top of page
On The Blog


Microsoft unveils small-business VoIP system
Microsoft has released details of a VoIP phone system dubbed Response Point aimed at small businesses. The company said that the phones...


Picking the right screens for your business guide
Get the right screen for your needs and budget. Score a sharp presentation without burning through every cent with our manual for what to...


Small business tax breaks for cloud, cyber security grow
Budget 2022: One-year boost to accelerate digital adoption. Small businesses will be able to deduct a further 20 percent from the cost of...


Microsoft modern authentication deadline looms over ExchangeSupport for basic authentication will e
Microsoft modern authentication deadline looms and Support for basic authentication will end this year Time is of the essence to prepare...


Office 2013 end of support: Reduce your exposure to security risks by moving to a newer version
After five years of Mainstream Support, and five years of Extended Support, Office 2013 will reach the End of Extended Support on April...


Secure the future of your domain name and protect your data and your customers.
The new domain name category is coming to Australia. Not acting now could leave your business or organisation open to fraudulent cyber...


3 Ways SMBs can profit from the online community
Influencer Marketing Today, the highest paid athletes make more money off the field than they do on it. According to some reports,...


Quick Wins for your Website
Small businesses account for over 95% of all businesses in Australia and 72% of them have a website. However, in a world in which...


Access Control
Access control is a way to limit access to a computing system. What? A process to regulate who can access what within your business’...


Monitor threats in real time and deliver unparalleled protection from a single, cloud‑based security
In the race to stay ahead of new cyberthreats and unexpected security issues for small and medium-sized businesses, how can IT service...


Tips for Social Media and Social Networking Apps
Social media, and social networking or messaging apps, can pose a number of security and privacy risks to both organizations and...


What is IP Telephony?
IP telephony (Internet Protocol telephony) is a term used to describe technologies that use a variety of protocols to exchange voice,...
bottom of page
