Synapse Blog
- 5 min read
- 5 min read
The wait is finally over, as the tech community’s most anticipated product launch returns for another year. Since its inception in 2007, the iPhone has been remodeled and upgraded as Apple brings its customers new innovative technology. In the 16th edition of the product launch there are 8 new pieces of technology. These include:
- iPhone 16
- iPhone 16 Plus
- iPhone 16 Pro
- iPhone 16 Pro Max
- Apple Watch Series 10
- Apple Watch Ultra 2
- Air Pods 4
- Air Pods Max
Apple’s newest gear includes impressive features, but most exciting of them all is their addition to the growing AI space.
Meet Apple Intelligence.
Apple Intelligence, as the name suggests, is Apple’s brand new artifical intelligence system. AI is being released in a Beta version later this year and will be available across a range of devices. The software is built into their most recent releases including the iPhone 16s.
Apple Intelligence was created with productivity in mind; much of the tool’s functions relate to streamlining the use of “writing apps” like Notes, Mail, iMessage and 3rd party apps. AI users can summarise long email or iMessage chains, get prioritised notifications and even create transcripts of phone calls.
Siri has also been optimised for artificial intelligence. Users can access a more personalised Siri experience, as the tool can gather information from across your device to create helpful answers. Beyond this, you can now talk to Siri more naturally. Its language processing abilities have been enhanced, to understand fluid speech. Finally, users can type to converse with Siri, if speaking out loud is not an option.
Beyond its more practical uses, Apple Intelligence has some great creative features. Generate images in Image Wand and Image Playground, videos and even emojis at the touch of a button using Genmoji.
Check out the full description of Apple Intelligence here.
iPhone 16/Plus & iPhone 16 Pro/Max
The iPhone 16 range functions as both a high tech digital camera and mobile phone. Apple has included new camera systems that deviate between models, but allow for extremely high quality photography and videography overall. Devices have a 48mp Fusion camera, studio quality microphones, 4K video capabilities and macro/ultra wide lenses. Next, Pro/Pro Max models are able to capture 3D photos and videos with spatial capture.
An extra button has been added to help utilise the new camera features, as well as streamline every day phone use. The Action Button can be used for silent mode, focus modes, camera, torch, translate and more.
All 16s include vital accessibility and safety features in their iOS 18 software. Users can employ eye-tracking and vocal shortcuts software, for accesssibility purposes. This means people can use their devices with their eyes or with their voice, no touch required.
Simultaneously, the devices detect crashes and call authorities if severe, and can make emergency SOS calls via satellite connection.
Finally, all 16s have Apple Intelligence built in which makes up the bulk of the new specifications. For a more detailed description of all AI features included in the iPhone 16s, visit the iPhone 16 page.
Apple Watch Series 10 & Apple Watch Ultra 2
Both new Apple Watches were created for optimised health tracking and high impact sports. The Series 10 consists of a range of tracking capabilities so users can watch their vitals in real time. Track your heart rate, blood oxygen levels, sleep, respiratory rate and more. The watch acts as a one-lead ECG, so you can listen to your heart and be notified of high, low, and irregular heart rates/rhythms.
The Ultra 2 consists of more sophisticated sports functions, including different specifications for a range of sports including running, hiking, cycling, diving and swimming. Apps are available for skiing, snowboarding, rowing and golf sports functions.
The watches have broken away from their attachment to the iPhone, letting people use their watch for communication without their phone nearby. Concurrently you can contact emergency services and employ crash and fall detection.
For the full list of Series 10 and Ultra 2 features, visit the Apple Watch page.
Air Pods 4 & Air Pods Max
Pushing past the Air Pods hacking incident earlier in 2024, the newest iteration of Apple’s popular headphones boast powerful noise-cancelling and music boosting capabilities.
