(07) 3721 4111 hello@surebridge.com.au

Our Blog

Multi Factor Authentication: no longer an optional feature

Cloud services provide businesses with an unprecedented level of access to resources from anywhere around the world at any time. This increased level of access to resources has provided businesses with the tools to mobilize and modernize their workforce. However, with...

Cybersecurity Essentials Webinar

Being connected is essential for doing business in 2018. This connectivity calls for a greater need to have an understanding of your devices and how you are at risk. It is not a matter of IF, but WHEN your business experiences a cyber-attack online, or security...

6 simple steps to becoming a ‘storm ready’ business

Power outages can result in a loss of data if your server experiences downtime. What state would your business operations be in if your business was to lose power for more than a few hours, or be victim to flooding or wind...

It’s not if, it’s when

In the second article in our Cyber Security series with our partner CCIQ , we explore the dynamics around cyber security, understanding the ‘hacker evolution’, globalisation, and dispelling common arguments made regarding the likelihood of attacks in a business. It is...

What is Phishing? (No, not Fishing)

  According to a 2017 ACCC report, the most commonly reported scams to the ACCC were phishing, identity theft, and false billing scams which resulted in losses surpassing $4.6 million. The people behind phishing emails are experts in manipulation, and use a form of...

Have you been compromised?

Have you ever wondered if your login credentials have been compromised online? When you think about how they could be used online on sites you're familiar with, as well as the DeepWeb sites you don't even know exist - it's enough to make you lose sleep. Check out this...

5 Best Practices for Password Security

Did you know the average internet user has 28 different online accounts? That's a lot of passwords to remember. That is, if you're not reusing your passwords... You're not reusing them, are you? Here's our 5 best practices for password...

SamSam Ransomware – A whitepaper from Sophos

The impact from a ransomware attack can be critical to a business. The down time created by such an attack can often cost more than the ransom itself. Download the whitepaper to find out about the latest insights into the malware, how the attacks unfold and what to do...

Email from the Post Office or a Ransom-ware attack?

You notice an email from the post office so you open it to see what it’s about: The courier couldn’t find you at home, so you have to go to the post office yourself to get your package. Not completely unfamiliar, is it? You click the link in the email then you are...

Contact Us

To book a free IT consultation, call us on (07) 3721 4111 or get in touch through the form below. We’ll help you get your IT on track.

  • This field is for validation purposes and should be left unchanged.
meta name="ahrefs-site-verification" content="4c9d56a4d33983af4ea45bb97fe00e46020279374ca7ea171228b1b343f02123”