let’s make something together

Give us a call or drop by anytime, we endeavour to answer all enquiries within 24 hours on business days.

Find us

PO Box 16122 Collins Street West
Victoria 8007 Australia

Email us

[email protected]
[email protected]

Phone support

Phone: + (066) 0760 0260
+ (057) 0760 0560

  • October 7, 2019
  • SouthridgeTech

Did you know 81% of hacking-related breaches used either stolen and/or weak password?

Are your user’s passwords…P@ssw0rd? Employees are the weakest link in network security, using weak passwords and falling for phishing and social engineering attacks. Our password test checks your Active Directory for 10 types of weak password related threats, get your report in 5 minutes! Call Southridge to find out more.

Read More
  • October 1, 2019
  • SouthridgeTech

How vulnerable is your network to hacked user passwords?

25% of employees are using the same password for all logins. What if that password is available on the dark web? A massive amount of passwords are compromised due to data breaches and used by the bad guys for attacks. Find out if hacked passwords are being used within your organization. Call Southridge to find out more.

Read More
  • September 24, 2019
  • SouthridgeTech

Did you know, on average 45% of your users will plug in unknown USBs…

Download our special software onto any USB drive, then label the drive with something enticing and drop at an on-site high traffic area. If a user picks it up, plugs it in their workstation and opens the file, it will “call home” and report the “fail” to your console.  Find out now how your users will […]

Read More
  • September 19, 2019
  • SouthridgeTech

This week’s topic: Avoid Android Malware

Android is the most common operating system among mobile phone users which makes them a top target among cybercriminals. Following these tips can help keep your devices safe. In this week’s security tip video, learn some of the tips and tricks you can follow to protect Android devices. Watch this week’s Security Tip by https://www.pii-protect.com/MicroTrainings/micro_training_view/152?brand_key=hekfo&ID=34770

Read More
  • September 17, 2019
  • SouthridgeTech

Do your users know what to do when they receive a suspicious email?

Should they call the help desk, or forward it? Should they forward to IT including all headers? Delete and not report it? Give your users a safe and easy way to forward email threats to us for analysis, all with a single click. Call Southridge to find out more.

Read More
  • September 10, 2019
  • SouthridgeTech

Can hackers spoof an email address of your own domain?

Are you aware that one of the first things hackers try is to see if they can spoof the email address of your CEO? If they are able to, they can now launch ‘CEO Fraud’ attacks against your organization, and that type of attack is very hard to defend against. Find out now if you are […]

Read More
  • August 24, 2019
  • SouthridgeTech

Windows 7 – Upgrade vs. Replacement

With Windows 7 End of Life, your organization will need to determine whether upgrading devices is sufficient or replacement of devices is necessary. To help you make this choice, here is a checklist to consider when looking to migrate from Windows 7 to Windows 10 successfully. If that fails or if you have any questions […]

Read More
  • August 20, 2019
  • SouthridgeTech

Phishing threats

Phishing is still the #1 threat action used in social engineering attacks and is used to take advantage of our socially networked lives. Attackers use social media to target both your brand and your users by distributing malware or spear-phishing for credentials. Southridge’s new social media phishing test makes it easy for you to identify […]

Read More
  • July 31, 2019
  • SouthridgeTech

Center for Internet Security reminds users to properly dispose of old or unused data and devices

The Center for Internet Security (CIS) July Newsletter reminds users to properly dispose of old or unused data and devices. Without careful management of online accounts, cloud storage, physical storage, and electronic devices, users could inadvertently disclose sensitive information that can be exploited by cyber criminals. CIS is home to the Multi-State Information Sharing & […]

Read More
  • July 1, 2019
  • SouthridgeTech

This month’s topic: Creating a Security-Forward Culture

Creating a culture of security aware individuals requires the participation of every employee, from executives to the front desk. We all will play a role in this culture and protecting sensitive information. In this month’s newsletter, we examine the steps that everyone can take to improve culture and put security first in the workplace.  Security […]

Read More