To help offset our carbon footprint, we have partnered with One Tree Planted to plant trees for each sale of computer hardware at no additional cost to our clients

let’s make something together

Give us a call or drop by anytime, we endeavour to answer all enquiries within 24 hours on business days.

Find us

PO Box 16122 Collins Street West
Victoria 8007 Australia

Email us

info@domain.com
example@domain.com

Phone support

Phone: + (066) 0760 0260
+ (057) 0760 0560

  • October 30, 2019
  • SouthridgeTech

Avoiding Social Engineering and Phishing Attacks

What is a social engineering attack? In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that […]

Read More
  • October 28, 2019
  • SouthridgeTech

Hard Drive Shredding @ Southridge

As many as 53% of businesses don’t use a professional service to destroy old hard drives, USBs or other hardware that contain confidential information. Only physical destruction ensures the data on an old hard drive is 100% destroyed. The most effective way to ensure complete data destruction on a defunct hard drive is to pulverize […]

Read More
  • October 14, 2019
  • SouthridgeTech

Southridge at the Dorothy Day House

The Dorothy Day Hospital House has been feeding the hungry and sheltering the homeless in the Danbury, Connecticut area since 1982. Located on Spring Street, the organization prepares breakfast and hot lunch meals daily. Most of the food has been donated from local groups. Guests, sometimes numbering over 100,  may take sandwich bags with them […]

Read More
  • October 14, 2019
  • SouthridgeTech

Are your users putting a big target on your organization’s back?

The bad guys are constantly coming out with new ways to hack into your network and steal your organization’s confidential information. Our password exposure test allows you to run an in-depth analysis of your organization’s hidden exposure risk associated with your users. Call Southridge to find out more.

Read More
  • October 7, 2019
  • SouthridgeTech

Did you know 81% of hacking-related breaches used either stolen and/or weak password?

Are your user’s passwords…P@ssw0rd? Employees are the weakest link in network security, using weak passwords and falling for phishing and social engineering attacks. Our password test checks your Active Directory for 10 types of weak password related threats, get your report in 5 minutes! Call Southridge to find out more.

Read More
  • October 1, 2019
  • SouthridgeTech

How vulnerable is your network to hacked user passwords?

25% of employees are using the same password for all logins. What if that password is available on the dark web? A massive amount of passwords are compromised due to data breaches and used by the bad guys for attacks. Find out if hacked passwords are being used within your organization. Call Southridge to find out more.

Read More
  • September 24, 2019
  • SouthridgeTech

Did you know, on average 45% of your users will plug in unknown USBs…

Download our special software onto any USB drive, then label the drive with something enticing and drop at an on-site high traffic area. If a user picks it up, plugs it in their workstation and opens the file, it will “call home” and report the “fail” to your console.  Find out now how your users will […]

Read More
  • September 19, 2019
  • SouthridgeTech

This week’s topic: Avoid Android Malware

Android is the most common operating system among mobile phone users which makes them a top target among cybercriminals. Following these tips can help keep your devices safe. In this week’s security tip video, learn some of the tips and tricks you can follow to protect Android devices. Watch this week’s Security Tip by https://www.pii-protect.com/MicroTrainings/micro_training_view/152?brand_key=hekfo&ID=34770

Read More
  • September 17, 2019
  • SouthridgeTech

Do your users know what to do when they receive a suspicious email?

Should they call the help desk, or forward it? Should they forward to IT including all headers? Delete and not report it? Give your users a safe and easy way to forward email threats to us for analysis, all with a single click. Call Southridge to find out more.

Read More
  • September 10, 2019
  • SouthridgeTech

Can hackers spoof an email address of your own domain?

Are you aware that one of the first things hackers try is to see if they can spoof the email address of your CEO? If they are able to, they can now launch ‘CEO Fraud’ attacks against your organization, and that type of attack is very hard to defend against. Find out now if you are […]

Read More
The owner of this website has made a commitment to accessibility and inclusion, please report any problems that you encounter using the contact form on this website. This site uses the WP ADA Compliance Check plugin to enhance accessibility.