Build your Business

Dorks Delivered, Brisbane's Award Winning IT Company

             Free Assesment 07 3166 5465          The Socials

Online Security

  • 14 Website Security Measures to Protect You From Hackers

    14 Website Security Measures to Protect You From Hackers

    Is Your Website Secure?

    Because of hackers, the Australian economy loses thousands of dollars annually on recovery costs alone. The number of offshore website security attacks significantly increased since 2005 because of the country’s high use of technology for social media, online government services, and banking. Your business could be next. 

     

  • 15 Biggest Data Breaches in the Last 15 Years

    15 Biggest Data Breaches in the Last 15 Years

    What Can You Do to Avoid Data Breaches?

    If you have read some of the most recent IT security news, whether in Australia or in any other parts of the world, you might have seen the number of data breach occurrences during the first half of 2019 alone. In fact, from January to July of this year, there has been a total of 1.6 billion records compromised due to the lack of proper IT security protocols. That’s a daily average of 7.6 million records in a span of 7 months

  • 5 Ways to Improve Small Business Security

    Simple Ways You Can Enhance Small Business Security

    How Can You Protect Your Company From Cyber Attacks?

    A report has shown that cybercriminals lean towards quieter attacks, targeting small businesses, but cyber attacks increased by 59% for 2018. And by the end of 2018, the number of attacks peaked at 80 per day, with an average of 62 for the whole year. These cyber-attacks damage businesses in many ways and many are unable to recover from the financial and reputational impact of a breach. To protect your company from the damaging effects of a cyberattack, it is essential to take small business security seriously.

  • Better Information Security for Accommodation Websites

    How Secure Is Your Website?Better Information Security for Accommodation Websites

    Australia’s hospitality industry is a perennial target of cybercriminals who will use any means necessary to gain valuable information. Some of their fraudulent activities are spoofing your website and creating fake accommodation deals. These ads often appear to be almost legitimate that the average customer, might not notice the difference between them and your own promotional offers. There are a lot more of these illegal activities that only an IT security consultant company may be able to identify for you.

  • Computer Backups During Covid-19

    Computer Backups During Covid-19

    We're in unreal, crazy times at the moment, and it has to be said that a lot of people are regretting their move to the cloud. A lot of people are loving it as well because they're going, "Huh, you know what? Sweet. I'm in the cloud, this is great. I can access everything from home." It is good.

    The problem that we've got is the loads that we've seen on the internet over the last few weeks haven't increased by 10% or 20% or 30%; it has increased by about 300%. And that means that we've seen lots of core business services going up and down, which is something that wouldn't happen if business owners spent the money on business-grade internet connections and kept their infrastructure local.

  • Cyber Security: Can We Really Be Safe?

    Can We Really Be Safe Online?man got scared of a hacker

    Today, we're going to talk about cybersecurity and whether we can ever be safe. Well, the short answer is no. However, we can try damn hard to be safe. We can be diligent and continue the game of cat and mouse to make sure that we're on top of it. The good news is crime, in general, is on the down, but online, there are a lot of risks. You can hold people, companies to ransom.

    One of the easiest ways to secure yourself is to make sure that you've got your stuff backed up and it's in an offsite location. If you've got a managed IT service provider, they can make sure that they're looking after that for you and they're backing it up onsite and remotely in your own private cloud. 

  • Cybersecurity

    How to integrate IT Cyber Security into your business

    Cybercriminals do not discriminate. No matter how big or small your company may be, you can become a victim of hacking, phishing and other cyber attacks. Learn how you can guarantee the security of your company’s data.

  • Don't Work From Home Without These Tips

    IT assistance, managed IT services, IT support,  Online Security

    I'm being serious, now, guys. I don't normally have this tone when I'm doing a podcast, but we're seeing so many IT companies that are just doing a poor job at setting up their remote workforces. There's been a 41.5% increase in the amount of businesses that are now open to threats. That's because they've been intentionally opened. Your business is like a box. If you have no light going into that box, nothing inside the box can spoil potentially. As soon as light starts going in, though, you can have bacteria and all sorts of things happen, and your business is exactly the same. Your business as a box, when you open up a door, you're going to let all sorts of nasties come in. I'll put a link in the description so you can see how much more, what they call RDP traffic, is out and around on the internet, which is a protocol that can be broken into.

  • How Can Apples and Oranges be the Same Price

    How Can Apples and Oranges be the Same Price

    How Can Apples and Oranges be the Same Price

    You can't compare apples with oranges and that's what it comes down to. We've been told this time and time again, don't compare apples with oranges. But the problem is people know what an apple looks like and people know what an orange looks like, but people don't know when they've bought a lemon. Pretty clever what I did there, I thought. Anyway, so what are we going to be talking about is removing and unveiling what's behind the curtains. This comes down to any service that isn't really tangible and you are led to believe that the person that you've got doing the service is doing a good job. Now, this can be bookkeepers, accountants, solicitors, lawyers, anything like that. IT people, marketers, SEO people, SCM people, ad-words people, all these people. Unless you're in the industry and you can double-check and cross-check what they're doing, you don't really know if the voodoo that they do is any good.

  • How Can Cyber Insurance and an IT Audit Protect You

    IT assistance, managed IT services, IT support,  Online Security

    You Have Cyber Insurance, Now What?

