1300 378 676 |
[email protected]
200px wide
  • Corporate Services
    • Managed Cloud Services
      • Private Cloud
      • Hybrid Cloud
      • Cloud Consulting
      • Microsoft SharePoint
      • Microsoft Office 365
      • Power BI
      • Amazon Web Services
      • Microsoft Azure
      • Colocation & Server Hosting
    • Managed Network Services
      • Business Internet
      • Managed Wi-Fi
      • Network Security
      • Private WAN
    • IT Support Services
      • Managed IT Services
      • IT Consultancy
      • Project Services
      • Password Manager
      • Outsource Your IT Department
      • Virtual CIO Services
      • IT Audit & Review
      • Corporate Apple Services
      • Production Studio and Design
      • Mobile Device Management
    • Business Telephony
      • Hosted PBX
      • On-Premise PBX
      • Skype for Business
      • Call Centre Services
    • Hardware and Software Procurement
    • Supported Industries
  • Education Services
  • Case Studies
  • News
  • About Us
    • Why Choose Us?
    • Our Management Team
    • Client Testimonials
    • Partners and Awards
    • Careers
  • Contact Us

Google moves us toward a more secure web

July 17, 2018 By estorm

 

For many years, Google has endeavoured to make a more secure web by recommending that sites adopt HTTPS encryption, as well as helped users understand that HTTP sites are not secure by marking larger subsets of HTTP pages as “not secure”.

Commencing this month, July 2018, with the release of Chrome 68, Chrome will mark all HTTP sites as “not secure”.

Chrome treatment of HTTP pages

Developers have been converting their sites to HTTPS and making the web a safer place for everyone, which has resulted in:

  • Over 68% of Chrome traffic on both Android and Windows now being protected
  • Over 78% of Chrome traffic on both Chrome OS and Mac now being protected
  • 81 of the top 100 sites on the web now using HTTPS by default

Chrome is striving to make the setup and conversion to HTTPS as easy as possible. Mixed content audits are now available to help developers migrate their sites to HTTPS in the latest Node CLI version of Lighthouse. Lighthouse is an automated tool for helping to improve web pages. The new audit in Lighthouse helps developers locate the resources a site loads using HTTP, and which of those are ready to be upgraded to HTTPS by simply changing the subresource reference to the HTTPS version.

The new Chrome interface will help move the web towards a secure HTTPS web by default by helping users understand that all HTTP sites are not secure. HTTPS unlocks both performance improvements and powerful new features that are too sensitive for HTTP, all while being cheaper and easier than ever before.

Developers can view Google’s set-up guides here to get started.

If you have any security or network concerns, you can learn more about what network security is and the benefits of securing and monitoring your network.

 

eStorm Australia is an IT managed service provider headquartered in Brisbane. We partner with your business and provide IT solutions and services that suit your specific requirements. Our solutions include a variety of services that are critical to overall business success and competitive advantage.

If you need any information, or to find out exactly how we can help your business – contact us anytime on (07) 3120 0640 or email us at [email protected]. If you are located outside of Brisbane: Sydney: (02) 9188 5148 – Melbourne: (03) 9088 6431.

In need of our other IT support and managed services? We specialise in Managed Cloud Services, IT Support Services, Managed Network Services, Business Telephony, Hardware and Software Procurement and Education Services.

 

Source: https://security.googleblog.com/2018/02/a-secure-web-is-here-to-stay.html

Filed Under: News Tagged With: chrome 64, chrome 68, chrome changes, chrome OS, Google, Google moves us toward a more secure web, HTTP, HTTPS, HTTPS for developers, HTTPS for web developers, lighthouse, new google chrome, node CLI, safe web, secure web, upgrade to HTTPS

How to Submit a Great Support Ticket

June 29, 2018 By estorm

Imagine you’re going about your work day, everything’s humming along and you’re getting stuff done. All of a sudden, you run into a roadblock with your Office 365 or Outlook and your productivity is halted in its tracks. It might be that you’ve run into a totally new behaviour or bug that you’ve never seen before, or maybe you’re not entirely sure if you’re using a particular tool in the most efficient way. What’s your next step?

That’s where we enter the picture. We’re here to help you and we want to ensure we’re delivering as valuable of a service to you as possible. Regardless of how you choose to reach out to us—whether by phone or email—there are certain pieces of information that our Support Engineers love seeing in a ticket. These are the bits of information that help us to address your case in the most complete and efficient manner possible.

