fbpx

ADITS Achieves SMB1001 Gold Certification, Demonstrating Commitment to Cybersecurity Excellence

Queensland, Australia [May 2024] – ADITS, a leading Technology Solutions Provider, today announced achieving a Gold certification in the SMB1001 Cybersecurity Standard. This rigorous program validates ADITS’ robust cybersecurity practices and commitment to protecting sensitive data, both internally and for its clients. 

The SMB1001 standard is a multi-tiered framework designed to equip small and medium-sized businesses (SMBs) with the tools to strengthen their cyber resilience. ADITS’ Gold certification demonstrates a comprehensive cybersecurity posture addressing critical areas like access control, incident management, business continuity, and network security. 

“Cybersecurity is paramount for ADITS,” said Adam Cliffe, SEQ Managing Director at ADITS. “This Gold certification validates our dedication to protecting our data and empowering our clients to do the same. It reinforces our position as a trusted partner in navigating today’s complex cybersecurity landscape.” 

Championing SMB Cybersecurity

Beyond its own achievement, ADITS leverages the SMB1001 framework to equip other businesses with the tools they need to thrive in a secure digital environment. Their CyberShield solution offers a comprehensive approach to achieving SMB1001 compliance. 

CyberShield empowers SMEs by: 

  • Providing a clear roadmap: ADITS guides clients through the SMB1001 framework, ensuring a smooth and efficient compliance journey. 
  • Implementing best practices: ADITS’ team of security specialists helps clients implement essential controls and safeguards outlined in the SMB1001 standard. 
  • Ongoing support: ADITS offers continuous support to ensure clients maintain their compliant posture and adapt to evolving threats. 

By achieving SMB1001 Gold certification and offering the CyberShield solution, ADITS demonstrates its commitment to not only its own cybersecurity excellence but also to fostering a more secure digital environment for Australian businesses of all sizes. 

Learn more about ADITS CyberShield

How IT Support Has Evolved To Empower Remote Workers

The workplace has undergone a seismic shift with the adoption of flexible work setups. Gone are the days of rigid, office-bound schedules for a significant portion of businesses.

“The increase in hybrid or remote working represents one of the largest changes in Australian workplaces in generations” reported the Australian HR Institute, citing that 24% of organisations expect remote working arrangements to increase until 2025. 

This trend presents both opportunities and challenges for Australian organisations. The good news is that IT support has evolved dramatically alongside this shift. We have seen its transformation from a reactive, problem-solving role to a proactive, strategic enabler of remote work success.

 

Traditional IT Support vs Managed IT: From Patchwork to Powerhouse

Imagine juggling a dozen laptops spread across the state, each with its own software updates, security vulnerabilities, and user quirks. That’s the reality faced by many businesses, especially when strapped for resources, like Queensland nonprofits or smaller medical practices.

Traditional break-fix IT support has had its advantages in time, but it’s like playing whack-a-mole: You’re constantly reacting to issues instead of preventing them. Plus, you’re bound to spend more in the long run, slowly draining your resources. We explain this in detail in our article, Managed IT Services: The Smart Way to Escape the Break-Fix Money Pit.

Enter Managed IT Services: a comprehensive approach that acts as an extension of your internal IT team. Managed IT provides proactive maintenance, remote monitoring, and strategic planning. With it, your IT can be constantly optimised, allowing your team to focus on core activities.

 

Remote Work Risks and Mitigation Strategies

Having a productive remote workforce is awesome, but there are still some security concerns associated with it. Here’s a breakdown of the key risks and how managed IT services can help:

Managing Remote Access & Data Transmission

Ensuring security for remote access is vital, with employees accessing data from home networks. A managed IT provider can implement Virtual Private Networks (VPNs) that encrypt data in transit. VPNs become the secure tunnels that connect remote user devices and your organisation’s network.

This way, John, a doctor at a regional Queensland medical practice who needs to access a patient’s confidential file outside of his office can safely collaborate with colleagues, regardless of location.

Managing Risks in Remote Devices & Networks

Unsecured home Wi-Fi networks and personal laptops also pose grave security risks. Managed IT providers with cyber security expertise can implement endpoint security solutions that monitor, patch vulnerabilities, and prevent malware infections on remote devices. Additionally, they can educate your employees and provide guidance on secure home network practices.

