“Does anyone know the password?”

Don’t let minor interruptions stop your business in 2019: If we look back at the statistics from 2018, it’s alarming to see that power interruptions accounted for 35% of disaster events (45% from hardware failure) and as the Dunder Mifflin team discovered, a minor power interruption can cause the server to reset and not being able to login to the server prevented the whole office from working… Takeaways: Do you have adequate power, surge protection and UPS equipment? Do you have [...]

Data Breach Notice: – 763,117,241 breached accounts

In February 2019, the email address validation service suffered a data breach. The breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The website went offline during the disclosure [...]

Data Breach Notice: – 40,960,499 breached accounts

In July 2018, the social bookmarking and sharing service ShareThis suffered a data breach. The incident exposed 41 million unique email addresses alongside names and in some cases, dates of birth and password hashes. In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly.

Security Tips to Stay Safe Online

Every day we use the internet for just about everything you can think of. With over 650 million websites worldwide, online gaming and social networking, keeping safe online can be tricky to comprehend. Fortunately there are some simple steps we can incorporate into our online life to stay safe and secure. Keep your computer secure Ensure all software (including your web browser) current by installing updates. This is usually as simple as turning on automatic updates on your computer but sometimes [...]

Security Considerations

Running any business requires a level of ICT understanding, we have listed 8 common security considerations you will come across during your accreditation journey.    1.  Passwords In today’s business-world ICT plays a fundamental part, with every system there is the basic security of a username and password. Now while most of the usernames that you use will most likely be different, do you tend to use the one password or do you have several? Having one password for all your ICT access [...]

What is RAID?

Introduction RAID (Redundant Array of Independent Disks, originally Redundant Array of Inexpensive Disks) is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvements. Data is distributed across the drives in one of several ways, referred to as RAID levels, depending on the required level of redundancy and performance. The different schemes, or data distribution layouts, are named by the word "RAID" followed by a [...]

Remote Access Risks

With software and services like accounting, email and Customer Relation Management (CRMs) being "in the cloud", users are able to work from anywhere in the world and from almost any device. Users can also connect into the office with VPNs or Remote Desktop / Teamviewer-like programs for complete access to their files. This freedom does introduce some risks to businesses if users are connecting from 'unknown' PCs. Does the users' computer have an antivirus? What if they have lost their phone [...]

What is ICT?

What is ICT and how does it differ to IT? Most business functions involve some form of ICT. To reduce risk and increase productivity, a business should develop a best practice framework for ICT. But what does ICT mean? It’s easy to get buried in acronyms these days. IT [information technology] and ICT [information and communications technology] get bandied around all the time, sometimes interchangeably. So what’s the difference, and why is it important? Essentially, ICT contains IT as an umbrella term. IT [...]

ICTAA launches Smart Certificate

The Smart Certificate let's people see the best of you. One of the issues surrounding accreditation and certificates is verifying if the participant is still current in their program. Our new ICTAA certificate now contains a simple way to validate accreditations and connect people to the ICTAA public profile of any accredited business. The ICTAA Smart Certificate uses both Near Field Communication (or NFC) and Quick Response Code (or QR Code) which contain an embedded link to the ICTAA online profile for [...]

ICTAA’s Accreditation Services 2nd anniversary

ICTAA™ Celebrates 2 Years of Successful Accreditation Services Brisbane, Qld, Australia – 7th July, 2015 Every business these days uses IT but many don’t realise the risks involved or the legal compliance required. This lack of knowledge could be the downfall of your company. ICTAA™ was born on July 1, 2013 (ICTAA™) to support business owners and IT service providers to understand the legal ramifications of using IT in the workplace. ICTAA™ was established by a group of experienced and accomplished ICT [...]