A New Chapter in Open-Source Infrastructure We're excited to announce that we've officially joined the Proxmox Partner Programme. This partnership reflects our commitment to providing cost-effective, enterprise-grade virtualisation solutions—and our belief that...
Latest News
IT Services tips to keep you secure while using Public WiFi
Public WiFi isn't limited to just coffee shops and airports these days, they can be found anywhere from malls, hospitals, train stations, sports stadiums and in some parts of the world, even along major roads. Here are some tips taken from an IT services point of view...
Spam and Phishing – Part 2 of 3
Phishing pages migrate to HTTPS Sites have been moving to HTTPS in increasing numbers, and not just legitimate resources. If a year ago a top tip for users was “check that pages requesting personal data are secure,” today a certificate does not guarantee safety:...
Spam & Phishing in 2017 – Part 1
Figures of the year The share of spam in mail traffic came to 56.63%, down 1.68% against 2016. The biggest source of spam remains the US (13.21%). 40% of spam emails were less than 2 KB in size. The most common malware family found in mail traffic was...
Spam and Phishing – Part 3 of 3
Proportion of spam in email traffic The share of spam in email traffic in 2017 fell by 1.68% to 56.63%. Sources of spam by country In 2017, the US remained the biggest source of spam (13.21%). A 6.59% hike in spam distribution pushed China up to second place (11.25%)....
The Weakest Link In Data Protection – The Human Factor
A company's greatest asset - it's employees - can also be its weakest link, especially in an era wherein mobility and accessibility play a huge role in enhancing productivity. Employee negligence puts an organisation in risk 78% of organisations have suffered from at...
The Current State Of Ransomware – Prevention and Detection
One of the recent examples of such an attack is Bad Rabbit ransomware that hit Ukraine and Russia in late October of 2017. Based on the well-known EternalBlue exploit, it targeted old Windows systems that weren’t properly updated. While the exploit itself has already...
Don’t over-complicate or get complacent with your passwords
Passwords are everywhere. From logging in to our social media accounts to buying new shoes, we wouldn’t be able to get much done without first logging in to an account with a password. The problem is, as more and more of our everyday lives have gone online, we’ve had...
How we should accept digital extortion into our lives
Digital extortion has evolved into the most successful criminal business model in the current threat landscape, and Trend Micro researchers predict that it will continue to grow rampant because it’s cheap, easy to commit, and many times the victims pay. The line...
The time to invest in Managed IT services is NOW
CompTIA, the world’s leading tech association, recently released a report about the annual trends in the managed services industry. After analysing its findings, here is a concise argument as to why you should invest in managed IT services, particularly in Sydney. The...
IT services block scam attack: CityLink brandjacked!
Managed IT service providers were once again able to block fraudulent emails to Sydney users. As the holiday season draws nearer and nearer, the scams are becoming more and more prevalent as well. Thankfully, those who are protected by managed IT experts were able to...
Users beware: Malicious apps found in Google Play Store
Many people are lax about their mobile security, downloading apps left and right with no worry about the consequences, since these apps should have been regulated by the publishers. Yet as managed IT service providers know, users in Sydney and all over the world...
Cybercriminals hijack Christmas: Scam emails flood Australian inboxes!
By now we are no longer surprised to see how cyber criminals would go the extra mile just to dupe a handful of people out of thousands. The holiday season is always on the list of opportune times to strike, not only for cybercriminals but also for criminals in the...
Managed IT services security update: Largest Bitcoin mining marketplace hacked, $70 million stolen!
The growth of cryptocurrency continues on. The present price of 1 bitcoin is equivalent to $14,800, a staggering amount in all aspects. Just imagine what you can do with one bitcoin alone—with that much money, you will have endless opportunities in this world. This...
Scam alert: Massive phishing scam targets inboxes
Phishing scams are becoming more and more common nowadays. In fact, we almost see a new one every day, with the scams ranging from very obvious to cleverly executed. Yesterday, security expert MailGuard reports that a massive scale phishing scam was launched. It seems...
Google to restrict third-party devs from injecting code into browser
Have you ever experienced your browser crashing in the midst of an important work? This crash may be caused by a third-party application that is injecting code onto your browser. As it turns out, Google is set to restrict this from happening in mid-2018. According to...
Hybrid Cloud vs MultiCloud: What you need to know
The Cloud, a term that refers to Internet-based software and services instead of locally on your computer, is becoming a business necessity today. Using the Cloud protects your investments, secures your data, and enables telecommuting and enhanced flexibility. In...