Managing Human Risk: Employee Training and Awareness

The strongest cyber security and IT solutions can’t replace a strong human defence. This is why technology providers can provide employee training programs to educate staff about threats and cyber security best practices. Properly trained and equipped employees can be your most powerful allies in the cyber war.

 

Cloud Solutions: Your Remote Work Toolkit

The key to remote work success lies in accessibility and seamless collaboration. Here are some cloud-based IT solutions that can be handy:

Remote Monitoring & Management (RMM) Tools

How can you diagnose and troubleshoot IT issues on remote devices instantly? RMM tools can be implemented as part of your managed IT services agreement, providing remote access for IT professionals. This enables them to support staff and address problems as quickly as possible.

Picture this: An NFP social worker’s Incident Management app doesn’t want to connect and they’re unable to do their reporting as required by their industry. Traditionally, this would mean waiting for an IT technician or risking a DIY fix. With an RMM tool, the managed IT provider is immediately alerted, so they can remotely diagnose the issue and fix it within minutes.

Collaboration Platforms

Tools like Microsoft Teams elevate the way remote teams work together. These platforms often come with integrated communication tools such as chat, video conferencing, and document sharing. They can thus build a sense of connection and improve productivity even when staff are geographically dispersed.

Imagine a team of architects at a Townsville business aiming to brainstorm design ideas for a new project. Traditionally, this might involve scattered emails and clunky conference calls. But with a collaboration platform, the architects can hold interactive video meetings, share design plans in real-time, and chat instantly to discuss changes. This nurtures a sense of connection and collaboration, while keeping the project moving smoothly even though the team members are all working remotely across Queensland.

 

The Future of Flexible Work: AI and Beyond

The future of IT support is brimming with exciting possibilities with the increasing role of Artificial intelligence (AI) in the workplace. From automated ticketing systems and predictive maintenance to chatbots and virtual assistants, the integration of AI and automation in IT support processes leads to faster issue resolution, improved efficiency, enhanced security, and a better overall user experience.

However, amidst all technological advances is the constant need to improve cyber security measures. As remote work keeps evolving, so do the risks we face. You must stay vigilant, adapting innovative IT strategies for a more secure and productive work environment.

 

Empowering Your Queensland Workforce

The shift towards remote work presents an opportunity for organisations to expand talent pools, improve employee satisfaction, and drive business agility. By embracing a proactive approach to IT support and adopting managed IT services, you can empower your remote workforce to be as productive, if not more, as if they were in the office.

To thrive in the era of flexible work, it’s essential to transform your IT infrastructure and processes to align with these new demands. At ADITS, we prioritise understanding your unique needs first, ensuring our partnership is fully customised to support your goals. Discover more about our proven process and how we help organisations in Brisbane, Townsville, and beyond adapt and excel in this dynamic work environment.

DISCOVER MANAGED IT

Cyber Security In Education: Protecting Student Data In Australian’s Schools

Cyber security for educational institutions is more crucial than ever with the ASD Cyber Threat Report 2022-2023 highlighting the education sector has being one of the prime targets for cyber crimes. Schools must therefore strengthen their security and compliance measures.

 

The Rising Threat Landscape in Education

In recent years, the education sector has become increasingly susceptible to cyber threats. Australia saw a 51% increase in cyber incidents reported by critical infrastructure organisations, including educational institutions. A Check Point Research study showed a weekly global average of 1,739 attacks per education or research organisation.

With 90% of data breaches due to phishing attacks worldwide, students, teachers, and staff are also often targeted through deceptive messages.

Cyber-attacks on the sector are not random. They are targeted and strategic, driven by the potential rewards and the relatively lower security defences compared to other sectors.

Reason #1: Valuable Data

Educational institutions hold a wealth of sensitive data, including personal information of students, staff, and parents, as well as financial records and intellectual property. This data can be highly valuable for cybercriminals seeking to sell it on the dark web or use it for identity theft.

Reason #2: Diverse User Base

Schools and universities have diverse populations of students, teachers, and staff with varying levels of IT expertise. Some are tech-savvy digital natives while others are still mastering computer basics. Everyone needs training and support to ensure each can confidently and securely collaborate better.

Reason #3: Limited IT Resources

Smaller schools often face resource constraints. Staff must juggle multiple responsibilities, including network maintenance, user support, and security. Tight budgets limit cyber security investment. Some could have aging hardware and limited bandwidth. Schools must therefore explore cost-effective cyber security solutions.