    Nowadays, businesses in Australia are more at risk of experiencing security breaches than ever before. With the numerous cyberattacks that occurred during the first half of 2019, there is no denying that the need for stricter security protocols is high. While you might feel safe, you should know that cybercriminals do not discriminate. No matter how big or small your business is, if they can find a way to use your information to earn money, they will do it, no matter how illegal or unethical it may be. This is why acquiring cyber insurance and complying with its terms is a must for every business.

  • How Do You Keep Your Business Secure Online?

    IT assistance, managed IT services, IT support,  Online Security

    How To Keep Your Business Secured Online?

    I'm in the security field where we have to keep many, many businesses safe online, day in, day out, 24 hours a day. It's obviously a really, really important idea to make sure your business is safe online. There are lots of free tools and utilities out there that can help you keep things safe. As the old adage goes, If you can't afford an expensive tool, wait until you see how much the price of a cheap tool will cost you. It can impact your business greatly. We see it all the time, where people don't have tools in place, to keep their business safe.

  • How Does a Network Security Audit Work?

    network security auditorIs Your Organisation Vulnerable to Cyberattacks?

    Network security should be a priority of business owners, especially with the recent cyberattacks in Australia. Without implementing robust security measures and protocols, organisations could become vulnerable to cyberattacks and lose important data. Avoid this mistake by getting a network security audit! It’s one of the best ways to ensure that your company’s network is in good shape.

  • How Important Is Information Security Policy in Your Business?

    How Important Is Information Security Policy in Your Business?

    How Protected Is Your Business From Cyber Crimes?

    As business owners in Australia are becoming more aware of surging cyber threats that could harm their organizations, customizing an information security policy now has a much larger role in their operations. While Aussies that run their own business benefit from taking such precautionary actions, some still lack the proper guidance in terms of establishing an effective policy that would ensure 100% protection from cyberattacks.

  • How to Implement a Small Business Security Program

    How to Implement a Small Business Security Program

    Having a Hard Time Managing Small Business Security Risks?

    Australian entrepreneurs must implement small business security measures regardless of the state of the market or even their company’s industry and level. It has been a never-ending battle for small businesses to protect assets, including sensitive corporate and customer information, from hackers. That’s why we’ve listed down small business security tips for organisations that want to establish, develop or strengthen their information security program.

  • How to Protect Your Small Business From Cybercrime

    Welcome to Miami!

    Miami...it's one of the places that really spoke to me because of Miami Vice, probably the most famous TV show around crime that there is. But don't take my word for it.

  • How to Secure Your Business Network With Alex Penrose

    IT assistance, managed IT services, IT support,  Online Security

    In this episode, Alex Penrose from Jolly Frogs tells us about pen testing, reverse engineering, the Internet of Things (IoT), risk profile and risk appetite statement of organisations, social engineering, the two departments in organisations that hackers take advantage of to get information, botnets and vulnerabilities, should you or should you not run automatic updates, backups and disaster recovery, the cloud, password databases and alternative like using passwords that are hard to crack but easy to remember, two-factor authentication, and other security dos and dont's.

  • How to Teach Staff Members About Data Security

    How to Teach Staff Members About Data Security

    How to Teach Your Staff About Data Security

    I've just been talking to a business owner and we put them up to the "Let Us Hack You" challenge. Yes, it is exactly what it sounds like. We're the good guys and we jump in and try to hack your systems like the baddies could and see if we can get in. Now, okay, much to their dismay we got in, they were not impressed.

     

  • Is Your Smartphone Spying on You?

    Is Your Smartphone Spying on You?

    The Truth About Your Smartphone

    Is your smartphone listening to you? The short answer is, yes, it is. How creepy is that? If you've got Facebook Messenger or any of the big apps on there, you're going to find that your phone is actually listening to you. You might be thinking, 'Why? How did they know that I was looking to buy new tyres?' The reason is they saw you make that call to Goodyear, Beaurepaires or Bob Jane, whoever it was, and then whoever had the highest bid on any of the different networks that are advertising to you, be it Facebook or Google, has then said, 'Oh, they've got the highest bid. Let's shoot them across even if they're a competitor.' 

  • IT Audit Checklist for Business in Australia

    IT Audit Checklist

    IT Audit Checklist for Business in Australia

    Long gone are the times when a business audit meant checking financial accounts for accuracy and comprehensiveness. Today, an audit covers Information Technology. The idea behind conducting an IT audit is to evaluate the performance of the systems in place to protect an organisation's data.

  • IT Audit Checklist: Why Do You Need It?

    IT audit checklist

    Why is an IT audit checklist important?

    In this day and age, every business in Australia—small, medium or large—uses some form of technology. Knowing this, you cannot deny that data loss and security threats are becoming a fast-growing concern. As a business owner, you would want to make sure your business is free from this modern-age nightmare. A data security breach on your valuable business information is the last thing you would want to happen. This is where an IT audit checklist will come in handy.

About Dorks Delivered


When did your IT guy last pay you for downtime?

 

Work with a Managed IT company who can help you streamline your systems and operations management. Implementing high‐tech solutions to ensure the integrity, uptime and accountability of all internal system processes gives you the assurance that you have continuity.

 

Read more

Keep in Touch

 

  • 360 St Pauls Terrace, Fortitude Valley QLD 4006
  • 07 3166 5465
  • 1300 85 3675 (1300 85 DORK)

Get Map

 

Dorks Delivered