let’s make something together

Give us a call or drop by anytime, we endeavour to answer all enquiries within 24 hours on business days.

Find us

PO Box 16122 Collins Street West
Victoria 8007 Australia

Email us

[email protected]
[email protected]

Phone support

Phone: + (066) 0760 0260
+ (057) 0760 0560

  • December 9, 2019
  • SouthridgeTech

For Tax Professionals – Tax Security 2.0 Checklist

From the IRS All tax professionals should take stock of security measures used to protect client data. Tax practitioners remain high-value targets of cyber-criminals seeking to steal sensitive tax information, so they can file fraudulent returns. Whether a one-person shop or partner in a large firm, everyone should take steps to protect their clients and […]

Read More
  • December 4, 2019
  • SouthridgeTech

Is texting HIPAA compliant?

We have discussed Healthcare Cyber security concerns before, Improving Healthcare Cybersecurity. Is texting a safe method of communication with patients? Is texting HIPAA compliant? The answer to this question is not as simple as it may seem. With more and more medical professionals relying on their mobile devices for communication, texting has become a significant […]

Read More
  • December 2, 2019
  • SouthridgeTech

Cyber Monday: Tips for Safeguarding Personal Information

Cyber Monday draw millions of shoppers online for deals and savings, but this day also provides opportunities for an attacker to steal personal information. The Cybersecurity and Infrastructure Security Agency (CISA) reminds users to remain vigilant when browsing or shopping online. CISA encourages Cyber Monday shoppers to review the following online shopping safety tips: Do […]

Read More
  • November 24, 2019
  • SouthridgeTech

6 Critical Reasons for Office 365 Backup

Do you have control of your Office 365 data? Do you have access to all the items you need? The knee-jerk reaction is typically, “Of course I do,” or “Microsoft takes care of it all.” But if you really think about it — are you sure? Microsoft takes care of quite a bit, and provides […]

Read More
  • November 8, 2019
  • SouthridgeTech

Phishing Attack Protection

Since look-alike domains are a dangerous vector for phishing attacks, it’s a top priority that you monitor for potentially harmful domains that can spoof your domain. Our testing tool makes it easy for you to identify your potential “evil domain twins” and combines the search, discovery, reporting, risk indicators, and end-user assessment with training so you […]

Read More
  • October 30, 2019
  • SouthridgeTech

Spear-phishing is on the rise

Many email addresses and identities of your organization are exposed on the internet and easy to find for cybercriminals. With that email attack surface, they can launch social engineering, spear-phishing and ransomware attacks on your organization. Run our exposure check to identify your at-risk users, it only takes a few minutes and is often an eye-opening discovery. […]

Read More
  • October 30, 2019
  • SouthridgeTech

Avoiding Social Engineering and Phishing Attacks

What is a social engineering attack? In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that […]

Read More
  • October 28, 2019
  • SouthridgeTech

Hard Drive Shredding @ Southridge

As many as 53% of businesses don’t use a professional service to destroy old hard drives, USBs or other hardware that contain confidential information. Only physical destruction ensures the data on an old hard drive is 100% destroyed. The most effective way to ensure complete data destruction on a defunct hard drive is to pulverize […]

Read More
  • October 14, 2019
  • SouthridgeTech

Southridge at the Dorothy Day House

The Dorothy Day Hospital House has been feeding the hungry and sheltering the homeless in the Danbury, Connecticut area since 1982. Located on Spring Street, the organization prepares breakfast and hot lunch meals daily. Most of the food has been donated from local groups. Guests, sometimes numbering over 100,  may take sandwich bags with them […]

Read More
  • October 14, 2019
  • SouthridgeTech

Are your users putting a big target on your organization’s back?

The bad guys are constantly coming out with new ways to hack into your network and steal your organization’s confidential information. Our password exposure test allows you to run an in-depth analysis of your organization’s hidden exposure risk associated with your users. Call Southridge to find out more.

Read More