These Air Pods Max are a more high-powered version of the original, particularly in battery life and sound manipulation. The device employs 2 times more active noise cancellation, adaptive EQ, and personalised spatial audio with head tracking. (Meaning your headphones act like a mini surround sound system). Also, the new transparency mode enables you to hear the world around you just as clearly as your music.
The headphones have a 20 hour battery life with noise cancellation enabled, and utilise the universal USB-C charging cable. Furthermore, the coinciding smart case helps preserve battery life.
Other useful features include: share audio between 2 devices and take calls through the headphones with audio that connects automatically. Next, the device will pause and play sound as you take the headphones off and put them on.
The Air Pods 4 have many similar features as their Max counterpart, like strong audio capabilities. Beyond these features, the 4s have nuanced elements like an “acoustic architecture” made to enhance sound quality, and conversation detection. Battery life ranges from 5-20 hours, depending on the specifications of your device. With the case the Air Pods will last for up to 30 hours overall.
Down to the core
Overall the new technology is extremely exciting, but the devices themselves come at quite the cost.
iPhone 16s range from $1399 AUD to $2849 AUD, Series 10 watch from $649, Ultra 2 from $1399, and Air Pods 4 range from $219 to $299 depending on noise cancellation features. Finally the Air Pods Maxs will set you back $899.
Before purchasing devices you should always research the best product for your needs based on specifications and price. If you are considering new devices for your business, contact Synapse IT for expert advice on what devices would fit your organisation best.
- 5 min read
Outlook Update Roll Out & Features
There’s a new version of Microsoft Outlook rolling out, and it’s bringing some exciting new features with it.
‘New Outlook’ has been released on General Availability, which means the new look and features are ready to replace Classic Outlook – although a full take over isn’t on the cards any time soon. However, New Outlook is the default system on Microsoft PCs using Windows 11 version 24H2.
Any Outlook user can turn New Outlook on and off, by toggling the switch in the top right corner of the desktop page. It is unclear whether New Outlook is available in the mobile app.

New Features
Some of the new features available in the program include
- Managed Accounts: Connect and manage multiple email accounts all in one place. Can connect Outlook.com, Gmail, Yahoo!, Mail, and iCloud accounts through the New Outlook app.
- AI Assistance: Utilise Microsoft Copilot for email writing suggestions and more advanced spelling and grammar checks.
- Powerful Productivity: Schedule emails with the click of a button, undo sent emails within 10 seconds of the send, and receive reminders to send follow-ups
- Its All There: Access your OneDrive files directly from your inbox, and use Word, PowerPoint and Excel applications for free.
- Make It Yours: Personalise your Outlook with over 50 themes and fonts, pin your most important emails, and choose from a range of different view options.
Potential Pitfalls
There are also some issues that users should be aware of. If your organisation uses automatic plug-ins in Outlook such as sales management systems or email signature managers, these plug-ins may not be functional in the New Outlook system. We recommend turning the new interface on for a few days to test for any potential problems.
New Outlook might take some getting used to, but its many new useful features should enhance your Outlook experience. Explore the new layouts, settings, and features to discover what works and what doesn’t for your business.
Contact our expert team for more information on the New Outlook update! Beyond this, Synapse IT offers comprehensive Microsoft 365 support for any issues you might face.
- 5 min read
Through the link provided, you will find the updated Synapse IT Communications Guide for 2024.
In this guide we have outlined the procedures for both technical and business enquiries.
Should you need to reach the Synapse IT team, please follow these guidelines to make communication as smooth and successful as possible!
We look forward to hearing from you.
- 5 min read
Cybercrime continues to be a prolific issue in Australian businesses, meaning companies must follow industry practices and guidelines to protect their sensitive data from cyberattacks.
This year, several industry bodies, including the Victorian Legal Services Board and Commissioner (VLSB+C) and the Legal Practitioners Liability Committee (LPLC) have released guidelines covering how law firms should protect themselves. Here is an overview of these cyber security expectations and practices.
