200px wide
1300 378 676
+61 7 3120 0640
[email protected]
CONTACT US
CALL US
CONTACT US
  • Corporate Services
    • IT Support Services
      • Managed IT Services Brisbane
      • IT Consulting
      • IT Outsourcing
      • IT Audit & Review
      • Project Services
      • Virtual CIO Services
      • Corporate Apple Services
      • Mobile Device Management
      • IT Support Sydney
      • IT Support Melbourne
      • Brisbane IT Support for Businesses
    • IT Cyber Security Services
      • Managed Security Services
      • ISO 27001 Services & Consulting
      • IT Cyber Security Audits & Assessments
      • Information Security Management
      • RFFR & DESE ISMS Services
      • The Essential Eight Framework
    • Managed Cloud Services
      • Private Cloud
      • Hybrid Cloud
      • Cloud Consulting
      • Microsoft SharePoint
      • Microsoft Office 365
      • Power BI
      • Amazon Web Services
      • Microsoft Azure
      • Colocation & Server Hosting
      • Managed Cloud Backups
      • Microsoft Teams
    • Managed Network Services
      • Managed Internet Services
      • Business Internet
      • Power Apps Development & Consulting
      • Managed Wi-Fi
      • Network Security
      • Managed SD-WAN
      • Private WAN
    • Business Telephony
      • Hosted PBX
      • On-Premise PBX
      • Teams Calling Australia
      • Call Centre Services
    • Hardware and Software Procurement
    • Supported Industries
      • Accountant & Finance IT Support Services
      • Civil & Construction IT Services
      • Creative Industries IT Support Services
      • Law Firm & Legal IT Support Services
      • Not For Profit IT Support Services
      • Healthcare IT Support Services
      • Real Estate IT Support Services
      • Manufacturing IT Support Services
  • Education Services
    • Apple Authorised Reseller
    • Education Device Procurement & Technology in Schools
    • IT Support for Education Services
    • Mobile Device Management for Schools
    • Professional Development for Teachers
  • Case Studies
  • Insights
    • Essential Eight Explained
    • Mastering Microsoft
    • Insights: Cyber Security
    • Insights: Backups
  • About Us
    • Why Choose Us?
    • Client Testimonials
    • Partners and Awards
    • Careers
  • Contact Us

What to Do When Your Computer Is Infected

January 19, 2023 By Angie Jones

The sad truth is that most of us are underprepared when it comes to computer infections. Without the proper precautions in place, it’s only a matter of time before a computer virus or harmful malware take hold of your device. If this has happened to you, the most important thing you can do is not panic. While infections can be dangerous and should always be taken seriously, there are a number of steps you can take to remove the infection and prevent any serious long-term damage.

The Different Types of Computer Infections

Unfortunately, there exists a multitude of threats that pose a danger to your device and networks. While each threat is unique, they often fall into one of the three following categories:

1. Viruses infect machines via a compromised link, file or website, and can wreak havoc on your device. In order for them to spread from device to device via a carelessly shared link and/or insufficient antivirus protection.

2. Worms can have the same affect has a virus, but don’t rely on humans to spread. Instead, their programming enables them to spread and infect every device on the same network.

3. Malware can come in many forms including adware, spyware and ransomware. While each attack differs, they are all designed to monitor your actions and collect personal data. In the most nefarious cases, your personal data can be be stolen, held hostage and even sold online.

Warning Signs That Your Computer Is Infected

Although infections may not also be obvious, here are a few warning signs that may signify you have a computer virus or some form of malware running on your device:

  • Device is running slowly and/or frequently crashing
  • Your internet browser is being redirected to unknown websites
  • The hard drive space suddenly changes dramatically
  • Missing, altered or corrupted files
  • Unexpected pop-up windows that keep appearing
  • Random noises coming from the device
  • Unexpected mouse movements or keystrokes
  • You’re alerted to attempted network connections
  • Warnings from anti-virus and/or anti-malware software
  • Spam is being sent from your email and/or social media accounts

What To Do If Your Computer Is Infected

Install and Run Antivirus Software

Hopefully, you already have an up-to-date antivirus program. If you don’t, then download one immediately! There are two kinds of antivirus software: real-time and on demand. While both are capable of detecting and removing harmful computer viruses and malware, a real-time scanner autonomously performs system scans for in the background while you’re using your divide. An on-demand scanner, on the other hand, has to be manually activated every time you wish to scan your device.

Once you’ve installed an antivirus software (and confirmed that it’s running as it should be), check your device for any virus and/or malware infections by running a thorough scan of your device’s system. Antivirus programs often offer a variety of different scans, the most comprehensive of which is usually called a full system scan. While these scans may take several hours, in most cases you do not need to remain with your device for the duration.

Remove Any Suspicious Files and Programs

Once the scan is complete, review the findings. The antivirus program should alert you to any identified threats and recommend a course of action. Once you’ve undergone the recommended steps, run another scan to confirm whether or not the threat has been eliminated. In most cases, deleting or quarantining any malicious files and programs will resolve the issue. However, if the antivirus software is unable to remove the threat, then it’s time to call in a professional. The worst thing you can do is ignore the problem!

Isolate the Device

To prevent any further damage, you should disconnect your device from all wireless and wired networks, including the internet. Some infections cans use these connections to migrate, so any device connected to the same network as yours will be vulnerable to attack.