Subject Line

The subject line is important because it uniquely identifies and conveys your issue so that we know where we’ll need to start troubleshooting. The perfect subject line is a clear and general description of the issue that has occurred, which also includes what machine or device you’re using.

Example: Outlook not sending emails on Mac

Body

Greeting & name

It’s always nice to kick things off with a friendly hello and a name so we know who we’re helping.

Computer name or number (if known)

This information won’t be applicable to all businesses and if you don’t know it that’s perfectly fine as well.

Machine / device

Including what type of machine—such as Mac or PC—or device you’re experiencing the issue on allows us to assign the right Support Engineer to deliver the best result.

Description of the issue with steps you might have tried

Information will vary from case to case, but a good way to approach this part of the ticket is to describe what you expected to happen and then what actually happened. The expectation part is likely to be more detailed than what actually happened, but that’s okay! We’re looking for whatever general details you can provide on the behaviour you’re seeing and on steps you may have already taken to troubleshoot the issue.

Example: Marketing is trying to send an email to salespeople when a contact is assigned to them. All of the other salespeople are receiving emails fine, but they aren’t arriving for me. I have checked in the SPAM folder, but the emails aren’t there either. Why aren’t these emails coming through?

Whenever possible, our team looks for specific examples of the obstacle you’re running into. If we can find evidence of that issue at hand (or if we can recreate the behaviour you’re seeing), that gives us a great starting point for troubleshooting. The more specific you can get, the better. If you’re submitting an email ticket, consider attaching screenshots.

Contact number 

Including a contact number for our Support Engineer to contact you during the resolution process helps with timely resolutions, particularly in certain instances where remotely accessing your computer may be necessary.

 

When we put all the information together into a single ticket and finish it with a focused question, we can see a full picture of the case. With that information, the Support Engineer is able to accurately and effectively address and rectify the issue quickly.

At eStorm, we’re constantly looking for ways to pre-empt potential user questions, but there will always be a need for a live support channel to handle these unexpected roadblocks. By using the above advice you can ensure that you get back into action as quickly as possible.

support ticket sent

 

IT Support Services Brisbane

Headquartered in Brisbane, we provide tailored IT support services to suit your specific requirements. No matter the size of your organisation, our solutions include a variety of services that are critical to the successful delivery of business IT support.

Our Managed IT Support Services include Managed IT Services, Outsource Your IT Department, Mobile Device Management, IT Consultancy, Corporate Apple Services, Project Services, IT Audit and Review, Virtual CIO Servicesand Production Studio and Design.

If you’d like any further information, or to find out exactly how we can help your business – please feel free to call us on (07) 3120 0640 or email us at [email protected]

If you are located outside of Brisbane, eStorm can still help you.
Sydney: (02) 9188 5148
Melbourne: (03) 9088 6431

In need of our other IT support and managed services?

We specialise in Managed Cloud Services, IT Support Services, Managed Network Services, Business Telephony, Hardware and Software Procurement and Education Services.

Filed Under: News Tagged With: get the most out of your IT support provider, getting the most out of your support ticket, how to submit a great support ticket, how to submit a support ticket, how to submit an IT support ticket, IT support australia, IT support brisbane, managed it support brisbane

Slow internet results in a significant cost to employers

June 29, 2018 By estorm

We all know how important a great Wi-Fi connection is these days – but just how much can a sluggish connection affect your business? Studies show that for every $13,291 worth of salary, disengaged employees account for a $4,520 cost to their employer. However, a study by the Economist Intelligence Unit found that those who were untethered and connected to fast and reliable Wi-Fi via a device created a significant boost in productivity for the business.

More specifically:

  • 16% boost in productivity
  • 18% boost in creativity
  • Increase in job satisfaction of 23%
  • Increase in company loyalty of 21%
  • Employees felt more empowered
  • Employees felt more autonomous within their working practices

Over a 40-hour week, a 16% boost in employee productivity makes up an accrued total of an extra 6.4 hours per week, which translates into a total efficiency saving for employers of 41 working days per year per employee.

So – what’s the solution to improving your internet speeds and coverage? At eStorm we use Ubiquiti UniFi AC access points.

First of all.. What is an access point?

An access point is a device that creates a wireless local area network, or WLAN. An access point connects to a wired router, switch or hub via an Ethernet cable and projects a Wi-Fi signal to a designated area. For example, if you wanted to have Wi-Fi access in your reception area but don’t have a router in range, you can install an AP (access point) in the reception area and run an Ethernet cable through the ceiling that runs back to the router / server room.

