Skip to the content

A security flaw made a concerning appearance last week after the bug, dubbed a ‘Krack attack’, was discovered by Belgian researchers. Targeting Wi-Fi encryption, the bug can access safely encrypted information such as emails, passwords and credit card numbers. Continue reading to find out everything you need to know about this flaw and how to reduce your risk of an attack.

Posted by Chloe Eldridge on

In 1996, Adobe introduced the ‘Flash Player plugin’, which ultimately shaped the very nature of the Internet as we know it today. Shockingly, Adobe has revealed that, in collaboration with tech partners such as Microsoft, the Flash Player plugin is going to be completely phased out by 2020.

Posted by Chloe Eldridge on

The National Broadband Network (NBN) is being systematically implemented throughout Australia over the next two years. This network will be rolled out alongside the existing ADSL broadband network in order to provide a faster and more efficient broadband service, with data showing the NBN is up to four times faster than the current broadband system. Once available in your are ...

Posted by Chloe Eldridge on

Technological developments and an overall increased trust in technology has seen the majority of businesses become ‘virtual companies’. Known as, ‘cloud computing’ this system works through the storage of computing resources over the internet, rather than a computer’s hard drive.

Posted by Chloe Eldridge on

Hailed the ‘Global Internet Forum to Counter Terrorism’, Facebook, YouTube, Microsoft and Twitter have joined forces to create a global forum fighting against the spread of online terrorist propaganda. In a united attempt to stop this, each tech giant has pledged to make their platforms ‘hostile to terrorists and violent extremists’.

Posted by Chloe Eldridge on

The 'chronic failure' to use secure passwords has grown increasingly concerning for individuals and companies alike. Password hacking software now enables passwords, thought to be safe, to be unscrambled within seconds. We have compiled the top reasons why implementing a complex password policy is vital for your protection and exactly how to put it in place. 

Posted by Chloe Eldridge on

Many small to medium sized Australian businesses have, or are looking at introducing, a set of Bring Your Own Device (BYOD) policies for employees.   With the widespread popularity of smartphones, tablets and iPads, it seems to make good sense to allow employees to use these personal devices for work purposes. In fact, over 74% of organisations either already have a BYOD polic ...

Posted by Administrator on

In late May, Microsoft launched its latest Surface Pro, its first upgrade to the company’s popular line of hybrid PCs since October 2015. While the Surface Pro’s specs have been upgraded across the board, including the newest 7th-generation Intel processors, many of the changes to the Surface Pro are minor, with the most notable upgrade being improved battery life.  Here’s a ...

Posted by Administrator on

Hi Jane, thanks so much for submitting your question! Travelling with a laptop opens doors to a range of potential security problems, both physical and software based. Despite this, there are many things you can do to protect your data from getting into the wrong hands! Here are some simple things you can do to help keep your laptop secure when you’re on the go. Physical Sec ...

Posted by Administrator on

As of April 11, the Windows 10 Creators Update is available to Windows 10 customers around the world as a free upgrade. New features in the Windows 10 Creators Update include 3D paint, built-in game broadcasting, new tab management features in Microsoft Edge, and enhanced security features. Despite this,  Microsoft  has released a message, urging users without a tech backgrou ...

Posted by Administrator on

Sign Up to our Newsletter

Synapse QuickSupport

Synapse IT is able to offer QuickSupport to our clients. Our support software enables us to resolve your problems remotely in minutes. For QuickSupport, please call our office and click the help button when advised to do so by one of our consultants.

IT Service Testimonials

Testimonials

Find out what our clients are saying about us!

Contact us for IT services

Talk to us today

If you have any queries, contact us today.