Site Map
Services
- CodeTwo Automatic Email Signatures for Microsoft 365
- Business 3CX VoIP Hosted Phone Systems
- CCTV for Business
- Electronic Bug Scanning
- Email Antispam
- Computer Maintenance and Security
- Microsoft 365 Backups
- Microsoft 365 Email and Document Migration
- Microsoft 365 Setup
- Security Awareness Training for Staff
- WatchGuard Managed Firewalls
Blog
- 3CX Silver Partnership
- 6 Reasons To Consider Security Cameras For Your Business
- 7 Business Benefits of Using a Virtual Private Server (VPS)
- A (Business) Catalyst for change
- ACSC Annual Cyber Threat Report 2020-21
- ACSC Annual Cyber Threat Report July 2019 to June 2020
- ACSC's Annual Cyber Threat Report 2021-22
- April 2020 Newsletter
- Are you taking a gamble on your business? Why Cyber Insurance is a must have
- .au direct domain names are coming
- Australia’s Cyber Threat Report Card: Cybercrime In The Age Of COVID-19
- Benefits of an Uninterruptible Power Supply (UPS) for your business
- Boost Your Business Efficiency: Top Browser Extensions for Microsoft Edge and Chrome
- Business calls on the beach? We've got you covered with 3CX
- Can we ever really be cyber secure?
- Coffee & Copy anyone?
- Case Study: IP Security Camera install for Manufacturing & Retail
- Case Study: The benefits of Thin Clients for your Business
- Case Study: VoIP install for Financial Services Client
- ChatGPT: The pro's and con's of using it to market your business on social media
- Client Install: 170 seat 3CX VoIP Phone System across 3 sites
- Client Install: 3CX VoIP Phone System for a Conveyancing firm
- Client Install: 3CX VoIP Phone System for a Financial Services business
- Client Install: 3CX VoIP
- Client Install: Apple Mac
- Client install: Automatic email signatures with CodeTwo for Office 365
- Client Install: Boosting Retail with Remote Desktop Server refresh
- Client Install: Line of Business Software server for a retail client
- Client Install: CCTV & Wi-Fi
- Client Install: CCTV as far as the eye can see
- Client install: CCTV for a retail showroom
- Client Install: CCTV for a small business
- Client Install: CodeTwo automatic email signatures for Microsoft 365
- Client Install: Dell Wyse Thin Clients
- Client install: Dual Monitors and Dock for Chromebook
- Client Install: Electronic Bug Scanning
- Client Install: Electronic Bug Surveillance
- Client Install: Executive Home Office
- Client Install: External Vulnerability Scan
- Client Install: HIK Vision security camera install - Big Brother is watching
- Client Install: Hikvision 11 Camera CCTV System
- Client install: Laptop with dual monitors in a law firm
- Client install: Lenovo Thinkbook 14
- Client Install: Manufacturing gets a makeover
- Client Install: Microsoft SharePoint & OneDrive for Business file sharing
- Client Install: Migrating from Google to Microsoft 365
- Client Install: MSI Laptop with dock and dual screens for an Accounting Practice
- Client Install: Network rack declutter
- Client Install: New office setup for Legal Services business
- Client install: Remote Installation of 3CX VoIP Phone System for a Law Firm
- Client Install: Securing a Microsoft 365 tenancy for a law firm
- Client Install: Server for a 10 user accounting practice
- Client Install: WatchGuard M270 Firewall
- Client Install : We're going NUC's
- How often should you clean your computer?
- Craig joins the team
- Cyber criminals vs fish tanks
- Cyber Security Awareness Training
- David speaks: Centre for Legal Innovation Cyber Security Panel
- David speaks: 2019 Logan Small Business Expo
- David speaks: BNI Focus
- David Speaks: Boards, Beer & Burgers
- David Speaks: Business Continuity
- David Speaks: College of Law Cyber Risk Workshop
- David speaks: Crunching cyber security numbers with the Institute of Public Accountants
- David speaks: Cyber security awareness training
- David Speaks: Cybersecurity numbers with IPA Queensland
- David speaks: Detecting and Tracking Events or Have You Been Hacked?
- David speaks: Email antispam and phishing
- David speaks: Firewalls and next gen antivirus
- David speaks: FortiTech helps CPA lead the way
- David speaks: Incident Response and Insurance
- David Speaks: IPA 2023 QLD Conference
- David Speaks: IPA BAS Agent Discussion Group Webinar
- David Speaks: IPA Ipswich chapter Cyber Security presentation
- David Speaks: IPA National Congress 2022
- David Speaks: Passwords and Multifactor Authentication
- David speaks: Patching & the Internet of Things (IoT)
- David speaks: Protecting data for remote users
- David Speaks: Security Assessments & Technology Policy
- David Speaks: Security Awareness Training
- David Speaks: Setting your practice up for success
- David Speaks: Sunshine Coast AAT Discussion Group
- David speaks: The QUT White Hats Society
- David Speaks: Turning your staff into Dark Web Defenders
- December FortiTech Newsletter
- Dicker Data's Brisbane TechX 2017
- Dirty Deeds, done (not) dirt cheap
- Stop your emails being rejected by Microsoft 365 and Google
- Federal Government Tax Incentive Helping Small Businesses Go Digital
- FortiTech helps CPA lead the way
- FortiTech joins the World Legal Summit 2019
- FortiTech partners with the Australian Cyber Security Centre
- FortiTech helps bring history to life
- FortiTech joins the World Legal Summit 2019
- FortiTech partners with the Australian Cyber Security Centre
- 14 Ways to Protect Your Business from a Cyber Attack
- Free 32-page Guide: How to Secure Microsoft 365
- Free guide: Small Business Cyber Security
- Free Template: Pandemic Action Plan
- Going Digital: The benefits of replacing paper-based checklists and forms
- Gone Phishing: How Security Awareness Training can save your business
- Happy Anniversary! Data Breaches and Digital Security 1 Year into The NDB Scheme
- How Much Should a Business Spend on IT?
