Latest News

Home 5 Blog ( Page 2 )
6 sneaky techniques criminal hackers use

6 sneaky techniques criminal hackers use

As the years go by criminals take advantage of technological advances and use it for their own methods of attack. Even the simplest things that we take for granted can be used against us. Here are 6 sneaky techniques that attackers may use to attack with:  ...

read more
Choosing The Right MSP For Small Businesses in Sydney

Choosing The Right MSP For Small Businesses in Sydney

Online security issues in Australia are at an all time high so choosing the best managed IT services team for your Sydney business is paramount. The ACCC (Australian Competition and Consumer Commission) reported a billion dollars in losses last year, due to internet...

read more
The Latest In Ransomware Tricks and Predictions

The Latest In Ransomware Tricks and Predictions

Ransomware creators have a number of clever tricks up their sleeves to make sure that they go about their business unnoticed and make it difficult to undo their work. Let's take a look at some of their methods. Name Encryption One of the more latest ransomware...

read more
Malware 101

Malware 101

The term malware seems to be making the headlines more frequently these days especially with all the cyber attacks on banks worldwide and businesses on a whole here in Australia. But in order to fully protect your business from the threat of malware it is important to...

read more
Need managed IT services in the Gold Coast area?

Need managed IT services in the Gold Coast area?

Originally based in North Sydney, IntelliTeK are no strangers to acquiring and serving clients Australia-wide. With clients as far out as Alice Springs, IntelliTeK have no issues with providing the best managed IT services to companies and organisations in the Gold...

read more
What Happened When An Organisation Refused To Pay The Ransom

What Happened When An Organisation Refused To Pay The Ransom

A water company in Arkansas, United States found themselves to be victims of a ransomware attack which encrypted 90,000 files on their server and took only under 2 minutes for it to be completed. Their local managed services provider insisted not to pay the ransom and...

read more
Cloud Computing Begins With Hybrid Cloud Services

Cloud Computing Begins With Hybrid Cloud Services

Hybrid cloud is an environment which has both private and public cloud services, and this is where public cloud resources are easily consumed and integrated into the day-to-day operations of an organisation. It is safe to say most companies will use a combination of...

read more
‘Nigerian Princes’ snatch billions via fake emails

‘Nigerian Princes’ snatch billions via fake emails

An Interpol-Trend study found that between October 2013 and May 2016, scammers walked off with more than US$3bn having exploited fake email techniques globally. Their techniques, which are no secret on Aussie shores, have slowly evolved from 'send money' emails back...

read more
Don’t get caught Netflix & Chillin’ with this fake app

Don’t get caught Netflix & Chillin’ with this fake app

A fake Netflix app has been discovered by cyber-security experts, which can take over your device and spy on you. The device gives strangers access to your phone's camera, microphone and messages so they have access to your life - potentially allowing them to take...

read more
Be wary of wearables – Managed IT Services Sydney

Be wary of wearables – Managed IT Services Sydney

Global spending on managed IT services, particularly in the area of security, is projected to go as high as $350 million this year, more than a 23% increase from last year’s $281.5 million spent in the global market. In the latest study in the managed IT and security...

read more
Updates For Businesses With Managed IT Support in Sydney

Updates For Businesses With Managed IT Support in Sydney

Small to medium sized businesses today are able to compete with global brands, thanks to the world wide web, but cyber criminals are unfortunately targeting these small to medium sized enterprises that is why it is essential to have managed IT support services for...

read more
Managed IT Ransomware Defence Checklist

Managed IT Ransomware Defence Checklist

It's easy to get your business any managed IT service provider and let them handle all your IT security for you but not all are willing to detail the steps that they will take to defend your business from cyber attacks. Here's an IntelliTeK checklist to effectively...

read more
Why We Believe In Amazon Web Services (AWS)

Why We Believe In Amazon Web Services (AWS)

Even though Amazon Web Services (AWS) hasn't been in the spotlight as much as its competitors, we here at IntelliTeK are firm believers that AWS is great for building a business from the bottom as it provides all the tools necessary for companies to start up with the...

read more
Global Banks Under Attack From New Malware

Global Banks Under Attack From New Malware

Watering hole attacks attempt to infect more than 100 organisations in 31 different countries in a new wave of attacks which has been underway since at least October 2016. The attackers used compromised websites or “watering holes” to infect pre-selected targets with...

read more
Managed IT Services: Your Small Business Is Vulnerable

Managed IT Services: Your Small Business Is Vulnerable

An increasing number of ransomware and cyber attacks target small businesses and startups, with ransoms ranging from from a hundred of dollars to 6-figure thousands of dollars - although there have been reports of ransoms going as high as millions for larger...

read more
Yahoo Issues New Email Hack Warning

Yahoo Issues New Email Hack Warning

Yahoo's newly issued warning to users about malicious hacks is related to a third data breach that the company disclosed in December 2016. A warning sent to some Yahoo users Wednesday read: "Based on the ongoing investigation, we believe a forged cookie may have been...

read more
Quick Defence Tips Against Business Process Compromise

Quick Defence Tips Against Business Process Compromise

Business Process Compromise (BPC) is a type of attack that has come into focus recently. It particularly targets the unique processes or machines facilitating these processes to quietly manipulate them for the attacker’s benefit. Attackers infiltrate the enterprise...

read more
Android Ransomware – An old but effective technique

Android Ransomware – An old but effective technique

Android.Lockdroid.E is spread via 3rd party app stores as well as doing the rounds on various text/SMS (URLs) messages and forum posts. It targets primarily rooted devices and attempts to drop a version of itself on the rooted device. or if the device is not rooted it...

read more
Citibank Fraud A Nightmare For Managed IT Services Providers

Citibank Fraud A Nightmare For Managed IT Services Providers

We've seen them before and they come in all shapes and sizes - now they are impersonating Citibank customer emails to make it seem as if you've been locked out of your online banking account, making you enter your login credentials. The elaborate scam involves sending...

read more
Can My Small Business Afford Managed IT Services?

