Blog

Recent Posts

April 27, 2025
Let’s be honest — we’ve all used Excel for more than it was ever designed for. Rosters, project tracking, budgeting, asset registers, timesheets, incident reports, inspections… the list goes on. And why not? It’s flexible, familiar, and already on most computers. But while Excel is great for quick fixes, it starts to crack under pressure when you’re relying on it to run your operations. The Excel Trap Spreadsheets are like duct tape — incredibly handy, but not a long-term structural solution. Here’s where Excel starts to fall short: No user controls: Anyone can edit anything, formulas can get accidentally wiped, and there’s no way to track who did what. No automation: Everything’s manual — data entry, formatting, reporting, chasing people to update their bit. Hard to scale: What works for one user on one laptop quickly becomes chaotic when 10 people are using 12 different versions of the same file. Zero integration: It doesn’t talk to your other systems. You’re stuck copying and pasting between platforms. Version What? One of the biggest productivity killers with Excel is version control — or more accurately, the lack of it. We’ve all seen it: report_final_FINAL_v3_updated.xlsx “Oops, I didn’t get the latest version.” “Someone opened it while someone else was editing it — and now the data’s gone weird.” When multiple people are working from different copies of the same spreadsheet, it’s a recipe for confusion, duplication, and errors. And if a file gets corrupted or lost? Unless you’ve got a backup system (most don’t), that’s hours — or days — of work down the drain. It’s not just annoying. It’s a genuine risk. What Custom Software Does Differently At HutSix, we build systems designed specifically for the job at hand — and the people doing the work. Here’s what you get with custom software: Tailored workflows: Built to reflect your real processes — not shoehorned into a spreadsheet format. Role-based access: Everyone sees just what they need to, and changes are traceable. Automation: From reports to notifications, the system handles the admin so you don’t have to. Real-time data: Always up to date, always available — no version control nightmares. Visual reporting: Dashboards, graphs, even maps — all at the click of a button. System integration: We can hook into your existing platforms (finance, HR, compliance, you name it) to reduce double-handling and improve accuracy. When It’s Time to Level Up If you’re spending more time fixing spreadsheets than doing your actual work, it might be time to upgrade. We’re not here to bash Excel — it’s a brilliant tool in the right context. But when your work is growing, your team is expanding, or your processes are getting more complex, custom software can save serious time, reduce risk, and make things a whole lot easier. We’ve helped teams move from duct-taped spreadsheets to clean, purpose-built systems — and the feedback is always the same: “Why didn’t we do this sooner?”  Ready to retire the spreadsheet? Let’s chat about a better way to get things done.
April 23, 2025
If there’s one thing we’ve learned from building systems for people on the ground — it’s that the small stuff matters. One less form to fill in. One less tab to open. One less email trail. One less phone call to confirm something the system should’ve told you. We’re big believers in continuous improvement — not as a buzzword, but as a way of working. Because every time you remove a step, you save time, reduce friction, and make life that little bit easier for the person doing the work. Efficiency Isn’t About Doing More — It’s About Doing Less You don’t need a full digital transformation to find efficiencies. Sometimes, it’s as simple as asking: Why are we doing this step? Could this happen automatically? Do we already have this information somewhere else? Can we collect this once instead of three times? By shaving off small inefficiencies again and again, you create a workflow that feels smooth, fast, and purpose-built — rather than something your team has to wrestle with every day. How We Approach It at HutSix When we design systems, we don’t just build what’s asked for — we look for ways to streamline, simplify, and sharpen. Our process is always driven by real people doing real work. That might mean: Auto-filling data based on past entries or user roles Combining forms so users don’t enter the same info twice Triggering actions when a step is completed (like alerts, updates or tasks) Removing unnecessary clicks and focusing only on what’s essential Surfacing the right info at the right time — without making the user dig for it It’s not about bells and whistles. It’s about thoughtful design that reduces effort without reducing clarity. Better Every Time We know that organisations evolve. So should their systems. That’s why we build with improvement in mind — adding features, simplifying flows, and listening to feedback as teams grow and change. It’s not about launching something perfect on day one. It’s about creating a system that can get better every time you use it. Even if we only remove one small step at a time — that’s still progress. And it adds up. Want to talk about what “one less step” could look like for your team? Let’s find the friction — and remove it.
