24/7 IT support — Call 1300 131 559
Soma blog

IT insights for Australian business

Cybersecurity, cloud, Microsoft 365 and managed-services guidance from a 20-year Gold Coast MSP. ASD IRAP assessed. Essential Eight Level 3.

Cybersecurity

Essential 8 Compliance Checklist: Avoid These Mistakes

Learn how to meet Essential 8 compliance using the cyber maturity model and ACSC mitigation strategies. Avoid common pitfalls and secure your systems.

Cybersecurity

IT security companies for cybersecurity, cyber threats and data

Explore IT security companies for reliable protection. Top IT security companies in Australia help secure your business with expert security and IT support.

Cloud & Microsoft 365

Cloud Computing Service Providers

Discover what to demand from cloud computing service providers.

Strategy & Business

DNATA Runs the World

soma technology group as a Strategic Supplier Partner to dnata catering are proud to have been involved in dnata’s most recent global fund-raising effort.

Cloud & Microsoft 365

Cloud Based Collaboration Tools

Cloud collaboration can be a great productivity booster with the right tools. Click here to learn more about cloud based collaboration & its benefits.

Cybersecurity

Importance of Cyber Security Awareness Training

Do you know enough about the importance of cyber security awareness training? Click here to learn more about the importance of information security awareness.

Infrastructure & Networking

Cable Management & Organisation

Transform your IT infrastructure with soma technology group’s expert cable management and rack clean-up services. Discover the benefits of an organised server r

Managed IT Services

Soma Achieves Platinum Partner Status With Datto

Soma Technology Group has exceeded high standards of performance to qualify for Platinum status within Datto’s Global Partner program.

Cloud & Microsoft 365

Soma Switch to Azure for Airline Catering Player Dnata

soma technology group integration work with dnata involved migrating Qantas’ passenger and scheduling systems, enterprise resource planning (ERP), real-time…

Managed IT Services

Telstra’s Pandemic Response

Telstra’s Pandemic Response: Job Reductions, 5G Plans & FY20 Outlook. See our article on the breakdown of Telstra's recent press release regarding COVID-19!

Cybersecurity

What To Look for in an IT Risk Consultant vs. Technology Risks

Which questions matter when hiring an IT risk consultant? Get clear on what to ask and how it ties to strong IT risk management and smarter business.

Managed IT Services

Cloud Computing Managed Services for Business Efficiency

Discover how cloud computing managed services can transform your business with enhanced security and efficiency. Learn more with this guide today.

Managed IT Services

Services for IT: Best Managed IT Services for Queensland

Looking for reliable services for IT in Queensland? Discover how managed services can secure your business operations, reduce costs, and more.

Cybersecurity

Top 5 Reasons Your Business Needs IT Risk Consultant

Is your business prone to cyber threats and compliance risks? Discover how IT risk consultants can protect your operations and ensure long-term security.

Cybersecurity

Cyber Essential Checklist for 2024: Secure Your Business

Secure your business in 2024 with the ultimate cyber essential checklist, including firewalls, access control, and malware protection.

Cybersecurity

Managed Security Services: What MSSPs & MSPs Know

Learn how managed security services protect your business with 24/7 security monitoring and threat detection response. Discover what to look for in a provider.

Cybersecurity

IT Compliance Frameworks for Security & Audit Success

Explore IT compliance frameworks and how SMB IT compliance can protect your business, reduce risk, and simplify audits. Learn key steps and best practices.

Cybersecurity

ISO Compliance: Certification, ISO 9001 and Management Systems

Learn how ISO compliance strengthens quality management systems, streamlines certification, and upholds service quality standards for lasting business success.

Managed IT Services

11 Services for IT: Which Managed IT Services Do You Need?

What makes a good managed IT services company? This guide breaks down services for IT that support growth, improve security, and reduce downtime.

Cybersecurity

Cyber Liability Coverage: Small Business Insurance Guide

Learn about cyber liability coverage, cyber insurance requirements, and penetration testing requirements. Know how to protect your business from cyber threats.

Managed IT Services

Complete Guide to IT Support for Small Companies

Discover tailored IT support for small businesses in Queensland. Learn how the right services can protect your systems, boost productivity, and support your gro

Cybersecurity

Cyber Security Awareness Training for Employees Cost and Benefits

Learn how cyber security awareness training for employees reduces risks. Compare security awareness training cost & companies to find the right fit.

Cybersecurity

Start Data Loss Protection With Data Loss Prevention (DLP) Tools

Discover data loss protection and learn about common data threats, DLP solutions, and how soma can safeguard your sensitive information.

Cybersecurity

Endpoint Security Protection (EDR) vs. Antivirus Software

Discover the differences between endpoint protection and antivirus software. Learn how each solution safeguards your business against cyber threats.

Managed IT Services

Reduce Operational Expenses with IT Managed Services

Discover how IT managed services can streamline operations and cut costs. Learn the benefits of expert IT management and proactive support.

Managed IT Services

Service Desk Experience: How to Improve IT Support Process

Discover how to improve your IT support process. Enhance productivity, security, and customer experience with strategies tailored to your business needs.