The VLSB+C’s expectations are divided into three main categories: Critical Controls, System Controls, and Behavioural Controls. These categories are then split into multiple sub-categories that outline each regulation.
Critical Controls
These are the key guidelines businesses must follow to ensure overall cyber safety. They cover security updates, passwords and logins, and Multi-Factor Authentication. The broad advice is to ensure that all devices, software, and hardware receive ongoing security and software updates. Alongside this, all passphrases must be unique and strong. This means businesses must not reuse passwords across multiple accounts or reuse old passwords. To store passwords/phrases, we recommend that firms use a secure password manager that’s available to all staff. Last but certainly not least, change compromised passwords immediately to avoid dangerous repercussions, including stolen or destroyed data and theft of funds.
Activate Multi-Factor and/or Two Factor Authentication where available to ensure your professional accounts are adequately protected. This small extra step is vital in stopping unauthorised access to your firm’s sensitive data.
System Controls
This area of the VLSB+C guidelines focuses on the more technical side of cybersecurity operations. The Comission recommends that businesses allow IT experts to manage and employ any technical operations.
System Controls refer to Security Software, Access Control, Devices, Information Security, and Backups.
Regarding Security Software, this practice consists of installing and using security software such as anti-virus and other detection tools on devices. Firms should run periodic anti-virus scans to detect and remove any possible malware or viruses. Ensure scans are conducted to check device configuration each time a new user is assigned. General anti-virus scans should occur weekly, using automatic scans if possible.
Physical Security
Considering the safety of the devices themselves, it is critical that devices are physically stored in a secure location when not in use.
Beyond this, be aware of the source and content of any hardrives/USBs you use with your devices. Dangerous software can be transferred into devices through hard drives, so make sure your USBs come from a trustworthy place. Firms must also turn on full disk encryption on devices that store sensitive data, to protect it from being stolen or leaked.
Beyond security software, it is vital that you control who has access to different areas of the company data. This is called ‘Role-based access control’ where employees access only the data relevant to their role and nothing else. This allows practices to track what data is viewed and by whom, limiting damage in the event of a breach.
Backups are essential to protecting your data from hardware failure, accidental deletion, or malicious activity in the event of a cyber breach. Being able to get your data back in these situations is vital. When reviewing your backup system there are many considerations. How often do you need to back up? If you had to restore, would you get your data back from an hour, a day, or a week ago? How long would it take to restore? Having your data on a USB drive is better than nothing, but if it would take 2 weeks to get your systems back up and running that may not be acceptable to you. Are your backups periodically verified? How do you know they will work when you need to restore? Work with your IT person to ensure that your solution meets your needs.
Behavioural Controls
A common cybersecurity misconception is that you (business owners and staff) don’t have to do anything once protection is in place. This idea is what puts so many businesses in danger! The truth is that staying safe is a people-centric practice and you should foster a cyber security aware culture. To highlight this, the VLSB+C has set behavioural regulations to encourage proper cybersecurity.
First and foremost, cybersecurity training for all staff must be provided. Tailor security training to different roles and cover a range of topics. These can include Phishing emails, Social Engineering, password best practices, safe web browsing, and other risks. Businesses must require cybersecurity training during induction for new staff and provide updated training at least once a year. Beyond this, make sure your staff understand their cybersecurity role within the company. They must also know what to do in a cybersecurity emergency!
Cybersecurity Incident Response and Reporting
An important part of having good cyber security posture is understanding that, despite your best efforts, a breach can happen to you. No protection is 100% effective. Once you accept that you could have a breach you can start thinking about what you would do in that situation.
All businesses should have a comprehensive Incident Response Plan. Having a plan you can execute under pressure reduces the risk of a cyber incident turning into a cyber disaster. The plan should outline how you would identify, gauge, mitigate, document, and report incidents to protect your firm. Check out these two Basic Action Lists created by the Law Council of Australia and the LPLC.
