Contact us: +61 7 3505 5000

Customer Experience – Rising to the Challenge

We all know that when working with customers, close enough should never be good enough.  This is especially true if you want to retain customers and grow.  Murphy’s Law lies in waiting, only a moment away, ready to strike at the worst times despite all good intentions and quality systems. Everyone has heard that news [...]

Read More...

Read More

The Ergonomics of Working Anytime, Anywhere

As technology is forever reaching new heights and changing the way we work, our health increasingly suffers in more ways than we are aware. How do we fix this? Get moving. In 1990 the Australian Standards for screen-based workstations was written and at the time this only included a desktop computer on a permanent desk, [...]

Read More...

Read More

Does your password need to do some strength training?

A recently released Data Breach Investigations report identified that 63 percent of confirmed data breaches involved weak default or stolen passwords. This asks the question, is multi-factor authentication a critical component to any organisation’s approach to data security? Due to the costs and complexities involved with deploying this type of security, SMB’s have not deployed [...]

Read More...

Read More

Work Smarter, Not Harder?

Over the past few months I have heard the saying “work smarter, not harder” dozens of times, however I personally never knew what it meant. How could someone work hard but not smart? I took it upon myself to dive into research and define what it means, and how it could relate to my day [...]

Read More...

Read More

Is Your Mobile Phone Running Your Life?

I, like most people, take my mobile phone with me (almost) everywhere I go. I use it for standard features such as phone calls and text messages, as well as an organiser with (multiple) reminders, managing several email accounts (personal and work), various social media platforms (again personal and work), camera and video features, banking, [...]

Read More...

Read More

Tech Brief – Business Email Compromise (BEC SCAM)

Tech Brief – Business Email Compromise (BEC SCAM) According to the World Economic Forum Business Email Compromise (BEC) or CEO Email Fraud cost organisations over $3.01 billion in 2015 and 2016.  These are staggering figures that cost organisations of all sizes enormous amounts of money in direct costs, lost revenue, lost goodwill with customers, and [...]

Read More...

Read More

Is Your Company Ready for a Ransomware Attack?

There are two types of ransomware in circulation: Ransomware is a sophisticated piece of malware that blocks the victim’s access to their files. 1. Encrypting ransomware, which incorporates advanced encryption algorithms. It’s designed to block system files and demand payment to provide the victim with the key that can decrypt the blocked content. Examples include CryptoLocker, Locky, CrytpoWall and more. 2. Locker ransomware, [...]

Read More...

Read More

It’s Time To Get Aggressive About Data Protection

How often do you backup your business critical data?  I would hazard to guess that the answer to that question from most organisations is once daily, normally after business hours.  There is nothing unusual about that, it is an fairly common and acceptable methodology now days. But have you ever really taken the time to [...]

Read More...

Read More

The 7 Biggest Classroom Technology Trends and Challenges

From first-hand experience, I have heard many educators list a number, if not each of the 7 noted trends/challenges as real obstacles currently being faced by their school.  I’ve included a link to the blog as published below for your reading. http://www.securedgenetworks.com/secure-edge-networks-blog/bid/102803/7-Biggest-Classroom-Technology-Trends-and-Challenges Aliva have solution outcomes that can assist Educational institutions address many of these [...]

Read More...

Read More