Telstra tagged by hackers: How to protect yourself from phishing emails
Leading managed IT service providers identify the latest scam from the arsenal of scammers, this time tagging Telstra, one of Australia’s telecommunications and media company. The large scale phishing attack is well executed, containing the usual interface from the...
Scammers are after your login information, too!
Most people think of compromising your credit card information when you are targeted by cyber criminals. However, an even more common scam is one wherein your login credentials are stolen. Read about this latest scam here. There are reports of the new scam that is...
Fast-fashion retailer Forever 21 the latest victim of data breach
While most companies are gearing up for Black Friday sales this week, it seems that one brand will be busy trying to secure its stores and appearing its customers. Fast-fashion retailer Forever 21 disclosed of a possible data breach in a handful of its stores. The...
Criminals brandjack PayPal: Is your account compromised?
PayPal is one of the most trusted payment gateways in the Internet today. However, not even the most trusted brand is safe from cyber criminals. Read about the latest scam to target consumers and IT professionals here. Leading security expert Mailguard recently...
The importance of partnering with your managed IT services provider
Managed service providers (MSPs) are becoming more and more popular in the tech landscape today. Managed IT service providers, in particular, are becoming instrumental to most companies. IntelliTeK, as one of the leading managed IT service providers in Sydney, is here...
Understanding the Cibecs Advantage – Contact IntelliTeK Today!
In a previous blog, we talked about our latest data protection solutions line offered by Cibecs. Here’s everything you need to know about it. Cibecs is considered as the simplest way to backup, protect and secure business endpoint data. It is a South African developed...
How your business will benefit from Cibecs data protection solution
Data protection is an integral part of every business. IntelliTeK, in a bid to provide you with the best solutions available in the market today, has included Cibecs in its portfolio of products. Find out how Cibecs can enhance benefit your business today. What do...
IntelliTeK: Helping you reach your full potential through managed IT services
There are many managed IT services providers in Sydney, yet there are only few companies that can offer you end-to-end processes that safeguards your data and enhances your productivity. IntelliTeK is one of these companies. IntelliTeK, an industry leader in managed...
4 reasons why outsourcing managed IT services is better than in-house IT
As technology trends continue to rise and fall all over the world, many companies across different industries are at a loss as to how to fully harness the technological advances to their advances. As a result of taking matters into their own hands, many of these...
KRACK attacks vulnerable Wi-Fi’s all over Sydney
Most, if not all of us, utilise Wi-Fi networks in our homes and businesses. If you’re using a mobile device, regardless of the brand and operating system, the chances that you are also connecting to a Wi-Fi network is very probable, too. We’re mentioning this to...
Infringement Notice Scam: Email scam targets Australia inboxes
A new email scam has hit inboxes across Sydney and all over Australia and are bringing IT services experts scrambling. The scam harnesses the urgency of a legitimate issue; in particular, e-ticket infringement notices. An e-ticket is defined by the Queensland Police...
Protect Your Company from These Data Protection Myths
Governments all over the world are cracking down on data protection. Never before has privacy and confidentially been uttered with utmost seriousness in the corporate world. After all, data is the bread and butter of your company. If your data is lost, compromised, or...
Are iOS owners at risk of phishing scam?
Apple sold its billionth iPhone on July 27, 2016, an impressive feat since the brand has been on the shelves for less than 10 years after it was launched on June 29, 2007. It is estimated that at least 700 million iPhones are currently actively being used in the...
Managed IT services nightmare: Security breach affects 17.5 million subs
In the wake of Yahoo’s disclosure that a 2013 data breach affected 3 billion subscribers around the world come this equality terrifying news from Disqus. Disqus, described as a “worldwide blog comment hosting service for websites and online communities that share a...
Another email scam hits Australia
Many companies that offer managed IT services also include impressive security packages for their clients. As the recent spate of phishing attacks in Australia can attest, managed IT in Sydney can improve by a notch or two when it comes to educating users to use...
Flashback Friday – 5 Breakthroughs In Computer Network History
Today we take a look back at some of the amazing advancements in computer networking and how some of them have changed the world and the way we live our lives, forever. The Internet Developed in the late 1960's, the Internet originated from the United States' Advanced...
ANZ Phishing Scam Emails Claim Your Last Payment Was Unsuccessful
So you've received an email this week regarding an unsuccessful transaction on your ANZ bank account? Chances are the email is fake and it is trying to steal your personal credentials. Our friends over at Mailguard have reported a fake phishing scam email originating...