Reset Your Passwords

It’s better to be safe than sorry! You can avoid any unauthorised access to your accounts and online profiles by changing all of your passwords and log-in credentials immediately. Be sure to only use a device that’s free from infection to complete this step! You should also do this in level of priority, with workplace, financial and email accounts taking precedence. If you are still concerned about any potential data theft or fraud, contact these institutions directly and brief them on the situation. This way they can monitor your account for any suspicious activity.

Delete Any Sensitive Information

Any potentially sensitive information (ie. personal identification, professional documents, etc), delete them as soon as you can! It’s better to go through the potential hassle of replacing these documents than to have them stolen by a cyber criminal. Do not transfer these files onto a portable drive or cloud storage, as this could result in the infection spreading to other devices.

Keep Your Back-Ups Separate

By now you should be in the habit of regularly backing up your devices. However, if you don’t already have a backup copy of your data, do not try to make one while your device is infected (without consulting an IT professional first). By connecting your backup drive to an infected device, you’re putting any data and previous backups stored on there in jeopardy.

Have a Professional Take a Look

Let’s face it…we’re not all IT wizards. Sometimes, trying to solve the issues ourselves can do more harm than good. If you’re antivirus protection is unable to remove the infection or you find that the operating system, programs and/or date are compromised beyond repair, then you should contact a reputable IT support team. They’ll have the knowledge, experience and tools best equipped to tackle the issue and minimise any potential fallout.

How To Avoid Future Infections

As the saying goes, “an ounce of prevention is worth a pound of cure.” Adopting a proactive approach can prevent infections from occurring in the first place and save you untold money, time and mental stress. Here’s a few easy practices that can help keep your device infection-free:

  • Use a good antivirus software
  • Keep your software, apps, internet browser and operating system up-to-date
  • Thoroughly research apps and software, only download them from reputable sources 
  • Carefully read the permissions the apps and software ask for
  • Absolutely never click on any unverified links in electronic communications (emails, texts, etc) or on unfamiliar websites
  • Never open attachments in suspicious looking emails
  • Use a secure VPN connection when browsing the internet, especially when connecting to a public Wi-Fi
  • Don’t insert any unknown USBs, hard driver or disks into your device

Filed Under: News

5 Ways to Build a Strong Relationship with Your MSP

January 18, 2023 By Angie Jones

Cultivating strong and lasting professional relationships are essential to the success of any business. Outsourcing your IT needs to a Managed Service Provider (MSP) can put your organisation on the fast-track to success and help grow your business….if you’re able to establish a solid working relationship from the outset. Partnering with an MSP gives them access to your internal IT environment and systems, which can have significant long-term impacts on your end-users and organisation as a whole. Therefore, it’s important that your MSP-client partnership is built on a shared understanding of your business’ needs, abilities and goals.  A successful working relationship with your MSP can have a number of benefits for your business including:

  • Improved efficiency of business operations
  • Enhanced cyber security and data protection (including meeting all regulatory standards and maintaining compliance)
  • Ensuring uptime through a proactive approach to system maintenance and repairs
  • Reduce overhead costs through a predictable pricing structure
  • Access to latest, cutting edge technologies

While trust and respect can take time to build in any relationship, here are our tips to starting off your MSP partnership on the right foot!

1. Choose Your Provider Wisely

First things first, you need to find an MSP that fits your needs! Every MSP is different and not every MSP may offer the services your business requires. For instance, the industry and/or sector your business operates within may necessitate specialised IT knowledge, eg. industry and legal regulations, specialised platforms and software, IT conditions such as on-premises, cloud and hybrid environments.

The MSP you choose to partner with will drastically affect the efficacy and performance of your IT systems. In order to find one with the right services, qualifications and expertise, it’s important to develop a selection criteria that thoroughly outlines your organisations IT requirements.

2. Have Open and Clear Communication

We’ve heard it time and time again – communication is key! Being open and transparent will help your MSP to plan and implement successful technology solutions for your business. Communicate your goals and the direction of your business, as well as the capabilities, shortcomings and current state of your internal IT department.

It’s also imperative that you update your MSP to any changes that may have an impact on their work. For instance, if your business is planning any projects or initiatives that may affect your IT systems at some point in the near or even distant future. Making sure your MSP is aware of even the tiniest changes can minimise their disruption and prevent them from growing into a much bigger problem down the road.

3. Define Roles and Responsibilities

One of the best ways to ensure that the working relationship with your MSP is mutually beneficial is to clearly define the expectations of both parties. A Service Level Agreement (SLA) outlines the level of service required from the partnership. They are also beneficial in establishing what falls under the purview of the MSP and what needs to be dealt with by the internal IT staff. When drafting your SLA, play to the strengths and weaknesses of your team, that way your internal team can focus on what they do best and the MSP can fill in the gaps!

Defining the parameters, roles and responsibilities of your internal IT department and MSP partner ensures that everyone is able to collaborate and have a valuable contribution. It also ensures that you only pay for the managed services you need.

4. Plan For the Long-Term

There’s a difference between being a good partner to your MSP and being a preferred one. If you want your MSP to value your partnership, then you need to think long-term and get them involved in your strategic technology roadmap. Your MSP wants your business to succeed, so why not consult with them when growing and/or scaling your organisation?

Remember, relationships need to be nurtured in order to flourish, so consider checking in with your MSP from time to time. These sessions can be used to provide feedback, address any ongoing challenges or even to better develop your own understanding of the state of your organisations’ IT systems. It also gives your MSP a better insight into the current state of your business, which allows them to anticipate your needs and any potential issues.

This can lead to the development of better business practices and policies, while also allowing you to foster a stronger interpersonal relationship with your MSP.