April 14, 2025
Cybersecurity isn’t just a technical issue — it’s a trust issue. And right now, Australia’s cybersecurity laws aren’t keeping pace with the reality on the ground. Minimum standards? Tick-box compliance? They’re often outdated, inconsistent, and don’t reflect how people actually use systems — especially in community organisations, regional service providers, and not-for-profits. The law might say you’re compliant. But would your community feel safe if they knew how their data was being stored? Would your team feel confident in what to do during a breach? That’s the real test.  Why We Don’t Settle for “Compliant” At HutSix, we build systems that go beyond what’s legally required — because we know the work our clients do often involves: Sensitive data Vulnerable communities Remote and low-tech environments Staff with varying levels of digital confidence Cultural expectations around privacy and ownership The legal standards don’t cover all that. But our design choices do. Real Security = Real Design Thinking Cybersecurity isn’t just about encryption and firewalls. It’s about: Role-based access and clear permissions Local data storage for sovereignty and compliance Educating users through design, not just training Building in “safe defaults” to minimise risk Creating systems people actually use properly (because that’s where most breaches happen) We believe that just being compliant is the floor, not the goal. If you’re worried your system wouldn’t hold up in the real world — even if it’s legal on paper — let’s talk . Because real responsibility goes beyond what the law says. It starts with how your systems are built.
April 6, 2025
When people hear “cybersecurity,” their minds often jump straight to firewalls, encryption, or Hollywood-style hackers in dark hoodies. But according to Stewart, one of our our Senior Developers at HutSix, the most common vulnerability isn’t found in code or servers—it’s found in people. This April, we’re revisiting cybersecurity with a fresh focus on the human side. We sat down with Stewart to hear his thoughts on the evolving risks we all face, the importance of culture, and how to strike that delicate balance between strong security and good user experience. His insights are equal parts practical and personal, and they’ll leave you thinking twice the next time you’re asked for your mother’s maiden name. From your experience, what’s the most common security mistake people make—both in organisations and as individuals? Falling for scams or targeted phishing attacks. It can be hard to break into a well configured system, but easy to manipulate a person through social engineering to give you the ‘keys to the castle.’ How do you and the team at HutSix build secure systems without sacrificing user experience? It is a delicate balancing act between security and user experience, one where the sensitivity of stored data and client requirements come into play. If you’re working with low-literacy users, you can’t insist on ultra-secure passwords, as these people simply won’t use the system. This can be balanced by reducing what those users can access, mitigating the risk to a degree. Where possible, we implement single sign-on (SSO) - this is where you are authenticated with your company’s Microsoft or Google account, for example. In this way, the system is not managing ‘another’ password, and access for employees leaving your organisation can be managed centrally. Can you share an example of a real-world security issue you’ve encountered in a project, and how you handled it? Many years ago, I was asked to take over the development of a legacy (read: ‘old’) payment system. This app handled online credit card payments; however, it did so in a non-PCI-compliant manner. Seeing as I like sleeping at night, I quickly set about refactoring the system to ensure credit card data was handled correctly. This was an involved process that required coordination with other parts of the organisation and had costs involved, but was ultimately the right move. In your view, what’s the biggest cybersecurity threat businesses face right now—and what should they be doing about it? Your people. Are your employees trained enough to discern a phishing email? Could your staff be fooled into inadvertently handing over sensitive information over the phone? Systems can be hardened as much as possible, but it takes only one person (disgruntled or otherwise) to compromise it all. Train your staff to identify dodgy emails and send simulations regularly to test their skills. What’s something non-technical people should know about cybersecurity that would genuinely make a difference in how they work or behave online? Take better care when it comes to passwords - don’t reuse them and don’t write them down. Instead, use a password manager like 1Password or LastPass to generate and store strong passwords. These tools can be used on your computer or device, so you only have to remember the password for the password manager itself. They also have browser extensions that can automatically fill in passwords for you, saving time. If given the option, activate multi-factor authentication (MFA), which will use your phone as a secondary measure