monitoring, IT systems, it security, it strategy, auditing

The 6 Major Ways That IT Is Disrupting the Retail Industry (and What You Can Do About Them)

by John Lane - Jul 24, 2018

To say that the retail industry in Australia is thriving is actually a little bit of an understatement. Retail sales in May of 2018 grew by 0.4%, well ahead of the original expectations of 0.3%. This means that, according to the Australian Bureau of Statistics, sales came at around $26.67 billion when all seasonal adjustment are accounted for. 

Read Post
0 Comments

TAGS: Retail, modern workplace, digital workplaces, hybrid IT, trends, industry, customer experience, it security

Powernet Ranks 5th Best MSP in Australia

by John Lane - Jul 19, 2018

At Powernet, we've always worked hard to become more than just another managed service provider. We understand how important IT truly is in the modern era, both in terms of your business and the value that it allows you to provide to your audience. That's why every decision we make ultimately begins with that which matters most in mind: our customers.

Read Post
0 Comments

TAGS: hybrid IT, hybrid cloud, MSP, managed service provider, powernet, IT systems, it security, cyber security

The Advantages and Disadvantages of a Hybrid IT Strategy

by John Lane - Jul 11, 2018

A hybrid IT environment, as its name suggests, is a combination of resources that are on-premises and in the cloud. The best hybrid IT strategy, as a result, focuses on the services that orchestrate the way these two platforms work together and allows them to act in a much more powerful way than either one could be on its own.

Read Post
0 Comments

TAGS: hybrid IT, hybrid cloud, managed service provider, it security, it strategy, MSP, digital workplaces, modern workplace, in-house, outsourced

Australia’s Data Breach Notification Laws Part 4: What's Next?

by John Lane - Jun 21, 2018

Now that we’ve reached the end of this four-part series on Australia's new data breach notification laws, the only thing left to do is to tie it all together: which means getting started on building a better, stronger business that is better able to counter cybersecurity risks as much as possible.

Read Post
0 Comments

TAGS: legislation, risk, business continuity planning, IT systems, leadership, disaster recovery planning, cyber security, it strategy, it security, notifiable data breaches scheme

Australia’s Data Breach Notification Laws Part 3: Developing a Data Breach Response Plan

by John Lane - Jun 18, 2018

Now that you're aware of what the data breach laws mean and how to protect your business, it's time to focus on arguably the most important cybersecurity task: developing a data breach response plan for when that terrible day finally arrives.

Read Post
0 Comments

TAGS: legislation, risk, business continuity planning, IT systems, leadership, disaster recovery planning, cyber security, it strategy, it security, notifiable data breaches scheme

Australia’s Data Breach Notification Laws Part 2: How to Protect Your Business

by John Lane - Jun 18, 2018

We've discussed what the notifiable data breach laws entail, why they exist, and why they'll be so important to both businesses and private citizens across the country moving forward. But to put it simply, no single mitigation strategy is guaranteed to A) apply to every type of business, or B) prevent every type of cybersecurity incident that you may encounter. 

Read Post
0 Comments

TAGS: legislation, risk, business continuity planning, IT systems, leadership, disaster recovery planning, cyber security, it strategy, it security, notifiable data breaches scheme

Australia’s Data Breach Notification Laws Part 1: What It Means and Why It Matters

by John Lane - Jun 14, 2018

It's official: the February 22, 2018 deadline has come and gone and Australia's new data breach notification laws are now in full effect. If you still feel unsure about what these new laws entail, or if you were only scarcely aware that they existed in the first place, don't worry — it’s not too late to be informed.

Read Post
0 Comments

TAGS: legislation, risk, business continuity planning, IT systems, leadership, disaster recovery planning, cyber security, it strategy, it security, notifiable data breaches scheme