5. Regularly Review Your Working Relationship

Relationships change, evolve and can (potentially) sour over time. That’s why you should conduct a regular audit of your MSP once (or even twice) a year. Even the most accredited and highly regarded MSP can still become a hindrance if your partnership is no longer simpatico. This can eventually lead to unanswered communications, unresolved IT issues and costly interruptions to your business operations.

Taking the time to review whether your IT needs are being met allows you to resolve any underlying tensions early on. Even if the working relationship can’t be salvaged, then at least your organisation is free to move on and start fresh with an MSP that may be a more suitable fit for your business.

Filed Under: News

Holiday Gift Guide 2022: Best Apple Products and Accessories!

December 8, 2022 By Angie Jones

Tis the season for giving and by now you’ve (hopefully) begun to think about your Christmas shopping. But thinking of that perfect gift for the special someone in your life can often be a struggle. Well, if that person happens to be an Apple aficionado, then you’re in luck! Apple has released their 2022 Holiday Gift Guide and we’ve rounded up a few of our favourites. Here’s our recommendations for the best Apple products and accessories to give this Christmas.

Happy shopping!

AirTag

We all know someone who constantly misplaces their things. Their keys could literally be in their hands and five seconds later they’re turning the place upside down trying to find them! If that scenario seems all too familiar then the AirTag is the perfect holiday gift for them! This circular, stainless steel accessory is compact and discreet, allowing it to easily be fastened to a keyring, bike or pet collar (with the help of a separately purchased AirTag Loop, AirTag Leather Key Ring or AirTag Leather Loop accessory), or slipped into a backpack, purse, wallet or travel luggage. Once that’s done, the AirTag can be used to track the location of the object via the Find My application. The sleek design is even water resistance and includes a small speaker, giving the AirTag a wide variety of uses.

AirPods and AirPods Pro (2nd Generation)

When it comes to wireless earbuds, the AirPods and AirPods Pro are one of the most popular on the market….and it’s not hard to see why. September saw the release of the second-generation AirPods Pro. An upgraded version of the original model, this generation includes a H2 chip with support for spatial audio and improved active noise cancellation. Other new new and upgraded features include: adaptive transparency mode (lets you stay aware of your surroundings by letting outside noise in), force sensor controls (adjust media playback and volume via the earbud stem), dynamic head tracking, sweat and water resistance, MagSafe wireless charging case (which holds a total 30 hours of charge) and longer batter life (up to six hours of use, an hour a half longer than the previous generation!). However, if you’re just looking for the basics, then the second and third generations AirPods are more than serviceable and have similar capabilities. All three models also support Siri commands and can be used to switch automatically between Apple devices.

HomePod mini

This HomePod may be mini, but it sure is mighty! This compact smart speaker offers excellent audio quality and can nearly everything its big brother (the HomePod) can do. Controlled entirely via Siri, the HomePod mini can be used as a hub for your HomeKit home automation accessories! Place two in different rooms and voila you’re got a home Intercom system! You can even play the audio from your Apple TV through the speaker. For a more immersive sound experience, we recommend setting two up for stereo sound.

If you’re looking to pair it with an additional gift, an Apple Music subscription is an excellent option.

iPad, iPad mini, and iPad Air

Perhaps you know someone in need of a new tablet device? Well, look no further! Apple have a broad range of options that cater to a variety of needs and budgets. Here’s our recommendations:

  • iPad (ninth and tenth generation) – The tenth-generation model is the latest incarnation of the standard iPad. With all the same functionality as its predecessor, the 2022 redesign also includes moving Touch ID to the top button, an increase to the display size (it now measures 10.98 inches) and a front-facing camera positioned on the landscape edge. This generations is of iPad is compatible with the Magic Keyboard Folio and first-generation Apple Pencil. However, if you only need the basics, last year’s ninth-generation iPad also makes a great holiday gift! It’s definitely the more budget friendly option, so consider adding on a first-generation Apple Pencil or Smart Keyboard as an extra stocking stuffer.
  • iPad mini – If size is a concern and you’re looking for something more portable, the diminutive sixth-generation iPad mini is just the ticket! While it’s compatible with a second-generation Apple Pencil, you’ll have to look elsewhere if you need a keyboard. While Apple may not have a keyboard product supported by the iPad mini, there are third-party manufacturer and standard wireless keyboard options on the market.
  • iPad Air – Looking for a tablet with a little more oomph? The iPad Air is just the ticket! Besides the iPad Pro models, the iPad Air has the most power of Apple’s tablet offerings. It can handle even the most intensive tasks. For those intending to use it for business or creative pursuits, the second-generation Apple Pencil, Magic Keyboard or Smart Keyboard Folio would make great accompaniments.

MagSafe Duo Charger

Designed to charge multiple devices from a singly power source, the MagSafe Duo Charger is the pinnacle of modern convenience. The MagSafe Duo Charger magnetically connects to both your iPhone and Apple Watch to wirelessly (and simultaneously!) charge them. Heads up, you’ll need to ensure that the intended recipient has an iPhone that supports the MagSafe standard (either a twelve or thirteen series handset). For the travel conscious consumer, the MagSafe Duo Charger folds up neatly and discreetly!

Apple Watch

Now this ones a little tricky, as the Apply Watch Suite provides a dizzying amount of options to choose from. In addition to choosing from one of the three models (Apple Watch SE, Apple Watch Series 8 or the Apple Watch Ultra), each model also includes a dazzling array of options for the case size, material and colour ways! Not to mention there’s also the band and band colour to consider…This makes it difficult when deciding on an Apple Watch as a gift.