Create Your Own Ransomware Android App Discovered
More bad news for device security as the existence of Android Apps which allow even novice tech users to create their own ransomware has been discovered. What's worse is the app appears to generate ransomware with just a few taps using its friendly UI. The days of...
Be careful who you’re chatting with on Facebook Messenger, malware found
An advanced and potentially malicious Javascript code injector is spreading via Facebook Messenger and it is still unknown as to how it is spreading around. Even though the method is pretty old school it still has the properties of a destructive piece of malware....
Sony PlayStation’s Social Media Compromised, PSN Possibly Hacked
While we hope there aren't any PlayStation Networks accounts hooked up to your office environment, it appears Sony have been compromised by a group claiming to be a 'white hat IT Security' firm. A group of Saudi Arabian hackers calling themselves OurMine posted a few...
8 Google Chrome Extensions Hacked Last Week
Google Chrome, arguably the world's most popular web browser has come under attack last week from hackers who have managed to compromise eight of its extensions which are readily available on the Chrome Web Store. It's believed that hackers compromised one of the...
Security Is The Forefront Of IntelliTeK’s Managed IT Services
IntelliTeK's modern day managed IT services has evolved from providing our clients better, streamlined IT solutions to ensuring our clients are safe from the daily threats of cyber criminals. Almost overnight, cyber security has risen to the top of the agenda when...
We answer a few questions about cyber security and cyber threats
We'll answer some questions about cyber security and provide you with some tips to detect and protect yourselves against online threats. Q: Can regular, non-expert, computer users be trained to handle cyber threats? A: Anyone can be trained to spot the basic of online...
Three mobile ransomware you need to look out for
From file hacking to cryptocurrency stealing to school boy errors, here are three notable mobile ransomware which you should be cautious about. SLocker Largely imitating the Petya ransomware, SLocker combines with the use of the China-based social networking website...
4 reasons why an IT disaster recovery plan is essential for any business
Having an IT disaster recovery plan is an essential business need. People often overlook it because they think that they already have all angles covered or they simply think a 'disaster' won't happen to them. Today in 2017 it's safe to say we are at the peak of cyber...
Another E-Toll phishing scam is hitting our inboxes this week
It seems the cyber criminals have taken a liking to the E-Toll emails as a new phishing email is making the rounds, following on from last month's Road and Maritime Services email scam. Fortunately the latest scam is nothing we haven't seen before and it was easy to...
This Russian mobile banking malware takes over your mobile phone
The "Svpeng" malware has evolved since 2013 and now it has new added functionality to become a keylogger, stealing entered text through the use of accessibility services (Android). On Android, Accessibility Services provides user interface (UI) assistance which aid in...
EnergyAustralia phishing scam emails hitting your inboxes right now
Following similar patterns to previous phishing scams, the emails are designed to trick the recipient into downloading malware. (Credit to MailGuard for the above image) The email looks realistic and to the untrained eye mimics an original email until you look closely...
Top IT Support Issues That You Can (Generally) Fix Yourself
There’s nothing IT support loves more than assisting clients with their tech issues but generally, there are some common issues which you may fix yourself or at least check to make sure that you are indeed doing the right thing. Unable to log in Left the good old Caps...
“Broadpwn” exploit eliminated with iOS 10.3.3 update
This release fixes a serious vulnerability in the Wi-Fi chips used in iPhone, iPad, and iPod touch, which allows an attacker to remotely take control of your device over a wireless network. Like a lot of mobile devices, Apple’s use Broadcom chips for Wi-Fi...
Why managed IT services providers recommend Thin and Zero Clients
Managed IT services providers will almost certainly recommend a setup which allows lightweight computers to replace desktop computers and connect to a server to deliver the software applications that your staff need. Referred to as Desktop Virtualisation, software...
Why should you outsource your IT services?
Small to medium businesses will benefit the most from outsourcing their IT services to a dedicated managed IT services provider. Most businesses are doing so and it continues to be the trend. If you haven't outsourced your IT yet, here are a few points which will...
IT Support News: The Windows 10 Creator Update (RedStone 3)
The much anticipated Windows 10 Creator Update (RedStone 3) is just around corner with it expected to be released around September-October 2017. Also dubbed the "Falls Creator Update" it brings to the table a vast list of improvements to the operating system with a...
New Week, New Ransomware: LeakerLocker steals and shares your data
Downloadable via compromised apps on the Google Play Store, the LeakerLocker ransomware threatens to send all of your pictures, messages and internet browsing history to all of your contacts. Once a compromised app has been downloaded, LeakerLocker locks the phone's...
