Stanfield IT Insights

Catch up on the latest insights

Intune MDM Case Study — HR Firm Implements Mobile Device Management

Case Study – HR firm gets Microsoft Intune MDM to control company data and applications on mobile devices. With the security of data being harder to control every day, businesses are turning to Microsoft Intune as a bolt on to Office 365 to help secure access to company data.

The Top 10 Reasons Our IT Managed Services Are What You Need

It's easy to be skeptical about a website bragging about their services being better than all the rest -- rightly so, we're all just tooting our own horns here. But we've reviewed what our existing clients love about our IT managed services. What is it that made...

How To Identify A Cyber Attack and 25 Things You Can Do To Recover

So you've had a cyber attack. Whether or not you prepared for it, now you find yourself needing to take action and respond to it. It's quite possible that you weren't even aware of the cyber attack immediately, or for some time after. It can take companies around 200...

12 Point Checklist for Choosing a Business IT Service Company

When you engage a Business IT Service Company to support your business, you expect they will know the technology inside out. A deep understanding of the relevant technology is crucial for any specialist working in IT. However, it's not enough to hire a company based...

11 Firewall Features You Can’t Live Without In Business

A firewall should be part of your overall cyber security mitigation strategy. You’re not a big bank or Apple, so your business is safe from hackers. Right? Unfortunately not. Many hackers actually target smaller to medium organisations because they know SMEs are less...

50 Powerful Ways to Increase Your Information Security

Information security is a hot topic amongst all the IT experts these days, and they all tell you the same thing. Protect your information. Improve your information security. Prevent data breaches. Look both ways before crossing the street. Yawn... but seriously,...

Cyber Security Case Study – Accounting Firm

We are basing this cyber security case study on a medium size accounting firm. This accounting firm is a family business that employs around 50 staff and based in Sydney. Covering basic bookkeeping to specialised wealth management. For the purpose of this Cyber Security Case Study, we shall protect the identity of this client.

With three sites across Australia and overseas, This Accounting Firm utilises a combination of on-premise and cloud-based infrastructure. As an accounting firm, this client is responsible for protecting highly sensitive information entrusted to them by their customers.

Can Your Business Afford to Violate the Privacy Act?

The Privacy Act is not some obscure governmental legislation for you to ignore. It carries serious consequences (aka hefty fines) to businesses who fail to fulfill their obligations. So, you need to understand what the Privacy Act is about, what are your...

Find Out Why Two Factor Authentication Is The New Security Standard

Two factor authentication (2FA) is a new standard in cyber security protection. In terms of cyber security, it's not exactly a new feature, but nor is it an extreme measure just for top secret databases. You should have noticed by now that many of your accounts have...

Ransomware Case Study – Practice Bounces Back From Attack

Cyber security issues are a delicate top for any business. As a result we will protect the identity of this client in this ransomware case study. For the sake of privacy, let’s call this client This Practice. This client is a specialised medical practice who employ around 30 staff members.

As a specialised practice, our client has a whole floor of sophisticated medical machines and equipment. This high-end equipment is dependent on reliable IT, and stable IT infrastructure.

Network Security And Why It Matters

What Is Network Security? Network security is the practice of protecting your network and its integrity. Network security utilises both hardware and software solutions in order to manage access to the network, identify threats and prevent them from accessing the...

What to do if you are hit by a ransomware attack

Most realizations of a ransomware attack begin with a similar scenario. Staff begin reporting that they are unable to open or access files. When you investigate you see that file names or extensions have been changed and there are documents with ransom payment instructions. You have become the victim of a ransomware attack. The question now is, how do you deal with a ransomware attack and what do you do?

Cyber Crime Rising in Australia Today

Cyber crime is rising at a disturbing rate in Australia and it's clear that many people still don't take it seriously. Australians on the whole don't seem to feel that they are at risk of cyber crime, and therefore don't take the necessary precautions to protect...

How Office 365 Teams Can Empower Your Business

Office 365 Teams is an underrated tool that can be used to effectively transform how you do business. Using a collaboration tool like this, will get you better teamwork, faster results and more effective communication. The modern work environment has evolved to...

Cyber Security for Small Businesses: A Beginner’s Guide

Cyber security for small businesses has different priorities and levels of risk compared to others. As a small business, you are less likely to be adequately protected, and more likely to be targeted for this reason. Depending on what industry you're in can also...

Microsoft Intune Features That Anyone Can Use

Microsoft Intune features a bunch of tools and cyber security benefits for mobile device management within a business. Intune forms a part of the Microsoft Enterprise Mobility + Security package, which is a comprehensive device management suite. Due to being a...

The 20 Best Features G Suite For Business Has To Offer

What’s so great about G Suite for business? For your business, specifically? No doubt you’re fully aware that G Suite is quickly climbing in terms of popularity among businesses, and that people are using it. But at first glance, you may just wonder what’s in it for...

The Best 14 Features of Microsoft Teams in 2018

Microsoft Teams is the ultimate tool for collaborating at work, Teams provides a fully decked out document storage, chat and online meeting environment. Teams is Microsoft’s answer to programs like Slack, or Google Hangouts. If you’ve ever needed to participate in a...

The Top 10 Office 365 Benefits For Your Business

Let’s take a look at how Office 365 benefits your business. Perhaps you’re looking for a better way to work, perhaps your employees are scattered around, or you travel for work. Whatever your reason, you’re weighing your options and now you want to know how Office 365...

Key Points to Consider for a Cyber Security Audit

A cyber security audit is something your organisation should do regularly. For full effectiveness though, you can hire an external specialised cyber security company to do it for you. This is often a good idea as a third-party will have the objectivity required to...

10 Reasons Why You Need a G Suite Partner

Having a G Suite Partner can serve you and business well, regardless if you’ve already made the migration to G Suite, or are still considering it. If you’ve already got G Suite, and are wondering what you could possibly want a G Suite Partner for, then have a look at...

Mobile Application Management – Does Your Company Need It?

Mobile application management is rapidly being adopted as a policy thanks to the growing culture of ‘bring your own device’ to the workplace. This culture has created the need for mobile application management (MAM) in order to control access to internally developed...

G Suite Training: Why It’s Essential For Your Team

Don’t underestimate the value of G Suite training for you and your team. You don’t need us to tell you the benefits of G Suite for your business, you know it already. But you can still benefit from utilising G Suite training for yourself and your team. Even if you’ve...

The Benefits of G Suite For Small Business

The benefits of G Suite for small business are numerous and practical. When you’re in the early stages of determining what system you want for your business, the amount of information can be overwhelming. The first advantage of G Suite for small business is that it’s...

Considerations When Planning an Office 365 Deployment

An Office 365 deployment is not an easy task. It requires careful planning and consideration around many aspects to ensure a smooth deployment that meets the requirements for your organization. So what are the key Considerations When Planning an Office 365 Deployment?

Mobile Device Management for Office 365 with Microsoft Intune

If you’re looking to understand more about mobile device management for Office 365, then read on. You may be looking for a MDM solution and trying to decide between Microsoft Intune and the built-in mobile device management for Office 365, and yes there’s a...

Office 365 Advantages and Why Should My Business Use It?

There are so many Office 365 advantages for businesses of all sizes. We explore below some of the key high level advantages for business. Thanks to Microsoft's evolution into being a provider of cloud-based applications, you've likely heard of Microsoft Office 365.  ...

A Summary of Healthcare Data Breaches in Australia 2018

Healthcare data breaches in Australia are growing at a concerning rate, with this sector being hit the most out of all reported data breaches this year. Of all reported data breaches in Australia across all sectors, healthcare accounted for 20% alone. The next highest...