
5 Practical Tips for Using Microsoft Copilot and AI at Work
AI is transforming how teams work, and our experts have shared five quick tips to help you get started confidently.

AI is transforming how teams work, and our experts have shared five quick tips to help you get started confidently.

AI is the buzzword du jour, yet few Australian businesses realise just how quickly the rules around its use are tightening. With the federal government looking to introduce mandatory “AI guardrails”, the days of treating data governance as an afterthought, especially for smaller businesses, are fast coming to an end. If your business is experimenting with AI, or you just want to avoid regulatory whiplash, now’s the time to get on the front foot. Read on to demystify the reforms and learn how to prepare your business for the AI-enabled future.

ASIC’s lawsuit against FIIG Securities over “systemic and prolonged cybersecurity failures” is a wake-up call for all professional services firms, not just large financial institutions. The regulator expects even small and medium businesses to implement basic controls. Relying on size as an excuse no longer cuts it. Neglecting cyber hygiene exposes firms to legal, financial, and reputational risks. The message is clear: cybersecurity is a core business issue that demands executive oversight and regular attention. Proactive investment in IT security safeguards both compliance and future commercial opportunities.

Cybersecurity is no longer optional—but which framework is right for your business? In this blog, we compare the long-standing Essential 8 with the newer, SMB-focused SMB1001 framework. Learn the key differences in complexity, certification, and human-focused strategies so you can make an informed choice.

Cyber threats are evolving fast, with Australian businesses facing a rising risk of attacks in 2025. From phishing and ransomware to supply chain breaches, understanding these threats is crucial. This guide covers key cyber risks, how to protect your business, and the latest security trends like AI-driven threats and Zero Trust Architecture.

With the recent rise of AI use, it’s natural for people to wonder about how they can incorporate AI into their data governance. But, how can AI be integrated into your data governance not only safely but responsibly?

In today’s fast-paced digital world, cyber threats are on the rise, and businesses of all sizes are vulnerable. For small and medium enterprises (SMEs), a single cyber incident can have especially devastating financial and reputational consequences. While it’s important to invest in cybersecurity technology and software, it’s equally as important to focus on staff awareness of potential risks and threats.

Cybersecurity is a broad field that encompasses much more than just installing antivirus software. Sentrian Expert Phil explains it involves a comprehensive approach that includes user education, logging and monitoring, application control, and more.

On Friday 19 July 2024 a faulty update to security software vendor CrowdStrike's Falcon Sensor application triggered widespread disruption. Companies worldwide were affected, with Microsoft Windows based computers running CrowdStrike software displaying a blue screen of death.

Cyber security continues to be a prime concern for law firms in 2024. How can you help to ensure that your firm is ready?
As a Managed Services Provider, Sentrian must maintain high levels of security internally to protect our customers and their data. In addition to the many controls that we have implemented, Sentrian are also ISO 27001 Information Security certified to give our customers the certainty that they require to know that our organisation follows international best practice.
The healthcare industry in Australia relies heavily on technology to deliver efficient patient care while maintaining the security of sensitive data. Whether you're running a small clinic or a larger healthcare facility, finding the right IT partner is vital...
Azure Virtual Desktop, Microsoft's flagship hosted Windows 10 platform, provides a huge number of benefits including low cost, high performance, flexibility and security.
Learn how Virtual Desktop Services provide a seamless, secure solution to accessing office files from home. With features like centralised data storage, secure remote access, these services are an invaluable tool.
Investigating how a businesses iT security environment can be improved by the use of virtual desktop services.

Getting and keeping a cyber insurance policy is no longer a simple matter of finding a broker and buying one. As the cyber risk increases year on year, insurers are tightening up requirements that must be met by companies before they can be considered for a policy. We have worked with Hunter Broking Group, cyber insurance experts, to come up with the 6 most common requirements that insurers will have before considering writing a policy for your business.

Safety of passwords is still critical in protecting your data, this is reminder of how to ensure your passwords are not at risk.

An update on cyber security attacks, both internationally and in the APAC region, from the latest Verizon Data Breach Investigations Report.

Now, more than ever, we are required to be aware of fraudulent email attacks. Learn how Microsoft ATP can keep you safe no matter where you're working.

Details of the current biggest threat to data breach and how applying MFA will stop it.

The top 4 security trends that could come back to bite you if you ignore them.

Access your data the way YOU want to, without compromising security or control.

Quick, fast tips for making your passwords more secure. See our password dos and dont's.

Using and remembering passwords doesn't have to be a day-to-day chore. You likely already have the devices needed to reduce your reliance on passwords.

Facial recognition security in many phones from LG, Sony, Samsung & more is not secure and can easily be fooled by a simple photo. But Face ID by Apple and long passcodes remain viable security methods.

Outlook on mobile devices has a default setting to automatically allow read receipts in the background, regardless of your desktop settings.

Systems Engineer Alex Uhde explores the history of computer viruses to explain where the latest 'WannaCry' & 'NotPetya' attacks came from and how they work.