Contact us +61295186000

National Technologies Group Blog

National Technologies Group has been serving the Sydney area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Add a PIN to Windows 10 Login to Improve Security

b2ap3_thumbnail_windows_10_pin_400.jpgBusinesses all over the world are taking advantage of two-factor authentication, causing the password’s value to depreciate over time. Passwords aren’t powerful enough to keep users safe from advanced threats. Hackers are finding ways to punch holes in even the most comprehensive security solution, forcing users to focus on improving security through other means.

Continue reading
0 Comments

Urgent: Protect Yourself Against Heartbleed

b2ap3_thumbnail_bleeding_heart_three_400.jpgApril 7th 2014 was a big day for the world, not only because Microsoft ended security support for Windows XP, but because a massive security flaw was found in the OpenSSL cryptographic library. This problem, called the Heartbleed bug, was found by Google Security, and it leaks information from any applications and services utilizing OpenSSL. The problem, however, is not that it was found; the problem is that over two-thirds of the entire Internet contains sites that utilise the OpenSSL/TLS protocol specification. It also doesn't help that this bug has been active since December of 2012.

Continue reading
0 Comments

Chrome Security Concerns: Are Hackers Listening To You?

An Israeli programmer has identified a bug in Google Chrome that allows malicious websites or hackers the ability to stealthily record conversations by accessing the device's microphone. The bug should be of serious concern for Google, especially given Chrome's current status as the browser du jour.

Continue reading
0 Comments

How to Escape Google's Grip and Search Anonymously

With NSA and Edward Snowden in the headlines, it's enough to make any user of the Internet think twice about online security and wonder if they are being monitored. A Google search seems harmless enough, but the reality is that you could be putting your information at risk when browsing through a site that harvests your information for advertisers.

Continue reading
0 Comments

Privacy Breakthrough: LinkedIn Adds a Block Button

In radical social media news, LinkedIn is adding a blocking feature to its site. LinkedIn is finally falling in line with other major social networks like Facebook and Twitter after significant pressure from users for a block button, including a petition with 8,500 signatures.

Continue reading
0 Comments

How to Anonymously Browse the Internet

b2ap3_thumbnail_whodat400.jpgSome places on the Internet are only suitable for secret browsing. Maybe you're shopping for a present and don't want your links to show in your browsing history, or maybe you don't want the customized ads to reflect a private interest. Whatever your reason is for wanting to anonymously browse the web, here's how you do it.

Continue reading
0 Comments

Protect Your Business from BYOD Lawsuits

b2ap3_thumbnail_lawsuit400.pngMany businesses are discovering how great it is for employees to use their personal devices to accomplish work. BYOD has been proven to improve productivity and worker satisfaction; but like so many great things, these BYOD benefits are in danger of being shut down as employers are becoming concerned about being sued. How can you still benefit from BYOD while being protected from lawsuits?

Continue reading
0 Comments

The Business of Malware and Your Mobile Device

b2ap3_thumbnail_phonejack400.pngWe often view hackers as creeps who are bent on spreading viruses to disrupt everyone's lives, perhaps for the sake of anarchy or some extreme ideology. But when it comes down to it, most hackers are in it for the money and are just trying to make a quick buck. In fact, hacking groups may even be more organized than your business!

Continue reading
0 Comments

4 Oversights that will Harm Your Network

b2ap3_thumbnail_SecurtyRisk400.jpgWith all the attention that hackers receive, you would think that they are solely responsible for every network security breach, but the truth of the matter is that most damages to company networks are due to negligence. Here are the four most common IT security oversights that can lead to major damages to your network.

Continue reading
0 Comments

4 Uses for Your Old Computer

b2ap3_thumbnail_ComputerRecycle400.jpgWe talk a lot about new computers. We enjoy giving advice on what new features to shop for, therefore it only makes sense that we also give advice on what to do with your old machines. Don't banish your old friend to the trash heap; here are 4 good uses for your old computer.

Continue reading
0 Comments

6 Reasons Why You Wouldn’t Trust Your Backup

TrustUs400.jpgData loss is serious. We know it, you know it. If you lose a month's worth of data, you are in some serious trouble. That's why your backup is so crucial to your business. Not all backup solutions are created equal. You need to be skeptical of your backup if it doesn't give you a ironclad guarantee. Here are 6 key indicators to look for to determine if your backup solution doesn't take your data seriously.

Continue reading
0 Comments

How Safe is Your Email?

thumb_how-safe-email_20130116-043748_1.jpgEmail is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Eastern Austrailia small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Continue reading
0 Comments

What is your Identity Worth to You?

b2ap3_thumbnail_thumb_identity_20120727-153332_1_20130116-043516_1.jpgYour identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading
0 Comments