Blog

2FA Basics

In our last article we discussed how to create and manage secure passwords, however even with a secure password your account may be vulnerable due to a data breach which …

Creating Secure Passwords

Passwords are the first line of defence when it comes to protecting your account. Did you know that in 2020, 81% of hacking-related breaches used stolen and/or weak passwords? In our …

Identifying and Preventing Online Scams

Australians are embracing more online services everyday which is fantastic and has caused a significant increase in the number of services available.  However, the downside to this is that we …

Optimise Your WordPress Website

What is website optimisation and why is it important? Website optimisation is the process of speeding up your website to make it load faster to give your visitors a more …

The Benefits of Google Workspace

What is Google Workspace? Google Workspace, formerly known as G-Suite is Google’s Suite of intelligent apps. Today we are going to discuss the benefits of switching to Google Workspace, why …

How to setup and use SSH keys

Introduction SSH, or secure shell, is an encrypted protocol used to communicate with servers. There are many different ways to log into an SSH server however in this article we …