Can My Small Business Afford Managed IT Services?

Managed IT is substantially a proactive outlook in dealing with your business computers and IT concerns. IT solutions before now, and it still is in some cases, was mainly on a reactive approach where IT professionals are contacted and brought in when something...

read more
All about Managed Security: IT Services in Sydney

All about Managed Security: IT Services in Sydney

Do you need help managing your IT services in Sydney? More and more companies are outsourcing their IT needs to managed IT service providers so they can focus on growing their business rather than focusing on the technical stuff. A managed IT service Sydney provider...

read more
Why IntelliTeK can be your IT support company in Brisbane

Why IntelliTeK can be your IT support company in Brisbane

Just because you're located in Brisbane, doesn't mean you have to acquire an IT support company in Brisbane too. The world we are living in means clients, customers and the general service offering can be managed and controlled from anywhere, thanks to 24/7 remote IT...

read more
Make these 5 tips your cybersecurity habits

Make these 5 tips your cybersecurity habits

As better technology rolls out on a daily basis, hackers have equally become more sophisticated with their ways of infiltrating their victims defences. Here's five quick tips which should point you in the safer direction. Enable 2FA 2FA or Two-factor authentication is...

read more
Managed IT Services 101: Data Migrations

Managed IT Services 101: Data Migrations

A Data migration is the process of moving data between computers, servers, networks or storage devices. Data migration is categorized as storage migration, database migration, application migration and business process migration. These scenarios are routine IT...

read more
Managed IT Services Nightmare: The Malicious Click

Managed IT Services Nightmare: The Malicious Click

Picture the scenario, it's a Friday and you've just got back from lunch, so you open your inbox and see that someone has updated a document in one of the Dropbox folders. You click on the button in the email which takes you to your Dropbox space - but what a minute,...

read more
The Role of Managed IT Support in Day to Day Operations

The Role of Managed IT Support in Day to Day Operations

For every business entity, prime results and quality work performance are the main priorities to ensure standards are kept and your company goes to the top of your league. But to do that, you must have your focus and attention dedicated to the centre of your business...

read more
Why Businesses Are Turning To Managed Service Providers

Why Businesses Are Turning To Managed Service Providers

Managed Service Providers (MSPs) have increasingly been sought after to handle all things IT related for businesses who wish to outsource or collaborate with external IT partners. A pattern has emerged during recent times which has seen businesses opt to outsource...

read more
5 Reasons Why You Should Leave Your IT Support Company

5 Reasons Why You Should Leave Your IT Support Company

Often, business partnerships are like some relationships, good in the beginning but struggle as time goes by. The same can apply for IT support companies who are called upon to provide a service for businesses where unfortunately the negatives are magnified more than...

read more
5 Mobile Malware Threats That You Should Look Out For

5 Mobile Malware Threats That You Should Look Out For

Sometimes swiping left or right maybe an ugly option. But swiping right may lead to undesirable consequences due to the simple fact of being fooled by downloading and using fake apps which may leave your private videos and photos being leaked all over the Internet....

read more
What To Expect From A Brisbane Managed IT Services Provider

What To Expect From A Brisbane Managed IT Services Provider

You and your enterprise may have encountered technical concerns that have led you to decide that you need the help of a managed IT services provider for your Brisbane business. IT managed services providers in Brisbane offer various services and packages but here are...

read more
Managed IT Support Tips: Avoiding Ransomware

Managed IT Support Tips: Avoiding Ransomware

Be wary of emails containing invoices that are masquerading under a Microsoft Word document file because it may contain ransomware. Having a managed IT support team that can help filter emails can make a world of difference in trying to keep your business data safe...

read more
6 Digital Threats During The Christmas Period

6 Digital Threats During The Christmas Period

It's that time of the year again, and more and more people than ever are buying gifts and presents online than by traditional methods. Let's face it, unless you're buying food, who doesn't want to do their Christmas shopping online from the comfort of their own homes...

read more
Ransomware: Past, Present and Future

Ransomware: Past, Present and Future

For more than a decade, ransomware has been doing the rounds and targeting computer users to an almost personal level. But now ransomware is becoming a huge problem for businesses of all sizes, regardless of industry. Designed for financial gain, ransomware is an...

read more
2016: The Year Of The Hacks

2016: The Year Of The Hacks

Ranging from data breaches, personal identifiable inforation (PII) theft and alleged hacking of party officials during the US elections, 2016 saw a vast number of cyber attacks. We look back at them and see how those attacks will play out in 2017. Personal Device...

read more