Contact us +61295186000

National Technologies Group Blog

National Technologies Group has been serving the Sydney area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Add a PIN to Windows 10 Login to Improve Security

b2ap3_thumbnail_windows_10_pin_400.jpgBusinesses all over the world are taking advantage of two-factor authentication, causing the password’s value to depreciate over time. Passwords aren’t powerful enough to keep users safe from advanced threats. Hackers are finding ways to punch holes in even the most comprehensive security solution, forcing users to focus on improving security through other means.

Continue reading
0 Comments
Featured

Your Business Can Learn a Thing or Two From Nuclear Power Plant Security

b2ap3_thumbnail_nuclear_it_security_400.jpgWe talk about a lot of frightening technology scenarios for businesses; data loss, identity theft, and expensive hardware failures that can inflict substantial downtime and, therefore, cripple the ability of your business to sustain operations. One industry that has changed the way they manage risk, specifically the potential failure of important security systems, is the nuclear power industry. Any business can learn how to mitigate disaster by looking into the specifics of the two most horrendous nuclear meltdowns in history, the meltdown at Chernobyl in 1986, and the tsunami-induced disaster at Fukushima in 2011.

Continue reading
0 Comments

Find Out What’s Lurking In “the Shadows” of Your IT

b2ap3_thumbnail_risks_of_shadow_it_400.jpgImplementing proper IT solutions is challenging for the average SMB, and it’s difficult without the aid of a proper IT department. Organizations that can’t afford a full in-house IT department sometimes resort to less savory methods of managing their technology, which can be dangerous for business continuity, data storage compliance, and security.

Continue reading
0 Comments

97,000 Cybersecurity Threats Reported to the Government Last Year, More to Come

cyber_security_dhs_priority_400.jpgArguably one of the most imperative assets for any government is an IT infrastructure, and in 2015, the U.S. government is realizing that security breaches are some of the most dangerous cyber threats to watch out for. As evidenced by the U.S. Department of Homeland Security, IT security is just as important as other matters of national security.

Continue reading
0 Comments

Urgent: Protect Yourself Against Heartbleed

b2ap3_thumbnail_bleeding_heart_three_400.jpgApril 7th 2014 was a big day for the world, not only because Microsoft ended security support for Windows XP, but because a massive security flaw was found in the OpenSSL cryptographic library. This problem, called the Heartbleed bug, was found by Google Security, and it leaks information from any applications and services utilizing OpenSSL. The problem, however, is not that it was found; the problem is that over two-thirds of the entire Internet contains sites that utilise the OpenSSL/TLS protocol specification. It also doesn't help that this bug has been active since December of 2012.

Continue reading
0 Comments

Chrome Security Concerns: Are Hackers Listening To You?

An Israeli programmer has identified a bug in Google Chrome that allows malicious websites or hackers the ability to stealthily record conversations by accessing the device's microphone. The bug should be of serious concern for Google, especially given Chrome's current status as the browser du jour.

Continue reading
0 Comments

Don't Use These Passwords! The Top 25 Most Popular Passwords of 2013

People have never been very good at making passwords - just ask our tech team. And now, thanks to a list compiled by SplashData, we have definitive proof. Pulling from data made public by hackers over the course of 2013, SplashData has sorted through millions of stolen passwords to find the top 25 most common login details.

Continue reading
0 Comments

The Business of Malware and Your Mobile Device

b2ap3_thumbnail_phonejack400.pngWe often view hackers as creeps who are bent on spreading viruses to disrupt everyone's lives, perhaps for the sake of anarchy or some extreme ideology. But when it comes down to it, most hackers are in it for the money and are just trying to make a quick buck. In fact, hacking groups may even be more organized than your business!

Continue reading
0 Comments

Are you prepared for the Zombocalypse?

b2ap3_thumbnail_zombie400.jpgAre you going to make sure your machete is handy and start boarding up your windows for the coming of George Romero's slow-moving walking dead, or will you load up on ammo and lock yourself in a bunker for the more active and feral Max Brooks-type zombies? What about your data, like your Zombie Survival Guide E-book? Is it safe?

Continue reading
0 Comments

5 Essential Security Measures for Every Network

b2ap3_thumbnail_NetworkLock400.jpgYour IT network is complicated, but that doesn't mean you should question your network's security. For your convenience, we have simplified network security into the five most important precautions that every network needs. Be sure to review this checklist against your own network to see how well you are covered.

Continue reading
0 Comments

What Can Darth Vader Do For Your Business?

b2ap3_thumbnail_vader400.jpgAs every good Stars Wars fan is well aware, May 4th is Star Wars Day (May the fourth be with you). As an IT company, we love all technology, especially tech from a long time ago in a galaxy far far away. Therefore, let us take a moment and look at the most famous technology from Star Wars, Darth Vader.

Continue reading
0 Comments

4 Oversights that will Harm Your Network

b2ap3_thumbnail_SecurtyRisk400.jpgWith all the attention that hackers receive, you would think that they are solely responsible for every network security breach, but the truth of the matter is that most damages to company networks are due to negligence. Here are the four most common IT security oversights that can lead to major damages to your network.

Continue reading
0 Comments

What’s New in Digital Surveillance?

b2ap3_thumbnail_CameraParty400.jpgSurveillance technology has come a long way from the days of having to designate entire closets for VHS tape storage. Digital recording, high-definition cameras, and Wi-Fi technology allow companies to keep their property safe in many new and exciting ways. If you haven't looked into digital surveillance lately, here are three new features that will make you want to install little cameras everywhere.

Continue reading
0 Comments

You Don’t Want to Miss These Important Microsoft Updates!

Update400.jpgThis week, Microsoft will be releasing critical security patches for Windows, Office, Internet Explorer, and SharePoint Server. Updating software is something Microsoft does routinely; however, users should pay attention when critical patches are released because they are,well, critical.

Continue reading
0 Comments

Learning the Hard Way: Burger King Twitter Account Defaced

Burger King hasn't been "having their way" (Get it? Get it?) over the past few days, as hackers have a heyday with the fast food giant's Twitter account. Hackers gained control over the @BugerKing twitter account and rebranded it to appear as McDonalds, complete with the Golden Arches logo in the avatar. Then, hilarity ensued.

Continue reading
0 Comments

How Safe is Your Email?

thumb_how-safe-email_20130116-043748_1.jpgEmail is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Eastern Austrailia small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Continue reading
0 Comments

What is your Identity Worth to You?

b2ap3_thumbnail_thumb_identity_20120727-153332_1_20130116-043516_1.jpgYour identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading
0 Comments