Author - Billy McKindley


WIFI + Marketing = marketWIFI

  • Simple set and forget marketing platform powered by your WIFI, this platform will hyper target your customers with relevant marketing content based on their social media activities.
  • This platform will collect information about your guests from their social media accounts to allow you better understand your guests and build your marketing database.
  • We also provide you with a marketing manager and powerful data analytics from social media sites that helps you to segment customers and streamline customer engagement to grow your club memberships and repeat visitors.
  • Engage with customers on familiar social media platforms and automated marketing efforts!

Download marketWIFI flyer


Wi-Fi gets major update, are you ready?

Over the years, we have seen WiFi overtake wired networks as the preferred and simplest way to connect devices:

  • Enterprises are using WiFi to connect staff and devices to corporate networks.
  • Retailers using it for POS and tracking of stock movements in warehouses.
  • Public “Free WiFi” solutions allow the public to browse the Internet while out and about.
  • Hospitals and care facilities use WiFi for mission-critical patient care and telecommunications requirements.
  • Schools are using WiFi to administer exams and deliver learning material.

When did WiFi become so mission-critical, what would happen if you unplugged your WiFi for a day, would you survive?

WiFi isn’t going away and the number of new WiFi enabled devices is astonishing, Televisions, Aircons, Door Bells, Surveillance Cameras, Dishwashers…

If you have ever setup WiFi on your phone or at home you would have seen acronyms like WEP, WPA and WPA2, these are wireless security standards (protocols) designed to add security to WiFi with features like authentication and encryption.

  • WEP was released in 1997 and was quickly discovered to have major security weaknesses.
  • WPA was released in 2003 to replace WEP.
  • WPA2 was released in 2004 and is the standard we still use today.
  • Over the years there has been several extensions programs aimed at bolstering WPA2 security such as TLS, TTLS, SIM etc – however the fragmentation this has caused is a major problem and has created mismatching security and interoperability issues within the WiFi landscape.

Make way for WPA3!

After 14 years of WPA2 its time for a major upgrade, WPA2 has served us well even with its flaws, which could be addressed with the new WPA3 standard.

WPA3 promises multiple enhancements:

1.      Device Provisioning Protocol (DPP) is an exciting development for provisioning Internet of Things (IoT) devices. This will make it easier to on-board devices that don’t have rich user interfaces such as screens or webapps and allows on-boarding of devices via a Smartphone app used by an authenticated user.

2.      Opportunistic Wireless Encryption (OWE) is encryption for open wireless networks that prevents eavesdropping attacks by encrypting the traffic between the AP and the client, before any authentication occurs. Although a welcome enhancement it still doesn’t address threats like Evil Twins and Honeypots.

3.      Suite B WPA3 adopts stronger cryptographic algorithms defined by the US Government. While mainly government and banking deployments are most interest in this feature, once available all wireless deployments will benefit from these capabilities.

4.      Simultaneous Authentication of Equals (SAE) is designed for clients that use insecure passwords, SAE adds another tenet of security that mitigates dictionary attacks by introducing a secure handshake.


And there’s more…. The 802.11ac standard will possibly be surpassed by 802.11ax which provides benefits in capacity for high-density deployments via multiple improvements:

1.      Enhanced Network Efficiency enables multiple-user operation efficiency over-the-air

a.      Orthogonal Frequency-Division Multiple Access (OFDMA) enhancements by multiplexing users it offers a 4x higher throughput over Wave-2 802.11ac in high density deployments.

b.      Multi-User Multiple Input Multiple Output (MU-MIMO) enhancements sees a single multi-spatial stream Access Point simultaneously transmit to multiple clients with fewer spatial streams.

2.      Enhanced Link Efficiency of Quadrature Amplitude Modulation (QAM) allows for more data to be packed and transmitted simultaneously.

3.      Improved robustness in outdoor deployments.

4.       Improved spectrum reuse through spiral reuse.


What does all this mean for your WiFi deployment?

You have a little time to digest and plan your upgrades, the upgrade will hit the market in late 2019 with manufactures already investigate upgrade pathways, most of the high-end manufactures such as Cisco Meraki have already confirmed their 802.11ac Wave2 hardware will support WPA3 via a firmware upgrade.


What if your planning to purchase new WiFi equipment in the next 12 months?

