Skip to content
Unit 10, 70-74 Frederick Street, Albany WA08 9841 4250Client PortalSupport
3Point IT
Discover | Innovate | Support
3Point IT
  • News
  • Home
  • Services
    • Business Phone Systems
    • Internet & Wireless Networks
    • Email & Productivity
    • Domains & Hosting
    • Cyber Security
    • Backups
  • Partners
  • Get Started
  • News
  • Home
  • Services
    • Business Phone Systems
    • Internet & Wireless Networks
    • Email & Productivity
    • Domains & Hosting
    • Cyber Security
    • Backups
  • Partners
  • Get Started

Author Archives: Jason Thomas

You are here:
  1. Home
  2. Article author Jason Thomas
Mar102026

Managing “Cloud Waste” as You Scale

CloudMarch 10, 2026

When you first move your data and computing resources to the cloud, the bills often seem manageable. But as your…

Read more
Mar52026
a-computer-generated-image-of-the-letter-a

Beyond Chatbots: Preparing Your Small Business for “Agentic AI” in 2026

AIMarch 5, 2026

AI chatbots can answer questions. But now picture an AI that goes further, updating your CRM, booking appointments, and sending…

Read more
Feb282026
closeup photo of computer keyboard

The Server Refresh Deadline: Why Windows Server 2016’s End of Support Should Drive Your Cloud Migration Plan

CloudFebruary 28, 2026

Time moves fast in the world of technology, and operating systems that once felt cutting-edge are becoming obsolete. With Microsoft…

Read more
Feb252026
Free attack unsecured laptop vector

The MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)

CybersecurityFebruary 25, 2026

For years, enabling Multi-Factor Authentication (MFA) has been a cornerstone of account and device security. While MFA remains essential, the…

Read more
Feb202026
Free cloud security database vector

The Daily Cloud Checkup: A Simple 15-Minute Routine to Prevent Misconfiguration and Data Leaks

CloudFebruary 20, 2026

Moving to the cloud offers incredible flexibility and speed, but it also introduces new responsibilities for your team. Cloud security…

Read more
Feb152026
Free cybercrime security scam vector

The “Deepfake CEO” Scam: Why Voice Cloning Is the New Business Email Compromise (BEC)

AIFebruary 15, 2026

The phone rings, and it’s your boss. The voice is unmistakable; with the same flow and tone you’ve come to…

Read more
←12345…
67891011121314151617
18→
3Point IT
© 3Point IT - 2020. All rights reserved.

08 9841 4250support@3pointit.com.au
Hosted by 3Point IT

Go to Top