WatchGuard Security Technologies – #1 Choice for Managed IT Services
We are in the midst of modern day cyber crime where everyone from students to large worldwide organisations are prey for cyber criminal predators. Which is why it's essential that your managed IT services provider offers your business only the best network security...
Fake Android app infects 14 million devices worldwide
Dubbed CopyCat, this malware has already infected 14 million devices and has caused nearly AU$2 million in damages in the space of only two months. Out of the 14 million infected devices, 8 million of them were rooted by the malware, 3.8 million devices were used to...
You may get Malware if you’re interested in the North Korean Missile Program
Last week North Korea claimed that it carried out its first test of an intercontinental ballistic missile (ICBM), the Hwasong-14 and US officials believe the country may have fired a brand-new missile that has not been seen before. No we haven't turned into a...
4 of the most destructive Botnets in recent times
Botnets are underdogs when it comes to cyber security but if orchestrated properly they can cause a world of destruction, as we will go on to talk about later. Firstly, what is a Botnet? A botnet is a when a device which is connected to the internet gets taken over...
If you’re using this WordPress plugin you might want to update it now
WordPress plugin which has been installed on 300,000+ websites around the world has been found to have a "severe" SQL injection vulnerability. Security firm Sucuri were auditing popular open source projects when they came across the vulnerability in the WordPress...
Make software updates a part of your daily regime
Any managed IT services company will tell you about the importance of updating your software especially when most think of it as a chore. Understandably the update reminders and restarts prompts will come at a wrong time but it is essential that you adhere to them on...
What do hackers do with your personal data?
In 2016 fraud and identity theft resulted in $21 billion worth of losses and was proving to be a lucrative gold mine for cyber criminals. Lucrative because it provided hackers with leverage to negotiate ransoms with businesses, organisations and individuals. In some...
WannaCry Ransomware is still around. Right here in Australia!
Weeks after the WannaCry ransomware shut down hospitals and businesses across the world, there have been reports of it successfully causing havoc in Japan and Australia. The self-spreading ransomware is still alive and kicking and the latest victims are Honda Motor...
Europe Under Fire: New Ransomware Takes Over Europe
There have been reports of a huge cyber attack which has, so far, crippled firms, airports, banks and government departments across Europe. Code-named 'Petya', it is bearing similar resemblences to the WannaCry hack. What do we know so far? Ukraine has bared the...
Managed IT Services 101 – 5 Advantages Of Cloud Backup
In light of recent cyber attacks, the spotlight is now on businesses to ensure that they have the right security in place to protect themselves on a daily basis from hackers who are using more and more sophisticated techniques to infiltrate business defences. One huge...
A company has just paid AU$1.3-Million to Ransomware Hackers
A South Korean web hosting company fell victim to ransomware hackers and had more than 150 of its servers compromised. Hackers demanded an equivalent of AU$5.8-million in ransom, but after a week of negotiations both parties agreed a fee of around AU$1.3-million - to...
IT Services Report: ‘Xavier’ malware on the loose on the Google Play Store
IT Services researchers over at Trend Micro have discovered the malicious 'Xavier' malware which come pre-installed on a wide range of Android apps including photo editors, wallpapers and ringtone changers and phone tracking. There are reports of over 800 Android apps...
Microsoft PowerPoint can present you with malware
A new social engineering attack has been discovered in the wild, which doesn't require users to enable macros; instead it executes malware on a targeted system using PowerShell commands embedded inside a PowerPoint (PPT) file. In the past attackers have been...
5 Ransomware Defence Pointers For You And Your Business
Ransomware is now the fastest growing class of malicious software and it has evolved from simple screen blockers demanding payment to something far more dangerous. Don't take the authorities' word Don't rely on word from Government agencies saying they have doused...
Roads and Maritime Services email phishing scam doing the rounds
Another week and another fake impersonation email is hitting Australian inboxes nationwide this week. Looks and feels just like the real thing but of course it isn't. Let's see what this scam email is all about. Looking like a wolf in sheeps clothing, emails...
Three Of The Best Malware Fails Of All Time
There have been some malware goofs in the past which are worth talking about. Ranging from the author's identity being revealed to a decryption key being left on an encrypted machine and even some funny malware names. Let's take a look at the three best malware fails...
DocuSign users may want to read this
Electronic signature and digital transaction management firm, DocuSign, reported email address theft on May 15. Despite there being no loss of personal information during the theft, DocuSign say that a malicious third party gained temporary access to a separate,...
