LOOKUP Shop           Remote Support          1300 553 559 enquiry@lookup.com.au
Cyber Security training basics: Password best practices

Cyber Security training basics: Password best practices

Cyber Security training basics: Password best practices & phishing identification As a business you know the importance of ensuring that...

WFH means more vulnerability to cybercrime

WFH means more vulnerability to cybercrime

WFH means more vulnerability to cybercrime. Here are some methods to stay safe WFH opens up whole new horizons in...

Data security in a WFH setup

Data security in a WFH setup

Data security in a WFH setup Do you have staff working from home? With the pandemic still around, the answer...

The challenges in establishing data security best practices

The challenges in establishing data security best practices

The challenges in establishing data security best practices in a WFH environment The COVID-19 pandemic changed the landscape of the...

WFH is here to stay Are you ready?

WFH is here to stay Are you ready?

WFH is here to stay. Are you ready? The COVID-19 pandemic brought about tremendous, unimaginable changes across the world. Lockdown,...

Cyber hygiene: The key to your business’s good cyber health

Cyber hygiene: The key to your business’s good cyber health

Cyber hygiene: The key to your business’s good cyber health We all know that basic hygiene is a must to...

Free Internet Access? Don’t fall for this one

Free Internet Access? Don’t fall for this one

Free Internet Access? Don’t fall for this one One of the popular internet scams that has been doing the rounds...

Online shopping? Watch out for these red flags

Online shopping? Watch out for these red flags

Online shopping? Watch out for these red flags Who doesn’t like online shopping? Online shopping has opened up a whole...

DNS Cache poisoning: What every SMB must know

DNS Cache poisoning: What every SMB must know

DNS Cache poisoning: What every SMB must know In one of the most common poisoning attacks, the attacker poisons the...

Protecting yourself against poison attacks

Protecting yourself against poison attacks

Protecting yourself against poison attacks Data poisoning by way of logic corruption, data manipulation and data injection happen when the...