Catch up on the latest insights

The Ultimate Guide to Microsoft SharePoint

Let's have a chat about all the wonderful ways that Microsoft SharePoint benefits your business. With the vast array business-related productivity tools and software packages, it frequently feels like there's too much to choose from. If your business is already...

Finding the Right IT Solutions For Your Business

Running and managing a business is stressful enough when you're only focusing on business goals related to strategic marketing and sales growth. But when you throw in slow networks, storage limitations, and failed backups; your business is suddenly facing many more...

Choosing The Best IT Company Sydney Has To Offer

Choosing an IT company for your business can be a trying process, especially when you're in Sydney and also looking for a local business to be your IT partner. It goes without saying that you're looking for the best IT company Sydney has to offer. But where do you...

50 Powerful Ways to Increase Your Information Security

Information security is a hot topic amongst all the IT experts these days, and they all tell you the same thing. Protect your information. Improve your information security. Prevent data breaches. Look both ways before crossing the street. Yawn... but seriously,...

Data Breaches and Small Business: How Does It Affect You?

Data breaches should be near the top of the list of concerns for any small business in Australia. Every small business is at risk of a data breach, and probably moreso if you think you're beyond that risk; because it means you haven't taken adequate measures to...

The 10 Wonderful Ways Microsoft Azure Can Transform Your Business

Microsoft Azure is probably the biggest tool that your business isn't using. If you're using Office 365 or Microsoft 365, then you've actually already got access to Azure AD. Azure AD is just one of the many tools that form part of the great Azure package. Microsoft...

5G: The Next Generation

By 5G, of course we're discussing mobile internet, not the force of gravity you'd experience in a spinning fighter jet. We're going to assume you're familiar with 3G, and 4G. Unless you're from 2006 before smartphones took over our lives. But that seems unlikely. So...

Stanfield IT Ranked Amongst Top Cyber Security Providers 2019

Stanfield IT is off to a great start this year. We can count ourselves fortunate to be amongst the Top 10 Cyber Security Providers for 2019. APAC CIOoutlook is a leading enterprise technology magazine with a focus on IT solutions, and enterprise networking. Each year...

5 Reasons Why Microsoft 365 Is All Your Business Needs

Yes, we mean Microsoft 365, not Office 365. As much as we love Microsoft and all that they offer, we have to admit it. When they sat down to name their different services and products... they made things a little confusing. Microsoft 365 is the bundled package...

What on Earth is SDWAN and How Can it Support Your Business?

SDWAN is a networking tool often used for businesses who are spread out geographically. It's been growing in popularity and use within Australia for several years now, but there is still a lot of confusing information surrounding it. When you first begin researching...

How To Choose Your Mobile Device Management Solution

Mobile device management software first emerged in the early 2000s as mobile devices started to become more common in the workplace. However, when 2007 saw the launch of the revolutionary iPhone, it fueled a huge trend of 'bring your own device' to work. Finally, a...

How To Identify Phishing & The Best Ways to Reduce Your Risk

Phishing as we know it has been an established scam since the mid-nineties, if you can believe it. That's nearly a quarter century of scamming! And the technique itself hasn't changed a lot since then, though it has grown more sophisticated of course. But the premise...

G Suite vs Office 365: Which One Should You Choose in?

We've seen it all before. iPhone vs Android. Windows vs Mac, Xbox vs Playstation, Pizza Hut vs Dominoes. Now the latest debate that will leave you umming and ahhing over which side to choose. G Suite vs Office 365.  A battle for the ages. And we're here to confuse you...

Intune MDM Case Study — HR Firm Implements Mobile Device Management

Case Study – HR firm gets Microsoft Intune MDM to control company data and applications on mobile devices. With the security of data being harder to control every day, businesses are turning to Microsoft Intune as a bolt on to Office 365 to help secure access to company data.

The Top 10 Reasons Our IT Managed Services Are What You Need

It's easy to be skeptical about a website bragging about their services being better than all the rest -- rightly so, we're all just tooting our own horns here. But we've reviewed what our existing clients love about our IT managed services. What is it that made...

How To Identify A Cyber Attack and 25 Things You Can Do To Recover

So you've had a cyber attack. Whether or not you prepared for it, now you find yourself needing to take action and respond to it. It's quite possible that you weren't even aware of the cyber attack immediately, or for some time after. It can take companies around 200...

12 Point Checklist for Choosing a Business IT Service Company

When you engage a Business IT Service Company to support your business, you expect they will know the technology inside out. A deep understanding of the relevant technology is crucial for any specialist working in IT. However, it's not enough to hire a company based...

11 Firewall Features You Can’t Live Without In Business

A firewall should be part of your overall cyber security mitigation strategy. You’re not a big bank or Apple, so your business is safe from hackers. Right? Unfortunately not. Many hackers actually target smaller to medium organisations because they know SMEs are less...

Cyber Security Case Study – Accounting Firm

We are basing this cyber security case study on a medium size accounting firm. This accounting firm is a family business that employs around 50 staff and based in Sydney. Covering basic bookkeeping to specialised wealth management. For the purpose of this Cyber Security Case Study, we shall protect the identity of this client.

With three sites across Australia and overseas, This Accounting Firm utilises a combination of on-premise and cloud-based infrastructure. As an accounting firm, this client is responsible for protecting highly sensitive information entrusted to them by their customers.

Can Your Business Afford to Violate the Privacy Act?

The Privacy Act is not some obscure governmental legislation for you to ignore. It carries serious consequences (aka hefty fines) to businesses who fail to fulfill their obligations. So, you need to understand what the Privacy Act is about, what are your...

Find Out Why Two Factor Authentication Is The New Security Standard

Two factor authentication (2FA) is a new standard in cyber security protection. In terms of cyber security, it's not exactly a new feature, but nor is it an extreme measure just for top secret databases. You should have noticed by now that many of your accounts have...

Ransomware Case Study – Practice Bounces Back From Attack

Cyber security issues are a delicate top for any business. As a result we will protect the identity of this client in this ransomware case study. For the sake of privacy, let’s call this client This Practice. This client is a specialised medical practice who employ around 30 staff members.

As a specialised practice, our client has a whole floor of sophisticated medical machines and equipment. This high-end equipment is dependent on reliable IT, and stable IT infrastructure.

Network Security And Why It Matters

What Is Network Security? Network security is the practice of protecting your network and its integrity. Network security utilises both hardware and software solutions in order to manage access to the network, identify threats and prevent them from accessing the...

What to do if you are hit by a ransomware attack

Most realizations of a ransomware attack begin with a similar scenario. Staff begin reporting that they are unable to open or access files. When you investigate you see that file names or extensions have been changed and there are documents with ransom payment instructions. You have become the victim of a ransomware attack. The question now is, how do you deal with a ransomware attack and what do you do?

Cyber Crime Rising in Australia Today

Cyber crime is rising at a disturbing rate in Australia and it's clear that many people still don't take it seriously. Australians on the whole don't seem to feel that they are at risk of cyber crime, and therefore don't take the necessary precautions to protect...

How Office 365 Teams Can Empower Your Business

Office 365 Teams is an underrated tool that can be used to effectively transform how you do business. Using a collaboration tool like this, will get you better teamwork, faster results and more effective communication. The modern work environment has evolved to...