TCT News

Notifiable Data Breaches (NDB) Scheme & Your Company

Starting from the 22nd February 2018, the NDB Scheme will come into effect for a wide range of organisations. Companies with an annual turnover of more than $3 million, or those with pre-existing obligations under the Australian Privacy Act will be required to comply. A company that experiences a data...
Read more

Happy New Year and Welcome to 2018

From everyone at TCT – Happy New Year. We hope everyone had a good break and enjoyed some time off. As always, TCT was here to support our clients during the holiday period – we never close. Between Christmas and New Year, we answered 66 calls and received 52 emails....
Read more

Happy Birthday TCT

Today marks TCT’s 20th birthday. The company was started back on 15 December 1997, working out of a second bedroom unit. Over the following years, we out-grew our home based office and many residential offices in Top Ryde. In 2003 we made the big step of buying an office in...
Read more

2018 – The Year of Cyber-Security

As 2017 comes to a close with Christmas just around the corner, there are many things 2018 is predicted to bring to the IT table. Namely, a lot more ransomware, encrypted files and other yet to be seen cyber-attacks. This is one area of IT that is not going to...
Read more

The Downside of Endpoint Diversity

Today, businesses use more devices over more connections than ever before. The network perimeter extends to wherever your colleagues happen to be. And of course more devices and more software means more vulnerabilities. With attacks doubling in number each year and growing in sophistication, it’s hard to stay on of...
Read more

Wireless Security Network Update

On October 16, 2017, Belgian security researchers made public their findings that demonstrated fundamental design flaws in WPA2 that could lead to attacks on wireless networks. Named KRACKs, or key reinstallation attacks, this technique can theoretically be used by attackers to steal sensitive information from unsuspecting wireless users leveraging these...
Read more

Bad Rabbit Ransomware Attack

On Tuesday, Oct. 24, a new strand of ransomware named Bad Rabbit appeared in Russia and the Ukraine and spread throughout the day. The initial installer masquerades as a Flash update but is believed to be an updated version of NotPetya, since the infection chain and component usage is identical. ...
Read more

5 Phases of a Cyber Attack

No one has resources to do everything perfectly. In cyber security, your goal should be constant improvement. Knowing your enemy’s objectives helps. What happens in each phase of an attack? Here, F-Secure Cyber Security Team lay it out for us:   Phase 1: Recon Timeline: months before detection The attacker’s...
Read more

F-Secure Declares That ‘Parental Control’ Is Dead

F-Secure’s flagship products now enable parents to set boundaries online the way they do in the real world. F-Secure now offers protection for the whole family with the latest version of its flagship products SAFE and TOTAL. The new Family Rules feature available in both products help families stay safe...
Read more

What Version of Office are you using?

In 3 months’ time (Oct 2017), all support for the Office 2007 ends. This means Microsoft will no longer supply patches for security vulnerabilities or fixes for other bugs, nor will it provide company-assisted technical support, whether free or paid, such as by-phone consultations or trouble-shooting. Is your business still...
Read more