How Cybercrime has Grown in the last decade
p1Technologies
by
11M ago
In this blog post, we’re going to highlight how cybercrime has grown in the last decade, the new threats that have emerged, and what individuals and organizations can do to protect themselves in the face of this growing threat ..read more
Visit website
I want Windows 10!
p1Technologies
by
1y ago
The first look we have had of Window 10 looks fantastic. A fusion of the best bits from Windows 8 and earlier version such as Windows 7. Microsoft is offering free upgrades for existing users of Windows 7 and 8. It will be interesting to see how this is rolled out into the market later this year and what the uptake of the new OS is after a less than spectacular uptake of Windows 8.  I’m looking forward to the release, what about you? Most people’s computers will be capable of running the new OS, the thing that will hold people back is the compatibility of 3rd party programs like Quickbook ..read more
Visit website
Are My Phone Apps Listening To Me?
p1Technologies
by
1y ago
Let’s face it, most of us can probably admit to being a little lax about our online footprint and what the Internet knows about you. Do you grant access to your phone’s camera for any app that requests it? Do your apps have access to your microphone? It can be easy to let these things slide, but you should think carefully before giving an app access to your microphone – think about it, why does your news app need access to your microphone? It’s all too easy to not care, click the ‘accept’ button and move on to what you need the app for. We have all heard of anecdotes where someone has been tal ..read more
Visit website
Cyber Security for Financial Advisors?
p1Technologies
by
1y ago
Financial Advisors are a tempting target for data thieves as they have a treasure trove of sensitive information and financial transactions. Did you know: According to a Cyber Security expert, most practices could be hacked within 30 minutes (source) “When we talk about policies and procedures across Australia, 93 per cent don’t have an appropriate cybersecurity policy”. If you’re a Financial Planner or Financial Advisor, are you doing enough for your cyber security, to keep your clients safe? What responsibility do you have to ensure your clients’ information is protected? Let’s look at how y ..read more
Visit website
Optus has had a massive data breach
p1Technologies
by
1y ago
You may be aware Optus was recently hacked and some 10 million clients had a range of details stolen. Some reports advise the hacker has since deleted the data, but conflicting reports say it's being sold to the highest bidder in the dark recesses of the Internet. As we don’t know the truth, it’s fair to say that any current or recent Optus customers can assume that some of their critical personal information, including their drivers’ license details, Medicare numbers, and passport numbers may have been stolen.   If you’re an existing, or previous Optus customer what can you do now ..read more
Visit website
The Microsoft Outlook Shortcut Bar Has Moved
p1Technologies
by
1y ago
We recently received a call from a client that noticed a change in their Outlook software and weren’t happy about it. That change – Outlook have moved the shortcut bar. It now appears vertically, on the left-hand side of the screen, where it was horizontal, underneath the folder panel.  Our client wanted to know if there was something we could do about it. Perhaps we could revert it back or provide a workaround? We’ll clarify what we know about the move of the Outlook shortcut bar… As per Tech Radar, Outlook has had some design tweaks that Microsoft believe to be “new and improved”. While ..read more
Visit website
Effective Mobile Device Management
p1Technologies
by
1y ago
Many businesses have a fleet of iPads, Android and other Mobile devices in their business that they may realise they have little or no control over. The business doesn’t know where devices are, who has them and it becomes clear there are tens of thousands of dollars in hardware the business has invested in that are unaccounted for, not the sort of news that the C level appreciates. How can a business best manage its mobile devices? There are a range of solutions for mobile device management (MDM) from providers like SOTI, VM AirWatch, Manage Engine, IBM, Citrix, AppTec and Baramundi, to name a ..read more
Visit website
How to tell if an email is malicious spam
p1Technologies
by
1y ago
Today the following email came through my theoretically spam-protected inbox: Initially I assumed it was SPAM, but I took another look. This email is: Unprofessional in appearance Has no branding Basic links No personalisation These are all red flags for malicious intent. Was this email SPAM? No! Incredibly, this wasn’t a SPAM email despite all evidence to the contrary. So we thought it would be helpful to provide some quick and basic tips for checking if an email contains malicious SPAM before you immediately delete it or click on any potentially dangerous links. Quick tips to check if an ema ..read more
Visit website
A
by
ago
A ..read more
Visit website
A
by
ago
A ..read more
Visit website

Follow p1Technologies on FeedSpot

Continue with Google
Continue with Apple
OR