
Tech Tips: The basics of using 3CX
Just started using 3CX or need a quick refresher? This easy-to-follow guide breaks down the most common call functions—like transfers, conferencing, parking, and voicemail—plus tips for using Yealink phones and understanding BLF. Perfect for anyone who wants to get the most out of their VoIP system without the tech jargon.

Client Install: Seamless Office Move for a Brisbane CBD Legal Services Firm
After helping this client with their office relocation back in 2022, we were excited to be called in again to support their growing team's move to a new Brisbane office. With more staff, more equipment, and a tight timeframe, they needed everything relocated, reinstalled, and fully operational with minimal disruption. Our team handled the entire technology setup—from computers and phones to networking and Wi-Fi—ensuring a smooth transition and a fresh start on day one. Find out how we did it in our latest blog.

Pinch Payments: The Easy Way to Automate Payments in Xero, MYOB & QuickBooks
Tired of chasing late payments? Pinch Payments automates invoice payments in Xero, MYOB, and QuickBooks. Get paid faster with secure, PCI-DSS compliant transactions. Find out more about this Brisbane based business in our latest blog.

Tech Tips: The Top 6 Features of Microsoft Edge
Is Microsoft Edge better than Google Chrome? Well, with these top 6 features, it definitely gives some food for thought. Dive into our latest blog to learn about 6 great features of Microsoft Edge that you could use in your business.

MFA Explained: A Simple Way to Boost Your Business Cybersecurity
Passwords alone aren’t enough to protect your business. That’s why multifactor authentication (MFA) is one of the easiest and most effective ways to secure your accounts and reduce the risk of cyberattacks. In this blog, we explain what MFA is, how it works, and why it’s especially important for small businesses in Australia—along with practical examples and tool recommendations.

David Speaks: Cyber Security Awareness Training for Brisbane Transport company
This week David led a cyber security training session for the staff of a Brisbane based transport company.

Client Install: Migration from GoDaddy to Microsoft 365
GoDaddy is often a convenient starting point for small businesses due to its bundled offerings and simple setup. However, for growing businesses, GoDaddy’s version of Microsoft services quickly becomes restrictive. Find out how we helped a new law firm find their freedom, and security, in Microsoft 365 direct.

Tech Tips: Microsoft Bookings Advanced Features
Back in 2022, we introduced the basics of Microsoft Bookings—how to set up your calendar, add services and staff, and share your booking form. It has become one of our most popular blogs. In this follow-up, we’ll highlight some lesser-known but powerful features you can take advantage of. Whether you're looking to reduce no-shows, gather more customer info, or get better oversight of your bookings, there’s something in here for you.

The Importance of Having a Business Continuity and Disaster Recovery Plan for Your Business
We all know that unexpected disruptions—whether it’s a cyberattack, power outage, or even a natural disaster (thanks Alfred!) —can seriously impact business operations. But having a solid Business Continuity and Disaster Recovery Plan in place can make all the difference in keeping things running smoothly when challenges arise. To help, we’ve put together a free template to get your started.

Queensland leads the nation in cyber crime
The Australian Cyber Threat Report for 2023–2024, released by the Australian Signals Directorate (ASD), highlights a significant escalation in cyber threats affecting businesses across the nation. Find out the key details in our blog.

Our top blog posts of 2024 revealed
We’re proud to share the top 5 blogs that have helped businesses stay informed and ahead of the curve in 2024.

Meowy Christmas from our Tech Sup'paw't team
As 2024 rolls to a close, our Paw-some foursome Tech Sup'pawt' team wish you a very Meowy Christmas with your friends and family.

Client Install: Roundup of our latest installs
It has been a busy lead up to the end of 2024 with a number of installations of new computers for our clients. We offer turnkey solutions for our clients and can deliver and install a new laptop or desktop PC in as little as 2 days. Find out about our latest installs in our blog.

Tech Tips: The best ways to use Google search
Google Search is an essential tool for businesses and professionals alike, but are you getting the most out of it? Whether you're looking for precise information, exploring industry trends, or hunting for market insights, mastering Google Search can save time and effort.
.png)
Cyber Security incident hits Brisbane Law Firm
This weeks blog is a report written in response to a cyber incident involving a Brisbane Law firm who found themselves caught up in a scam centered around unauthorised access to the Microsoft 365 account of the firms Office Manager, Susie and the subsequent activity undertaken
under the account by the unauthorised party.
Our blog provides a summary of the incident, remediation steps undertaken, an outline of the firms existing technology landscape
and post-incident recommendations. It also highlights the importance of Security
Awareness Training
and strong cyber security practices are for your business.
.png)
Defense in Depth Explained
For small and medium-sized businesses (SMBs), safeguarding sensitive information and ensuring uninterrupted operations requires a
proactive, layered approach to security. One highly effective strategy is Defense in Depth.
This blog will unpack the concept of Defense in Depth in simple terms, explain its benefits, and offer practical examples of how your
business can adopt this powerful cybersecurity framework.

How AI is Advancing Phishing Attacks – And How Your Business Can Stay Ahead
Phishing attacks have always been a major threat to businesses, but the game has changed. With the rise of Artificial Intelligence (AI), these scams are becoming more sophisticated and harder to detect, putting businesses and their employees at increased risk. In this blog, we’ll explore how AI is powering more effective phishing attempts, the risks involved, and actionable steps your business can take to combat these evolving threats.