Reason #4: BYOD Risks

Bring your own device (BYOD) allows students and staff to use personal devices for learning, but also present security risks:

  • Personal devices may lack proper security measures.
  • Sensitive information can leak if devices are compromised.
  • Infected devices can spread malware within the school network.

Schools can manage BYOD risks by:

  1. Establishing clear policies and guidelines for acceptable device usage
  2. Implementing network segmentation, isolating BYOD devices from critical systems
  3. Adopting mobile device management (MDM) solutions to enforce security policies
  4. Enforcing regular audits to assess compliance and address vulnerabilities

 

Impact on the Sector

Successful attacks disrupt operations and put student data, including personal and academic records, at risk. This undermines privacy and trust, leading to potential identity theft, financial fraud, and emotional distress.

 

Technological Innovation in Education

The rapid shift to digital learning environments, especially during the COVID-19 pandemic, has increased the attack surface for cybercriminals. With more devices connected to school networks and the use of various online platforms, there are more opportunities for vulnerabilities making cyber security solutions an all-time priority.

Remote Learning Platforms

Online learning platforms have bridged geographical and time boundaries. Students in any location now have access to the same kind of education. There are live online sessions, shared cloud resources, and virtual interaction. Platforms like Microsoft Teams for Education are boosting collaboration and engagement.

Digital Learning Tools

The sector has also benefitted from the proliferation of digital tools. Interactive whiteboards are replacing traditional chalkboards, allowing dynamic lessons and easier understanding of complex concepts.

Adaptive learning software enable personalised learning pathways. They can analyse student performance and adjust content accordingly. Virtual reality (VR) and augmented reality (AR) are also transporting students beyond textbooks.

Increased Reliance on Technology

Technology has become integral to the educational journey. Laptops, tablets, and Wi-Fi are now lifelines for learning. Teachers are harnessing digital tools to create more engaging content and enhance teaching methodologies.

Educators have shifted from traditional lectures to student-centred learning – facilitating discussions, encouraging critical thinking, and guiding students. Students are empowered by technology to collaborate, create, and explore.

 

Australian Laws and Regulations

As schools chart a course toward safer digital horizons, they must also comply with relevant regulations.

The Privacy Act 1988

The Privacy Act covers private schools, except those that fall within the small business exemption or do not provide health services (e.g., physical education classes, nursing services). The Australian Privacy Principles (APPs) prescribe how schools must:

  • Have data privacy procedures, practices, and systems to ensure compliance
  • Handle personal data transparently, ensuring consent, accuracy, and security
  • Demonstrate accountability by promptly addressing queries and complaints

Apart from the Australian Capital Territory (ACT), government schools are not directly covered by the Privacy Act. They fall under state or territory privacy legislation or schemes. In Queensland, for example, the transfer of personal information between schools without consent is allowed before enrolment in a new school.

The Australian Education Act 2013

The Australian Education Act governs Commonwealth funding to both government and non-government schools. It specifies specific requirements to receive Australian Government funding for school education, covering student data protection, educational reforms, and financial accountability. Schools are required to manage student data prudently and proactively while fulfilling their educational mission.

 

Best Practices for Cyber Security in Schools

Safeguarding digital learning environments is highly important today. Educators are responsible for protecting their students, staff, and sensitive data from cyber threats. Below are some best practices:

Password Hygiene

Educate students, teachers, and administrators – everyone in your school community — to create strong, unique passwords.

  • Combine uppercase and lowercase letters, numbers, and special characters
  • Never reveal a password to anybody
  • Encourage regular password updates or implement a password expiration policy

Data Encryption

All sensitive information (e.g., student records, financial data, and research findings), must be encrypted. Encryption ensures that even if data falls into the wrong hands, it remains unreadable. Consult with your IT provider about the different industry-standard encryption methods such as Transport Layer Security (TLS), Full Disk Encryption (FDE) and File-Level Encryption.

Incident Response Plan

Swift action is crucial when a breach occurs. Handling security incidents starts with preparing a well-defined incident response plan, which should include:

  • Designated Incident Response Team: Identify key personnel responsible for handling incidents.
  • Communication Protocol: Establish clear lines of communication during an incident.
  • Containment and Recovery Steps: Consult with your IT support team to outline the steps to isolate the breach and restore normal operations in your school.
  • Legal and Reporting Obligations: Understand our legal responsibilities and reporting requirements.

