SQUARETECH PERTH
Quantum Computing and the Future of Cyber Security: What Businesses Should Do Now
Wed, 05-Nov-2025 10:17
Introduction Quantum computing promises breakthroughs in science and technology — but it also threatens to break much of the encryption we rely on today. ASD and ACSC are encouraging organisations to start thinking about quantum readiness. While the quantum future ...
Read More
Your Business Security Depends on Your Partners: Managing Supply Chain Risk
Wed, 29-Oct-2025 16:34
Week 3: Supply Chain Risk IntroductionIn today’s connected world, your cyber security is only as strong as your weakest supplier. If your vendors, contractors, or service providers have poor security practices, attackers can use them as a gateway into ...
Read More
Legacy Technology: The Silent Risk in Your Business
Thu, 09-Oct-2025 13:31
Introduction If your business is still relying on old software or unsupported systems, you might be holding onto more risk than you realise. Legacy technology is one of the biggest blind spots for small and medium businesses — and cybercriminals ...
Read More
Event Logging: Your First Line of Defence Against Cyber Threats
Thu, 09-Oct-2025 13:34
Event Logging: Your First Line of Defence Against Cyber Threats IntroductionImagine someone walking into your office after hours. If there are no cameras or logs, would you ever know? The same applies to your IT systems. Without event logging, malicious ...
Read More
Why MSP with us?
Fri, 19-Sep-2025 13:28
Why Perth Businesses Are Switching to IT Managed Services (And Why You Should Too) Meet Sarah, owner of a 25-person accounting firm in Perth CBD. Six months ago, her server crashed during tax season, costing her $50,000 in lost revenue ...
Read More
Windows 10 EOL
Mon, 15-Sep-2025 11:57
For nearly a decade, Windows 10 has been the go-to operating system for businesses and home users alike. Reliable, familiar, and widely supported — it’s been a workhorse. But like all technology, it has a lifecycle, and that cycle is ...
Read More
Why Your Multi-Factor Authentication Might Not Be Enough
Tue, 09-Jul-2024 11:13
How Multi-Factor Authentication Can Still Be Compromised Outline: Multi-Factor Authentication (MFA) is a security mechanism that requires multiple forms of verification to prove a user's identity before granting access to a system, application, or account. The goal of MFA is ...
Read More
Protecting Digital Identities: The Frontline in Cybercrime Prevention
Wed, 29-May-2024 12:43
The latest National Scam Report states that in 2023, Australians will have lost AUD2.74 billion to scammers, with identity emerging as the new front line in cybersecurity. A total of AUD 1.3 billion was lost to investment scams, AUD 256 ...
Read More
Unleashing the Dark Side of SAAS: Protect Your Business from SAAS Ransomware!
Thu, 02-Nov-2023 05:15
Software as a Service (SaaS) has dramatically revolutionized how firms work in today's digital world by delivering unparalleled flexibility and convenience of company operations. However, this convenience comes with a significant risk: SaaS ransomware. SaaS ransomware has emerged as one ...
Read More
Cyber Safe Month
Wed, 11-Oct-2023 04:08
Be cyber-wise and don't compromise is the theme for 2023. We want to remind you to "Be cyber wise - don't compromise" this year. You may dramatically increase your cyber security and be more cybersavvy by following these 4 ...
Read MorePost Categories
Featured Posts
Tue, 03-Oct-2023 03:52
Tue, 03-Oct-2023 05:46
Wed, 11-Oct-2023 04:08
Mon, 15-Sep-2025 11:57
Wed, 29-Oct-2025 16:34
Latest Posts
Wed, 05-Nov-2025 10:17
Wed, 29-Oct-2025 16:34
Thu, 09-Oct-2025 13:31
Thu, 09-Oct-2025 13:34
Fri, 19-Sep-2025 13:28
Mon, 15-Sep-2025 11:57
Tue, 09-Jul-2024 11:13
Wed, 29-May-2024 12:43
Latest Posts
Your Business Security Depends on Your Partners: Managing Supply Chain Risk
Wed, 29-Oct-2025 16:34
Week 3: Supply Chain Risk IntroductionIn today’s connected world, your cyber security is only as strong as your weakest supplier. If your vendors, contractors, or service providers have poor security practices, attackers can use them as a gateway into ...
Read More
Email Security and Attacts
Tue, 03-Oct-2023 03:54
A social engineering phone call lends authenticity to the attacker's malicious email Written by Andrew Brandt In the course of performing a postmortem investigation of an infected computer, Sophos X-Ops discovered that the attack began with an innocent-sounding phone call. ...
Read More
Why Your Multi-Factor Authentication Might Not Be Enough
Tue, 09-Jul-2024 11:13
How Multi-Factor Authentication Can Still Be Compromised Outline: Multi-Factor Authentication (MFA) is a security mechanism that requires multiple forms of verification to prove a user's identity before granting access to a system, application, or account. The goal of MFA is ...
Read More
Managed Services Benefit
Tue, 03-Oct-2023 03:49
1. Introduction to Managed Services for SMBs As small and medium-sized businesses (SMBs) strive to stay competitive in today's technology-driven landscape, efficient and reliable IT infrastructure is crucial. However, many SMBs face challenges in managing their IT operations effectively due ...
Read More
Cyber Safe Month
Wed, 11-Oct-2023 04:08
Be cyber-wise and don't compromise is the theme for 2023. We want to remind you to "Be cyber wise - don't compromise" this year. You may dramatically increase your cyber security and be more cybersavvy by following these 4 ...
Read More
Protecting Digital Identities: The Frontline in Cybercrime Prevention
Wed, 29-May-2024 12:43
The latest National Scam Report states that in 2023, Australians will have lost AUD2.74 billion to scammers, with identity emerging as the new front line in cybersecurity. A total of AUD 1.3 billion was lost to investment scams, AUD 256 ...
Read More