A Trouble Free Blog
2024 support for Vet industry
Are you a veterinarian? Do you run a vet clinic or animal hospital? We know the veterinary industry is a labour of love for most of you. It involves incredibly long hours, messy work, and none of...
Backups
I've talked to a number of business owners recently about their backup scheme, and for the most part it's been barely adequate. In an age where cloud backups like DropBox, OneDrive and Google Drive...
Protecting Yourself From Scams
Scams are nothing new. People have been engaging in fraudulent activities, scamming, conning, grifting, etc for centuries. Just look kids! If you do <something> / give me <something>,...
Managed Endpoint Detection and Response (EDR) for computers & Managed Detection and Response (MDR) for Microsoft 365
Endpoint detection and response (EDR) offers a more comprehensive approach to cybersecurity. Unlike antivirus software, EDR solutions use machine learning and advanced behavioural analysis to detect and mitigate cybersecurity threats in real time. They analyse activity on every device on your network, often nipping potential threats in the bud.
Remote Monitoring and Management (RMM)
Remote Monitoring and Management Tools Disrupting IT for the Better Remote monitoring and management (RMM) tools are becoming more and more important, especially for managed service providers and IT...
Credential Stuffing –
Hackers, Password Managers and Us
What is Credential Stuffing? Credential Stuffing is a form of cyber attack whereby real user name & password combinations are leaked from any particular service, and then those same credentials...
Passwords
Love them or hate them, have one or have hundreds of them; you'll need to use passwords for a while to come yet - despite people trying to move on from them. And while the thought of all the...
ChatGPT: Dangers and Risks
As an artificial intelligence model trained to interact with humans through natural language, ChatGPT has the potential to pose certain dangers if not used responsibly. While the risks associated...
Search Engine Optimisation vs Search Engine Marketing
SEO (Search Engine Optimization) and SEM (Search Engine Marketing) are two essential digital marketing strategies used by businesses to improve their online presence, drive traffic to their website,...
Search Engine Optimisation
Search engine optimization (SEO) is an essential digital marketing strategy that involves optimizing your website to rank higher on search engine results pages (SERPs) for specific keywords and...
Hosted PBX vs On-premise phone systems
As businesses continue to evolve and adapt to new technology, many are moving away from traditional on-premise phone systems and transitioning to hosted PBX phone systems. Hosted PBX, which stands...
Cyber Security for Cloud hosted enrivonments
Email and collaboration tools have become an integral part of modern business operations. They enable teams to work together remotely, exchange sensitive information, and increase productivity....
The Future of Commerce
The recent ‘Future of Commerce 2022’ report, released by Shopify explores a number of significant global and regional consumer trends. As with all things in our digital world, things are changing,...
Dot au Domains
Australian internet users can now register ‘second level’ .au domains. Until now, users in Australia have been restricted to only ‘third level’ domains i.e. domain.com.au, domain.org.au. Now, they...
Free IT Audit for Vets
Being a Vet is a labour of love. It involves incredibly long hours, and sometimes heartbreaking work. We want to reward your dedication with a free IT audit for your practice. You’re a busy...