Before you commit to WiFi equipment for the next 3-5 years, I’d suggest double checking the manufacture is going to support WPA3 in the future via a software/firmware update, not all manufactures will upgrade existing equipment to WPA3, instead they will expect you buy new equipment.


How do you upgrade to WPA3?

This upgrade will most likely require you to do something to activate it, when its released, this could be as simple as downloading a firmware update and will require some clients to re-authenticate to the network after the upgrade.


How can PLAN A IT help?

If you’re not sure if your current WiFi equipment is WPA3 ready, please reach out and we will happily do the research for you or 1300 093 794



Fighting skin cancer together with SCARD

Skin Cancer Audit & Research Database (SCARD) Surgical Audit Project is a surgical log designed for doctors who treat skin malignancies. It has been designed to facilitate the easy recording of useful data at the time of treatment so that the treatment of skin cancers can be tracked. SCARD is provided free-of-charge for all users.

Designed initially as a self-audit tool for primary care skin cancer practitioners, SCARD acts as a tracking tool to enhance practice safety, and it also creates practice performance reports. Pooling of de-identified data enables participating practitioners to confidentially compare their own practice to that of their peers.

Additionally, this creates a large database with significant research potential, as SCARD records for every lesion de-identified practitioner and patient data, and extensive details of location, provisional and histological diagnosis, and the procedure(s) performed in its treatment.

The data presented are being analysed for further studies, and additional data continues to be collected from this ongoing project. SCARD is a useful tool at practice level, and substantial uptake by Australian primary care skin cancer practitioners has provided a unique opportunity for research into skin cancer and its management.

Read more @

PLAN A IT is committed to the ongoing development of the SCARD project and is committed to supporting the almost 1000 practitioners accessing SCARD.


If you’re a medical practitioner and do not have an existing SCARD account?
Register for your free audit with SCARD @


Why you need Email Gateway Security

Why you need Email Gateway Security.

The security industry has provided large businesses with effective email security solutions for many years, helping to address their heightened sensitivity to email risk.

Email gateway security solutions have proven particularly effective because they filter inbound and outbound email traffic at the email gateway, thus ensuring that only emails conforming to corporate policy are allowed in and out of the business. Because these solutions remove unwanted email before it reaches the email gateway, they also reduce bandwidth consumption over networks.

Mid-sized businesses historically have been less aggressive toward email security, due to lower perceived risk and a general lack of full-featured solutions suitable to their budgets and environments. Today, however, these companies face a constant barrage of spam, viruses, and other malware that can cause significant business harm—ranging from impaired productivity to lost business and brand damage.

News headlines frequently tout the proliferation of email-based spam and malware. In 2014, two-thirds of all email traffic was spam. For mid-sized businesses, spam and viruses have traditionally been a nuisance and productivity hindrance, so deploying anti-spam and antivirus solutions that could block most of this traffic was considered good enough….

Read More:



Six Data Security Techniques That Are Highly Valuable For Businesses.

Australian business owners need to recognize the importance of data security. IT companies are ready to assist business owners with all their data security needs. With the ever-growing threat of cyber-crime, it becomes more and more important to protect assets before they are compromised.

Everyone needs to be installing multiple layers of security and backing up files to the cloud and offline, there’s no excuse for data and company security to be compromised in today’s modern and highly reactive security environment.

Crime syndicates have moved into the cyber security realm. These hackers are extremely sophisticated and have the ability to hack your systems today. You also have to anticipate the threat from hacktivists, these are motivated individuals that attack companies for political agendas. One more common security threat to be aware of is corporate espionage and protecting data from disgruntled or opportunistic employees. The bad guys are arming themselves with the latest technologies to steal information, Don’t let them succeed!

Read More:




What is IT Data Security?

We have created a series of articles to help educate people about IT, this is our first article ‘What Is IT Data Security’

What Is IT Data Security and Popular Techniques used.

Data security, is the act of stopping unauthorized intrusion, use, inspection, or destruction of information. It is a term that covers all forms of data, this may be electronic or physical. The primary purpose of data security is to maintain protection over the integrity and confidentiality and availability of data.

It is quite common for small and medium scale business owners to ask the importance of data security for their businesses. Often, they are not sure what benefits such a technical term can do for their business.

Data security is important for all business. Hackers do not care about the size of your operation, all they are looking for are vulnerabilities to be mischievous with. Unfortunately, any naivety on the part of SMB often makes them have poor security practices which leave them vulnerable to attack.

Read More: