1300 855 651
Archives

AWD Blog

The AWD Glossary of Basic IT Security Terms and Concepts

Posted by Kate O'Hanlon on 15 June 2017

For those in the IT industry, the issue of network security is paramount and pressing. However, for the average Australian business owner, the concept of network security is often a vague, nebulous co…

Consumer Vs. Business Grade IT Products

Posted by on 07 June 2017

As a business owner, keeping costs low is always a priority when setting up a new venture. However, once your business is established and turning a profit, it’s important to consider the long-term v…

Will Migrating to Cloud Solve Your Security Issues?

Posted by Kate O'Hanlon on 01 June 2017

One of the most common misconceptions about cloud migration is that it’s a chance to start afresh, free from the challenges associated with having an onsite server. Whilst the weightless, effortless m…

How to Identify a Phishing Scam

Posted by Kate O'Hanlon on 29 May 2017

  Since 1995, phishing has been used by cyber criminals as an extremely lucrative way to obtain sensitive user information. In fact, according to the 2013 Microsoft Computing Safety Index, phishing…

Starting on May 12th a strain of ransomware cryptoworm known as WannaCry (also WannaCrypt) began exploiting a vulnerability in the Windows Operating system to encrypt data and demand ransom payments. …