With its larger screen, faster chip, and new iPhone and Apple Watch crash detection feature, the Apple Watch SE satisfies the needs of the majority of Apple consumers.

However, if you’re looking for a larger Always-On display, a blood oxygen sensor, ECG monitoring and temperature sensor for cycle tracking, then the Apple Watch Series 8 might be more your speed.

For the truly adventurous at heart, the Apple Watch Ultra combines all of these features and more. While the 49mm titanium case is larger than the other models, it comes with larger, easier to manoeuvre buttons and a new Action button feature that gives the wearer quick access to app-specific commands. The Apple Watch Ultra also includes a brighter Always-On display, more reliable GPS (even in unfavourable conditions), longer battery life (up to 36 hours, soon to be 60 hours in a yet-to-be-released extended battery optimisation mode), and can even function as a dive computer thanks to its depth gauge and water temperature sensor.

As you can see, there’s a lot to consider when comparing the Apple Watch models. So make sure you know what you’re looking for before heading down to your local Apple Store!

Apple TV 4K

With its new A15 Bionic power processor, the new third-generation Apple TV 4K has a lot to offer. Its CPU is 50% faster than the previous generation, resulting in better audio and video, greater responsiveness, easier navigation and faster UI animations. Gamers will be happy to know that the GPU has also improved by 30%, ensuring smoother gameplay! Depending on your media streaming needs there are two options:

  1. Apple TV 4K (Wi-Fi) model with 64 GB of storage
  2. Apply TV 4K (Wi-Fi + Ethernet) model with 128 GB of storage

Both options also include a Siri Remote that’s charged via USB-C.

Apple One Subscription

Over the last few years we’ve seen Apple expand further into software services. A huge component of that has been their foray into streaming and gaming services – Apple Arcade, Apple Music, Apple TV+, etc. Now there’s another on the market – Apple One! Apple One bundles multiple Apple streaming subscriptions at a reduced cost. Both the individual and family plans include access to all aforementioned products, in addition to an expanded allocation of iCloud storage. The Premier tier adds even more iCloud storage to your account, as well as access to News+ and Fitness+ services.

Not sure which of these suggestions is the right fit for the Apple fan in your life? Why not consider an Apple gift card! A gift card is a great way to avoid gifting someone with a product they already have or have no use for. It also gives them the freedom to choose the exact model and colourway they have their heart set on! 

Filed Under: News

Mastering Microsoft Ep 17: Managing Meeting Options and Permissions in Microsoft Teams

December 7, 2022 By Angie Jones

Although your organisation may already have default meeting options in place, did you know that you can change these options at any point during a Microsoft Teams meeting? These settings allow you to limit access to certain meeting features and functions in order to keep your meetings running smoothly without interruptions!

How to Change Meeting Options in Microsoft Teams

  1. Begin your meeting
  2. Click on the ellipses in the menu bar (top right hand corner)
  3. Select ‘Meeting options’ from the drop down menu
  4. This will open the ‘Meeting options’ panel
  5. From this panel you can change the following meeting options
    • Which attendees can bypass the lobby to join the meeting automatically
    • Set alerts when attendees join and leave the meeting
    • Which attendees are ‘presenters’ and have the following permissions:
      • Share their screen
      • Allow attendees waiting in the lobby to join the meeting
      • Mute attendees
      • Remove attendees from the meeting
      • Start and stop a recording of the meeting
    • Giving attendees permission to use their microphones and/or cameras
    • Set up an automatic recording of the meeting
    • Enabling the reactions feature
    • Enabling the Q&A feature
    • Enabling CART (Communication Access Realtime Translation) captions
  6. Once you’ve finished changing your meeting options, click ‘save’ to apply them
  7. You can access and change meeting options at any point during a Microsoft Teams meeting by opening this panel

Filed Under: Mastering Microsoft, News

Why Your Business Needs a Disaster Recovery Plan

November 30, 2022 By Angie Jones

Your data is the core of your business. So what would happen if you suddenly lost access to it? Documents, business critical applications, organisational data….gone. Sadly, this scenario is all too common. Natural disasters, hardware failures, cyber threats and even simple user errors can all lead to the permanent loss of valuable data.

While you may already have backup policies in place to mitigate these threats, without a disaster recovery plan your business could still experience extended downtime and catastrophic data loss. With a disaster recovery plan as part of your IT strategy, you can rest assured that your lost data can be restored in a timely manner, helping you to keep your business operating even in a worst case scenario.

What is a Disaster Recovery Plan?

A disaster recover plan should be a crucial part of any business’ IT strategy. It is a well-documented process detailing your organisation’s response to any hypothetical scenarios that could impact your IT infrastructure. Every disaster recovery plan is guided by three main goals:

  1. Ensure uptime by minimising any interruptions to normal operations
  2. Limit the the damage and economic impact caused by interruptions
  3. Maximise productivity by providing personnel with emergency procedures and alternate means of operation in advance of any interruptions

While every business operates differently, one thing they have in common is that they all store and use data in some way. Therefore, every disaster recovery plan should address two man objectives:

  • Recovery Point Objective (RPO) – This objective sets how far back to recover data from and defines the maximum amount of data loss (measured in age) deemed acceptable in the event of a disaster, failure or comparable event.
  • Recovery Time Objective (RTO) – This objective defines the length of time it takes to restore company data and systems, resulting in business operations resuming as normal.