New Fake ASIC Emails Unleashed This Week
Yet another wave of scam emails have been hitting inboxes this week, fortunately it appears to be something that we've seen before. The scam carries the same ingredients as previous scams - fake email, fake link and malware. The first reports of the scam were on...
IntelliTeK Pty Ltd – Top Rated Managed Service Providers Sydney
IntelliTeK is a team of IT professionals who have over 60 years of experience in consultancy, managed IT services and software engineering. We actively work in an environment where positivity stems from the bottom, up. We seek to provide solutions to all problems and...
IT Services Sydney – Why Outsource Your IT?
IT Services Sydney is usually taken care of in-house or outsourced to a managed IT services company. After all every company has their own circumstances and one offering may work best for one company, with the other offering working best for another company....
Hacked In Translation: Streaming movies isn’t safe as you think
You're probably asking, but how? Well it's all to do with the subtitle files themselves and since they usually bypass security software it gives the attacks full control of the system. So that was it in a nutshell. But going into detail, a team of researchers at Check...
Here are 10 ways ransomware has most likely tried to attack you
Ransomware has been trending lately with the recent WannaCry outburst. The rate of infection is definitely on the increase due to cyber criminals' illicit methods of attack. READ OUR RELATED ARTICLE: MANAGED IT RANSOMWARE DEFENCE CHECKLIST The 10 methods of attack...
Web Security 101 – How Secure Is Your Home Router
Modern day web security means you have to keep all your senses open and be alert to any potential breaches to your security. Not everybody includes their home router on the top of their web security priority list and since it is often over-looked, cyber criminals have...
Move over WannaCry, there’s a new Ransomware in town
Adylkuzz is a CoinMiner malware, which means that it employs - without user consent - machine resources to mine coins for virtual currencies. It appears to exploit the same vulnerabilities as the WannaCry ransomware did but in a more stealthier fashion. On paper...
Web Security 101 – Top 5 Least Wanted Malware
Here at IntelliTeK we make web security a number one priority and we have come up with a list of the top five least wanted malware and how to defend yourself against them. Firstly, let’s define what Malware is – Malware is an abbreviated term derived from “malicious...
Global disruption of IT services because of ‘Wannacry’ ransomware
IT services around the world are waking up to the aftermath of the 'Wannacry' ransomware malware which hit a majority of countries around the world in such a short amount of time. IT services across the private and public sectors of most countries have been working...
The WannaCrypt Ransomware Attack – Here’s All You Need To Know
WannaCrypt (or WannaCry, WanaCrypt0r 2.0, Wanna Decryptor or similar) is a ransomware program targeting Microsoft Windows. On Friday, 12 May 2017, a large cyber-attack was launched, infecting over 230,000 computers in 150 countries, demanding bitcoin ransom payments...
IntelliTeK – One of the top managed service providers in Australia
When composing a list of managed service providers in Australia you will definitely see IntelliTeK's name as one of the most efficient, most competitive and most reliable especially when it comes to post-sale requests such as technical support and security. Managed...
Don’t waste your time and energy clicking on this fake email
Fake Origin Energy electricity bills have been making the rounds today and as usual they are pretty convincing and contains a direct link to malware. Thousands of fake emails have reportedly landed in people's inboxes today (May 10th 2017) and the emails look like a...
WordPress Admins Warned To Be Cautious About Potential Hack
WordPress, the world’s most popular content management system (CMS), has found itself in the limelight again for the wrong reasons after an issue which was first discovered back in July 2016 has gone public. The issue was first reported to the WordPress security team...
Be Weary Of The New Google Docs Phishing Scam
Google confirmed that they are aware of the scam and have already taken action to protect users against an email impersonating Google Docs by disabling the offending accounts. The phishing scam followed the same ingredients as other phishing scams by using deceptive...
Why Cloud Services Are More Equipped To Fend Off Email Spam
Email filtering is the process involving the segmentation of certain emails by specific criteria. Included in email filtering is spam filtering where unsolicited and unwanted emails are filtered out so that your inbox or even servers do not get clogged up. Cloud...
Here’s Why Microsoft Has A Cloud Data Centre Under The Ocean
Tech companies such as Facebook and Google have their data centres in colder parts of the world due to the heat, but Microsoft has gone one better and decided to drop a Cloud Data Centre under the sea. Microsoft says that 50% of people live near the coast and dropping...