to verify your identity. Are there any day-to-day habits or tools you personally use to stay secure online? Outdated software can often have vulnerabilities, so I keep all my tech up to date with the latest updates. I use 1Password to manage logins for the various systems I look after, but I can also store all sorts of things that need to be securely stored. Lastly, I have registered my email addresses with ‘ Have I Been Pwned’ , a free service that notifies you when your email has been discovered in a data breach. If I get notified about a breach, I change the affected password as soon as possible. What role does culture play in keeping an organisation secure? Is it all about the tech, or is there more to it? Australians are known for their laid-back culture - you’ll often hear, “She’ll be right.” But when it comes to security, “Actually, she won’t be right.” We are all increasingly becoming the targets of data breaches, and with companies increasingly asking for large swathes of personal information, many are becoming victims of identity theft. Personally, I think twice before handing over my personal information. I ask myself, “Why do you need to know this?” or “What is the minimum I need to hand over?” With AI and automation becoming more common, how is cybersecurity changing—and what should we be watching out for? AI can be an amazing tool, but we don’t yet know the full extent of the security issues it may cause. Deepfakes, voice simulators, and photo generation are all tools that can be used to manipulate people, spread disinformation, or project a false sense of legitimacy. Tools like ChatGPT can be used to write perfect English with no spelling or grammar mistakes - normally a dead giveaway when discerning the legitimacy of an email, for example. Laws are, unfortunately, woefully inadequate, and common sense is not always common. So, until the law catches up, everyone needs to be more skeptical and question everything. Stewart wanted to leave you with this final image—a light-hearted tribute to organisations operating with the classic mindset: “The security budget’s gone, but confidence remains high.”

All Posts

April 27, 2025
Let’s be honest — we’ve all used Excel for more than it was ever designed for. Rosters, project tracking, budgeting, asset registers, timesheets, incident reports, inspections… the list goes on. And why not? It’s flexible, familiar, and already on most computers. But while Excel is great for quick fixes, it starts to crack under pressure when you’re relying on it to run your operations. The Excel Trap Spreadsheets are like duct tape — incredibly handy, but not a long-term structural solution. Here’s where Excel starts to fall short: No user controls: Anyone can edit anything, formulas can get accidentally wiped, and there’s no way to track who did what. No automation: Everything’s manual — data entry, formatting, reporting, chasing people to update their bit. Hard to scale: What works for one user on one laptop quickly becomes chaotic when 10 people are using 12 different versions of the same file. Zero integration: It doesn’t talk to your other systems. You’re stuck copying and pasting between platforms. Version What? One of the biggest productivity killers with Excel is version control — or more accurately, the lack of it. We’ve all seen it: report_final_FINAL_v3_updated.xlsx “Oops, I didn’t get the latest version.” “Someone opened it while someone else was editing it — and now the data’s gone weird.” When multiple people are working from different copies of the same spreadsheet, it’s a recipe for confusion, duplication, and errors. And if a file gets corrupted or lost? Unless you’ve got a backup system (most don’t), that’s hours — or days — of work down the drain. It’s not just annoying. It’s a genuine risk. What Custom Software Does Differently At HutSix, we build systems designed specifically for the job at hand — and the people doing the work. Here’s what you get with custom software: Tailored workflows: Built to reflect your real processes — not shoehorned into a spreadsheet format. Role-based access: Everyone sees just what they need to, and changes are traceable. Automation: From reports to notifications, the system handles the admin so you don’t have to. Real-time data: Always up to date, always available — no version control nightmares. Visual reporting: Dashboards, graphs, even maps — all at the click of a button. System integration: We can hook into your existing platforms (finance, HR, compliance, you name it) to reduce double-handling and improve accuracy. When It’s Time to Level Up If you’re spending more time fixing spreadsheets than doing your actual work, it might be time to upgrade. We’re not here to bash Excel — it’s a brilliant tool in the right context. But when your work is growing, your team is expanding, or your processes are getting more complex, custom software can save serious time, reduce risk, and make things a whole lot easier. We’ve helped teams move from duct-taped spreadsheets to clean, purpose-built systems — and the feedback is always the same: “Why didn’t we do this sooner?”  Ready to retire the spreadsheet? Let’s chat about a better way to get things done.