The access point is used in conjunction with a router to extend the wireless coverage around your home/business. Coverage to “dead spots”, distant rooms or other floors would be significantly improved. You might be asking – why not use a range extender? Range extenders are great for home Wi-Fi networks, however they just don’t cut it for modern businesses. Range extenders can only support a limited number of devices at a time. Concurrently, while range extenders increase the coverage of the Wi-Fi router, they do not increase its available bandwidth. Depending on the number of devices connected simultaneously, a range extender could weigh down your entire connection.

Conversely, access points can handle a significant number of simultaneous connections, as well as allowing users to freely roam without experiencing network interruptions. As you move through your building, your device shifts seamlessly from one AP to the next without dropping the connection. Other advantages of using access points include:

Business-grade access points can be installed anywhere you can run an Ethernet cable with newer models being compatible with Power over Ethernet so there is no need to run a separate power line or install an outlet near the access point.

Captive Portal and Access Control List support, so you can limit guest access without compromising network security, as well as easily manage users within your Wi-Fi network. Select access points include a Clustering feature—a single point from which the IT administrator can view, deploy, configure, and secure a Wi-Fi network as a single entity rather than a series of separate access point configurations.

Why Ubiquiti UniFi AC Access Points?

eStorm how to improve workplace productivity ubiquiti wifi unifi ac ap

 The Ubiquiti UniFi AC Access Point delivers wireless coverage, indoors or outdoors, in high-density deployments requiring low latency and high up-time performance. Available in five models, the new UniFi AC Access Point delivers the throughput needed for bandwidth-intensive applications, including HD streaming, large file transfers and cloud services with up to 5x faster speeds.

The UniFi Wi-Fi system combines enterprise performance and unlimited scalability. You can build wireless networks as big or small as needed all while maintaining a single unified management system. Easily accessible through any standard web browser and the UniFi mobile app (iOS or Android), the central management controller software to configure and manage your access points is easy-to-learn with a simplified user interface. This allows you to quickly configure and administer an enterprise Wi-Fi network without the need for special training or knowledge.

One of the best things about using these units is the RF environment functionality to detect and troubleshoot any nearby interference, analyse radio frequencies, choose optimal access point placement and configure settings. This allows you to identify deadspots and other areas where your Wi-Fi might be lacking in order to fix them and deliver the best results possible.

 ubiquiti rf and management business internet
The reality is that domestic level Wi-Fi access points just don’t cut it in a work environment anymore. Enterprise level access points offer features that consumer grade APs simply cannot deliver, such as:
  • Superior security features
  • Exceptional reliability
  • Redundancy
  • Greater flexibility
  • The ability to scale

Learn more about eStorm’s business internet and how we can help solve your speed and connectivity issues. Specialising in managed network services, we understand the importance of reliable, secure and optimised communication. If you’re looking to improve, overhaul or optimise your current business network technologies or internet services, our specialists are here to help. Give us a call any time on (07) 3120 0640 to discuss how we can help improve your business’ network coverage, or email us at [email protected]

Filed Under: News Tagged With: AP, business internet, business wifi, corporate internet, corporate wifi, increase job satisfaction, ubiquiti unifi ac access point, ubiquiti wifi access point, untethered workplace, wifi access point, workplace creativity, workplace internet, workplace productivity, workplace wifi

IP-PBX (VoIP) vs Traditional PBX Phone Solutions: Which Is Best?

May 22, 2018 By estorm

As today’s business environment is so highly dependent upon greater connectivity amongst stakeholders, vendors, customers, staff members and supervisors – as well as small businesses often succeeding or failing based on the effectiveness of their communications systems – being dependent upon traditional phone companies for technology and service is often an expensive, time consuming and tedious process.

As a result, many businesses find themselves in the predicament of whether or not they should commit to upgrading to a VoIP phone solution (and then whether that should be hosted or on-premise) versus continuing to use a traditional PBX phone system. To make a decision that’s right for you you need to have a clear understanding of traditional PBX, as well as hosted and on-premise IP-PBX (VoIP).

Traditional PBX

Traditional copper based non-VoIP PBX is coming to the end of its life cycle with more copper services being turned off each day.