An effective disaster recovery plan will include a comprehensive backup solution, as it will automatically backup data to ensure that both the RTO and RPO standards are met.

The Benefits of a Disaster Recovery Plan

1. Ensure Business Continuity

No matter what business you’re in, unexpected downtime carries significant consequences. Every minute your business operations are offline means significant revenue loss and irreparable reputational damage. In addition to this, without access to the tools and information they need, your employees will be unable to carry out their duties. This can lead to a dramatic loss of productivity, as unfinished tasks and missed deadlines continue to accumulate.  By implementing a disaster recovery plan and backing up your data to the cloud, you can maintain your business operations, even when disaster strikes!

2. Improve Information Security

One of the biggest cyber threats businesses face is ransomware attacks. Organisations who don’t have disaster recovery plans in already in place are often forced to pay an exorbitant amount just to regain access to their own data. By incorporating a data backup solution and restore policies into your disaster recovery plan, you can render these types of cyber attacks moot. Furthermore, cloud backup services also usually include enhanced security features and tools that detect unauthorised access and other suspicious activity. The earlier you can detect and respond to a potential security breach, the less chance of any negative fallout impacting your business.

3. Better Customer Retention

A disruption to your normal operations isn’t just detrimental to your business, but also frustrating for the customers who rely on your systems and services. Not only are they inconvenienced, but may also begin to question the reliability of your company’s practices and services. After all, if your business can’t protect your own data, how can they trust you with theirs? The longer the disruption to your operations lasts, the more inclined your customers and clients will be to take their business elsewhere. A brief lapse in service may be forgiven, but a prolonged absence could very well lead to client and consumer relationships you’ve spent years cultivating quickly souring. A disaster recovery plan demonstrates that your business is well-equipped to handle any disaster and will guarantee a continuation of service, no matter what the circumstances.

4. Cost Efficiency

A single data disaster can incur a number of associated costs that have the potential to bankrupt businesses. Some of the financial consequences your business may need to reconcile include: meeting the demands of ransomware hackers, the financial penalties incurred when businesses fail in their obligation to safeguard personal information from becoming compromised, and the loss of income caused by the disruption to revenue channels and worker productivity. You can avoid these costs by utilising a disaster recover plan. Plus, even if you never suffer a disaster event, having a disaster recovery plan can still impact your bottom line in a positive way. For example, cloud-based backup solutions are more cost effective to implement and maintain that other on-premises options and can heavily reduce your business costs. In addition, working with an external IT service provider to develop your disaster recovery plan can often be a more cost-efficient option than delegating the task to your in-house team. All ongoing monitoring and management of your data can be outsourced to your external partner, freeing up your internal IT department to focus their time and resources to maintaining your day-to-day operations and other projects.

5. Increase Productivity

As we’ve already discussed, losing access to your business critical data and applications can result in a major decline in productivity. No only can a disaster recovery plan circumvent this by keeping data accessible no matter the situation, but even just having a plan in place can lead to an increase in productivity! A disaster recovery plan reduces the likelihood of your organisational data becoming compromised, by helping all personnel understand their own role in data security and giving them a guideline to follow in the event that of a cyber attack. The more prepared your staff feel for these situations, the more efficiently they’ll be able to handle any situations that arise. By keeping your staff calm and well-equipped, you’ll improve their efficiency across the board.

What Makes an Effective Disaster Recovery Plan?

So now that we understand what a disaster recovery plan is and why your business needs one, the question is: where do you begin? Well every business is unique and your disaster recovery plan should be tailored to the needs of your organisation. But, to get you started, here’s a list of some of they key components that should be addressed in your disaster recovery plan:

  • Recovery Point Objective (RPO) and Recovery Time Objective (RTO)
  • A comprehensive and current inventory of all IT assets (hardware and software)
  • Identify all members of the Disaster Recovery team and clearly define their roles
  • Identify and prioritise sensitive data and information
  • Identify and prioritise all risks and threats to organisational data
  • Identify where all assets are located and where they will be moved to in the event of a disaster
  • A remote storage site should be dedicated to keeping copies of critical physical documents and storage media (such as hard drives) 
  • Implement a backup policy and conduct regular reviews and testing
  • Develop a step-by-step recovery plan in response to every identified risk 
  • Run exercises and disaster recovery drills to test the effectiveness of and identify improvements to your disaster recovery plan 

Filed Under: News

9 ways to stay safe while shopping online these holidays!

November 23, 2022 By Angie Jones

The holiday season is upon us! If you’re like me and try to avoid the hustle and bustle of shopping centres this time of year, then you’ve probably already started doing some (or most) of your Christmas shopping online.

However, online scammers know this and are ready to take advantage of the buying frenzy that occurs during the holidays. Therefore, it’s important that you take necessary precautions when conducting online transactions.

Here are our tips to keep your financial and private information safe from cyber criminals this Christmas:

1. Only use up-to-date devices

Any devices operating on old software pose a serious threat to your online security. Hackers exploit the vulnerabilities found in older operating systems to gain access to both the device and the users private data. Software updates not only improve your device’s performance, but also include patches to fix these vulnerabilities and improve your cyber security. Although installing updates on your computer, tablet or smartphone may feel like a lengthy chore, it can drastically reduce your online risk. For this reason, we recommend that you only use up-to-date devices when shopping online.