This Impossible Phishing Attack Is Hard To Detect – Managed IT Report
Hackers use a vulnerability in popular web browsers such as Google Chrome, Mozilla Firefox and Opera to spoof the web address bar with 'legitimate looking' web addresses in order to steal login or financial credentials from users. Millions of Internet users who are at...
A Boost For Web Security? Mastercard’s New Fingerprint Scanner Card
After two successful trials in South Africa, Mastercard are rolling out a payment card which features a fingerprint sensor. The cards are thought to be the first to include both the digital template of the user's fingerprint and the sensor required to read their...
IT Services Advisory: Fake Super Mario Run App Steals Your Data
Released in September 2016 on iOS and March 2017 on Android, Super Mario Run looked to follow in the footsteps of popular mobile games such as Pokemon Go and even Candy Crush but as with most apps nowadays attackers have released versions of these fake apps that steal...
Managed IT Services 101 – Think before you click
It is usually the managed IT services company who mops up after a security breach and more often than not the breach originates from users clicking on things that look normal to click on. Let's take bogus MYOB emails as an example, there have been attempts by cyber...
10ZIG Zero Client Solutions – IntelliTeK are 10ZIG’s sole distributor in the APAC region!
Zero Client VDI Solutions consist of the following qualities: Fastest boot-up possible Lowest power-consumption Most secure data Least amount of IT maintenance A nearly completely OS-free VDI experience 4448 Series Zero Client Value Class Thin Client Model Numbers:...
Here’s why your business needs to upgrade to Microsoft Office 365
Microsoft Office 365 is the fastest growing cloud productivity application and if your business hasn't upgraded to it yet, IntelliTeK can help you install, migrate and manage your personalised Office 365 package. Here are 6 reasons why your business should upgrade to...
6 sneaky techniques criminal hackers use
As the years go by criminals take advantage of technological advances and use it for their own methods of attack. Even the simplest things that we take for granted can be used against us. Here are 6 sneaky techniques that attackers may use to attack with: ...
Choosing The Right MSP For Small Businesses in Sydney
Online security issues in Australia are at an all time high so choosing the best managed IT services team for your Sydney business is paramount. The ACCC (Australian Competition and Consumer Commission) reported a billion dollars in losses last year, due to internet...
Managed IT Services Company, IntelliTeK, is a NSW Government Approved ICT Supplier
IntelliTeK has taken the steps to become a NSW government approved ICT supplier and by doing so means that NSW government agencies can find and procure goods and services directly from IntelliTeK. Below are some of the services that IntelliTeK is now registered to...
10ZIG Thin Client Solutions – IntelliTeK are 10ZIG’s sole distributor in the APAC region!
What are the benefits of Thin Clients? Lower Operational Costs - In an office environment where there are multiple workstations, a thin client setup would definitely equal to lower operational costs especially with all workstations being connected to a single server...
IT Services Predictions – Ransomware to subside in the 2nd half of 2017
The IT services security industry and international law enforcement have joined forces to actively detect and respond to ransomware cases around the world. This is one of the reasons why we believe ransomware will subside in the latter half of this year. The IT...
IT Services Study: CEOs Are Cybercriminals’ Number 1 Target
Cyber criminals imitate the CEO and persuade fellow employees to make an unapproved financial transaction - which goes straight into the pockets of cyber criminals. How do they do it? With very little difficulty. Sometimes you can spend billions of dollars on IT...
The Latest In Ransomware Tricks and Predictions
Ransomware creators have a number of clever tricks up their sleeves to make sure that they go about their business unnoticed and make it difficult to undo their work. Let's take a look at some of their methods. Name Encryption One of the more latest ransomware...
Malware 101
The term malware seems to be making the headlines more frequently these days especially with all the cyber attacks on banks worldwide and businesses on a whole here in Australia. But in order to fully protect your business from the threat of malware it is important to...
Need managed IT services in the Gold Coast area?
Originally based in North Sydney, IntelliTeK are no strangers to acquiring and serving clients Australia-wide. With clients as far out as Alice Springs, IntelliTeK have no issues with providing the best managed IT services to companies and organisations in the Gold...
What Happened When An Organisation Refused To Pay The Ransom
A water company in Arkansas, United States found themselves to be victims of a ransomware attack which encrypted 90,000 files on their server and took only under 2 minutes for it to be completed. Their local managed services provider insisted not to pay the ransom and...


































































































