Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

let’s make something together

Give us a call or drop by anytime, we endeavour to answer all enquiries within 24 hours on business days.

Find us

PO Box 16122 Collins Street West
Victoria 8007 Australia

Email us

info@domain.com
example@domain.com

Phone support

Phone: + (066) 0760 0260
+ (057) 0760 0560

  • June 6, 2017
  • SouthridgeTech

Healthcare Ransomware Guide

Healthcare organizations are a high value target for ransomware cyberattacks due to the sensitive nature of their information. Whether a small business or large, ransomware does not discriminate when it comes to obtaining vital data. If a business is unable to recover information for clients from a ransomware attack the result can bring not only […]

Read More
  • May 2, 2017
  • SouthridgeTech

MHS Fined 5.5 Million For HIPAA Violation

In the second largest fine against a covered entity to date, Memorial Healthcare is set to pay 5.5 million dollars in breach of protected health information. In this case over 100,000 people were affected dating back between 2011 and 2012. Information such as names, dates of birth and social security numbers were leaked as reported […]

Read More
  • May 2, 2017
  • SouthridgeTech

How to Avoid Being Spoofed

In Jacksonville, Florida a recent spoofing case was reported by a women claiming to have been asked for $250. The spoofer called pretending to be the HHS Office of Inspector General and informed the women she had won $9,000 in government grant money. In order to complete the process she was then asked to give […]

Read More
  • May 2, 2017
  • SouthridgeTech

How To Keep Your Smart Phone and Mobile Device Secure

1. Password, pin, or fingerprint protect your mobile device It’s critical to lock your phone with a password, pin, or fingerprint detection. It’s easy to do and it’s free. If you ever put your phone down at a party or event, it’s very easy for someone to pick it up and read your email or […]

Read More
  • March 23, 2017
  • SouthridgeTech

Cloud Troubles: The Need for Cloud Focused Business Continuity

The need for cloud focused business continuity is growing. In recent news, Microsoft Office 365 lost service for 17-hours halting access to OneDrive Accounts. Further, Outlook.com experienced login problems for a few hours during this same period.  Ensuring there is no downtime for your business can be costly, as a result a balance needs to […]

Read More
  • March 23, 2017
  • SouthridgeTech

Improving Healthcare Cybersecurity

Healthcare data is extremely sensitive information highlighting the need to protect it from cyber breaches. Cyber breaches have increased in frequency in recent times and the healthcare sector is no exception. As a result security measures must be organized in order to prevent such attacks from disrupting business practice. The WEDI researched improvements needed within […]

Read More
  • February 20, 2017
  • SouthridgeTech

Cyber Security: What Is A Firewall and Which Type Is For You?

What is a Firewall? A Firewall is a software program or built in hardware device with the specific purpose to defend your home or business against electronic threats by screening viruses, hackers and worms looking to infiltrate your computer through the internet. Serving as a gatekeeper between your company’s servers and the outside world – […]

Read More
  • February 14, 2017
  • SouthridgeTech

Healthcare Security’s Biggest Threats

THREATS TO HEALTHCARE SECURITY The top three threats healthcare professionals should concern themselves with: Vulnerable Connected Devices Distributed Denial of Service (DDoS) Phishing Scams 1. With the increase in healthcare technology the number of connected devices is growing rapidly. Within the business framework this is a welcomed enhancement because it increases efficiency and effectiveness. From […]

Read More
  • February 14, 2017
  • SouthridgeTech

Protect Your Business With These Easy Steps to Make Your Password Stronger

Is Your Password Secure? Here are some ideas on how to formulate a secure and strong password. Create different passwords for each account Use different passwords for every account. For example, email accounts, online banking accounts, and Linked-In or Facebook accounts should all have different passwords. This becomes critical because when businesses like Gmail, AOL, […]

Read More
  • February 13, 2017
  • SouthridgeTech

Netgear Routers Allow Security Loophole

A Ton of Popular Netgear Routers Are Exposed—With No Easy Fix A VULNERABILITY IN some popular Netgear routers has gone unpatched for months. Left unchecked, it leaves thousands of home networking devices exposed to full control by hackers, who can then ensnare them in havoc-wreaking botnets. While Netgear has finally released a tentative fix for […]

Read More