The main issues with a traditional PBX phone systems are:

  • More expensive call costs
  • Line rentals
  • Traditional PBX systems are based on an increasingly obsolete technology, which results in the limiting of features
  • Limited integration
  • Clunky interfaces making navigation needlessly difficult and time consuming
  • Minimal reporting
  • Lengthy contracts
  • Expensive maintenance contracts attached
  • Poor resale value
  • Limited functionality as you are locked into what was originally purchased
  • Expensive upgrade costs, such as adding additional phone lines
  • Increased running costs as traditional PBX units are a draw on power

Upgrading to an IP based phone system is now more important than ever before – but which solution is right for you? Hosted PBX or On-Premise PBX?

PBX Phone System eStorm Australia PBX Brisbane

Hosted PBX

Hosted PBX or Hosted VoIP, also known as a Virtual PBX, is an Internet phone system or private branch exchange (the private telephone network used within a company to make and receive phone calls outside of the business) delivered as a hosted service. This means that the provider is responsible for housing the IP-PBX (Internet Protocol Private Branch Exchange), as well as maintaining and managing the technology required to provide the services to the phone system.

How it works

At the user level, an employee’s IP desk phone connects to a router where the calls, signalling and features all run through an IP-PBX server based at the service provider’s location. A monthly fee is typically paid for this service, with businesses having the ability to add and remove features as and when they are needed, which provides a significant degree of flexibility.

The advantages:

  • The third party provider is responsible for running, managing and upgrading the Hosted PBX
  • A significant reduction in installation, operation and maintenance costs
  • No training or speciality knowledge required for running the phone system or adding extensions etc., as the PBX provider maintains the system
  • Scalable with your business
  • Superior integration – including CRM integration
  • Simple addition of extra lines
  • Low monthly service cost
  • Outsourced maintenance
  • Extended features, like conferencing (may come with additional costs)
  • Highly flexible – this includes month-to-month payments to avoid lock in, as well as being able to transfer office extensions to mobile
  • Potential to reduce telephone costs by up to 80% by leveraging SIP trunks, WebRTC, free calling to remote extensions and reducing the number of telephony lines
  • Superior call quality when paired with the right internet connection
  • PBX housed in a data centre environment could see an increase in efficiency and stability, as data centres are specifically equipped with cooling and other infrastructure to house them

The disadvantages:

  • Connections and voice quality are as a result of the Internet connection
  • Loss of power or internet results in loss of phone service, however calls can be routed to voice mail and cell phones
  • Customisation of features are limited to what the provider offers

We recommend utilising a Hosted PBX solution for businesses with 1-50 employees.

Learn more about Hosted PBX / IP PBX systems and solutions.

Hosted VoIP PBX phone system Brisbane

On-Premise PBX

On-Premise PBX offers all the same benefits as a hosted PBX solution (including management of your system), with the only real difference being that your PBX system resides at your location instead of at the providers location.

This has its benefits:

  • Monthly fees can be cheaper due to using your own infrastructure
  • On-Premise PBX makes more sense in terms of efficiencies for larger and more complex use cases and environments

The disadvantages:

  • Loss of power or internet results in loss of phone service
  • Technical issues may require a qualified technician onsite, which can be subject to availability and scheduling
  • Can lead to an increased power bill depending upon the size of the environment

We recommend utilising an On-Premise PBX solution for businesses with over 50 employees.

Learn more about On-Premise PBX systems and solutions.

If you’re looking for a hosted or on premise PBX phone system provider, you can find our Hosted PBX solutions here and our On-Premise PBX solutions here. If you’d like any more information or assistance, please feel free to call us at any time on (07) 3120 0640 or email us at [email protected]

Filed Under: News Tagged With: cloud pbx, cloud pbx brisbane, hosted pbx, How it works - Virtual PBX hosted phone system, IP PBX, IP PBX Brisbane, on premise pbx, on premise pbx brisbane, PBX, private branch exchange, sip trunking, virtual pbx, VoIP, What are the benefits of an IP PBX system?, what are the benefits of on premise pbx, What is a virtual PBX Phone System and how does it work?, What is required to run an IP PBX, What's the difference between on-premises and Cloud PBX?