April 23, 2025
If there’s one thing we’ve learned from building systems for people on the ground — it’s that the small stuff matters. One less form to fill in. One less tab to open. One less email trail. One less phone call to confirm something the system should’ve told you. We’re big believers in continuous improvement — not as a buzzword, but as a way of working. Because every time you remove a step, you save time, reduce friction, and make life that little bit easier for the person doing the work. Efficiency Isn’t About Doing More — It’s About Doing Less You don’t need a full digital transformation to find efficiencies. Sometimes, it’s as simple as asking: Why are we doing this step? Could this happen automatically? Do we already have this information somewhere else? Can we collect this once instead of three times? By shaving off small inefficiencies again and again, you create a workflow that feels smooth, fast, and purpose-built — rather than something your team has to wrestle with every day. How We Approach It at HutSix When we design systems, we don’t just build what’s asked for — we look for ways to streamline, simplify, and sharpen. Our process is always driven by real people doing real work. That might mean: Auto-filling data based on past entries or user roles Combining forms so users don’t enter the same info twice Triggering actions when a step is completed (like alerts, updates or tasks) Removing unnecessary clicks and focusing only on what’s essential Surfacing the right info at the right time — without making the user dig for it It’s not about bells and whistles. It’s about thoughtful design that reduces effort without reducing clarity. Better Every Time We know that organisations evolve. So should their systems. That’s why we build with improvement in mind — adding features, simplifying flows, and listening to feedback as teams grow and change. It’s not about launching something perfect on day one. It’s about creating a system that can get better every time you use it. Even if we only remove one small step at a time — that’s still progress. And it adds up. Want to talk about what “one less step” could look like for your team? Let’s find the friction — and remove it.
April 14, 2025
Cybersecurity isn’t just a technical issue — it’s a trust issue. And right now, Australia’s cybersecurity laws aren’t keeping pace with the reality on the ground. Minimum standards? Tick-box compliance? They’re often outdated, inconsistent, and don’t reflect how people actually use systems — especially in community organisations, regional service providers, and not-for-profits. The law might say you’re compliant. But would your community feel safe if they knew how their data was being stored? Would your team feel confident in what to do during a breach? That’s the real test.  Why We Don’t Settle for “Compliant” At HutSix, we build systems that go beyond what’s legally required — because we know the work our clients do often involves: Sensitive data Vulnerable communities Remote and low-tech environments Staff with varying levels of digital confidence Cultural expectations around privacy and ownership The legal standards don’t cover all that. But our design choices do. Real Security = Real Design Thinking Cybersecurity isn’t just about encryption and firewalls. It’s about: Role-based access and clear permissions Local data storage for sovereignty and compliance Educating users through design, not just training Building in “safe defaults” to minimise risk Creating systems people actually use properly (because that’s where most breaches happen) We believe that just being compliant is the floor, not the goal. If you’re worried your system wouldn’t hold up in the real world — even if it’s legal on paper — let’s talk . Because real responsibility goes beyond what the law says. It starts with how your systems are built.