2. Never visit websites from email links

This time of year you’re probably being inundated with promotional emails offering the latest products and exclusive offers. However, not all of these emails are going to be legitimate and, as cyber attacks become more sophisticated, it can be difficult to detect which emails are in fact phishing scams. Many of these phishing emails include seemingly innocuous links that, once clicked, lead the unsuspecting victim to a nefarious site that will begin to auto download malware onto their device. It’s better to be safe than sorry, so we recommend never clicking links found in an email. Instead, try navigating directly to the website yourself by typing the url into your web browser. We also recommend applying the same advice to links that have been texted to your phone.

3. Use a wallet app

Giving your financial information (such as debit and credit card details) always constitutes risk. However, during the holiday season, many of us find ourselves purchasing from online stores and retailers we haven’t dealt with before. Freely handing over your financial details to an unknown site exponentially increases the risk of cyber criminals accessing this information. That’s why we suggest that (whenever possible) you use a wallet app (such as PayPal) to facilitate your online purchases. Using these services circumvents this issue, as you only share your payment card details with the wallet app service (Apple Pay, Google Pay, PayPal, etc.), and keeps it out of the hands of the online merchant.

4. Remove all saved payment information after finalising your purchase

Many websites automatically save your payment card details after you finish checking out. While this may be convenient and save you time on your next purchase, it also puts you at risk for a number of reasons. For starters, anyone with access to your device or online account could easily rack up hundreds (or even thousands!) of dollars of purchases in your name. In addition, the online retailer may suffer an all-too-common data breach, which could likely result in your payment card details ending up in the hands of a cyber criminal. A general rule of thumb is the fewer databases you allow your financial details to be stored on, the better. Subsequently, it would be in your best interest to immediately remove your payment card information after checking out. You can usually do this through your account settings.

5. Only shop on secure websites

The new standard for URLs is no longer “HTTP” but “HTTPS”. Having the “S” on the end indicates that their websites encrypts any and all data transmitted through the site. This includes personal data such as your name, address and payment information. We cannot emphasise this enough, you should NEVER trust a website that doesn’t use HTTPS in the address bar. A small lock icon in front of the website address is also another indicator that a website is secure and should be safe to purchase from.

6. Double (and triple!) check the website URL

Mistakes happen and we’re all guilty of the occasional typo, especially when trying to use those tiny keyboards on small smartphone screens, am I right? However, if gone unchecked, one typo can lead you into a world of trouble. Cyber criminals often buy domain names that are very close to real ones used by popular and reputable online retailers (think Amaazon.com instead of Amazon.com). They then build a fake ‘copycat’ site designed to fool victims who’ve accidentally typed in the URL. Being vigilant and taking a few moments to double-check that you’ve navigated to the correct website before you start shopping can save you a world of hurt.

7. Never use public Wi-Fi to shop online

Connecting your device to public Wi-Fi is asking for trouble. Hackers know that this time of year people are more likely to use their portable devices to search for products and prices while out and about in public. They often station themselves around popular public Wi-Fi spots and use it to spy on the activities of any other devices that are also connected. In doing this, these hackers are privy to every website you visit, every word you type and every app you open. With this kind of uninhibited access, it won’t be long until they’re able to see (and steal) your online account passwords and payment card information. We strongly urge you to switch off Wi-Fi while out in public and rely only on your mobile carrier’s network. Or, if that’s not a viable option, wait until you’re safely at home to do any online shopping.

8. Watch out for scammers impersonating well-known brands

While phishing is a major concern year round, the holiday season sees a major spike in phishing and smashing attacks. During the 2021 holiday season alone there was a 397% increase in typo-squatting domains associated with phishing sites. Cyber criminals know that this time of year people receive hundreds of retailer marketing emails, order confirmations and shipping updates. These emails provide the perfect templates for them to impersonate well-known and trusted brands like Amazon, Target and JB Hi-Fi. Unsuspecting victims are then tricked into clicking on a nefarious link and/or logging in to malicious website. Even under the most intense scrutiny it can be hard to tell which email is real and which is fake, so it’s important that you remain on high alert. This is yet another reason why we recommend always visiting a website directly, instead of clicking on an email link.

9. Keep an eye on your bank accounts

Odds are that, during the holiday season, you’re probably making more purchases than you normally would. Therefore, if you’re not paying attention, it can be easy for unexplained transactions to slip through the cracks. That’s why we believe you should keep a close eye on your bank account. Catching suspicious charges early gives you a greater chance of recuperating the lost funds, while also helping you prevent any further breaches. You can even set up banking alerts to monitor your account for you, all through your online banking app. For example, you may choose to set up alerts for purchases over a specified amount or for purchases made outside the country.

Filed Under: News

Mastering Microsoft Ep 16: How to Add a SharePoint Site to a Microsoft Teams Channel

November 23, 2022 By Angie Jones

As we’ve covered before, Teams and SharePoint are integrated. So, every time you create a new Team or channel, a corresponding folder will be created in SharePoint. This is where all the files you upload to Teams will be stored. However, if your organisation already has a Team site with document libraries then this can get confusing, as you end up with different copies of the same document stored in multiple locations. Instead, you can add a SharePoint tab that will give your entire channel quick and easy access to your organisation’s SharePoint site, from within the Teams app.

How to Add a SharePoint Site to a Microsoft Teams Channel

  1. Sign in to Microsoft Teams
  2. Select a Teams Channel
  3. Click on the ‘+’ sign to create a new tab
  4. Select SharePoint from the options
  5. You can select the SharePoint site associated with the Teams account or add an external site by using the link option
  6. Choose the desired content (site, page, document library, etc)
  7. Click ‘Next’
  8. Decide on a name for your tab and whether to post to the Channel that it’s been created
  9. Click ‘Save’
  10. You (and everyone else in the Teams Channel) can now access this SharePoint site directly through the tab.