CeBIT Australia 2018

May 16, 2018 By estorm

CeBIT Australia is the focal point for the Asia Pacific business and technology industry comprised of both an exhibition – for organisations to showcase their solutions and capabilities to a domestic and international audience of decisions makers for enterprise, SMEs and government – and conference – where attendees are able to maximise their learning and networking opportunities with captains of industry, who cover cloud computing, big data and analytics, cyber security and eGovernment.

eStorm at CeBIT Aus 2018 NSW Business Booth

CeBIT Australia 2018 provides a wealth of knowledge from many highly regarded representatives in tech and business, such as the Country Director for Google Cloud Aus and NZ, Global Senior Director of Social Media for Lego, CEO and Managing Director of Yamaha, CTO of TOLL, the Head of Aus and NZ from Stripe, Executive Director and Head of Emerging Tech of CommBank, CEO of Airtasker, CEO of Yahoo, Google’s Managing Director for Aus and NZ, BHP Global Information Security Officer, AGL’s CTO and the COO of Telstra just to name a few, as well as many other highly regarded representatives of tech and communications companies, banks and government departments.

Coupled with the 250+ exhibitions, which include organisations of all sizes and disciplines, from startups, to big data, communications, software, hardware, education, security and cloud, CeBIT Australia 2018 really showcases the best of business and tech in the Asia Pacific region.

This is the kind of thing we get really excited about – events like CeBIT Australia provides us with even more learning opportunities, as well as a wealth of information and solutions that we’re able to take directly to our clients in order to help them grow, remain competitive and solve their industries most difficult problems. We love to keep our finger on the pulse and immerse ourselves in the exciting current and future developments in tech so we are able to better serve our clients and help improve their businesses.

eStorm at CeBIT Aus 2018 Future Tech Stage

Filed Under: News Tagged With: AI and the future of tech, analytics, big data, CeBIT, CeBIT Australia, CeBIT Australia 2018, cloud, communications, education, estorm australia, hardware, IT, security, software, tech and business conference, tech and business panels, tech conference australia, technology conference australia, the role AI will play in business

Public Cloud vs Private Cloud vs Hybrid Cloud – Which Is Right For You?

May 8, 2018 By estorm

Cloud computing is the delivery of computing services, infrastructure and resources via the internet, with deployment options including public, private and hybrid cloud.

What is a Public Cloud

Public clouds are the most common when it comes to setting up cloud computing. The cloud resources, such as servers and storage, are owned and operated by a third-party cloud service provider, which is then delivered via the internet.

All hardware, supporting infrastructure and software is owned and managed by the cloud provider as, in a public cloud, all hardware, storage and network devices are shared with other organisations aka cloud tenants.

Public cloud services are frequently accessed via a web browser and most commonly provide web-based mail, online office applications, storage and testing and development environments.

Public cloud advantages include:

  • Lower costs – due to not being required to purchase hardware or software
  • No maintenance as the service provider is responsible for maintenance
  • Close to unlimited scalability
  • Increased reliability

What is a Private Cloud

A private cloud is comprised of computing resources used exclusively by a single business or organisation. Private Cloud is a secure and high performance solution available for businesses seeking the added resilience of having their infrastructure, servers and storage housed within a secure data centre environment. We discovered that many businesses prefer not to operate in a multi-tenant and public cloud environment because of internal policies, industry compliance legislation or just personal preference.

The infrastructure and services in a private cloud are always maintained on a private network where the hardware and software is specifically dedicated to a single organisation and a single organisation only. This allows organisations to tailor their resources to meet their exact requirements.

Private clouds are most commonly utilised by organisations with business-critical operations who seek a greater level of control over their environment.

Private cloud advantages include:

  • Greater security
  • Increased flexibility
  • High levels of customisation
  • Increased scalability
  • Greater efficiency

Learn more about eStorm’s Private Cloud solutions and what Infrastructure as as Service (IaaS) is.

What is a Hybrid Cloud

Hybrid clouds offer a combination of on-premise infrastructure with cloud based services in order to maximise the benefits of both solutions.

A complete cloud solution isn’t always the right solution for all businesses as there can be limiting factors, such as poor internet access that limit the benefits of moving all your IT infrastructure and applications to the cloud.

Hybrid cloud solutions are tailored to provide you with the best of both worlds. Experience the benefit of on premise IT resources whilst still maintaining some of the benefits of a full cloud solution such as anywhere access, full redundancy and disaster recovery

Hybrid cloud advantages include:

  • Flexibility
  • Control
  • Cost-effectiveness
  • Easy transition

Overall Benefits

All 3 methods for deployment provide similar benefits, which include:

  • cost-effectiveness
  • performance
  • reliability
  • flexibility
  • scale

Learn more about eStorm’s Hybrid Cloud solutions and why a complete cloud solution isn’t right for all businesses.

