Skip to navigation Skip to content
  • Blog
  • About Us
  • nelson@modtech.com.au
  • Facebook
  • Instagram
  • YouTube
Logo of ModTech with slogan underneath of 'Systems, Solutions, Service'

Your Medical & Business IT Specialist Since 1991

  • Home
    • Home 1
    • Home 2
    • Home 3
    • Home 4
  • About Us
  • Services
    • All Services
    • Computer Repair
    • Battery replacement
    • Data recovery
    • Virus protection
  • Shop
    • Products
    • Cart
  • Blog
  • Contacts
    • Contact Us 1

Call us

03 95760862

Call us for enquiry

121 Wattletree Road
Malvern
Vic 3144

Mon-Fri 9:30-18:00
Sat 9:30-13.00
Sunday - closed

Logo of ModTech with slogan underneath of 'Systems, Solutions, Service'

Your Medical & Business IT Specialist Since 1991

Call us

03 95760862

Call us for enquiry

121 Wattletree Road
Malvern
Vic 3144

Mon-Fri 9:30-18:00
Sat 9:30-13.00
Sunday - closed

  • Home
    • Home 1
    • Home 2
    • Home 3
    • Home 4
  • About Us
  • Services
    • All Services
    • Computer Repair
    • Battery replacement
    • Data recovery
    • Virus protection
  • Shop
    • Products
    • Cart
  • Blog
  • Contacts
    • Contact Us 1

Author: nelson

01 May

How to choose a network cable

1. Determine Your Speed and Usage Needs Speed Minimum Cable Type Up to 100 Mbps Cat5 (obsolete) Up to 1 Gbps Cat5e (minimum) Up to 10 Gbps Cat6 or better 10 Gbps + future-proofing Cat6a, Cat7, Cat8 Cat5e: Good for general use (1 Gbps up to 100m). Cat6: Better shielding, up to 10 Gbps (at […]

An article by nelson Posted in Computer Hardware, Connectivity
29 Apr

Monitor test

✅ 1. Physical & Connection Check Make sure power cable is connected securely. Ensure video cable (HDMI, DisplayPort, VGA, DVI, USB-C) is plugged in properly. Try another video cable or port to rule out cable/port issues. Test the monitor on a different PC or laptop. ✅ 2. Basic Display Test Use this free website: https://www.testufo.com […]

An article by nelson Posted in Computer Hardware, Connectivity
28 Apr

The Impact of Corporate Data Loss from Mobile Devices

The impact of corporate data loss from mobile devices can be severe, exposing organizations to financial loss, legal consequences, operational disruption, and reputational damage. Mobile devices — while boosting productivity — are also a major attack surface due to their portability, frequent use outside secure networks, and user behavior. 🚨 Key Risks of Data Loss […]

An article by nelson Posted in Computer Hardware, Connectivity
28 Apr

NIST Releases Draft Guide on Mobile Security Threats

📘 1. Draft IR 8579 — Not Mobile‑Focused NIST’s NCCoE recently published Internal Report (IR) 8579, a draft on chatbot security, not mobile threats. Public comment closes August 4, 2025 csrc.nist.gov. 📱 2. Most Recent Mobile‑Security Draft (SP 800‑124 Rev 2) The latest draft mobile security guide is Special Publication 800‑124 Revision 2, “Guidelines for Managing the Security of Mobile Devices in […]

An article by nelson Posted in Computer Hardware, Connectivity
28 Apr

State CIOs Can Take a Leadership Role in Data Security

✅ Key Leadership Actions for State CIOs Role Action Strategic Visionary Define a statewide cybersecurity strategy aligned with national standards (NIST, CISA, etc.). Policy Maker Create and enforce data governance and security frameworks for all departments. Unifier Break down silos by standardizing IT policies, tools, and training across agencies. Risk Manager Conduct regular risk assessments, […]

An article by nelson Posted in Computer Hardware, Connectivity
28 Apr

Application Persistence is Editor’s Choice Winner for Application Security

🔐 What Is Application Persistence? Application persistence ensures that a security application cannot be removed, disabled, or tampered with, even if: The system is rebooted The app is uninstalled The OS is reinstalled Malware tries to disable it It’s commonly used in: Anti-theft solutions Endpoint protection Enterprise mobile device management (MDM) Secure remote monitoring tools […]

An article by nelson Posted in Computer Hardware, Connectivity
28 Apr

Decentralization of IT Spending Puts Data at Risk

🔍 What Is Decentralized IT Spending? Decentralized IT spending happens when individual departments, clinics, or branches make their own IT decisions (software, services, devices) without centralized IT oversight or standards. Examples: A medical clinic buys its own cloud backup solution. A dental surgery uses personal Google Drive accounts. A department installs unauthorized apps or network […]

An article by nelson Posted in Computer Hardware, Connectivity

Recent Posts

  • How to choose a network cable
  • Monitor test
  • The Impact of Corporate Data Loss from Mobile Devices
  • NIST Releases Draft Guide on Mobile Security Threats
  • State CIOs Can Take a Leadership Role in Data Security

Recent Comments

No comments to show.

Archives

  • May 2017
  • April 2017

Categories

  • Computer Hardware
  • Connectivity

Recent Posts

  • How to choose a network cable 01/05/2017
  • Monitor test 29/04/2017
  • The Impact of Corporate Data Loss from Mobile Devices 28/04/2017
  • NIST Releases Draft Guide on Mobile Security Threats 28/04/2017
  • State CIOs Can Take a Leadership Role in Data Security 28/04/2017

Tags

computer, laptop, network cable, repair, risk, security
  • nelson@modtech.com.au
  • Facebook
  • Instagram
  • YouTube
Computer Repair Logo

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Our Newsletter

Instagram

[instagram-feed num=9 cols=3 imagepadding=0 disablemobile=true showheader=false showbutton=false showfollow=false] Follow @ comrepair

Address

  • 121 Wattletree Road
    Malvern
    Vic 3144
  • 03 95760862
  • nelson@modtech.com.au

Working hours

  • Monday 9:30 - 18:00
  • Tuesday 9:30 - 18:00
  • Wednesday 9:30 - 18:00
  • Thursday 9:30 - 19:80
  • Friday 9:30 - 18:00
  • Saturday 9:30 - 13:00
  • Sunday Closed
Scroll to top