Apple’s M1 Chip – A Game Changer!
Apple recently unveiled their new series of Mac computers with the all-powerful M1 chip designed spe...
IT SupportContact Us
Total Computer Technology has been working in the IT service industry for over 20 years and has built a solid reputation for handling all facets of IT computer support for Sydney, Melbourne and Horsham clients.
Like many businesses we currently support and work with, you may require assistance with your communications and IT, but are unable to hire the people who are experienced enough to navigate business solutions and technologies.
Struggle with the slow response speeds, fast comprehensive fixes or the operating hours of your current IT Support provider?
Do you need a comprehensive business solution for your infrastructure, applications and data?
Do you find yourself bombarded with technical language and complexities, when you just want to focus on your business?
Need to achieve peace of mind that your valuable data is protected from an evolving cyber threat?
Business no longer stops at 5pm, which is why our local teams work extended hours to be there when you need us.
We hold years of expertise in delivering a wide-variety of technical solutions that solve many business challenges you face.
We proudly work as an extension of your team, always acting in your best interests to solve any technical obstacles.
We place cyber security at the heart of everything we do. Employing best cyber practices your business secure & compliant.
Our locally based teams in Sydney, Melbourne and Horsham provide our clients with timely and specialised knowledge, letting you focus on running your business.
A wide variety of solutions, professional expertise, managed services and support to help you overcome any business challenge the right application of technology. Our services include IT Support, Cloud, Cyber Security, Backup & Disaster Recovery and Business Continuity.
Prompt, reliable and comprehensive support for your IT infrastructure and services - delivered both remotely and on-site.
Data, productivity, collaboration and communication services that keep your team effective and connected wherever they need to work.
Cutting edge defences, monitoring, advice and education to keep your valuable data and systems fully protected to an evolving cyber threat.
Consultative advice, guidance and competitive supply of anything and everything you need to empower your workforce with the right tech.
By applying the best technology tools, it enables your team to work productively from anywhere, anytime.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi dignissim pulvinar facilisis. Curabitur condimentum leo a diam sodales, sit amet placerat orci facilisis. Praesent luctus, quam vitae lacinia convallis.
Richard Butler - Company.co.uk
Apple recently unveiled their new series of Mac computers with the all-powerful M1 chip designed spe...
Amazon brings unwanted holiday gifts to businesses Everyone loves giving and getting gifts – it...
Remote workers are a juicy targets for ransomware attacks! The global pandemic has changed the way t...
As we head into the last weeks of 2020 (finally!), businesses are starting to take stock of what the...
Ransomware Recovery is Long and Expensive. Ransomware has been the story of the year in cybersecurit...
Pharmaceutical companies have a tough week with hacking as manufacturing is disrupted at COVID-19 dr...
Too many privileged credentials can lead to disaster How many administrator or above credentials are...
Get your cyber action plan ready because they are coming for your business. Small to medium business...
Securing highly privileged executive and administrator accounts has to be a high priority for every ...
Rising breach costs call for increased email security to protect your data from being compromised. A...
Hackers for hire are here to steal corporate secrets. As the rise of “as a service” cybercrime c...
Cyberattack risks and data breach costs are on the rise in 2020 There’s no doubt that 2020 has bee...
Growing Dark Web data dumps are fuelling new Cyber crime. These types of data dumps have been a sour...
Healthcare breaches climb as attackers branch out When we think about a healthcare data breach, we...
Software as a Service (SaaS) is becoming more and more common across pretty much all software types ...
Like their counterparts who run legitimate businesses, cyber criminals need hosting and cybersecurit...
The World Has Changed. So Has the Dark Web. COVID-19 has affected every corner of the world – ...
Passwords are the codes that both access and protect your company’s data, but like the traditi...
Double Extortion Ransomware is in Fashion In a tough economy, everybody’s looking for a way to mak...
It has been said, that in todays world, more people own a mobile phone than a toothbrush. With so ...
Cybercrime Boom Means Data Breach Risks are Rising In a challenging economy, even cyber criminals ha...
Multifactor Authentication is a Security Must-Have in 2020 Today’s risk landscape is more complica...
The last decade has seen a huge growth of ransomware and malware attacks, the severity of which has ...
