Skip to content

March 2025

[Outage Notification] – Intermittent Outbound Calling Issue on Hosted PBX and Voice Services

Start Time: 25/3/2025 8:30 AMStatus: RESOLVED (25/3/2025 9:45 AM)Service Impacted: Approved Systems – Hosted PBX & Voice Services We are currently experiencing an intermittent issue affecting outbound calls across our Hosted PBX and Voice Services platform. Customers may find that they are unable to make outgoing calls at this time. Inbound calls and internal call routing are currently unaffected. Our… Read More »[Outage Notification] – Intermittent Outbound Calling Issue on Hosted PBX and Voice Services

The Hidden Cost of Skipping the Chain: Why Business Owners Must Respect the IT Support Model

The Hidden Cost of Skipping the Chain: Why Business Owners Must Respect the IT Support Model In the world of IT support, efficiency is everything. Businesses rely on their IT support teams to ensure operations run smoothly, minimize downtime, and provide quick resolutions to technical issues. Yet, despite the carefully designed support structures put in place, many business owners still… Read More »The Hidden Cost of Skipping the Chain: Why Business Owners Must Respect the IT Support Model

Right to Disconnect & Direct Contact Policy

Changes in Legislation & What It Means for You Recent amendments to the Fair Work Act 2009 have introduced the Right to Disconnect, which ensures employees are not required to engage in work-related communications outside their designated hours unless such refusal is unreasonable. This legislation applies to employers and extends to third-party contacts, including Managed Service Provider (MSP) clients. At… Read More »Right to Disconnect & Direct Contact Policy

Train Yourself and Your Staff to Spot Scam Emails Before It’s Too Late

Cybercriminals only need one mistake to compromise your business, and that mistake is often as simple as one employee clicking a malicious email link. Phishing and scam emails are the most common method used by hackers to deploy ransomware, steal credentials, and gain access to sensitive business data. Training your staff to detect these threats is not optional — it’s… Read More »Train Yourself and Your Staff to Spot Scam Emails Before It’s Too Late

Is Your Network a Mule for Malicious Actors? How to Protect Your Business with PenTesting

Cybersecurity threats are evolving at an alarming rate, and businesses of all sizes—whether a small office with a few PCs or a large corporation—are at risk of being exploited. It’s no longer just about protecting your own data; if your network is unsecured, it can become a mule for malicious actors, carrying out attacks without your knowledge. Unchecked vulnerabilities could… Read More »Is Your Network a Mule for Malicious Actors? How to Protect Your Business with PenTesting

The Woes of Supporting Fax Services for the Medical Industry

How to Send Successful Faxes Faxing remains a critical communication tool in the medical industry despite the digital shift to email and secure messaging. Supporting fax technology, however, has become increasingly challenging due to a combination of legacy fax machines, virtual fax services, and the way the internet handles real-time audio transmissions. Unlike modern digital communications, fax transmissions require uninterrupted,… Read More »The Woes of Supporting Fax Services for the Medical Industry

Starting a Business? Secure Your IT Foundations for Long-Term Success

Starting a business is an exciting journey, but many new business owners overlook critical IT steps that can make or break their success. From securing your business name and domain to ensuring long-term IT reliability, the right technology strategy will not only support your operations but also protect you from security risks, downtime, and costly mistakes. Here’s what you need… Read More »Starting a Business? Secure Your IT Foundations for Long-Term Success