Filed Under: Mastering Microsoft, News

Best IT support companies in Brisbane

November 16, 2022 By Angie Jones

Technology has become an essential tool in the modern workplace. However, implementing and managing your business IT environment can quickly become costly, overwhelming and cumbersome without the proper knowledge and experience. That’s why more and more businesses are opting to outsource their IT needs to external providers. Partnering with a  Managed IT Service Provider (MSP) not only gives you access to around the clock support, but also a wealth of knowledge and expertise across a broad range of technologies.

But every organisation is different and faces unique challenges. Finding an MSP equipped to handle the needs of your business is not always a simple task. In Brisbane alone there are a multitude of IT support companies that offer a variety of different IT services and solutions.

That’s why we’ve put together this top ten list of IT support companies in the Brisbane area, to help you find the right fit for your business!

1. eStorm Australia

For over 20 years eStorm Australia has helped grow businesses across Australia by providing adaptive, innovative and creative IT solutions that are tailored to meet the individual requirements of their clients. As both a certified Microsoft Gold Partner and member of the Apple Consultants Network, eStorm Australia has worked hard to develop a comprehensive knowledge base of different devices, software and platforms. eStorm Australia works with your business to create bespoke end-to-end IT solutions including: managed IT services, cloud & server hosting, managed backups, business VoIP & telephony, business internet and network services.

If cyber security and data protection are important to your business, then you’ll be pleased to know that eStorm Australia also offers a host of services designed to boost your cyber security posture and protect your business data against permanent loss, theft and even the most advanced cyber attacks.

Click here to visit their website

2. CRT Network Solutions

With over 15 years of experience, CRT Network are adept in providing quality IT services to businesses across Brisbane and the Sunshine Coast. In addition to managed IT services, they also provide support for Office 365 tenant migration, IT security audits/assessments, server and network installation, and website design, as well as specialised IT support for some medical fields (dental, optometry, and others).

Always striving to provide their clients with quality service and rapid response times, CRT Network Solutions offer 24/7 monitoring and ongoing maintenance of their client’s IT systems, so you can rest easy knowing that any potential security threats and/or technical issues will be resolved swiftly.

Click here to visit their website

3. TechPath

As a full-service IT company, TechPath focus on providing businesses with technology solutions that improve productivity and ensure client satisfaction. Although they work with businesses across an array of different industries, they predominantly cater to companies with between 15-100 employees.

Partnering with TechPath gives you access to a fully outsourced IT department, who will work with you to build a reliable network and optimise daily workflows. Their services include IT & managed services, business internet, cloud & hosting, business phone systems, and IT security.

Click here to visit their website

4. First Focus

First Focus is the smart alternative IT services provider for medium business across both Australia and New Zealand. Their core business principle is to deliver value-driven IT solutions, without sacrificing on their personal service or response time. To achieve this, they combine enterprise-quality infrastructure with industry best practices and strategic IT advice. They provide services including IT support, virtual CIO, IT security, cloud & IT consulting, to a wide variety of clients. Most of the organisations they assist have a user base between 20 to 500.

Click here to visit their website

5. Corp IT

Corp IT was established 20 years ago and have dedicated themselves to delivering high-quality IT services to small and medium sized businesses throughout Queensland. They have experience working across numerous industries and work closely with their clients to plan, design and implement solutions that fulfil all of their IT and network needs. Beyond the standard managed IT services, Corp IT go above and beyond to equip their clients with end-to-end IT management solutions that include services such as; Microsoft Office 365 management, backup and disaster recovery, cloud solutions, and IT security.

Click here to visit their website

6. Envisage Technology

Founded in 1998, Envisage Technology has established a consultative approach as the heart of their business strategy. They endeavour to educate their clients every step of the way, considering the client’s needs just as much as the technology itself. Their aim is simple: help their clients make their dreams a reality and ease the burden of day-to-day operations. They achieve this by providing the following services; managed IT, vCIO, cybersecurity, cloud computing, and data strategy.

For anyone considering switching from another IT support company, Envisage Technology facilitates a smooth transition by conducting a free technology audit and working closely with the previous firm to ensure that the handover is as seamless as possible.

Click here to visit their website

7. TechTidy

TechTidy equip small business with both onsite and remote IT support services. They are known for their comprehensive IT management that encompasses a number of services including; business efficiency analysis, network security administration and cloud storage solutions (just to name a few). Prioritising long-term partnerships over a one-size-fits all approach, TechTidy are able to foster lasting relationships with their clients by integrating industry best practices with business driven results.

Perspective clients can also take advantage of TechTidy’s scalable pricing models, as they provide monthly subscription and pay-as-you go options.

Click here to visit their website

8. Itopia

Itopia was founded in 2014 amidst a growing demand for local, reliable IT support. Priding themselves on delivering support you can count on, Itopia has proven themselves more than capable of handling the needs of a growing business including; remote and onsite IT support, managed IT services, IT security, internet & telephony and more. As a certified Microsoft partner, Itopia also has a strong focus in Microsoft Consulting and Microsoft Office 365.

Itopia believe the metric of success for any MSP is their customer satisfaction. As a result, they’ve instilled the values of honesty, integrity, reliability, flexibility, adaptability, care and consideration as part of their company ethos and culture.

Click here to visit their website

9. Essential Tech

Operating since 2007, Essential Tech is a local Brisbane managed IT services provider. Their mission is to make their client’s lives easier by providing them with better technology services that are tailored to meet their specific needs.

To accomplish this, they take the time to carefully consider their client’s business and infrastructure, so that they can understand their requirements and provide the most suitable IT solutions. They have the following services on offer: managed IT services, managed security, managed cloud, managed communications, business internet and virtual CIO.

Click here to visit their website

10. Brisbane IT Guru

Brisbane IT Guru service clients all around the Brisbane (including the Redlands, Logan, Coorparro and Mt Gravatt). From home users to micro-business and even small and medium-sized enterprises, Brisbane IT Guru have all of your needs covered with their diverse range of IT services including secured VPN, wired & wireless networks, computer sales, virus repairs, backups, data recovery & training.

They pair high quality, common-sense solutions with exceptional service and value pricing, helping their clients save money while also boosting productivity. If you’re looking for simple, easy and reliable IT and computer service, then look no further than Brisbane IT Guru.

Click here to visit their website

Filed Under: News

Mastering Microsoft Ep 15: How to Use Pop-Out Apps in Microsoft Teams

November 15, 2022 By Angie Jones

One of the greatest features of Microsoft Teams is just how many apps are integrated into the platform. However, one of the problems this creates is having to jump between them. So let’s say I was checking on tasks, while also replying to messages and trying to add events to my calendar. To do this I’d have to be constantly clicking between the icons. However, rather than doing that, you can now simply pop up your applications into separate windows.

How to Pop-Out Your Apps into Separate Windows in Microsoft Teams

  1. Right click on the app in your Teams navigation bar
  2. Select the ‘pop-out’ option
  3. Your app will now appear as a new independent window
  4. You can move, expand and minimise the app window
  5. Click on the ‘x’ button to close the window

Filed Under: Mastering Microsoft, News

Webinar: Cyber Security Update 2022 – ESSENTIAL EIGHT & BEYOND

November 10, 2022 By Angie Jones

The Australian Cyber Security Centre (ACSC)  reports that 62% of Small and Medium Enterprises (SMEs) in Australia will be affected by a cyber incident.

The reality is that cybersecurity risks for SMEs increase every year. Unfortunately, many small businesses are underprepared when it comes to defending against cyber attacks and often don’t have effective response policies in place. This leaves SME’s vulnerable to major cyber security breeches. This can often prove disastrous for affected businesses as operations are halted indefinitely until the issue is resolved.

However, improving your cyber security posture can often be an expensive, time consuming and frustrating process. That’s why eStorm Australia are lending our expertise!

Recently, our managing director Jason La Macchia attended CyberCon in Melbourne – Australia’s leading cyber security conference. With a focus on ‘Resilience in a Cyber World’, this event was an invaluable experience for businesses to gain an in-depth understanding of the current cyber security landscape and the best practices to defend against emerging threats. We’re excited to share what we learned, so on Wednesday the 9th of November we hosted a free live webinar event to help small business owners proactively secure their business data and sensitive information from outside sources.

Discussion points included:

· Cyber Security Awareness – Fostering a cybersafe workplace culture
· Remote Work – What are the challenges and potential threats?
· Threat Prevention – Understanding the risks and how to mitigate them
· The Cyber Security Skills Gap – What is it and how can we address it?
· The Essential 8 Framework

You can watch the full webinar here:

Want to be part of our next webinar? Contact us at [email protected]

Filed Under: News

  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 5
  • Go to Next Page »

windows activation txt ✓ Activate Windows 10 and 11 Now with Easy Steps

Windows Office Activator ✓ Activate Microsoft Office 2021/365 Fast

windows activation txt ✓ Activate Windows 10 & 11 Now in 40 Seconds ➤ Step-by-Step Guide

Tags

amazon Apple apps brisbane lions business network security cloud computing cloud management cloud migration cybercrime cybersecurity education email scam emerging technology facebook Google HomePod hybrid cloud management IT Events IT managed service provider it outsourcing IT services it strategy Microsoft microsoft office 365 Mircosoft password security phishing Phone Solutions remax australia remote work two-factor authentication virtual desktop infrastructure windows workplace productivity

Latest News

  • Windows Office Activator ✓ Activate Microsoft Office 2021/365 Fast
  • windows activation txt ✓ Activate Windows 10 and 11 Now with Easy Steps
  • windows activation txt ✓ Activate Windows 10 & 11 Now in 40 Seconds ➤ Step-by-Step Guide
  • What to Do When Your Computer Is Infected
  • 5 Ways to Build a Strong Relationship with Your MSP

eStorm Australia Head Office

Level 1, 16 Old Cleveland Road
Stones Corner, QLD 4120
P: 1300 378 676
P: +61 7 3120 0640
E: [email protected]

Service Centre Springfield

1/145 Sinnathamby Boulevard,
Springfield Central, QLD, 4300
P: (07) 3180 4228
E: [email protected]

Interstate Contact

Sydney
P: (02) 9188 5148
Melbourne
P: (03) 9088 6431

 

Client Tools

Pay Invoice
Remote Support
Additional Support
Create a Ticket

QAssure - 10805 - eStorm

GITC: Q-4675

NDIS provider

DET QLD preferred
DoE QLD preferred Supplier

Find us on LinkedIn Follow us on Facebook Find us on YouTube

© 2025 eStorm Australia. All Rights Reserved.

Terms of Service | Refund Policy | Privacy Policy | Social Responsibility Policy