SQUARETECH PERTH

Card image

Quantum Computing and the Future of Cyber Security: What Businesses Should Do Now

Wed, 05-Nov-2025 10:17

Introduction Quantum computing promises breakthroughs in science and technology — but it also threatens to break much of the encryption we rely on today. ASD and ACSC are encouraging organisations to start thinking about quantum readiness. While the quantum future ...

Read More
Card image

Your Business Security Depends on Your Partners: Managing Supply Chain Risk

Wed, 29-Oct-2025 16:34

Week 3: Supply Chain Risk   IntroductionIn today’s connected world, your cyber security is only as strong as your weakest supplier. If your vendors, contractors, or service providers have poor security practices, attackers can use them as a gateway into ...

Read More
Card image

Legacy Technology: The Silent Risk in Your Business

Thu, 09-Oct-2025 13:31

Introduction If your business is still relying on old software or unsupported systems, you might be holding onto more risk than you realise. Legacy technology is one of the biggest blind spots for small and medium businesses — and cybercriminals ...

Read More
Card image

Event Logging: Your First Line of Defence Against Cyber Threats

Thu, 09-Oct-2025 13:34

Event Logging: Your First Line of Defence Against Cyber Threats IntroductionImagine someone walking into your office after hours. If there are no cameras or logs, would you ever know? The same applies to your IT systems. Without event logging, malicious ...

Read More
Card image

Why MSP with us?

Fri, 19-Sep-2025 13:28

Why Perth Businesses Are Switching to IT Managed Services (And Why You Should Too) Meet Sarah, owner of a 25-person accounting firm in Perth CBD. Six months ago, her server crashed during tax season, costing her $50,000 in lost revenue ...

Read More
Card image

Windows 10 EOL

Mon, 15-Sep-2025 11:57

For nearly a decade, Windows 10 has been the go-to operating system for businesses and home users alike. Reliable, familiar, and widely supported — it’s been a workhorse. But like all technology, it has a lifecycle, and that cycle is ...

Read More
Card image

Why Your Multi-Factor Authentication Might Not Be Enough

Tue, 09-Jul-2024 11:13

How Multi-Factor Authentication Can Still Be Compromised Outline: Multi-Factor Authentication (MFA) is a security mechanism that requires multiple forms of verification to prove a user's identity before granting access to a system, application, or account. The goal of MFA is ...

Read More
Card image

Protecting Digital Identities: The Frontline in Cybercrime Prevention

Wed, 29-May-2024 12:43

The latest National Scam Report states that in 2023, Australians will have lost AUD2.74 billion to scammers, with identity emerging as the new front line in cybersecurity. A total of AUD 1.3 billion was lost to investment scams, AUD 256 ...

Read More
Card image

Unleashing the Dark Side of SAAS: Protect Your Business from SAAS Ransomware!

Thu, 02-Nov-2023 05:15

Software as a Service (SaaS) has dramatically revolutionized how firms work in today's digital world by delivering unparalleled flexibility and convenience of company operations. However, this convenience comes with a significant risk: SaaS ransomware. SaaS ransomware has emerged as one ...

Read More
Card image

Cyber Safe Month

Wed, 11-Oct-2023 04:08

Be cyber-wise and don't compromise is the theme for 2023.   We want to remind you to "Be cyber wise - don't compromise" this year. You may dramatically increase your cyber security and be more cybersavvy by following these 4 ...

Read More


Latest Posts

Card image

Your Business Security Depends on Your Partners: Managing Supply Chain Risk

Wed, 29-Oct-2025 16:34

Week 3: Supply Chain Risk   IntroductionIn today’s connected world, your cyber security is only as strong as your weakest supplier. If your vendors, contractors, or service providers have poor security practices, attackers can use them as a gateway into ...

Read More
Card image

Email Security and Attacts

Tue, 03-Oct-2023 03:54

A social engineering phone call lends authenticity to the attacker's malicious email Written by Andrew Brandt In the course of performing a postmortem investigation of an infected computer, Sophos X-Ops discovered that the attack began with an innocent-sounding phone call. ...

Read More
Card image

Why Your Multi-Factor Authentication Might Not Be Enough

Tue, 09-Jul-2024 11:13

How Multi-Factor Authentication Can Still Be Compromised Outline: Multi-Factor Authentication (MFA) is a security mechanism that requires multiple forms of verification to prove a user's identity before granting access to a system, application, or account. The goal of MFA is ...

Read More
Card image

Managed Services Benefit

Tue, 03-Oct-2023 03:49

1. Introduction to Managed Services for SMBs As small and medium-sized businesses (SMBs) strive to stay competitive in today's technology-driven landscape, efficient and reliable IT infrastructure is crucial. However, many SMBs face challenges in managing their IT operations effectively due ...

Read More
Card image

Cyber Safe Month

Wed, 11-Oct-2023 04:08

Be cyber-wise and don't compromise is the theme for 2023.   We want to remind you to "Be cyber wise - don't compromise" this year. You may dramatically increase your cyber security and be more cybersavvy by following these 4 ...

Read More
Card image

Protecting Digital Identities: The Frontline in Cybercrime Prevention

Wed, 29-May-2024 12:43

The latest National Scam Report states that in 2023, Australians will have lost AUD2.74 billion to scammers, with identity emerging as the new front line in cybersecurity. A total of AUD 1.3 billion was lost to investment scams, AUD 256 ...

Read More

SQUARETECH PERTH

CONTACT US

Main Office:

Address

Unit 1/872 Beaufort St, Inglewood WA 6052

Call us on

(08) 6377 7449

Opening Hours

Mon to Fri - 08.30 am to 5.30 pm
Sat & Sun - CLOSED