Search archive
-
Signs You’ve Been Hacked and What to do Next?
Security and data breaches remain a constant threat for business. Hackers are continuously looking for vulnerabilities and new ways to take advantage of security lapses. Hackers typically won’t tell their victims that they are in their network and will spend as much time possible in the system looking for any...
-
5 Benefits of Managed Print
Utilising a Managed Print service can benefit organisations big or small in many ways. Through managed print, your business could see an increase in savings and productivity up to 40% through solution recommendations, professional implementation and customer support services. Keep reading to find out more on how Managed Print can...
-
Protect Critical OT Infrastructure Systems With Digital Immunity
As each new revolution has improved production efficiency and output in the manufacturing industry, it has introduced new threats and risks to critical systems. These advancements provide a more robust delivery of critical infrastructure but also increase the risk of cyber-attacks. 80% of manufacturers will have adopted IIoT by 2021,...
-
Major Victorian Hospitals Hit By Ransomware Attack
Despite warning from the state’s Auditor-General, Victorian hospitals across Gippsland, Geelong and Warrnambool have been hit by a disruptive ransomware attack. After successfully hacking into some of the state's biggest health databases earlier this year, the Auditor-General made five recommendations for Department of Health and Human Services and nine recommendations...
-
Is Your Business Prepared for Windows 7 End of Life?
With the end of Windows 7 support just around the corner (January 14, 2020 to be exact), it’s time to start thinking about finally moving away from your favourite operating system. End of Windows 7 support won’t mean that Window’s 7 will stop working completely - you will still be...
-
INFO SESSION: How to Detect, Protect and Manage Your Privileged Accounts
Last week at the National Wine Centre, Logi-Tech, together with STEALTHBits, Thycotic and emt Distribution teamed up to host an information session on “How to Detect, Protect and Manage Your Privileged Accounts”. We presented to a select group of cyber-security experts and key decision makers from companies in the health,...
-
Online Them: Keep your children safe online without invading their privacy
HelloSoda’s Online Them is a product designed by Parents for Parents in the monitoring of your children’s activity on social media. It can provide visibility around the clock of a child’s social media activity and reports on any threats and insulting or bullying text they may encounter. From there you...
-
Office 2007 End Of Support (EOS)
If your business is still running Microsoft Office 2007, you need to know that this product is now End Of Support (EOS) with Microsoft. That means... No new security updates, no new features or bug fixes, not online technical updates, reduced functionality when integrating with more modern versions of Office...
-
Securing data and end-user devices with Microsoft 365 Business
Video: Securing data and end-user devices with Microsoft 365
-
Collaborate with Microsoft Teams - included in Microsoft 365
Video: Introducing Microsoft Teams
-
Thinking of moving your business to the cloud with Office 365?
Your go-to Office - anywhere Whether you’re working in your office or on the go, with Office 365 you will get a familiar, top-of-the-line set of productivity tools. Office applications - always the latest versions - let you create, edit, and share from your PC/Mac or your iOS, Android™, or...
-
Starting a business? The long & lonely journey ahead.
Starting a business is a long and often lonely journey. Aspiring business owners may be tempted to do everything themselves to save money and time. However it is important to recognise that no one individual can be an expert at everything. You don't self diagnose a medical condition, you go...
-
A Small Business guide to Cyber Security
A Small Business Guide to Cyber Security The recent media surrounding the hacking of an unnamed Australian defence contractor where sensitive information relating to Australia’s warplanes, navy ships and bomb kits was downloaded, highlights the very real and increasing threat of cyber-crime attacks on Australian businesses. An investigation by the...
-
Internet of Things. Who? Where? Why? What?
Have you been wondering why everyone is talking about the Internet of Things (IoT)? Here's why: 82% of manufacturers who have taken advantage of the Internet of Things solutions have reported increased efficiencies. 49% experienced fewer product defects. 45% gained higher customer satisfaction levels. (source: PR Web.com) Using a tailored...
-
5 simple steps to lower your business operating costs
Of course information technology comes at a cost. However aspects of IT can be reworked to create cost savings. Whilst these are not always obvious to business, the experienced eye of Logi-Tech Managing Director Peter Moore sees them clearly. "Every business wants to reduce costs, especially in a tougher economic...
-
Top 3 reasons you should integrate data in your business
You may not even know it, but many businesses run key IT systems that are independent of each other and that demand significant time and resources to produce meaningful data. Logi-Tech works with many businesses to integrate data operations and bring disjointed systems into a single operating environment. Here are...
-
Top 8 business tech questions you’re too scared to ask
What does ‘integration of industrial and corporate systems’ actually mean? Logi-Tech staff are unique in South Australia, being trained and certified in integrating industrial equipment systems with corporate systems. Simply put this means we link the operating systems that run your production line or equipment with the operating systems that...
-
How can I lower risk of catastrophe through securing my business’s IT infrastructure and systems?
Security in your data protection involves more than just dealing with hacking. There are 3 key ways Logi-Tech helps businesses overcome these risks, according to Managing Director Peter Moore. Using a hosted service "Security relating to potential data loss is more complex than the scenario of someone breaking into your...