Catch up on the latest insights
The Healthy Chef
The Healthy Chef is an Australian business started by Teresa Cutter. They make simple, healthy products like protein powders and supplements to help women stay healthy. Their focus is on using natural, clean ingredients that are not only good for the body but...
Windows 10 End of Life (EOL) and What it Means
Microsoft has announced that October 14, 2025, will be the End of Life (EOL) date for Windows 10. Windows 10 EOL is set to affect all versions of Windows 10, including Home, Pro, Education, and Enterprise. Research from Lansweeper indicates that only 23.1% of...
ISO 27001 Certification in Australia: A Comprehensive Guide
Business data is like a treasure for cyber criminals. In fact, buried in almost every organisation's information assets are details worthy of holding ransom. So, how do you protect it? With ISO 27001 certification. ISO 270001 is more than just a standard industry...
Cyber Hygiene For Business: What You Need To Know
Implementing cyber hygiene practices is one of the most effective ways to protect your business from cybersecurity risks. As a business owner, the security of your company's data is paramount. With the prevalence of cyber-attacks in the modern world, it’s increasingly...
7 Reasons To Switch From Google Workspace To Microsoft 365
Have you thought about making the switch from Google Workspace to Microsoft 365? Businesses today rely heavily on technology for their daily operations. Yours is probably no different. From communication to collaboration, storing and accessing data, to creating and...
11 Great Firewall Features (2024 Update)
A firewall should be part of your overall cyber security mitigation strategy. You may think that because you’re not a big bank or Apple your business is safe from hackers, right? Unfortunately not. Many hackers actually target small-to-medium businesses because they...
Scaling Global Operations: How Stanfield IT Empowered Rokt with Seamless IT Solutions
Rokt is the global leader in ecommerce, enabling companies to unlock value by making each transaction relevant at the moment that matters most, when customers are buying. Rokt is headquartered in New York, with offices across North America, Europe, and...
How to Successfully Introduce Two-Factor Authentication To Your Team
Two-factor authentication (2FA): It's a term that every internet user in the 21st century should be familiar with, and for good reason. Given the nature of threats to digital security, 2FA serves as a crucial additional check that ensures users are who they say they...
How to Manage AI Specific Cyber Security Risks in the Finance Industry
Are you ready to tackle the cyber security challenges that come with AI in finance? Let’s face it: AI is revolutionising the finance sector, and it has been for years. But, with tech comes new risks and responsibilities. In this article, we’ll take a look at managing...
How To Identify A Cyber Attack (+ 25 Ways You Can Recover)
Cyber attacks are becoming increasingly common in recent years. While they might sound like scenes from a Hollywood heist film, they are very real threats that businesses face daily. In fact, cybercrime is predicted to cost $10.5 Trillion annually by 2025. Attacks...
What You Need To Know About Malware
Malware is a problem for businesses of all sizes. It can be used to steal personal data, disrupt operations, and cost thousands or even millions of dollars in lost productivity and remediation expenses. Every day, over 450,000 new malicious programs are registered....
How To Create An AI Policy For Your Company (2024)
Wondering if your business needs an AI policy? AI technologies are revolutionising business with automation, insight, and decision-making abilities. And they present boundless opportunities for those who are equipped to use their potential. However, new technology...
Social Engineering: 10 Ways To Protect Your Business
What if I told you that many cyber attacks were largely preventable? Social engineering is not a new phenomenon, yet people in a number of organisation's continue to fall for them. This is because they prey on the on the most vulnerable aspect of security - human...
How to Build A Solid Cyber Security Strategy in 5 Steps
Having a well thought out and correctly implemented Cyber Security Strategy can help businesses avoid a huge amount of damage if they find themselves under attack. Let’s explore the importance of cyber security and how to avoid the sort of security failure that can destroy a company.
10 Of The Best Microsoft Intune Features in 2024
Microsoft Intune isn't your run-of-the-mill endpoint management solution that leaves you with more security questions than answers. Instead, it's easy to grasp, super streamlined, and extremely relevant in the current work from home (WFH) environment. In this article,...
