News & Views

Five Tips to Ensure Your Data Remains Secure, Relevant and Accessible

by Lachie Dixon - Jul 4, 2019

Adopting a secure and accessible data management solution can protect your business from data theft, misplaced documents and can save employees hours of labour as files are readily accessible.

Read Post
0 Comments

TAGS: it security, cyber security, Data Security, Data Loss, Risk Management

Why Two-Factor Authentication and Password Policies Are Critical for Securing Your Business (and How To Implement Them)

by John Lane - Dec 19, 2018

In an era where the average cost of a single malware attack on a company has risen to a catastrophic $2.4 million, it's safe to say that cybersecurity has never been more important than it is right now. But at the same time, this demands the question: in a world where even large corporations like Yahoo and Uber can become victims overnight, what chance does your small business really have?

Read Post
0 Comments

TAGS: it security, cyber security, risk, end user, business, two factor authentication, passwords

Your Guide to the ASD Essential 8 Strategies (And How to Implement Them)

by John Lane - Nov 29, 2018

Cybersecurity attacks are a major threat to every business. That said, many businesses aren’t aware of the basics of how to protect themselves against these common threats. A breach in security can be catastrophic for a business’s reputation and bottom line.

Read Post
0 Comments

TAGS: it strategy, it security, cyber security, risk, strategy, tips, essential 8, webinar, implementation

Phishing Attacks: How to Instantly Spot an Email Scam

by John Lane - Sep 25, 2018

Not only are phishing scams incredibly common, they're also getting more believable and effective as time goes on. According to one recent study, a massive 76% of all organisations said that they experienced phishing attacks in 2017. Not only that, but the frequency rate of those attacks actually took a massive 65% leap compared to 2016.

Read Post
0 Comments

TAGS: it security, cyber security, scam, phishing, how to

Why an Information Technology Audit Is More Important Than You Probably Think

by John Lane - Aug 29, 2018

Being able to leverage the full power of modern technology is critical to the success of any business, but it's also a far more proactive affair than a lot of people realise.

Read Post
0 Comments

TAGS: it strategy, it security, IT systems, It monitoring, hybrid cloud, hybrid IT, private cloud, public cloud, digital workplaces, auditing

The 6 Major Ways That IT Is Disrupting the Retail Industry (and What You Can Do About Them)

by John Lane - Jul 24, 2018

To say that the retail industry in Australia is thriving is actually a little bit of an understatement. Retail sales in May of 2018 grew by 0.4%, well ahead of the original expectations of 0.3%. This means that, according to the Australian Bureau of Statistics, sales came at around $26.67 billion when all seasonal adjustment are accounted for. 

Read Post
0 Comments

TAGS: it security, trends, Retail, hybrid IT, digital workplaces, modern workplace, industry, customer experience

Powernet Ranks 5th Best MSP in Australia

by John Lane - Jul 19, 2018

At Powernet, we've always worked hard to become more than just another managed service provider. We understand how important IT truly is in the modern era, both in terms of your business and the value that it allows you to provide to your audience. That's why every decision we make ultimately begins with that which matters most in mind: our customers.

Read Post
0 Comments

TAGS: it security, cyber security, IT systems, powernet, MSP, hybrid cloud, hybrid IT, managed service provider

The Advantages and Disadvantages of a Hybrid IT Strategy

by John Lane - Jul 11, 2018

A hybrid IT environment, as its name suggests, is a combination of resources that are on-premises and in the cloud. The best hybrid IT strategy, as a result, focuses on the services that orchestrate the way these two platforms work together and allows them to act in a much more powerful way than either one could be on its own.

Read Post
0 Comments

TAGS: it strategy, it security, MSP, hybrid cloud, hybrid IT, managed service provider, digital workplaces, modern workplace, in-house, outsourced

Australia’s Data Breach Notification Laws Part 4: What's Next?

by John Lane - Jun 21, 2018

Now that we’ve reached the end of this four-part series on Australia's new data breach notification laws, the only thing left to do is to tie it all together: which means getting started on building a better, stronger business that is better able to counter cybersecurity risks as much as possible.

Read Post
0 Comments

TAGS: it strategy, it security, cyber security, disaster recovery planning, leadership, IT systems, legislation, business continuity planning, risk, notifiable data breaches scheme

Australia’s Data Breach Notification Laws Part 3: Developing a Data Breach Response Plan

by John Lane - Jun 18, 2018

Now that you're aware of what the data breach laws mean and how to protect your business, it's time to focus on arguably the most important cybersecurity task: developing a data breach response plan for when that terrible day finally arrives.

Read Post
0 Comments

TAGS: it strategy, it security, cyber security, disaster recovery planning, leadership, IT systems, legislation, business continuity planning, risk, notifiable data breaches scheme