- How Much Should a Company Spend on IT?
- How often should a business replace their computers
- How often should you clean your computer?
- How Safe Is Your Technology? Security Vulnerabilities In 2021
- How technology busted an employee stealing $370,000 from our client
- How to add an email signature on all of your outgoing Office365 emails
- How to connect your work desktop PC to the Internet at home
- How to create and maintain strong password management
- How to improve workplace productivity in 1 simple step
- How to Prevent Business Email Compromise (And Other Things You Should Know About BEC)
- How To Protect Your Business From Ransomware (The Full Story)
- How to Protect your Business on Windows and Apple
- Password Management Tools
- How to use FortiTech's antispam platform
- How we foiled a Veracrypt ransomware attack
- The secret to how we saved a client hundreds of thousands of dollars with Backupify
- How we saved our client over $40,000 a year in phone and internet costs
- Installs
- Is your Business Data safe on Office 365?
- Is your business prepared for the Notifiable Data Breaches (NDB) scheme?
- Is your business protected against Ransomware?
- Is your Network Security Future Proof?
- IT Connect 2019: Solving Technology Challenges
- IT User and Cyber Security Policy template
- It's back: The Abbey Festival rides again
- It’s official – David is a Geek
- Keeping business data secure when you are away from the office
- Keynote Speech: 2019 Disrupting Law Hackathon
- May 2020 Newsletter
- Meet our new tech Sup"paw"t interns
- Microsoft Is Making Some Big Changes to Windows 11
- Noah's gaming PC wish is granted
- Notifiable Data Breach report to June 2020
- October Newsletter: FinTechnology becomes FortiTech
- Our most popular blogs in 2022
- Our top blog posts of 2023
- Out & About: College of Law 2021 End of Year function
- Out and About: College of Law Queensland
- Out and About: Connect Collaborative
- Out and About: Doggo's and Donuts
- Out and About: Getting into the swing of things
- Top 5 things must haves in a personal Password Manager
- Phishing Attacks: How Scammers Reel You In (And What To Do About It)
- Phone scammers dupe couple out of $230,000
- Queensland Government Business Basics Grants Program
- Reasons Why Everyone Should Use A VPN
- Setting up Cybersecurity Policies and Processes for Business
- Setting up Cybersecurity Policies and Processes for Business
- Streamline Your Retail Business Network with TP-Link Omada and APC Solutions - An IT Support Business Case Study
- Strengthen Your Business Defenses with Managed Detection and Response (MDR)
- Taking the Red Pill: Top Challenges In The Accounting Industry
- Tales from the data crypt: how to prevent a business nightmare
- Tech Sup'pawt' update: Boo & Skie turn 1
- Tech Sup'pawt' update
- Tech Tip: How to upload staff photos in bulk to Office 365
- Top 5 tips for getting started on 3CX
- Tech Tips: 5 ways to improve your workflow with Microsoft Outlook
- Tech Tips: A guide to the best ways to use ChatGPT for small business
- Tech Tips: Adding Microsoft 365 email accounts to mobile devices
- Tech Tips: Harnessing the Power of Microsoft To Do - Business Productivity Unleashed
- Tech Tips: Mail Merge in Microsoft Word: A Step-by-Step Guide to creating emails and letters
- Tech Tips: Microsoft Bookings
- Tech Tips: Microsoft Excel
- Tech Tips: Microsoft Forms
- Tech Tips: Top 5 ways to improve your productivity with Microsoft OneNote
- Tech Tips: Microsoft Outlook
- Tech Tips: Microsoft PowerPoint
- Tech Tips: Microsoft Teams
- Tech Tips: Microsoft Word
- Tech Tips: Setting up Linktree for your business
- Tech Tips: The top 7 ways to boost your productivity with Microsoft 365 Office suite
- Tech Tips: Using Microsoft 365 Copilot
- Tech Tips: Using Microsoft SharePoint & OneDrive
- Tech Tips: Windows 10
- Tech Tips: Windows 11
- TechX 2019: More than just free socks
- The backup that wasn’t, or how to age 10 years in a month
- The benefits of an IP Security Camera System
- The benefits of hosting your domain with FortiTech
- The benefits of Security Awareness Training for your staff
- The importance of an Acceptable Use Policy
- The most tempting cyber attacks of 2020
- The Side Hustle: Everybody is doing it, so why aren't you?
- The top 10 things that can go wrong when migrating email from Google to Microsoft 365
- The top 5 benefits of using Microsoft SharePoint
- The Top 5 techniques used to hack your password
- The top 7 reasons your business should use CodeTwo Automatic Email Signatures for Microsoft 365
- Tips for Identifying Phishing & Business Email Compromise Attempts
- Top Browser Extensions for Google Chrome
- Turning computers into vertical gardens
- What is Advanced Endpoint Detection & Response and why do you need it?
- What is Email Antispam and how can it help your business?
- What is Microsoft Copilot?
- What is the Dark Web?
- What is Wi-Fi 7 and is it worth the upgrade?
- What to look for in a Cyber Insurance policy
- What’s the best Accounting Practice IT Package?
- Why should you use software to restrict children's internet access
- Why your business should consider Managed IT Services
- Windows 12 is coming