Jump to content

All Activity

This stream auto-updates

  1. Yesterday
  2. until
    Learn from industry experts in our second MSPs in Conversation as they discuss different approaches to packaging and pricing to ensure your MSPs approach is profitable, as well as practical tips on how to implement them into your business. We're proud to be joined by some of Australia's MSP leaders, Nigel Moore, Founder of The Tech Tribe, @Scott Atkinson, CEO of TribeTech, and Aaron Jacobs, General Manager of RODIN Business Solutions. What you will learn: Pricing Strategies and keeping them profitable What to include in a Managed Service Offering Knowing yo
  3. Last week
  4. until
    We're inviting all members of SMBiT Pro to join us as we host another technical workshop this time covering Hosted Network's IaaS. What we'll cover: Organisational hierarchy Networking options Backup options Migration options Technical demonstration vCloud Director Structure Edge Gateway Creating and Managing Snapshots Backup and Restorations Checking and Decreasing IaaS Resources 👉 REGISTER HERE
  5. until
    I'm sure you're all seasoned veterans when it comes to VoIP however, if you're curious about Hosted Network's platform and how we differ from other Telco providers, feel free to come along to tomorrow's technical deep dive. What we'll cover: Round up of Basics VoIP Webinar Charging Plans and how to get them right Hunt Groups and Call Centre reporting & analysis An in-depth look into IVRs Incoming Call Rules and how they work with different types of extensions including IVRs, Hunt Groups, and Phone Terminals How to set up and manage advanced Call Fl
  6. Steve Burns

    Nvidia Workstation Graphics Webinar with MMT

    until
    Multimedia Technology and Nvidia are teaming up to run a webinar covering Nvidia Quadro Graphics cards which will include: - The New Ampere GPU Platform - High End & Low End Range - Value Proposition and Positioning - Customer Focus Points - Mosaic and Quadro Sync and RTX Bridges - RTX vs. GeForce So if you have customers that are currently using Workstation graphics for CAD / Design, Ai, Data Science & Analytics, Engineering, Media, Photography and more, this is the webinar for you. To register for this webinar, use below Zoom link https://
  7. Earlier
  8. until
    You might've seen in the Hosted Network thread, we're hosting our first MSPs In Conversation - a webinar series where we are inviting industry leaders and MSP partners to talk on topics facing growing MSPs . In our first session "MSP Operational Maturity: Tackling Growing Pains at Different MSP Sizes", learn how you can get over the hump and take your business to the next level. What you will learn: Understanding MSP Maturity stages and where you fit Pain Points for different size MSPs and how to overcome them What to focus on in your business and when The fundamen
  9. Meryl Palma

    Technical Workshop: VoIP Fundamentals (Online Event)

    until
    You're invited to join us for a technical overview of the fundamentals of Hosted Network's VoIP Solution. What we'll cover: Overview of Hosted Network VoIP products - PAYG, Unlimited Plans, SIP Trunks, Managed CloudPBX, Teams Direct Routing Use cases Technical Scoping Migration Best Practices Introduction to VoIP Management Portal VoIP Platform PBX Functionality Sneak peek of Hosted Network's Rebilling System Free Number Porting Promotion Register here to attend.
  10. Paris Franke

    Datto Virtual Vendor Day

    until
    Datto is excited to announce our Virtual Vendor Day is back! For those who missed the first session, Vendor day is a day dedicated to introducing partners to our exciting vendor community. This event will give you an in-depth look at how the solutions and services offered by these vendors present MSPs with new opportunities to grow. We’ve asked four vendors ( Wise-Sync, Staff Domain, Tribu, and CSP Portal) to showcase their solutions, share how they integrate with the Datto product family, and discuss how they can contribute to your ongoing success. All attendees will be eligible for a n
  11. Version 1.0.0

    0 downloads

    Powershield UPS vendor has put together this selection guide for the range of Synology NAS. It shows a specific NAS and what run time you can get with different model UPS. As you all know power failure is a big contributor to data loss. Enjoy. Any questions don't hesitate to contact me. Steve Burns Multimedia Technology 1300 650 203
  12. until
    Over lunch we will address how we have taken the industry-leading Crystal Eye XDR platform and added a suite of new features, including: Security object control access across the entire organisation with SASE cloud, on-premise and MDR, DFIR, SD-WAN and IRM endpoints applications. Extended SOAR and DFIR capabilities from network-based incident escalation. Email gateway scanning to allow for improved Microsoft 365 Integration and better Windows AD integration. Tighter integration between CE XDR SASE and on-premis
  13. Maria Armstrong

    State of Cybersecurity 2020

    Version 1.0.0

    3 downloads

    More than ever, companies are accepting that digital business is the way of the future. Regardless of the industry, offering or customer base, digital tactics are needed to survive in a dynamic and unpredictable environment. With this in mind, cybersecurity moves from a piece of IT operations into an overarching business concern. From formal policies to specialized teams, organizations are adopting the practices that will secure their new digital efforts, ultimately moving towards a new framework that defines a modern mindset. This report examines the state of cybersecurity as the
  14. Maria Armstrong

    Vendor Assessment Cheat Sheet

    Version 1.0.0

    6 downloads

    Vendor Assessment Cheat Sheet
  15. Version 1.0.0

    2 downloads

    Using the Australian Government Information Security Manual Guidelines for Cyber Security Roles Guidelines for Cyber Security Incidents Guidelines for System Hardening
  16. Version 1.0.0