Once an IRP is in place, practices must make their staff aware of the plan, and how to enact it. Alongside this, creating a culture of reporting within your firm is vital! Ensure that your staff are confident in reporting suspected issues to your IT team since early identification helps limit damage.
Then, regularly test your IRP and update it to align with current recommendations. This should occur at least once a year.
If you face a cybersecurity emergency, there are protocols you must follow as well as your business’s IRP. The Notifiable Data Breach legislation outlines that businesses mus report some cyber incidents to the Australian Cyber Security Centre, and the Office of the Information Commissioner. Also notify your cyber insurance, the security team at your bank, relevant industry bodies, and clients that may be affected.
Your Conduct
The VLSB+C states that ignoring or incorrectly applying their guidelines is considered Unsatisfactory Professional Conduct or Professional Misconduct, in severe cases. Not employing security software, giving inappropriate data access, and not backing up data in a trustworthy place, goes against proper cybersecurity policy; putting your business at risk.
To discover the full range of practices considered Unsatisfactory Professional Conduct or Professional Misconduct, visit the Minimum Cybersecurity Expectations page.
What can you do to stay secure?
Ultimately business owners and leaders are responsible for the safety of their data, employees, and clients! You need to understand the risks and obligations, and ensure you are comfortable with the protections you have in place.
If you need assitance with this Synapse IT can help! We will work with you to help clarify the risks, understand the requirements, and help you put the necessary solutions in place. Reach out today to discover how Synapse IT can boost your business’ vital cybersecurity processes!
- 5 min read
Over 8 million computers flashed the “Blue Screen of Death” at the end of July, due to a major technical issue at cybersecurity giant CrowdStrike. What exactly happened, and how were people affected?
What is CrowdStrike?
CrowdStrike is an American company that supplies internet security products to protect to large businesses across the world from malware and ransomware.
What Happened?
As is common practice, CrowdStrike released an update to their Falcon cyber security sensor. The update was meant to help mitigate emerging cyber-attacks. Unfortunately, there was bug in the update, and any Windows systems that downloaded the new files crashed. The bug caused the affected devices to go into a reboot loop and become completely unusable.
There were hundreds of businesses affected by the crash across the globe. In Australia, finance, retail, transport, media, and air travel all experienced large technical outages for some hours.
Which Businesses Were Affected?
Finance: NAB, Westpac, ANZ, Commonwealth Bank, Bendigo Bank, and Suncorp.
Retail: Woolworths and Coles (Marvel Stadium experienced ticketing issues).
Travel: NSW Regional Train systems, V/Line systems, and freight train organisation Aurizon.
Air Travel: Qantas, Jetstar, and Virgin Australia.
Media: ABC, SBS, 7 Network, and 9 Network.
CrowdStrike began solving the issue within the hour, although users were warned about problems occurring for up to 2 weeks after. Beyond this, customers were informed of heightened scam activity, as scammers were ready to take advantage of the situation. People received messages from fake CrowdStrike technical support and messages from fake airlines. Additionally, it is vital to be extra cautious of scammers and potential cyber threats while organisations recover from the downtime.
This mass technical downtime event reinforces the great importance of having solid business continuity and backup plans. No product, no matter how advanced or widely used, is perfect. Even industry leading software can experience pitfalls, meaning you need to be prepared for any issues that may arise, particularly the unexpected ones.
Synapse IT has the right people, tools and processes to ensure your business is protected in the event of downtime. Contact our friendly team to discuss which Business Continuity and Backup Plans are best for your organisation.
- 5 min read
Every business aspires to be competitive, as a competitive business is one that has longevity. There are many ways to gain a competitive advantage for your business; boosting productivity, efficiency and quality of product/service. However, while all available methods have some level of importance, few are as effective or as readily available as IT.
What is the connection between IT and business competition?
As businesses interact with IT with increasing levels of depth and frequency, more opportunities for competitive advantage arise. Therefore, it is a foregone conclusion that an organisation that does not have IT integrated into its business model will lose to its competitors.