April 6, 2025
When people hear “cybersecurity,” their minds often jump straight to firewalls, encryption, or Hollywood-style hackers in dark hoodies. But according to Stewart, one of our our Senior Developers at HutSix, the most common vulnerability isn’t found in code or servers—it’s found in people. This April, we’re revisiting cybersecurity with a fresh focus on the human side. We sat down with Stewart to hear his thoughts on the evolving risks we all face, the importance of culture, and how to strike that delicate balance between strong security and good user experience. His insights are equal parts practical and personal, and they’ll leave you thinking twice the next time you’re asked for your mother’s maiden name. From your experience, what’s the most common security mistake people make—both in organisations and as individuals? Falling for scams or targeted phishing attacks. It can be hard to break into a well configured system, but easy to manipulate a person through social engineering to give you the ‘keys to the castle.’ How do you and the team at HutSix build secure systems without sacrificing user experience? It is a delicate balancing act between security and user experience, one where the sensitivity of stored data and client requirements come into play. If you’re working with low-literacy users, you can’t insist on ultra-secure passwords, as these people simply won’t use the system. This can be balanced by reducing what those users can access, mitigating the risk to a degree. Where possible, we implement single sign-on (SSO) - this is where you are authenticated with your company’s Microsoft or Google account, for example. In this way, the system is not managing ‘another’ password, and access for employees leaving your organisation can be managed centrally. Can you share an example of a real-world security issue you’ve encountered in a project, and how you handled it? Many years ago, I was asked to take over the development of a legacy (read: ‘old’) payment system. This app handled online credit card payments; however, it did so in a non-PCI-compliant manner. Seeing as I like sleeping at night, I quickly set about refactoring the system to ensure credit card data was handled correctly. This was an involved process that required coordination with other parts of the organisation and had costs involved, but was ultimately the right move. In your view, what’s the biggest cybersecurity threat businesses face right now—and what should they be doing about it? Your people. Are your employees trained enough to discern a phishing email? Could your staff be fooled into inadvertently handing over sensitive information over the phone? Systems can be hardened as much as possible, but it takes only one person (disgruntled or otherwise) to compromise it all. Train your staff to identify dodgy emails and send simulations regularly to test their skills. What’s something non-technical people should know about cybersecurity that would genuinely make a difference in how they work or behave online? Take better care when it comes to passwords - don’t reuse them and don’t write them down. Instead, use a password manager like 1Password or LastPass to generate and store strong passwords. These tools can be used on your computer or device, so you only have to remember the password for the password manager itself. They also have browser extensions that can automatically fill in passwords for you, saving time. If given the option, activate multi-factor authentication (MFA), which will use your phone as a secondary measure to verify your identity. Are there any day-to-day habits or tools you personally use to stay secure online? Outdated software can often have vulnerabilities, so I keep all my tech up to date with the latest updates. I use 1Password to manage logins for the various systems I look after, but I can also store all sorts of things that need to be securely stored. Lastly, I have registered my email addresses with ‘ Have I Been Pwned’ , a free service that notifies you when your email has been discovered in a data breach. If I get notified about a breach, I change the affected password as soon as possible. What role does culture play in keeping an organisation secure? Is it all about the tech, or is there more to it? Australians are known for their laid-back culture - you’ll often hear, “She’ll be right.” But when it comes to security, “Actually, she won’t be right.” We are all increasingly becoming the targets of data breaches, and with companies increasingly asking for large swathes of personal information, many are becoming victims of identity theft. Personally, I think twice before handing over my personal information. I ask myself, “Why do you need to know this?” or “What is the minimum I need to hand over?” With AI and automation becoming more common, how is cybersecurity changing—and what should we be watching out for? AI can be an amazing tool, but we don’t yet know the full extent of the security issues it may cause. Deepfakes, voice simulators, and photo generation are all tools that can be used to manipulate people, spread disinformation, or project a false sense of legitimacy. Tools like ChatGPT can be used to write perfect English with no spelling or grammar mistakes - normally a dead giveaway when discerning the legitimacy of an email, for example. Laws are, unfortunately, woefully inadequate, and common sense is not always common. So, until the law catches up, everyone needs to be more skeptical and question everything. Stewart wanted to leave you with this final image—a light-hearted tribute to organisations operating with the classic mindset: “The security budget’s gone, but confidence remains high.”
