1300 89 22 00

white x 

Hello all,   We recently hosted a webinar presented by Wayne Tufek the Director of CyberRisk.  The webinar presented provided a thorough explanation of the new mandatory data breach disclosure bill that is expected to be legislated by February, 2018.   The aim of this session was to give participants a clearer understanding of what they need to know regarding the new Privacy Law and how they could be impacted if there was a cyber-security breach.  A recording is available, please register and you will gain access to the recorded webinar. The webinar covers for the following areas: How is my organisation affected by the legislation? What constitutes a breach? Questions to ask yourself (such as, am I prepared if this happened to me?) What are the next steps for my organisation? If you would like a copy of the presentation, please email 
How to tell if you have been infected with malware!   We have written articles on how to spot potential malware and even the 10 top ways to avoid being infected. Unfortunately, as we have seen time and time again, sometimes, these nasty & malicious emails catch us off-guard. Time is of the essence when infected, so if you experience any of the below symptoms, please call IT support ASAP and shut down the power to your machine.  Here are 12 symptoms of malware.  Your computer slows downnnnnnnnnnnnnnnnnnnnnnn Your computer freezes Pop-ups Your computer crashes Suspicious Hard Drive Activity Running out of Hard Drive Space Unusually high network activity New Browser Homepage, new toolbars and/or unwanted websites accessed without your input Unusual messages or programs that start automatically Your security solution is disabled Your friends/colleagues tell you they are getting strange emails from you Encrypted files   Please feel free to write or call 1300 89 22 00 with any questions. The ITConnexion Team
Friday, 13 January 2017 09:34

5 Common Traits of Malware

5 Common Traits of Malware   In 2016, we saw a dramatic increase of infected computers due to the malware (aka Cryptolocker).  Below are some common traits of Malware to look out for. Please share this article with your fellow colleagues so you and your friends don't become the person who shuts down your office. Zip files Fake sender email address Disguised links or buttons Request or threat of urgent attention Too good to be true offers Here are some real-life examples of Malware. Some are very professional-looking, so if in doubt, don't click or open any attachments. As always please call our IT support team for any advice on 1300 89 22 00.     Please feel free to write or call 1300 89 22 00 with any questions. The ITConnexion Team
This article has been created with the employee in mind, in particular the Administration or Finance Teams. Unfortunately, we are seeing a rise in phishing attempts that target individuals within organisations. These emails are designed to appear as normal internal communication and any staff in the management and finance area should be particularly mindful of the source of any fund transfer requests. There are emails currently circulating where the senders name is being forged (spoofed) so as to appear to be from a legitimate and familiar name, the following is an example of how such an email header appears: On close examination you will note that there is a “Reply-To” field below the “Subject” that shows the real senders email address. Also note, that the "Reply-To" field may not show. Therefore it is also important to always check once you hit reply and before you send, that the reply email address is the email address you intend to send to (that is it doesn't change to an unknown suspicious email like the one above). These emails are Phishing attempts designed to make you believe a request for funds or information is from a genuine and trusted source. To learn more or to report this type…
Page 1 of 3

Socialise with us

Back to top