Still not sure which is the right solution for you? Or perhaps you’re undertaking some cloud changes and could use some guidance to be certain you’re making the right decision – you can learn more with eStorm’s Cloud Consulting services. If you’d like any further information please contact us on (07) 3120 0640 or email us at any time [email protected]

Sources:
eStorm Hybrid Cloud
eStorm Private Cloud
Microsoft Cloud

Filed Under: News Tagged With: benefits of cloud computing, benefits of the cloud, cloud computing, cloud infrastructure, cloud management, cloud providers, cloud service providers, cloud services, cloud solutions, cloud storage, hybrid cloud services, IaaS, managed cloud services, private cloud services, public cloud services, what is the hybrid cloud, what is the private cloud, what is the public cloud

Windows 7 user? Why you desperately need to upgrade

May 1, 2018 By estorm

According to NetMarketShare’s January 2018 data, 42.39% of users are still using Windows 7, even though on January 13, 2015 Microsoft discontinued mainstream support for Windows 7. This meant that they no longer provided non-critical security updates, design changes or complimentary support for the operating system to end users.

Now the discontinuation of extended support also draws near. On January 14 2020, Microsoft will discontinue extended support for Windows 7, which means they will no longer provide updates, bug fixes or paid support for businesses using the operating system. This date announcement is important as it gives businesses that are still running Windows 7 the opportunity to upgrade to Windows 8.1 or Windows 10 (Windows 10 is the recommended upgrade as it is Microsoft’s latest OS and is still within the 5 year mainstream support period).

Why should I upgrade?

There are several risks in not upgrading your OS once the extended support ends.

Malware

Malware, which is software that is specifically designed to disrupt, damage, or gain authorized access to a computer system, is particularly pernicious. When Microsoft discontinues extended support, systems running Windows 7 will become significantly vulnerable to un-patched security risks within the OS and applications it runs. This means that upgrading will become essential to remain protected against the massive amount of malware samples that hit the web each day, not to mention the billions of malware samples that already exist.

Ransomware

Ransomware, a type of malicious software designed to block access to a computer system until a sum of money is paid, is another significant concern – particularly following 2017’s WannaCry attack and the various ransomware attacks that followed.

The WannaCry ransomware attack was a May 2017 worldwide cyberattack by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in Bitcoin. It propagated through EternalBlue, an exploit in older Windows systems. While Microsoft had released patches previously to close the exploit, much of WannaCry’s spread was from organizations that had not applied these, or were using older Windows systems that were past their end-of-life.

Thankfully the attack was stopped within a few days of its discovery due to emergency patches released by Microsoft, and the discovery of a kill switch that prevented infected computers from spreading WannaCry further. However, the attack was estimated to have affected more than 200,000 computers across 150 countries, including businesses, universities, hospitals, banks and police with total damages ranging from hundreds of millions to billions of dollars.

While it is important to note that upgrading your OS to the latest versions and keeping patches up-to-date does not make you invulnerable, it is always best to maximise your defences as unpatched systems are vulnerable.

If you’d like to find out how we can help your business, or if you require any further information, assistance with your IT needs or you simply don’t know where to start – please feel free to call us on (07) 3120 0640 or email us at [email protected]

Filed Under: News Tagged With: estorm australia, malware, ransomware, wannacry, why you should upgrade, why you should upgrade from windows 7, why you should upgrade to windows 10, windows 10, windows 7, windows 7 end of life cycle, windows 7 extended support, windows 7 mainstream support, windows 8

How to create a strong password that’s easy to remember (with examples)

April 20, 2018 By estorm

eStorm's Guide for How to Create a Strong Password

It goes without saying that a strong password is important for your on and offline security—both at home and at work (especially given the new Australian data notification legislation put in place earlier this year, which could see businesses and other organisations fined up to $1.8million for data breaches, unauthorised access to personal information and the loss of data). And we all know our passwords, in most cases, are our first line of defence. However, cyber security insight reports show we have a long way to go when it comes to using passwords effectively.

Nearly one in four (24%) people surveyed use the same password for all accounts. This statistic is of significant concern as passwords remain the most common, and in most cases the only, form of protection used by Australians for our devices. A recent Western Australian government security audit found that 26% of its officials had incredibly weak and easily guessable passwords (more than 5,000 passwords across 17 government agencies included the word “password”).

What makes a strong password?

The traditional password advice follows a fairly simple formula. You’re typically asked to create a password with a minimum of 12 characters, as well as being sure to include numbers, symbols, capital letters and lower-case letters. Likewise, you’re also encouraged to changed your passwords frequently in order to maintain a secure first line of defence for your accounts and applications.

However, contrary to popular belief, using a mixture of uppercase and lower case letters, symbols and numbers, as well as enforcing frequent password changes, has repeatedly shown to be counterproductive to good password security. Over time these traditional password security practices have become commonplace and predictable, therefore making them fairly unreliable and certainly not the safest option when creating a new or strong password.

A good password should contain at least 10 characters with an un-guessable combination of words. Using a phrase with multiple words helps memorisation but remains difficult to guess or crack. A simple rule of thumb is the longer the password the harder it is to hack. Likewise, it goes without saying that you should never share your passwords, or use the same password across multiple accounts, because if one gets hacked the rest become vulnerable.

Strong password examples:

  • purple cabbage rabbit
  • graceful elephant dance2
  • redbull mobile bottle1

A great tool for testing strong password ideas is How Secure Is My Password. However, it is worth noting that exact passwords entered into the site should not later be used as the security of that specific password can no longer be guaranteed. Tools like How Secure Is My Password should only be used as a rough guide for strong password idea testing.

Trying to remember your password for every website, portal, tool and piece of software is borderline impossible—particularly in a work setting where the average enterprise uses 91 services! With programs and services like Skype, Slack, OneDrive, Dropbox, Social media channels, CRM, marketing and sales software, account keeping programs, your online store, website, mail client—the list goes on and on. With more accounts than you can possibly recall, how are you supposed to remember strong, unique passwords for all of them? The simple answer is you can’t—which is why we recommend using a password manager.

A password manager is an application that creates, remembers, securely stores and automatically fills in your passwords for you. A password manager can be incredibly beneficial for any business that wants to boost security, simplify the on-boarding and off-boarding process (did you know that a SailPoint Market Report discovered that more than 2 in 5 employees reported having access to a variety of corporate accounts after leaving their last job!), as well as help employees manage their passwords more effectively. A password manager is a convenient and practical option to help reduce the chance of falling victim to cyber crime that could result in a data breach.

If you’d like to find out how we can help your business with password management, just ask us about eStorm Secure any time on (07) 3120 0640 or email us at [email protected]

You can learn more about why your business needs a Password Manager as well as eStorm’s approach to multi-layered security.

For over 15 years eStorm Australia has been partnering with business, education and government as their trusted Managed IT Services provider, IT Support and single source supplier. Our team of specialists deliver superior on-site and remote IT services tailored to suit your specific requirements.

Call us today on (07) 3120 0640 or email us at [email protected].

Filed Under: News Tagged With: best password creation, cyber crime, how to create a good password, how to create a safe password, how to create a secure password, how to create a strong password, how to create a strong password and remember it, how to create a strong password that's easy to remember, is my password good enough, national data breach scheme, password, strong password, strong password examples

What is AWS (Amazon Web Services) and How Can Your Business Benefit?

April 10, 2018 By estorm

What is Amazon Web Services

Amazon Web Services, or AWS, is a secure cloud services platform that offers computing power, database storage, content delivery, deployment tools and other functionality solutions that can increase your businesses flexibility and reliability while maintaining agility, lowering your IT costs, and scaling your applications.

From data warehousing to deployment tools, directories to content delivery, over 50 services are available at the click of a mouse with AWS.

Deep features such as a wide range of database engines, server configurations, encryption and powerful big data tools enable you to stay focused on your core business, and not on gathering infrastructure.

How can your business benefit?

AWS is as complex as it is powerful and there are several different solutions that can be tailored for specific cloud environments.

When used correctly, AWS can deliver greater flexibility within your business, which is why we recommend utilising the expertise of IT professionals to help you choose the right instances and tools for your applications. For example, eStorm can design redundant and secure environments as well as manage your migration and optimise your deployments.

Learn more about eStorm’s AWS support.

Rightsized for Your Size

AWS solutions can be scaled to your business needs via tailored solutions for small, medium and large corporations. Our solutions are specifically aimed at providing maximum value and cost effectiveness for your AWS environment. 