Third Party Data Breaches Endanger Every Company Just because your company hasn’t had a data breac...
Upgrading old computer hardware can be a huge expense for any business, but can be especially keenly...
The Ransomware Tide is Rising Worldwide No industry is immune to ransomware attacks. Just last week,...
Australian Cyberattacks Prove That Threat Resistance Training is Always a Good Investment Sophistica...
Improving password security improves all of your defences, especially for identity protection. O...
Choosing the right printer can be difficult, especially when there are so many options. Naturally th...
Ransomware is everywhere, and every company is at risk Ransomware is a growing menace to companies o...
This global uncertainty is stressful for many businesses. Everyone is doing it tough at the moment. ...
460 Million Records Reported Stolen in May A tally of May cybersecurity instances found that 4...
To curve or not to curve, this is the question! Whether you’re gaming, working, studying, or even ...
Small businesses suffer more than a quarter of all breaches According to Verizon’s 2020 Da...
Cyber Insurance Agencies increase scrutiny of COVID-19 claims as the pandemic increases their submis...
Cybersecurity involves some big numbers: Never-before-seen threat variants are up 145% year-on-year....
2/3 of Consumers Reuse Their Passwords on Multiple Platforms Despite years of advocacy for strong, u...
Cybercrime Increased by 300% Since COVID-19 Pandemic Began By now, many organizations are well aware...
Hackers use stolen credentials to attack hospitals and medical facilities with ransomware Since the ...
A solid state drive (SSD for short) is the newer technology of the traditional hard disk drive (HDD ...
Thousands of Zoom Credentials Available on Dark Web As we recently reported, Zoom and other video co...
Here at Total Computer Technology we like to do our part for the environment by recycling as many it...
Online retailers see surge in Cyberattacks amidst COVID-19 Crisis The COVID-19 pandemic has relegate...
One of the most frequent questions we are asked by customers is “what’s the difference between i...
Social isolation puts company data at risk As the COVID-19 pandemic continues to cause chaos for bus...
World Backup Day is Today! Did you know that World Backup Day is an independent initiative to educat...
How to Avoid Data Breaches While Working From Home The COVID-19 pandemic has reshaped the way we wor...
Human Error is a Top Cause of Data Breaches Companies face cybersecurity threats on many fronts ever...
With a dynamic workforce, employers are trusting their remote workers to safeguard their corporate n...
IBM Threat Report Presents Risks for 2020 The latest IBM threat report examines the threats facing...
Phishing Scam Invokes Executive to Trick Employees An employee of an aged care facility in Australia...
You might be surprised to know that using NON genuine toners in your printer can void its warranty. ...
Ransomware attacks are causing more downtime than ever before Ransomware attacks are becoming more f...
UK Businesses Endured an Attack Every Minute in 2019 For companies around the world, 2019 was a terr...
We are very pleased to announce that Canon have been awarded 2020 Pick Awards from Keypoint Intellig...
60% of Digital businesses will suffer service interruption by 2020 For many businesses, an online pr...
Ransomware attacks are impacting businesses of every size in every sector This malware, which restri...
As the work force becomes more mobile, it makes sense for a businesses to consider Microsoft’s O36...
New Threat Actor Impersonates Government Agencies Cybersecurity researchers are warning consumers of...
Small businesses can’t always be across up skilling staff in IT practices. To really succeed, comp...
Google Has Access to Personal Health Information of Millions of US Patients Recently Google pa...
The purpose of IT disaster recovery testing is to discover flaws in your disaster recovery (DR) plan...
Data Breaches are pushing SMBs into Bankruptcy A recent survey by Zogby Analytics confirmed what man...
Maybe these sound familiar? They take forever to answer simple enquiries. Deals with problems only w...
Australian CEOs Fail to Appreciate Cyberthreat Today, data breaches are top-of-mind for companies an...
Businesses underestimate the threat of stolen employee data. While every business is busy finding wa...
20,000 E-commerce Sites Could Be Compromised by Magecart Providing an online shopping experience is ...
2019 on Pace to Set Data Breach Record You could already guess that data breaches are increasing. T...