Using IT to build a competitive advantage for your business is not an easy decision to make. You will be required to consider a multitude of factors, which will take both considerable time and effort. However, if done properly, these decisions will net your business an advantage over the competition.
How do you use IT to build that competitive advantage?
No matter the context, the goal of IT is to solve problems. Broadly speaking, the process of building a competitive advantage with IT involves identifying problems with the business and then solving those problems using IT.
There is no specific technology that will guarantee a competitive advantage. Instead of trying to find the perfect device for your business, your focus should be using various kinds of technology solutions to ensure that your business is operating as best as it can. From there, opportunities for competitive advantage will present themselves.
Here are some of the ways that you can make your business more competitive using IT:
Enhance your corporate culture
Because employees make the backbone of your business, it is important to ensure that their needs are being met. To this end, you can use various forms of IT to:
- Automate processes so that your staff can focus on their own duties
- Allow your staff to work autonomously, as well as provide resources they can use to inform their work at their own discretion
- Streamline your employees’ tasks, making their work as simple as possible
- Provide communication tools where employees can provide actionable feedback, etc.
Not only do employees recognise a business with a good corporate culture, but customers do as well. Because a large percentage of consumers are more likely to purchase from companies that align with their values, businesses that have a reputation for treating their staff with respect will have a competitive advantage.
Provide accessibility for your customers
Customers want to interact with your business, but they will have little patience for a business that is difficult to make purchases from. This can be for various reasons, such as:
- A lack of purchasing options
- A defective website
- A lack of online shopping features
- Missing purchase information
- An inability to track purchases
- A needlessly complicated purchasing system
- A purchasing system that neglects customers with disabilities, etc.
If your business provides a less than satisfactory purchasing experience, then customers will turn to your competitors.
Establish your unique selling proposition
Businesses cannot be competitive without a unique selling proposition. By definition, a USP is what sets a business apart from their competitors. However, if your business operates within a particularly saturated market, it can be difficult to define your USP.
That is where technology can be an immense help, as it can enhance your business in many different ways that can be used as a USP, such as;
- A more efficient purchasing process than competitors
- More payment processes than competitors
- More convenient methods of communication than competitors
- More reliable and transparent customer service than competitors, etc.
That way, it doesn’t matter what your market is. Thanks to IT, you can present your products/services to your customers in refined ways that your competitors cannot.
Create your online presence
Businesses cannot be competitive without an online presence these days. As customers have pivoted towards purchasing goods and services online, businesses have forged their own competitive advantage through how effectively they accommodate them.
But, an online presence for a business means more than just a store. The way in which businesses interact with customers online can result in a competitive advantage, with various methods including:
- Conducting numerous sales and discounts
- Carrying themselves affably on social media
- Offering comprehensive customer service
- Giving customers a fully realised review system
- Collaborating with respected content creators
- Enhancing customisability for customers
- Integration with emerging technologies (e.g. VR, cryptocurrency, AR), etc.
Times have changed. Businesses that might have struggled to compete previously have been presented with an opportunity to stand out from their peers thanks to the constant innovation that technology represents.
Identify your strengths (and fix your weaknesses)
Another function that IT provides is data visualisation. There exist software solutions that calculate your various metrics (i.e. total sales, KPIs, review ratings, time spent on projects, etc.) and then have that information collated into formats that can then be presented to your employees.
This is an invaluable tool, because it demonstrates to your employees where they are succeeding, as well as where they can improve. Using this method to optimise your services will grant you a competitive advantage against businesses that don’t.
Additionally, your business’ successes can be presented to your customers to reassure them that they have made the right decision for selecting you over your competitors. Customers also appreciate accountability. If you can identify your weaknesses, and then commit to fixing them, your customers will acknowledge your efforts and match your commitment by continuing to buy from you.