Cloud & Microsoft 365

Set Up Microsoft 365 Backup the Right Way

Learn how to set up Microsoft 365 backup correctly. Discover key features, avoid common mistakes, and protect your business data from loss, ransomware, and down

Managed IT Services

IT Support and Services for Melbourne Businesses

Get expert IT support and services with local IT support near me and full IT services and support for your business. Secure, scalable, and responsive help.

Cybersecurity

IT security management system

Learn what an IT security specialist does, how to build a career, and how to manage your IT security management system, network and IT security, and more.

Cybersecurity

A Guide to Choosing the Best Multi-Factor Authentication

Discover tips for selecting the right multi-factor authentication tools in 2025. Protect your business with MFA methods, features, and best practices.

Cybersecurity

How Will AI Affect… | Impact of Artificial Intelligence

Explore how AI will affect cybersecurity, enhancing your defence with artificial intelligence. Learn how AI transforms cyber security and threat management.

Cybersecurity

Cybersecurity Audit Checklist: Protect Your Business from Threats

Learn the best practices to identify vulnerabilities, ensure compliance, and protect your business from threats with a cyber security audit checklist.

Cybersecurity

10 IT Security Tips You’re Probably Ignoring | Cybersecurity

Most threats come from overlooked mistakes. Discover 10 IT security tips to safeguard your business, protect personal information, and prevent a breach.

Managed IT Services

What's the Role of IT Support in Your Business?

Discover what is the role of IT support in ensuring smooth business operations, from troubleshooting technical issues to implementing cybersecurity measures.

Cloud & Microsoft 365

7 Rs of Cloud Migration Strategy for Seamless Transitions

Dive into cloud migration strategies to make your business move securely and efficiently. Discover types, challenges, and solutions for your cloud journey.

Cybersecurity

Uninstall Tips: How to Turn Off Reason Cybersecurity in 2025

Learn how to turn off Reason Cybersecurity with step-by-step instructions, tips for disabling real-time protection, and uninstalling the software safely.

Cybersecurity

Confidentiality in Cybersecurity: Protecting Your Data

Explore the importance of confidentiality in cybersecurity through the CIA triad. Learn how to protect your data and strengthen your security.

Cybersecurity

5 Key Role of Data Privacy in SMBs

Explore the role of data privacy in today's digital landscape. Learn how safeguarding information is key in securing customer trust.

Managed IT Services

Guide to Choosing Managed IT Service Providers

Discover crucial tips for choosing managed IT service providers. Navigate this complex landscape using our comprehensive guide!

Cybersecurity

Importance of Firewall Management in Cybersecurity

Explore why effective firewall management in cybersecurity is crucial. Learn key strategies to protect your digital assets from cyber threats.

Cloud & Microsoft 365

Cloud PBX: Avoid Mistakes When Choosing a Phone System

Learn how a cloud PBX integrates with Microsoft Teams phone system and Teams direct routing. Avoid common setup mistakes and choose the right solution.

Managed IT Services

After Hours IT Support: Services for Smooth Operations

Get after-hours IT support with urgent technical support, 24/7 IT emergency support, as well as round-the-clock monitoring to keep your business running.

Cloud & Microsoft 365

What is Pax8? Your Guide to Revolutionary Cloud Marketplace

Learn what Pax8 is and how it redefines cloud solutions for MSPs, enhancing security, management, and growth opportunities in a simplified platform.

Cybersecurity

Passwordless Authentication with MFA Passkeys & Biometrics

Explore passwordless authentication and how it improves passwordless login security using MFA, biometrics, and passkeys. Learn how to implement it today.

Managed IT Services

Managed IT Services Pricing Guide: Models, Costs &amp

Explore managed IT services pricing, models, and costs. Learn how to choose the right pricing strategy for your business with our expert guide.

Cloud & Microsoft 365

Microsoft 365 License Tips to Assign Licenses Right

Learn Microsoft 365 license management best practices and Office 365 license optimisation strategies to cut costs, streamline user access, and stay compliant.

Cybersecurity

Cybersecurity Analyst Jobs: What Security Analysts Mistakes

Learn what a cybersecurity analyst does, key skills, and how networking and cybersecurity work together to protect your business from threats.

Cybersecurity

IT Health Check: Identify Risks, Cyber Tools and Infrastructure

Get an IT health check to uncover risks. Includes IT infrastructure audit, system evaluation, and technology assessment for better business outcomes.

Cybersecurity

MFA Fatigue Attack: Protect Your Business from MFA Spam Attack

Learn how MFA spam or fatigue attacks work, their risks to businesses, and the best strategies, including advanced MFA methods and more.

Managed IT Services

IT Support Automation Tools to Streamline Help Desk

Discover how IT support automation and help desk automation improve efficiency, reduce costs, and streamline support operations for faster resolutions.

Cloud & Microsoft 365

Backup as a Service: Avoid Costly Backup & Azure Mistake

Discover how backup as a service and data backup as a service protect your business. Learn key benefits, mistakes to avoid, and how to choose a provider.

Cloud & Microsoft 365

6 Cloud Migration Strategies

Explore effective cloud migration strategies when moving your data to the cloud, with expert insights on optimising the process.

Talk to a real Gold Coast MSP, not a call centre

500+ businesses trust Soma. Local team, 24/7 support, ASD-assessed cybersecurity. Get a free IT health check.

Get a free assessment Call 1300 131 559