Business Email Compromise Overtakes Ransomware with Insurance Claims By virtually every metric, phis...
Data Breaches Expected to Cost Businesses $5 Trillion by 2024 By now, every business should be aware...
Data breaches have increased 54% in 2019 so far. Which means more than 3,800 data breaches have hit ...
ACSC Warns Australian Small Businesses about BlueKeep Vulnerability According to a warning by the Au...
Proof that ransomware attacks are targeting Small Medium Businesses. German SMBs are the target of a...
New Malware Strain Targets Windows Users A new malware strain, SystemBC, targets Windows computers w...
Australian Consumers Demand Data Security. According to a recent survey of Australian consumers, con...
Ransomware Targeting Attacks on Network Attached Storage (NAS) Devices According to recent findings ...
Company cut off from Government Contracts after Data Breach Last month, Perceptics, a maker of licen...
Just halfway through 2019, Australians have already lost more than $6 million to internet scams, mar...
Awareness Tops Readiness in Cybersecurity Preparedness Many organisations are well-aware of their cy...
Three Billion Phishing Emails are Sent Every Day Phishing attacks are wreaking havoc as they encoura...
The recent WhatsApp breach was very sophisticated and clever in the manner it was delivered. And tha...
Australian Universities at Significant Risk of a Cyber Attack A recent audit of the IT environment f...
Unpatched Vulnerabilities Are a Top Threat. Today’s cybersecurity landscape is incredibly daunting...
Microsoft Office 365 users have been the target in a phishing campaign. Users of Microsoft’s popul...
Cyber criminals are becoming increasingly sophisticated in delivering realistic and almost identical...
Mobile Banking Malware Increases by 58% According to a recent report by Kaspersky Lab, mobile bankin...
This week, hackers continue to phish for patient data from US healthcare providers, a British police...
Phishing and identity theft make top three most reported scams in 2018 with the ACCC reporting losse...
As you’ve probably noticed from tuning into our weekly newsletter, ransomware attacks are increasi...
Almost half of Australian businesses have experienced a cyber-attack in the last year, which is a ri...
Traditionally, payment credentials stolen from brick-and-mortar stores were able to command a higher...
When Windows 7 reaches its End of Life phase on January 14, 2020, Microsoft will stop releasing upda...
Only 5 months into 2019 and Cyber-attacks are soaring through the roof. It’s no surprise that cybe...
Ransomware attacks are one of the scariest and most reported cybersecurity threats, and a recent rep...
The results from a data breach can be devastating, not only for your business, but for all your clie...
It’s HERE! The 2019 SonicWall Cyber Threat Report. You may not be surprised to learn that if a net...
Each year in Australia there are thousands of cyber breaches to businesses. While most of these brea...
World Backup Day is this Sunday 31 March. Not sure if you have heard of the phrase “Your Data Is.....
Why small businesses struggle with cybersecurity best practices? A recent report unveiled that almos...
Microsoft Office 2010 will reach its end of extended support on October 13, 2020. If you haven’...
Did you know that data never expires on the Dark Web? In the ongoing slew of mega data breaches, it...
In the past, being a small business was enough to divert hackers from targeting your company. Howeve...
The weakest link in your security is often the one you place the greatest trust in. Your users unkno...
According to a recent study from PCI Pal, 41% of consumers in the UK said that they would stop spend...
There’s a common misconception that data in the cloud is fully backed up. Did you know that it...
F-Secure has won its sixth and seventh AV-TEST Institute’s Best Protection Award. The accolades re...
In this week’s security news, highly-sensitive medical conversations accessed from a Swedish healt...
What we can do to stop putting our data at risk of identity theft? 5 quick and easy tips for......
2017: The Year of Cryptojacking. 2018: The Year of Ransomware. 2019? It’s shaping up to be the Yea...
A global attack could cause $200bn in damage – and we’re just not ready A worldwide cybe...
Most news coverage surrounding data breaches will hint at the erosion of customer loyalty, but what ...
Do you know that 91% of all Cyber-attacks start with an email? It’s not surprising considering tha...
Since the widely anticipated installation of the EU privacy law known as the General Data Protection...
As phishing attacks evolve in sophistication, human resource and finance teams are becoming caught i...