    1 download

    Guidelines for Cyber Security Incidents Guidelines for Enterprise Mobility Guidelines for System Hardening Guidelines for System Management Guidelines for Networking
  17. Version 1.0.0

    1 download

    Guidelines for Outsourcing Information technology and cloud services Further information The content was modified to include a reference to the ACSC’s new Identifying Cyber Supply Chain Risks publication. Further information on cyber supply chain risk management can be found in the ACSC’s Cyber Supply Chain Risk Management publication at https://www.cyber.gov.au/acsc/view-all-content/publications/cyber-supply-chain-risk-management and the Identifying Cyber Supply Chain Risks publication at https://www.cyber.gov.au/acsc/view-all-content/publications/identifying-cyber-supply-chain-risks.
  18. Version 1.0.0

    3 downloads

    Applying monthly ISM updates Please note: There is no requirement for organisations to immediately implement monthly updates to the Australian Government Information Security Manual (ISM). Instead, organisations are encouraged to review the security risks for their systems (using the latest version of the ISM available at the time) based on a frequency suitable for their business requirements and in accordance with their corporate risk management framework. For example, every month, every three months (quarterly), every six months (semi-annually) or every year (annually).
  19. Version 1.0.0

    4 downloads

    In response to the COVID-19 pandemic, many small and mid-sized enterprises (SMEs) around the world have closed their offices and told people to work from home. Many organizations and their employees were not prepared for this sudden shift to remote work, nor are they prepared for the possibility that remote work will become far more common in the future.
  20. Version 1.0.0

    3 downloads

    Data breaches have become a common occurrence, and the reality of the problem is much worse than current perceptions, because the general population is only aware of publicly disclosed breaches. It is not aware of the multitudes of breaches that either are not under any disclosure mandate, or breaches that have not yet been detected. The latter category is a very large number, since most research shows that it can take months or even years before an organization detects a breach.
  21. Version 1.0.0

    2 downloads

    Australian Communications-Electronic Security Instruction, ACSI-77 (B) is an Unclassified, Non-Registered publication issued under the authority of the Director, Defence Signals Directorate (DSD). It is effective from the date of issue. The Australian Emanation Security Program sets out the requirements for government and industry agencies to be formally recognised by the National Authority, DSD as attaining the necessary qualifications to conduct Emanation Security (EMSEC) practices to National TEMPEST Standards.
  22. Version 1.0.0

    2 downloads

    In response to COVID-19, there was a rapid shift to remote work. Now, as the pandemic enters a new phase, we are seeing another shift to a hybrid work environment, in which some employees will be working from home, some from the office, and some from both home and office. This new reality will likely last through the year, at least, raising new challenges in protecting data. Protecting your organization’s data is important to the security and sustainability of your organization and you, as an employee, play a critical role in this protection. If each person is conscientious, the org
  23. Maria Armstrong

    Ransomware Playbook

    Version 1.0.0

    3 downloads

    How to prepare for, respond to, and recover from a ransomware attack To Pay or Not to Pay? This question is often the first one many organizations consider after they are hit with a ransomware attack. Unfortunately, the choice is not simple. Many organizations simply don’t know how to protect against ransomware. This guide is intended to provide a roadmap for organizations (e.g., small and medium-sized businesses, state and local governments) to secure themselves against this growing threat.
  24. Version 1.0.0

    2 downloads

    Although technology enables people to work remotely, it also opens the door to new cybersecurity and data protection risks. Now more than ever, every organization needs to have a designated Cyber Readiness Leader – someone who will guide your workforce. To learn more about our free Cyber Readiness Program and the role of the Cyber Leader, please check out our website (www.cyberreadinessinstitute.org).
  25. Maria Armstrong

    Keeping Educators and Students Safe

    Version 1.0.0

    1 download

    Our nation’s educators and students are in uncharted territory as remote learning becomes the norm for school systems across the country. Remote learning brings tremendous opportunities that we could not have imagined 30-40 years ago. For teachers, it means that their mission can continue. For students (and parents), it means the classroom has no boundaries and an adjusted sense of normalcy can exist in these uncertain times. We are fortunate that today’s advanced technologies will enable teachers and students to continue to work together. It also means we need to take precautions
  26. Version 1.0.0

    2 downloads

    Cyber criminals are using the COVID-19 pandemic to take advantage of remote workers by stealing their personal and professional information. To protect yourself in this growing threat environment and new security reality, outlined below are simple dos and don’ts to be more cyber ready. Since the start of the pandemic, everybody has learned to take three simple actions to stay healthy. Wash your hands for 20 seconds. Don’t touch your face. Stay six feet apart. Sure, it took some behavioral change, but you’re probably used to it after a few weeks. You need to take the same “can-do” at
  27. Version 1.0.0

    2 downloads

    Guidelines for communications infrastructure
  28. Version 1.0.0

    2 downloads

    About this report The Office of the Australian Information Commissioner (OAIC) periodically publishes statistical information about notifications received under the Notifiable Data Breaches (NDB) scheme to assist entities and the public to understand the operation of the scheme. This report captures notifications made under the NDB scheme for the period from 1 July to 31 December 2020. Where data breaches affect multiple entities, the OAIC may receive multiple notifications relating to the same breach. Notifications relating to the same incident are counted as a single notification in thi
  1. Load more activity
Ă—
Ă—
  • Create New...