How to Identify a Phishing Attack

There is no doubt you have seen or heard about the scam emails, texts, and phone calls that are a daily nuisance for everyone. It may be in an email, phone call, or text format. The scam message could lure you in many ways; It may tell you that you have won a prize or a notification about an internet order or package delivery.

What is Phishing?

Phishing is a type of social engineering where the attacker sends fake messages to trick a person into disclosing sensitive details to the attacker or deploys malicious software onto a device to get private information. Phishing scams usually require the recipient to perform an action such as clicking a link, downloading a file or entering a password. 

Tactics Phishing Attackers Use

Look out for emails and texts with: 

  • Generic greetings such as “Hello Customer” rather than an actual name.
  • Emails requesting personal information
  • Emails demanding an urgent response
  • Emails that say you won a prize for something that you didn’t enter
  • Messages with poor spelling and grammar
  • Messages asking for money
  • Mismatched links in the email body
  • Spoofed links. Never click on a link unless you are certain it is authentic. You can hover over it first to reveal its true destination. If the email claims to be from your bank, they will never ask you to log in from an email. Also, secure links should begin with HTTPS://
  • If in doubt, ask your I.T support person
Always be suspicious of texts, emails & calls from unknown sources

Scam Phone Calls: Tactics to look out for:

  • Unknown phone numbers
  • Calls seeking your personal information
  • Recorded messages that ask for payment or personal data
  • Callers who say there is an issue with your computer
  • Callers who require your action urgently.
  • Offers or deals that sound too good to be true
  • If the caller claims to be your bank and asks for your information
  • If the caller threatens you

How can you protect your business from phishing attacks?

  • Phishing awareness training – Most successful attacks occur due to employees unknowingly clicking on dangerous links in their emails.
  • If you suspect a phishing email, you can check online for scams related to the email topic or company. For example, if the email claims to be from PayPal, check PayPal’s website or sites such as www.scam-detector.com
  • Installing Endpoint Protection software such as Sophos, will add an extra layer of security and warn you if you click on a suspicious link. Ask us for a free trial!
  • Get an I.T support team with exceptional cyber security knowledge and experience. We are happy to help! Ask us about our priority I.T support options.
Round 3 of Small Business Basics Grants

Round 3 of Small Business Basics Grants

Attention, Small Business owners! New opening dates have been announced for Business Basics Grants!

Round 3 opens for applications as follows:

Regional Queensland funding stream: 9 am, Monday 16 May 2022

South East Queensland funding stream: 9 am, Tuesday 17 May 2022

Grant information can be found on the QLD government website.

This grant is for START UPS and small business owners just getting back on their feet. It offers $5,000 cash upfront to go towards things like:

  1. Coaching and Training
  2. Creating or updating your website
  3. Business planning and advice
  4. Strategic marketing planning and advice
  5. Cyber Security tools and training

We are here to help your local small business succeed by understanding your goals and the essence of your brand. Please give us a call if we can help you with any of your digital marketing, I.T Support, and communication needs.

Windows 7 RIP

Windows 7 RIP

RIP Windows. Long Live Windows!

When windows 7 launched in 2009 it was lauded as the successor to XP that Vista should have been but wasn’t.

Windows 7 was in effect a modernized Windows XP that cut back on many of the frivolous features and interactions of Vista. Many of you might even still be on Windows 7 if you’ve been using the computer you’re on for more than a few years.

That said, It’s definitely time to think about moving on.

Microsoft ended extended support for Windows 7 this January, so if something goes wrong with, you’re pretty much on your own. As good as it is, Windows 7 relies heavily on third party tools to monitor system security.

The good news is that Windows 10 is very much a worthy upgrade, especially with its capable inbuilt virus and malware protections. It has the same ease of use as Windows 7 and won’t use vastly more system resources.

You might be able to download, install and activate Windows 10 on your Windows 7 machines using their original licenses, but if you’d rather be safe than sorry, we at Key Comm have experience managing IT for businesses. Just message us.

Just for kicks, and to appreciate how good you’ve had it all these years, here’s TechRadar’s raving review of Windows 7.

How Do You Immunise Your Business from a Virus?

How Do You Immunise Your Business from a Virus?

The recent outbreak and spread of coronavirus has sent shockwaves through world markets and underscores just how interconnected we are in this age of global supply chains and mass travel.

The ASX has shown signs of vulnerability, with major players such as Qantas down as much as 20% since the start of the outbreak, and markets still on edge for further flow-on effects.

So, with travel down, and the supply potentially affected, how much do you need to prepare and make contingency plans for your small business? Major governmental and nongovernment bodies emphasise that the crisis is far from something to panic over, and so far the response and adaptation internationally has been heartening.

Contingency Plans

Examine your supply chain for direct connections to mainland China, and it may be worth considering how to keep things running if those particular elements are cut off or run low in supply. For most of us with businesses directly relying on Chinese supply, that will be an urgent and specific issue to keep track of. But there’s also the indirect effect of a general slowdown affecting your bottom line, efficiency of delivery and cash reserves.

Coronavirus delays

Back to the news. Some products expected in early 2020 have delayed. Companies, including Apple, have been confirming their supply chain has been affected by Coronavirus, affecting all kinds of tech products. Apple has been the first to officially recognise this impact but you can bet they’re not the only ones.

