Call Today +61-2-8985-6600

Locky-type ransomware is attacking systems

A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far. Quick facts According to a threat intelligence report, the email-based ransomware attacks started Read more about Locky-type ransomware is attacking systems[…]

Worrying evidence of poor router security

Adding to the list of reasons to outsource your network security to a certified IT provider, a recent CIA leak shows just how vulnerable most network routers really are. Read on to learn why this is such a big vulnerability and what you can do to fix it. The Wikileaks CIA documents For several months, Read more about Worrying evidence of poor router security[…]

PC fixes are a drain on your company’s budget

Security professionals should be beefing up your network security, implementing advanced firewall software, and identifying risks for possible breaches. In reality, they spend a huge chunk of their time troubleshooting issues on individual personal computers (PCs). That workflow is not ideal, but that’s what normally happens in many organizations. At what cost? Read on to Read more about PC fixes are a drain on your company’s budget[…]

Office 365 receives security upgrades

Office 365 receives security upgrades

With the increasing sophistication of cyberattacks, businesses need even stronger security tools to defend their sensitive documents. Fortunately, Office 365 subscribers now have more advanced security tools to stay ahead of the ever-evolving threat landscape. If you are concerned about security and compliance, these new Office 365 features could help. Threat Intelligence Threat Intelligence for Read more about Office 365 receives security upgrades[…]

Cloud security: everything you need to know

Cloud security: everything you need to know

Cloud technology is becoming more pervasive every day. Some reports claim that almost 90% of businesses will utilize some form of the technology in 2017. But somehow myths about its lack of security remain. From cloud-based software to data storage, we believe cloud security is swiftly becoming better than that of local area networks. Hands-on Read more about Cloud security: everything you need to know[…]

Why you need to update Microsoft Word

Microsoft Word is a staple business application. But since so many people use it on a daily basis, hackers work tirelessly to expose and exploit flaws in the system. In fact, cybercriminals stumbled upon a Word vulnerability that puts your sensitive data at risk. Read on to learn more about the exploit and what you Read more about Why you need to update Microsoft Word[…]

Fileless malware: who are the targets

Fileless malware: who are the targets?

Business owners have spent the last couple months fearful of cyber attacks from the “fileless malware” plastered across headlines. The reality of this new threat doesn’t actually call for panic…yet. Getting acquainted with this new malware today could save you from a headache in the future. What is this new threat? To oversimplify the matter, Read more about Fileless malware: who are the targets?[…]

Attacks on WordPress websites

Attacks on WordPress websites

WordPress is currently the most used web platform, with a market share of 40-50% out of all Content Management Solutions (CMS) platforms. It powers various types of websites, from personal sites to those of small- and medium-sized businesses as well as multinational corporations. If you run a website on WordPress, yours may have been one Read more about Attacks on WordPress websites[…]

Hackers use browsers to get credit card info

Does filling in web forms sap all your browsing energy? Do you find it especially taxing to shop or register online using a mobile device? Google’s Chrome alleviated this dilemma when it introduced the Autofill feature in 2011, which made filling in forms much faster and making credit card purchases online more convenient. Unfortunately, it Read more about Hackers use browsers to get credit card info[…]

New year, new cyber-threats

New year, new cyber-threats

Have you had to deal with security issues in the past year? Brace yourself, as there are more to come. For this reason, security experts have become indispensable members of society, who guard tech-dependent individuals and businesses against malicious attacks that pose threats to their privacy and livelihood. As you ring in the new year, Read more about New year, new cyber-threats[…]

shadow

SymSAFE partners with industry leaders. To ensure you get the very best from your IT

SymSAFE is simplifying business IT across Australia

Are you ready for us to do the same for you?