Queens Beach Medical Centre

This project was carried out to increase reliability, performance and efficiency of Queens Beach Medical Centre’s infrastructure.  As part of the customers roadmap, ADITS provided suitable and scalable recommendations for compatibility with upgraded infrastructure from our world-class vendors. This has provided the customer with simplistic cloud manageability which spans across all different device platforms.

The project was completed over the 2-day weekend, outside of the Practice’s work hours, so they were ready to begin the working week without interruption.

Grady Homes

This project was carried out to increase reliability, performance and efficiency of Grady Homes infrastructure. As part of the customers roadmap, ADITS provided suitable recommendations for new and upgraded server operating systems to provide the client with seamless internal and remote access.

This project was completed over the 2-day weekend whilst keeping the business online so they were able to work through the weekend.

Increased cyberattacks in our Townsville Community

Increased cyberattacks have been the result of a wave of new, sophisticated attack methods which are hitting our country. Our Townsville community have become a target area in recent times, with our most vulnerable falling victim.
ADITS’ Security Operations Manager, Dave Jacob was asked by 7News to provide actionable advice on identifying cyber scams and preventing these attacks.
A Townsville pensioner has been led up the garden path, after a scammer stole her ride-on mower.
The 65-year-old thought she’d found a buyer online – but instead she’s been left hundreds of dollars out of pocket.

Story by 7News Townsville

adits-interview

Crystal Rivers normally takes people on face value, but a recent run in with a scammer has made her think twice.

“I don’t want to not trust people, but it makes it really hard for me to trust anyone,” she said.

Last week, she advertised her ride on lawn mower for sale on Facebook marketplace. She exchanged a few messages and organised for someone to come and have a look at it

“They had a look at it and said, ‘oh yes, it’s great! I love it ‘. I did have it up for $900 but I was willing to sell it to him for $700 because he was one of the army boys” she recalled.

The deal was done and the mower was taken. Crystal was waiting for the money to go into her bank account, but, it never did.

“He called on a private number so I couldn’t call him back.”

She said the man was wearing an army uniform and drove away in a blue ute.

The incident has prompted a warning from cyber security experts.

“My advice would be to always maintain a level of mistrust and try to keep in mind you may not always know who you are dealing with,” ADITS Security Operations Manager, Dave Jacob advised.

He add that if you are selling online, then do it through PayPal.

“You can see the transaction happen automatically and make sure you don’t let go of your goods without receiving payment”.

Reporter: Yasmin Bonnel, 7News 

Cyber Security Tips for End Users

Hi! Joe Average here! I’m just your average bloke who knows way too much about IT, with way too much time on his hands. One of the top causes of cyber security breaches is user error. So allow me to provide you with my top tips on what you can do to prevent cyber security breaches.

The majority of cyber security breaches don’t start with hackers breaking into sophisticated systems; they begin with simple user mistakes. Weak passwords, outdated software, careless clicking, or connecting to unsafe networks can all open the door to attacks. That’s why end users play a critical role in keeping both personal and business data secure.

This guide outlines essential cyber security solutions and practices that anyone can implement, from setting strong passwords and avoiding phishing links to keeping devices updated and backing up important data. By following these tips, end users can dramatically reduce their risk of cyber attacks and create a safer digital environment for themselves and their organisations.

Password protection

If you use the same basic password for everything, you are asking for trouble. Even a rebel without a cause would have fun with that. Make sure you use a complex password; one with a mix of upper and lower case, numbers and symbols. Hot tip: If you nearly forget it yourself, it’s a good one! Never share passwords or sensitive information via email or messages to avoid compromise. Remember to change your password regularly, once every 30 days is the recommended best practice. I also recommended you install two-factor authentication on all devices and programs for an additional line of defence. This common cybersecurity practice helps protect against unauthorised access. And no, for the last time, ‘Password’ is not a good password. Don’t make me say it again.

Know your hardware

Freddy from Finance has no business borrowing your USB, and vice versa. Take ownership of all of your hardware, inclusive of your computer, USB and hard drive. We also recommend that each employee has their own secured accounts for online services, including email and any other software programs you use.

Think before you click

Phishing attacks often mimic trusted sources to make you click on malicious links, increasing the risk of compromise. We are all guilty of being suckered into clickbait; the enticing news article titles that promise more information, but never deliver. This tactic is also used in phishing attacks, which attempt to obtain sensitive information. Remember, curiosity killed the cat, so we need to avoid pop-ups and unknown links and email messages at all costs. Always check with your IT manager to ensure that links are safe to access.

Install Anti-Virus Protection and Firewall

This software takes the guesswork out of malicious attacks by preventing them from entering your systems. It is the number one line of protection and has the potential to eliminate user error completely. And remember, there is no point in having it if you do not keep it up to date. Effective security measures involve regularly updated systems and staying alert to cyber threats.

