Skip to the content

A security flaw made a concerning appearance last week after the bug, dubbed a ‘Krack attack’, was discovered by Belgian researchers. Targeting Wi-Fi encryption, the bug can access safely encrypted information such as emails, passwords and credit card numbers. Continue reading to find out everything you need to know about this flaw and how to reduce your risk of an attack.

Posted by Chloe Eldridge on

A new report (published by Microsoft themselves!) has shown the company's cloud cyber security attacks have increased by an astonishing 300% from 2016.

Posted by Chloe Eldridge on

Every time you install an application onto your phone, you are asked to allow that app certain permissions in order for it to function properly. However, by allowing these permissions you in turn leave your personal information vulnerable to exploitation.

Posted by Chloe Eldridge on

The 'chronic failure' to use secure passwords has grown increasingly concerning for individuals and companies alike. Password hacking software now enables passwords, thought to be safe, to be unscrambled within seconds. We have compiled the top reasons why implementing a complex password policy is vital for your protection and exactly how to put it in place. 

Posted by Chloe Eldridge on

Many small to medium sized Australian businesses have, or are looking at introducing, a set of Bring Your Own Device (BYOD) policies for employees.   With the widespread popularity of smartphones, tablets and iPads, it seems to make good sense to allow employees to use these personal devices for work purposes. In fact, over 74% of organisations either already have a BYOD polic ...

Posted by Administrator on

Hi Jane, thanks so much for submitting your question! Travelling with a laptop opens doors to a range of potential security problems, both physical and software based. Despite this, there are many things you can do to protect your data from getting into the wrong hands! Here are some simple things you can do to help keep your laptop secure when you’re on the go. Physical Sec ...

Posted by Administrator on

Last week, an unusually sophisticated phishing campaign appeared to target Google's 1 billion+ Gmail users worldwide, seeking to gain control of their entire email histories. The worm, which arrived in users' inboxes posing as an email from a trusted contact, asked users to click on an attached "Google Docs" file. Clicking on the link took users to a real Google security page, ...

Posted by Administrator on

Due to increased regulation and the growing adoption of Bring Your Own Device (BYOD) in the workplace, it’s now more important than ever for businesses to protect sensitive information and company data. At the same time, companies need to securely share sensitive information with appropriate employees and individuals within and external to their business network. Fortunately, ...

Posted by Administrator on

With 79 new variants discovered in the first half of 2016 alone, ransomware has become one of the most – if not the  most prevalent, effective and successful forms of cybercrime. A ransomware attack can cripple its victims, where the impact on business operations, finances and reputation can leave many organisations wondering how such an attack ever happened. While ransomware ...

Posted by Administrator on

Microsoft Office 365  incorporates business class email, instant messaging, cloud file storage and the full office suite. With collaboration tools, remote access and familiar programs included, it’s no surprise that Office 365 is becoming increasingly popular among small to medium sized businesses. While there is no questioning the benefits of Office 365, businesses seem to ov ...

Posted by Administrator on

Sign Up to our Newsletter

Synapse QuickSupport

Synapse IT is able to offer QuickSupport to our clients. Our support software enables us to resolve your problems remotely in minutes. For QuickSupport, please call our office and click the help button when advised to do so by one of our consultants.

IT Service Testimonials

Testimonials

Find out what our clients are saying about us!

Contact us for IT services

Talk to us today

If you have any queries, contact us today.