Inspired IT Blog
Blog articles
Stay up to date with our Inspired IT blog. It contains articles covering a variety of topics, ranging from IT security to business productivity.
Inspired IT and Probax – An Important Partnership
Inspired IT is a team of dedicated Australian IT professionals that has been providing reliable cloud-based storage solutions since 2005. Each member of the Inspired
Ransomware Causing a Rethinking of Disaster Recovery Importance
Many companies are having to re-think their disaster recovery strategies due mainly to the recent spike in ransomware attacks, but also because of malware infection
The View on Hannans – Project Recap
Inspired IT was recently approached by The View on Hannans, a four-star hotel located in Kalgoorlie. Our initial task was to review existing legacy hardware,
Global Knowledge: Cybersecurity Predictions
A recent series of white papers released Global Knowledge and specifically authored by James Michael Stewart (CISSP, CEH, CHFI, ECSA, and Security+) reveal some startling
New Corsair PC Cooling Fans Defy the Laws of Physics
Those who are put-off by noisy or inefficient PC cooling fans should consider upgrading to the new Corsair ML-series fans. They use maglev technology to
Checklist: 10 Things You Need in Place to Survive Data Network Disaster
In order to remain in business, stay competitive, and keep yourself and your company safe from a data loss disaster, there is a fairly standardized
Yahoo Data Theft Good Reason to Regularly Change Passwords
In case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the reason of the
Unsafe Facebook and Email Links a Continuing Problem
A new study done on online safety by German scientists reveals that 56% of email recipients and roughly 40% of Facebook users click on links
How to Tell if Someone Has Read Your Email
It’s a concern many of us may have – whether or not someone has read a sent email message. It concerns both personal and business
Pentagon’s Use of Floppy Disks “Probably Safer Than Newer Technologies”
They date back all the way to 1971, but the Pentagon is still employing floppy disks as part of their tests and military maneuvers. A
Super-Sophisticated Spyware Has Been Discovered After Undetected Five-Year Run
After spending a half-decade operating undetected, an APT (advanced persistent threat) known as “ProjectSauron” has been uncovered by both Symantec and Kaspersky Labs. A group
Data Breaches Often Far More Expensive Than Managed IT Security
We can’t escape it in our current-day, online, Web-connected culture: Every day it seems there is another news story about a business organization that’s been