Brisbane QLD Office Time: Mon - Fri (9:00 am to 5:30)

Hard drive, email and network configuration

Determines your vulnerable IT assest as well as remediation solutions for future attack prevention.

Data back-up and recovery

Simulates a cyber attack on your networks to determine the risks and results of a successful breach.

Virtual CISO

Syscon Cyber Security Consulting that helps you company affordably strengthen its overall security posture.

What We Offer

Computer Action Ltd. offers a full range of IT support services for home users, businesses and network administrators. Whether you require the design and installation of a computer or network, laptop repair, or upgrades and regular maintenance to existing systems be assured we can meet your needs in a friendly, timely and professional manner.


Our extensive and diverse expertise in the Windows, Apple, and Linux platforms enables us to offer you a breadth of services that few IT Support Firms can match. From screen replacement to operating system reinstall to network configuration and storage device management, we provide full service. Our services are available in your home, at your workplace, and in our shop. Computation has worked with hundreds of small to enterprise-level firms – protecting their data, preventing downtime and proactively monitoring, automating and supporting their systems since 2001.

Great Partnership

Syscon is a leading, highly-specialised security consultancy established and started in Toronto Canada in 1998, Our mandate is simple, we protect our clients data - and therefore their business.

Read More

Threat Analysis

Vulnerability Assessments, Identifies, quantifies and prioritizes vulnerable assets within your IT environment that can be successfully exploited by a cyber attack.

Read More

Policy Development

We will help you determine the elements you need to consider when developing and maintaining an information security policy to cover all information security bases.

Read More

Architecture Reviews

We will examine the existing network topology and deployment of the security controls within the organisation like firewalls, IDS/IPS, network segmentation and make recommendations to increase the effectiveness of the security controls you currently have.

Read More

Penetration Tests

We can conduct a simulation of an external or internal cyber-attack on you network infrastructure that attempts to prove or disprove whether a real-world attack would successfully exploit critical systems and gain access to your sensitive data.

Read More

Governance

We can assess your organisations Governance, Risk and Compliance obligations, explain and interpret the security and audit requirements relevant to your scope, and provide services that align with your companies budget and time constraints.

Read More
0

Project Completed

0

Happy Customers

0

Attacks Every Minute

0

Followers

Latest Threats

The top driver of cyber-attacks is now cyber-crime. Attackers are motivated by financial gain and driven by the prosperity of cryptocurrencies. Meanwhile, attacks are becoming more targeted. A determined enemy will take the time to learn the target by investing in reconnaissance, social engineering and specific tools.

Image

Ransom Motivated Every Other Attack

With the value of Bitcoin skyrocketing so did attacks motivated by ransom. Organisations associated ransom as the leading motivation for attacks (50%) over other attacks including insider threats, hacktivism and competition to list a few. Globally 42% experienced ransomware attacks, a 40% increase from 2016.

Read More
Image

Top Concern: Data Leakage

Data leakage/information loss emerged as the number-one security concern, cited by 28% of organisations globally. Service level degradation/outage was another top concern, cited by 23%.

Read More
Image

DDoS on the Rise, Hitting Harder at the Application Layer

The prevalence of Distributed Denial-of-Service (DDoS) attacks grew 10%, hitting nearly two in five businesses. One in six suffered an attack by an IoT botnet and 68% of attacks resulted in a service degradation or complete outage. Both carry associated costs. 2017 also brought an increase in application-layer vs. network-layer attacks.

Read More

Are you Looking for a Consultant?