These best practices can help schools in Brisbane, Townsville, and across Queensland become more cyber resilient. Remember, it’s not just about implementing the right technology but also about fostering a culture of vigilance and shared responsibility among staff and students.

Cyber Security Training for Education Sector Leaders

If you’re not sure where to start with fostering a cyber aware culture in your school or university, ADITS conducts tailored cyber security training sessions for boards and school executives. Kindly fill up the form below:

ADITS and Assuredly Partner to Streamline Privacy Act Compliance

Queensland, Australia [May 2024] – Managed IT & Cybersecurity solutions provider ADITS announced today a strategic partnership with Australian start-up Assuredly, the all-in-one platform for managing cybersecurity controls.  

The collaboration exclusively allows ADITS to manage their clients’ compliance with the Privacy Act inside of Assuredly. This will streamline their customers complex cybersecurity, compliance and reporting processes. 

Dashboard

Evolving Cybersecurity Challenges

Our digital reliance increases more and more every day,” says Adam Cliffe, ADITS SEQ Managing Director. This gives more opportunities to cyber criminals to penetrate IT systems and access sensitive information. It is the responsibility of the business to protect the data they handle. And our partnership with Assuredly combined with our comprehensive CyberShield solution can certainly help organisations do that. 

The Assuredly platform has a user-friendly interface to review, evaluate, and demonstrate adherence to cybersecurity frameworks such as: 

  • SMB 1001 – a multi-tiered framework designed for Small and Medium-sized Businesses (SMBs) 
  • ISO 27001 – the leading international standard focused on information security
  • Essential Eight – cyber protection strategies recommended by the Australian government 
  • NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) – a comprehensive reporting framework for mitigating organisational cybersecurity risks
  • SOC2 Assessment – examines an organisation’s internal control environment related to security, availability, processing integrity, confidentiality, or privacy 

New in the platform, and exclusively for ADITS, Assuredly now includes the Privacy Act Reasonable Steps.  

Did you know that even if you have completed a 27001 or NIST CSF Assessment and Certification you will have only covered 50% of the reasonable steps suggested by the OAIC? This indicates a clear need for businesses to take Privacy assessments as seriously as they take their security assessments. 

Exclusive Privacy Act Component

The integration of the Privacy Act for ADITS is groundbreaking. This unique feature can help assist businesses comply with the Australian Privacy Principles (APPs) while also build an effective cyber security defence. It stems from ADITS’ shared vision with the Australian Signals Directorate (ASD) and Cyber Security Certification Australia (CSCAU) to improve the cyber resilience of the Australian community. 

This is a significant milestone for ADITS as we play our role supporting the Australian government’s vision to be a world leader in cyber security by 2030,
continues Adam Cliffe.

We’re excited to team up with ADITS and enhance our platform to meet the unique needs of Australian organisations under the Privacy Act,” says Fiona Long, Assuredly Founder and CEO. “The general public can trust that businesses prioritising the privacy and security of stakeholders’ sensitive data are committed to upholding their trust and confidentiality. This partnership between Assuredly and ADITS exemplifies our dedication to this mission.

The Privacy Act 1988 regulates how organisations handle personal information, with standards for collecting, using, and securing data. Compliance with this law is mandatory for most organisations nowadays (Learn more in this article: Navigating Cyber Security Compliance and Regulations: Essential 8 vs. Privacy Act). 

Moving Forward with Confidence

By adopting robust cybersecurity practices, businesses can significantly reduce their risk of data breaches and associated financial and reputational damage. They can also demonstrate a commitment to data protection, which fosters trust and confidence amongst customers and stakeholders. 

At ADITS, we are committed to finding new and innovative solutions that can provide businesses with the best options to safeguard their data and assets,” says Adam. “This partnership with Assuredly is a great move forward in our efforts to stay ahead of the curve in cybersecurity.

By leveraging the Assuredly platform and ADITS’ cybersecurity expertise, businesses can be more confident in facing the complexities of compliance and data protection. They can then focus on their core operations because they know their sensitive data is well-protected.

 

About ADITS

ADITS is a technology solutions provider based in Queensland, with a mission to help businesses of all sizes achieve their cybersecurity goals. They offer a comprehensive suite of Managed IT and Cybersecurity services. 