What should you do about it? Keep your products and systems in good shape, and if your depreciation schedule is telling you it’s time to upgrade, don’t throw out the old ones until the new one’s have arrived! If you have any concerns about the health of your system or devices, we’re here to help you get the most out of them.

Lookout for coronavirus phishing scams!

There are also phishing scams a plenty around Coronavirus. Scammers pose as health officials, asking you to log into other sites. Businesses who host their own email and access it via old school IMAP (or even POP!) are vulnerable to such attacks as their spam filters are less powerful than those used by white label email services such as gmail and outlook 365. Talk to us about modernising your email, but in the meantime, rather than clicking a suspicious link, copy and paste it into your browser’s search bar and see if the domain matches the advertised link.

This event – so far – gives us a good opportunity to examine our systems and prepareness for untoward events, while falling short of worst-case scenarios. Use it to stress-test, and let’s hope it all fizzles out soon.

Spike in NBN Scams: Tips and Tricks

Spike in NBN Scams: Tips and Tricks

IT News: Tips to not Fall Victim to NBN Scams!

IT Support: NBN scam alert

A significant increase in suspected internet connection scams has occurred as of late, with NBN Co. receiving over 100 calls a day from members of the public about such scams. NBN Co. is currently in the process of rolling out the $50 billion network.

For a reliable supplier of NBN compatible phone systems and more, click here!

Calls to NBN’s contact centre have reached 9500 over the last three months, representing a significant increase from 6700 between October 2018 and March 2019. This comes as a sizable portion of the network is being completed ahead of the 2020 ETA. Driving awareness to combat these attacks, NBN Co’s chief security officer addressed the cause for concern by having this to say: “As we close in on the end of the network build, scammers are increasing their efforts to take advantage of the NBN brand as a way to steal people’s personal or financial details and using increasingly sophisticated ways to convince people of their legitimacy”.

What You Need to Know

NBN Co will never make unsolicited calls to seek access to your computer, threaten disconnection, or request personal details

This public awareness campaign will involve NBN Co’s community engagement team, hosting a series of information sessions to help Australians discern, avoid and report scammers. The ACCC has previously warned of social engineering attacks where scammers impersonate NBN Co in calls offering to connect them to the NBN for a low price. In some of these cases, impersonators have tricked users into giving remote access to their computers so that they could steal personal information, install malware and demand payment to fix alleged problems. If you run into someone calling you about the NBN remember this: “As NBN Co is a wholesaler, we will never contact residents or businesses to sell phone or internet services”.

Moreover, NBN Co will never make unsolicited calls or door knock for the purposes of seeking access to a person’s computer, threaten them with disconnection, or request personal details. Despite increasing public awareness, Australians are expected to lose a record amount to scams this year, with the ACCC estimating that projected losses for 2019 will surpass $500 million (an unprecedented figure).”Many people are confident they would never fall for a scam but often it’s this sense of confidence that scammers target,” the ACCC Deputy Chair Delia Rickard states. “People need to update their idea of what a scam is so that we are less vulnerable.”

The Damage

The ACCC reports that investment scams were among the most sophisticated and convincing, with nearly half of the reported cases this year resulting in financial loss. Particularly, cryptocurrency investment scams are a serious cause for concern, with net losses reaching almost $15 million between January and July this year. This represents a significant increase from $6.1 million lost to the same type of scams last year.

You can report any suspected scams you come across here.

Need help managing your IT?

4g Failovers for Network Reliability

4g Failovers for Network Reliability

4g Failovers for Network Reliability
IT Support Brisbane


When is Network Reliability Important?

For many businesses it is highly important that their internet connection remains online with as few interruptions as possible. These businesses include those who perform most of their business activities online and where these activities must be performed in a timely manner. These are not the only businesses who may require reliability, and if you are wondering whether your business is one of these, simply ask yourself the following question. Are you often frustrated with internet outages and do they impact your work? If so, yours is indeed one of these businesses.

Such network reliability depends on reliable hardware (such as routers) as well as internet connections and service providers. Unfortunately, all service providers have the occasional outage, but luckily network hardware can be used to ‘hedge your bets’ as it were. Using a router with Failover capabilities can improve the availability of your business’s network connection.

WAN Failover

High Availability Network Setup

Network Failover Diagram

A WAN failover (sometimes termed a 4g failover) is suitable for use when a business has one or more networks which require as little interruption as possible. This feature is available with Network Setup from Key Technologies.

A business may have both a primary and secondary internet connection. This generally uses one traditional copper line or NBN service and a secondary 3g or 4g dongle as a failover, though just about any second internet connection can be used. This secondary (failover) connection comes into use when the first goes down. For example, a business could have a prepaid 4g modem with no ongoing costs plugged into the router on standby mode. Thus, if the primary link goes down the router is triggered to bring up the backup connection. This can take up to 10 seconds, so there may be a brief interruption, but far less than what could alternatively occur. If you would like even less downtime than this, then you may want to ask us about WAN load-balancing routers.

Additionally, with Multi-WAN routers, you can choose when you want to activate the backup or failover service. An example of these options is shown below. You may failover when either:

  • Any selected WANs are disconnected.
  • All WAN’s selected are disconnected.
Network Failover Options: IT Support Network Setup

Need Help Setting Up a Reliable Network

Our IT support staff are able to set up networks with high availability, integrity and confidentiality.


Need help managing your IT?