March 9, 2025
Operational efficiency isn’t about how busy your team looks—it’s about how much meaningful work gets done with the least amount of wasted time, effort, and resources. It’s the difference between a well-oiled machine and one that’s just making a lot of noise. Too often, businesses and organisations mistake activity for productivity. Endless meetings, clunky workflows, and outdated systems can make a team look busy, but they don’t necessarily translate into real results. Operational efficiency is about maximising output while minimising waste—so you can grow without unnecessary complexity slowing you down. Why Operational Inefficiencies Cost You More Than You Think If your organisation is dealing with inefficiencies, you’re losing more than just time: Time Drain – Employees stuck in repetitive manual processes lose valuable hours that could be spent on strategic work. Hidden Costs – Outdated systems and workarounds lead to increased labour costs, missed opportunities and even fines for non-compliance with regulatory requirements. Employee Frustration – Clunky workflows and inefficient tools create frustration, which can lead to disengagement and turnover. Reduced Agility – Slow decision-making and poor visibility into operations can make it harder to adapt to market changes and grasp opportunities. How Software Can Help You Work Smarter The right technology isn’t just a convenience—it’s a game-changer for operational efficiency. Software solutions tailored to your business can: Automate repetitive tasks – Free up time by eliminating manual processes. Improve visibility – Centralise data so teams have the information they need when they need it. Enhance collaboration – Streamline communication and document sharing. Reduce errors – Automate workflows to eliminate human mistakes. Scale effectively – Grow without increasing admin burdens. A Handy Checklist: Is Your Business Running Efficiently? To find out if inefficiencies are creeping into your operations, ask yourself: Are employees spending too much time on manual data entry or repetitive tasks? Do you have multiple systems that don’t integrate properly? Are bottlenecks slowing down workflows? Do employees struggle to find the information they need? Are meetings and approvals taking longer than they should? Do you rely on spreadsheets where automation could be used? Are your teams frequently reinventing the wheel instead of following optimised processes? Is your reporting inefficient or lacking insights to drive decision-making? If you answered ‘yes’ to more than a couple of these, you could benefit from a systems and process review. Getting Started: Improve Efficiency with HutSix At HutSix, we help identify, refine, and optimise processes using technology that makes operations leaner, smarter, and more effective. Whether it’s automation, integration, or process refinement, we can work with you to remove roadblocks and build a scalable, high-performing operation. Efficiency isn’t about working harder—it’s about working smarter (our favourite saying!). Let’s make your business run better. Need help? Get in touch with us today .
February 9, 2025
Cyber threats are evolving at an alarming rate. What was secure yesterday may be vulnerable today. With cybercriminals refining their tactics and businesses becoming more digitally connected, the need for robust cybersecurity has never been greater. But how do you know if your organisation is truly protected? The Changing Cyber Threat Landscape Cybercrime is no longer limited to large-scale data breaches or sophisticated nation-state attacks. Today, organisations of all sizes are being targeted by: Ransomware Attacks – Malicious software that locks you out of your own systems until a ransom is paid. Phishing Scams – Deceptive emails or messages designed to trick employees into revealing sensitive information. Supply Chain Vulnerabilities – A weak link in your software vendors or third-party providers could expose your business. Credential Theft – Attackers exploiting weak or reused passwords to gain unauthorised access to critical systems. Ignoring cybersecurity is no longer an option. A single breach can lead to financial loss, reputational damage, and legal implications. Compliance: The Other Side of Cybersecurity Beyond the immediate threats, organisations must also navigate an increasingly complex regulatory landscape. The Australian Government is tightening data protection laws, and non-compliance can be just as costly as a cyber attack. The Australian Privacy Act (under review in 2024) – Proposed reforms could introduce stricter data handling rules, higher breach penalties, and greater transparency requirements. The Notifiable Data Breaches (NDB) Scheme – Businesses must report serious data breaches to affected individuals and the OAIC or face regulatory action. Essential Eight & ASD Guidelines – The Australian Signals Directorate’s framework is becoming a benchmark for cybersecurity best practices, particularly in government and corporate sectors. ISO 27001 Certification – Increasingly expected in industries handling sensitive data, supporting both security and compliance obligations. With tougher regulations on the horizon, reviewing your security and compliance measures now can help you avoid penalties and reputational damage. The Importance of Regular Security Reviews Many organisations assume their security measures are strong enough—until they aren’t. Conducting regular security assessments ensures your defences keep pace with emerging threats. A comprehensive security review should cover: Access Controls – Are employees using strong authentication methods? Software & Patch Management – Are systems up to date with the latest security patches? Network Security – Is sensitive data encrypted, and are firewalls properly configured? Incident Response Plan – Do you have a tested strategy in place for dealing with a cyber incident? Get Ahead of the Threats Cybersecurity isn’t just about defence—it’s about resilience. Being proactive rather than reactive is the key to protecting your organisation. At HutSix, we can help you with cybersecurity strategy and risk mitigation. Whether you need a full security review, penetration testing, or guidance on best practices, we can help you strengthen your defences. Don’t wait for a breach to reveal your weaknesses. Contact us today for a cybersecurity review and ensure your organisation is ready for whatever comes next.
SHOW MORE
typewriter keys