Formulate your strategies
IT has changed the way in which employees can collaborate over projects by providing new methods of collaboration. Nowadays, you can conduct and transcribe meetings business-wide with ease, and this can be used to comprehensively outline:
- Your unified business vision
- Your goals used to achieve that vision
- Your strategies that will be used to achieve those goals
The competitive advantage this presents for your business is a fairly simple and straightforward one. A more cohesive business is more likely to perform better than the competition. If you operate with peak efficiency and effectively deliver your clients what they want, you will leave them without a need for your competitors.
How do you select the right IT tools for that competitive advantage?
So, you have decided on the business problems that you would like to use IT to solve. However, the next decision is equally important and difficult. Now that your goals are in place, you need to select the tools that you’ll use to achieve them.
Below, we have outlined some tips that you can use to make sure that you select the right technology for your business.
Identify what you need vs what you want
This is an important distinction to make.
- Your needs make up what you should look for in the immediate future. You should prioritise them because they exist to solve the problems that are currently facing your business and are therefore critical to your day-to-day operations.
Examples include:- Upgrades to dated infrastructure
- Software updates with major bug fixes
- Technology that directly addresses missing functionalities, etc.
- Your wants should not be neglected, but they should be prioritised lower than your needs. This is because they still benefit your business, but they don’t solve immediate problems and are instead used to anticipate future problems that may arise.
- New hardware with better technical specifications
- Software that provides new functionality
- Experimental technology that presents new opportunities, etc.
The reason that you need to make this distinction is that prioritising the wrong technology can kill your competitive advantage. You might have implemented some impressive experimental technology with the potential to optimise your business practises, but your customers will not care about that if they are too busy contending with your broken website, or their inability to email your business, etc.
Determine the logistics behind your selection
There needs to be a purpose behind your IT decisions. Every time you look to new technology, you should be asking questions such as:
- What problem will this technology solve?
- Who is going to run and maintain this technology?
- What costs will arise from this technology?
- Will this technology integrate with my existing infrastructure?
- How will this technology benefit my employees/customers/the environment? etc.
Logistics are important because their answers determine what competitive advantage your business will get. You can purchase the most powerful technology, but if it integrates poorly with your existing systems or it makes your customers’ experience more difficult, your competitor with less impressive technology will be able to use that against you and poach your business.
Calculate your budget
This operates on similar principles as the previous point. You never want to spend money that you don’t have to, and you especially don’t want to spend money that you’re not going to make back.
So, while it is important to keep your systems up to date and seek innovation wherever possible, you have to make sure you budget accordingly. There is no point in spending exorbitant amounts of your budget on a really powerful piece of technology if it means neglecting other aspects of your existing systems.
While it might seem like a good idea in the short term to go for impressive technology that will seemingly put you ahead of your competition:
- Your systems may not be able to handle this new technology in the long term, causing major problems down the road that will require a lot of time, effort and resources to fix
- Your new technology may initially impress customers, only to then alienate them once problems in your customer experience present themselves
- You may have a headstart on your competition, but they might end up discovering a better version of your technology later on, giving them the perfect opportunity to steal your customers
Include others in the selection process
Think about who is going to be interacting with this technology the most and allow them to offer suggestions on what technology you should use; whether it’s your employees or your customers.
While this does not mean you are obligated to take their suggestions, this simple action demonstrates that;
- You value your employees/customers as equals, which they will recognise and consider when presented with your competition
- You care for their experience, and want to improve it as much as possible
- You share values with your customers/employees, which will resonate with them
- You take a rational approach to your technology, which assures your customers and employees that you are not trying to use extravagance to take advantage of them
Keep in mind; your choice in technology also affects the impression you give to your stakeholders. This should be one of the many things that you consider when selecting technology. If your approach does not take your image into consideration, your customers will turn to a competitor whose approach does.
Contact Us Today
Reach new heights in your industry through beginning the transition to managed IT solutions.