As the historical debate surrounding work-from-home (WFH) policies continues to reach news headlines...
The Leaders of Genomics England has revealed that foreign hackers have attempted to access the DNA d...
A new report has shed light on the fact that not only are email-based attacks on the rise, but they....
This week, Amazon experienced technical issues, and cybersecurity culture isn’t where it needs to ...
Magecart is a credit card skimming malware, used by different unrelated groups that attack in a simi...
A financial breach of epic proportion has occurred in Pakistan, with hackers making off with data fr...
As Christmas is just around the corner, we are finding lots of Christmas Best Of collections now ava...
When looking for a job, usually you would check one of the many job hunting sites you see in commerc...
Facebook announced earlier this month that the world’s largest social network had identified “a ...
New research has revealed that a whopping 90% of all malware is delivered via email. It was also dis...
Did you know that the cost of keeping a 4 year old PC could be as much as $3,800 per......
This week brings a sinister revelation of China using a tiny chip to infiltrate USA Companies. The a...
Big News this week with Facebook being breached! The breach was the largest in the company’s 14-ye...
October is National Cybersecurity Awareness Month (#NCSAM) and the perfect time to review your netwo...
The well-known Magecart group of hackers are at it again. They targeted Newegg, one of the America...
If we asked 100 small to medium business if they had a plan to keep their business running should th...
This week’s report is a little closer to home, with the Perth Mint being breached. While the incid...
This week the average person gets their own back, with news of a Tor (Dark Web) site being breached ...
This week sees targeted breaches in the hospitality and airline verticals. It has also been reports ...
The national consumer watchdog has revealed that Australian small businesses reported losses of more...
Phishing and compromised databases still rule the day. We highlight incidents involving a New York-b...
Email has been a go-to method of distributing malware for years, and the reason why is simple: It...
This week we saw mobile apps making headlines. Tinder was used by a potential spy to unsuccessfully ...
As the IT environment evolves, the common factor in all this is the human factor. You can have all t...
This week contains the high-profile breach of Reddit, healthcare and education sectors and an explor...
This week there were a few troubling breaches that stood out, especially the identity theft company ...
It is interesting to know that about 184 million commercial PCs – in small- and mid-sized busi...
Australian companies are increasingly under the threat of Cyber crime. The latest Global Economic Cr...
This week serves up a reminder why medical data should be handled with care, as it’s among the mos...
A recent study conducted by IBM provides some context to the same old story that you hear in the new...
This week we have seen a ton of media attention about the dark web markets, what is bought and sold....
Overall a relative slow week in breaches, but not in the severity of the breaches! A cyber-attack co...
Hackers have been breaking boundaries across international waters from North America to Australia. I...
It’s no surprise that this week has been busy for cyber-attacks on the web, targeting big events s...
A new type of ransomware is coming for cloud email inboxes. While this particular strain hasn’t be...
Attacks on banks have been international news since at least 2016, when a cyber heist on Bangladesh...
A support Service Agreements is an important part of providing or receiving an IT support service. S...
Cyber-attacks affect companies all over the world. Some attacks are relatively indiscriminate, such ...
The cloud can mean different things to different people, however, it essentially relates to your inf...
Over the last few years we have seen a huge growth of ransomware threats, the severity of which has ...
Getting mobile security under control can be challenging, but it is now a necessary component to kee...
The cyber threat landscape has evolved significantly from the early days when it used to be mostly a...
This year, World Backup Day falls on a Saturday. So we are getting in early to remind everyone to ...
Losing data is never fun. Whether it be one document or ten. In traditional terms, we all have a bac...
A new form of ransomware has managed to avoid detection by built-in security in Google Drive and Mic...
SonicWall reveals that a new Capture Cloud engine has discovered hundreds of new malware variants no...
How much do you think a hacker could earn in a year? It was estimated that hackers fleeced more than...
So you have recently upgraded to a new android device. But before you start adding in your account d...
Is your password “password” or “qwerty”? On the 19th of December 2017, Splas...
Starting from the 22nd February 2018, the NDB Scheme will come into effect for a wide range of organ...
From everyone at TCT – Happy New Year. We hope everyone had a good break and enjoyed some time off...