ISO/IEC 42001: What Businesses Need to Know
These days, everyone is talking about AI. But not many are talking about ISO/IEC 42001. AI might seem like a bit of a buzzword. And in many cases it is. One Harvard Business School professor found that 95% of products fail. We’ll likely see the same trend with AI...
The Best 40 Features of Microsoft Teams in 2024
Microsoft Teams is the ultimate tool for collaborating at work. Teams provides a fully decked-out document storage, chat, and online meeting environment. Teams is a key component of Microsoft 365. If you’ve ever needed to participate in a team project at work, you'll...
How Risky Behaviour and MFA Myths are Undermining Cyber Security
The number of cyber incidents caused by human error varies depending on which report you read. But they all have one thing in common. It’s high. A study by IBM estimates that human error is the driving factor in 95% of cyber security breaches. But how can that be?...
Latitude Hack: How To Stop It Happening To Your Business (Updated 2024)
Another day, and another Australian business has suffered a data breach. The Latitude Financial cyber attack hack has once again put the spotlight on the importance of cyber security for businesses. The recent attack also highlights the prominence of cybercrime in...
The Top 22 Cyber Security Audit Checklist Strategies in 2024
Imagine this: your business is thriving, taking advantage of all the opportunities in our increasingly connected world. You're reaching new customers, streamlining processes, and innovating like never before. But wait, what's that lurking in the shadows? Cyber...
4 Emerging Cyber Security Threats Businesses Must Watch Out For
"Cyber threats are constantly evolving" - Every cyber security writer. If you’ve read a few articles on cyber security, there’s no doubt you’ve read the above line. Probably numerous times. But there’s a reason that line persists. It’s because the evolution of cyber...
What You Need To Know About Cybercrime In Australia (2024)
IntroductionCybercrime in Australia is a hot topic, and for good reason. In 2022, two of Australia’s biggest businesses were victims of cyber-attacks. Then, in 2023 we had the Latitude hack. And one thing is glaringly obvious; Australian businesses are not taking...
Stanfield IT: One of Australia’s Top 50 MSPs
We are thrilled to announce that Stanfield IT has been recognised as one of the top 50 Managed Service providers in Australia by Cloudtango for 2024. This recognition is a testament to our team's hard work, dedication, and commitment to excellence in providing...
Mastering the Cloud: Insights into AWS and Azure for Modern Businesses
The cloud has emerged as a cornerstone of business technology. It has revolutionised how businesses operate and innovate. At the heart of this transformation are two giants: AWS (Amazon Web Services and Azure, Microsoft's cloud platform. These cloud service providers...
17 Reasons Why You Should Use Intune for Mobile Device Management
Are you looking for an efficient solution for your business's mobile device management (MDM)? Microsoft Intune stands as a leading MDM solution that ensures seamless application integration across various devices. And it does so while delivering top-notch security...
7 Ways To Nail Your IT Strategy
In business, your strategy communicates how you will win. Your IT strategy therefore communicates how you will win using technology. It’s about making technology choices that directly impact your company’s market position and operational effectiveness. An effective IT...
Announcing Our New Essential Eight Report
For many business owners and professionals, business security is always top of mind. And for good reason, cyber threats have become a reality of doing business. As we’ve seen in the last 12 months, attackers are targeting data from Australian businesses, big and...
13 Critical IT & Cyber Security Mistakes Your Business Needs To Stop Now
Avoiding cyber security mistakes is a must for any business, but slipping up is often easier than expected. People do all kinds of things that put an organisation’s security at risk. Often without a second thought. These lapses, often due to human error, are a leading...
How To Minimise Third-Party Cyber Risks
Business are increasingly supplementing their operations with a network of third-party vendors. There’s no doubt that this collaboration is vital for growth - many hands make light work. However, these partnerships often harbour vulnerabilities. After all, a chain is...
What You Can Learn From 2023’s Ransomware Attacks in Healthcare
Healthcare organisations are constantly under threat from ransomware. And as our medical institutions become increasingly reliant on technology, the threat of ransomware only grows. Unfortunately, when it comes to healthcare, this creates the potential not just for a...