1-94 Auburn Street Wollongong NSW 2500 02 4228 2000

Imagine you’re going about your day when suddenly you receive a text from the CEO. The head of the company is asking for your help. They’re out doing customer visits and someone else dropped the ball in

Technology vulnerabilities are an unfortunate side effect of innovation. When software companies push new updates, there are often weaknesses in the code. Hackers exploit these. Software makers then address the vulnerabilities with a security patch. The cycle

Since the pandemic, Illawarra, Southern Highlands & South Coast NSW employers have needed to change. They've had to shift how their employees operate. Remote work is very much here to stay. Businesses and employees can both benefit

There are a lot of things that have changed since the invention of the internet. One of these is how we bank and access our accounts. You used to have to go into a local bank branch

The popular Australian patient booking solution HotDoc has released HotDoc Caller ID recently, allowing medical practices the ability to view patient contact & booking information when they call in. The key feature of this facility is a

Cybersecurity researchers uncovered an alarming mobile statistic. During the first few months of 2022, mobile malware attacks surged by 500%. This is alarming both in scale and because many people aren’t yet protecting smartphones. For years, mobile

If you follow Microsoft products, then you may know about Microsoft Ignite. Held annually, it generates many exciting updates and announcements in the Microsoft world. Microsoft held its most recent conference last October. In the rush of

Bring your own device (BYOD) is a concept that took hold in Illawarra businesses after the invention of the smartphone. When phones got smarter, software developers began creating apps for those phones. Over time, mobile device use

Paying attention to your customer experience directly impacts your bottom line. Companies that are “customer-centric” are 60% more profitable than those that aren’t. In this digital age, customers also expect more from those they do business with.

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or