 

About Assuredly

assuredly

Assuredly is the all-in-one platform that helps businesses of all sizes easily review their cyber security controls, get real-time results automatically mapped to many global standards and be audit ready. It automates evidence collection, simplifies control assessment, and provides real-time results mapped to key frameworks. 

 

Media Enquiries 

B2Me Marketing 

07 5606 4050 

media@B2Me.Marketing 

 

Resources 

Board & Executive Cyber Security & Compliance Training 

Importance of Data Privacy for Queensland NFPs 

Meeting Australia’s Cyber Security Compliance Standards 

Privacy Act Review 

Navigating Cyber Security Compliance and Regulations 

ADITS Certified Great Place to Work for 3 Years in a Row!

We’re proud to announce that we’ve been officially recognised as a Great Place to Work® for the third year running! 

This is a true testament to our teams unwavering commitment to fostering a positive, supportive, and high-performing work environment.
says Managing Director, Ashley Darwen.

What does it mean to be Great Place to Work certified? Great Place to Work® surveys a business’ team members to assess factors like trust, respect, camaraderie, professional development opportunities, and overall workplace satisfaction

All-time High Satisfaction Rating

The survey reported that 96% of our employees think that ADITS is a great place to work. This is the highest rating for ADITS after it first got certified in 2022-2023, then in 2023-2024 and now in 2024-2025. It is also well over the 56% average for typical Australian-based companies.  

Their positive feedback is what truly makes this achievement so meaningful
according to Staci Yarrow, ADITS HR Advisor.

Here is what some of our employees have to say about ADITS 

I joined the ADITS team in 2016 and have never looked back. My role has continued to expand across all aspects of the business, which is one of the perks of working with a company that is continuing to scale. The number one thing I love about ADITS is the workplace culture. Everyone just gets along, which makes it such a great place to work.

At ADITS, I have the opportunity to work with a cohort of fun, professional, and outgoing staff members who encourage me to take on new and challenging opportunities. The flexibility that ADITS provides around personal and family life is exceptional. The managerial staff are absolutely brilliant at what they do and have an open-door policy to listen to all requests from employees.

ADITS has the office culture and tightly knit team that makes every day enjoyable. Being presented with new and interesting obstacles which are backed by training and learning paths has helped me to further my knowledge which I can then pass onto our customers. Staff are trusted to work autonomously and when strategies need deliberation the team is always reliable and available for a joke or three. My passion for technical details and market leading performance makes ADITS a great place to work.

To learn more about ADITS, visit our About Us.

The Power of Culture and Values in the Workplace

ADITS’ consistent enthusiasm fosters such a positive work environment. It boils down to a powerful combination of culture and values: 

  • Collaboration and Support: From day one, new team members are welcomed into a supportive and collaborative environment. Open communication and knowledge sharing are encouraged, along with teamwork, mutual respect, and a sense of belonging.
  • Professional Growth: ADITS recognises that our team’s success is our success. We invest in professional development opportunities, training programs, and mentorship initiatives. We love seeing each individual to reach their full potential.
  • Work-Life Balance: We understand the importance of a healthy work-life balance. Our flexible working arrangements and commitment to employee wellbeing allow our team to thrive both professionally and personally.
  • A Shared Passion for Innovation: We’re a forward-thinking company driven by a shared passion for innovation and excellence. Our team members are passionate about what they do, and that energy is contagious.
  • Recognition and Appreciation: We believe in celebrating achievements and recognising the hard work of our team. We foster a culture of appreciation where individuals feel valued, and their contributions are acknowledged. 

Proud of the Team, Inspired to Move Forward

Great Place to Work® is recognised as the global authority on workplace culture due to its extensive research, assessments, and insights into employee experiences across diverse companies and industries. 

This latest Great Place to Work® certification is a badge of honour for ADITS,
says Ashley.

It validates what our clients have known all along with ADITS as their IT partner. For those seeking to work with us, it is a preview of the stimulating, supportive, and rewarding work environment they can be part of to make a difference.

Adam Cliffe, ADITS Managing Director, shares:

ADITS is incredibly proud of this achievement and immensely grateful to our dedicated team. It is an inspiration for us to keep nurturing our culture, fostering innovation, and improving the workplace experience for our employees.

Centacare North Queensland

Centacare Catholic Family Services is a non-profit offering a range of services committed to enhancing people’s quality of life across Australia. Their programs include domestic and family violence, homelessness, registered training, NDIS and carer supports, children’s services, family and relationship supports and health, wellbeing and education.