Australia now has mandatory data breach notification legislation
The recent passing of mandatory data breach notification laws through the senate imposes on organisations a need for increased transparency and accountability. Australian government agencies, businesses and not-for-profit organisations with an annual turnover of more...
Cybersecurity Challenges: Perception vs. Reality
New research from Vanson Bourne on the state of mid-market cybersecurity reveals major gaps between perception and reality of cybersecurity challenges. While mid-market enterprises expressed confidence in their cybersecurity defences, in reality, they struggled to...
blueAPACHE expands to new office in Victoria to meet demand
PRESS RELEASE Melbourne, Australia – Award-winning IT as a Service (ITaaS) provider blueAPACHE are set to expand their operations in Victoria, following significant growth. “As organisations seek greater business agility and improved alignment between their business...
Deloitte TMT Predictions for 2017
Breakthrough in machine learning, growing use of biometric security, escalation in DDoS attacks and half a trillion global spend on IT-as-a-Service are some of the key predictions for 2017. Deloitte released their 16th edition of predictions for the Technology, Media...
Simon Sinek Leadership Forum: Start with Why
blueAPACHE recently hosted our Insight Event in association with Veeam. This exclusive, all-day event was specifically crafted for leaders - current and future - to help them create sustainable, high-performing cultures within their organisations. Presented by Simon...
blueAPACHE celebrates family day
Last weekend, blueAPACHE hosted our annual family day in the Mornington Peninsula. Every year in February, staff along with family, are invited to the home of blueAPACHE Managing Director, Chris Marshall for a casual, relaxed afternoon of family friendly festivities....
Technology solutions for business challenges – SIP calls over internet
How does placing SIP calls over the internet affect its quality? In order to answer this, we must first understand how SIP trunking works. With SIP trunks (Session Initiation Protocol or IP based phone and messaging), voice is first converted into IP packets. These IP...
Fraud Barometer: Fraud in Australia is on the rise
Insider jobs and technology enabled fraud are the two alarming trends in Australian fraud, as reported by KPMG in their six-monthly fraud barometer. According to the Fraud Barometer recently released by KPMG, between April to September 2016, 143 frauds occurred in...
Gartner’s Top 10 Technology Trends for 2017
Gartner’s top 10 Strategic Technology Trends for 2017 focus on three key areas - intelligence everywhere, the digital world and the new intelligent digital mesh. Intelligent 1. AI and Advanced Machine Learning The techniques for machines learning will move beyond...