Implementing Multi-Layered Cyber security

Cyber security isn’t one-size-fits-all with apps and services. A stacked strategy with secure passwords, software updates, and tools like firewalls and intrusion detection systems is the way to go. Regular software and apps updates are essential methods to control vulnerabilities in systems. Protect access and keep sensitive info under wraps to manage business like a pro amidst the rising tide of cyber threats.

Update Your Software Regularly

Outdated apps and software are the easiest vulnerabilities hackers exploit. Always install system and application updates as soon as they’re available. These patches often fix security vulnerabilities before attackers can exploit them.

Secure Your Wi-Fi & Remote Connections

Your home or office Wi-Fi network should never be “set and forget.” Make sure your router uses WPA3 or WPA2 encryption, has a strong, unique password, and hides the default network name (SSID). If you work remotely, always use a VPN to protect your connection from eavesdropping.

Be Wary of Public Wi-Fi

That free public café Wi-Fi isn’t really free—it could be a haven for malicious cyberattacks. If you must use it, avoid logging into sensitive accounts (like banking or email) unless you’re on a secure, encrypted VPN.

Lock Your Devices

Control access to computers and lock your devices to protect against unauthorised access. Step away from your desk? Lock your computer and mobile device, even if it’s just for a coffee break. Unattended devices are an open invitation for unauthorised access.

Back Up Your Data

Accidents (or ransomware) happen. Regularly back up your files to a secure cloud service or an encrypted external drive. That way, even if something goes wrong, your important data isn’t gone forever. Ensuring data is stored securely helps avoid the identity compromise risk.

Stay Alert to Social Engineering

Cyber threats aren’t always technical—sometimes they rely on psychology. Be cautious of phone calls, texts, or even in-person requests for information. If something feels off, it probably is. Suspicious requests could lead to identity or information compromise if mishandled. Always verify suspicious requests before sharing sensitive information.

So there you have it; my top tips on what you can do to prevent cyber security breaches. For questions, concerns and smart remarks, contact my knowledgeable tech mates for cyber security services at ADITS on 1300 361 984, or at enquiries@adits.com.au

Whether you’re in Brisbane, Townsville, or beyond, we’re here to support you! Cheers!

FAQs

Q1: Why is end-user cyber security so important?
Most breaches happen due to human error. Even the strongest security systems can be bypassed if employees use weak passwords, click on phishing links, or leave devices unlocked. Strong end-user awareness is the first line of defence.

Q2: How often should I update my passwords?
Best practice is every 30–60 days, and you should always use a mix of upper and lower case letters, numbers, and symbols. Even better, use a password manager or passkeys to keep your accounts secure.

Q3: Is public Wi-Fi really that dangerous?
Yes. Public Wi-Fi networks are often unsecured, meaning attackers can intercept your data. If you must use it, always connect through a trusted VPN and avoid logging into sensitive accounts like banking or work email.

Q4: What’s the easiest way to improve my cyber security today?
Enable multi-factor authentication (MFA) on all accounts. It adds an extra layer of protection beyond your password and blocks most unauthorised access attempts, even if your credentials are stolen.

Q5: Do I really need to back up my data if I’m careful?
Yes. Being careful isn’t enough. Hardware failures, ransomware, and accidental deletions happen all the time. Regular backups to a secure cloud or encrypted drive ensure your data is safe no matter what.

Mitigating the IT risk of employees

Hi – Joe Average here!
In Australia, business owners have been asked to allow their employees to work from home if it is possible for them to do so. Although critical to the health and safety of your employees, the risk to your data may be a potential side effect, with employees using work devices all over the countryside. So, allow me to provide my top tips on mitigating the IT risk of employees.

Accessibility

Polly from PR does not need access to your finances, just like Fred from Finance does not need access to your PR files. I recommend that you conduct a permission audit, as in, document which employees have access to what files and ensure adequate restrictions are in place. It may also be beneficial to create an access request structure, to ensure that only those who need access, can get it.

Work devices for work purposes

Everyone has heard the old saying, ‘horses for causes’ and its true for your business tools as well, inclusive of devices. Work devices should only be used for work purposes. Limiting work and personal use overflow will limit the risk of your business data leaking into employees’ personal lives (and who knows where that could end up!

Data retention

It is important that all business data is backed up and stored in a secure location. That way, if Fired Freddy ‘accidentally’ deletes all of your documents on his last day of work, your data is protected.

Education

There is only one way employees are going to know the do’s and don’ts of IT in your business: education. It is important to spread awareness on topics such as identifying spam and steering clear of activities that may pose a security risk. We recommend talking to your Managed IT Services provider to develop an education plan for your employees.

So there you have it; my top tips for mitigating the IT risk of employees. For questions, concerns and smart remarks, contact my knowledgeable tech mates at ADITS on 1300 361 984, or at enquiries@adits.com.au

Whether you’re in Brisbane, Townsville, or beyond, we’re here to help! Cheers!