Focus on Your Applications in AWS — Not Your AWS Infrastructure

Your applications are key to the running of your business, however monitoring performance and tracking costs at the application level within AWS often requires a resource-draining effort. From architecture to monitoring, we focus and drill down on individual applications and not merely AWS infrastructure.

One option we provide is a monthly report card that delivers you the relevant data required to keep costs in line with your business objectives.

Customised Control: The Right Way to do Managed AWS

Our approach to AWS allows for custom managed services delegation. This means that if you want to keep some AWS tasks in-house, we are able to facilitate that. Alternatively, you are can unburden yourself and put it on our plate, from infrastructure management to the convenience of having us as a single billing contact for all your AWS services. Our mission is to lighten your load and give you back the time needed to innovate and grow your business with the assurance that you’re always in control.

Hybrid — The Future is Flexible

Our comprehensive portfolio of infrastructure solutions gives you the agility to optimise architecture as your workloads, security concerns and compliance requirements evolve. Moving to a hybrid solution can simultaneously optimise AWS deployment performance and contain costs.

If you’d like to find out exactly how we can help your business, or if you require any further information, assistance with your IT needs or you simply don’t know where to start – please feel free to call us on (07) 3120 0640 or email us at [email protected]

Filed Under: News Tagged With: amazon, amazon cloud, amazon cloud computing, amazon cloud services, amazon web services, aws, aws IT infrastructure, aws summit, cloud computing, cloud environment, cloud services, hybrid cloud, IT services, it services brisbane, managed IT services brisbane, managed services

How To Remove Companies Who Can Access Your Facebook Profile

April 6, 2018 By estorm

In the wake of the Cambridge Analytica scandal, Facebook has now listed all the companies that you have given access to your profile information in one convenient location.

You might have taken a Facebook quiz, or logged in via Facebook connect instead of creating a new account on a website, or even given a company access to your information for a giveaway – even if that was years ago, they still have access to your information today.

You might not think this is a big deal, but it’s important to keep in mind how much Facebook knows about you. Facebook knows your relationship status, political leanings, interests and so much more! This information is still available to any company you’ve given permission to access your profile.

So lets do a profile purge shall we?

Step 1. In your Facebook app, tap the stacked lines, also known as the hamburger icon, in the bottom right hand corner

How To Remove Companies Who Can Access Your Facebook Profile walk through step 1

Step 2. Scroll down to Settings & Privacy

How To Remove Companies Who Can Access Your Facebook Profile walk through step 2

Step 3. Select Account Settings

How To Remove Companies Who Can Access Your Facebook Profile walk through step 3

Step 4. Scroll down and tap on Apps

How To Remove Companies Who Can Access Your Facebook Profile walk through step 4

Step 5. Tap on Logged in with Facebook

How To Remove Companies Who Can Access Your Facebook Profile walk through step 5

Step 6. Here are all the companies you have given access to your profile. Select and remove the ones you no longer wish to have access.

How To Remove Companies Who Can Access Your Facebook Profile walk through step 6

 

If you’d like any further information, assistance with your IT needs or you simply don’t know where to start – please feel free to call us on (07) 3120 0640 or email us at [email protected]

Filed Under: News Tagged With: cambridge analytica, facebook, facebook analytics, facebook cambridge analytica, facebook data, facebook data scheme, How To Remove Companies Who Can Access Your Facebook Profile, how to stop companies from having access to your facebook

  • « Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Next Page »

Microsoft Surface Pro 7. Is it worth the upgrade?

high performance and strategy

The 3 keys to high performance & cost savings with IT

a framework for emergent technology

A Framework for identifying and assessing emergent technology

Tags

Apple Apple Apps AR Azure business cloud computing cloud services coding digital education digital learning education estorm australia Google how to IOS ipad iPhone IT it outsourcing brisbane IT services it support IT support brisbane Mac malware managed it services managed IT services brisbane managed service providers managed services Microsoft microsoft office microsoft office 365 NBN NEW iPad office 365 outsourcing ransomware redlands college security STEAM strong password virtual reality VoIP VR windows windows 10

Latest News

  • Microsoft Surface Pro 7. Is it worth the upgrade?
  • The 3 keys to high performance & cost savings with IT
  • A Framework for identifying and assessing emergent technology
  • What we can learn from the Baltimore services hack
  • The 5 Key Areas of Efficient Cloud Management

Contact Details

Head Office – Brisbane

eStorm Australia
Level 1, 16 Old Cleveland Road
Stones Corner, QLD 4120
PH – (07) 3120 0640
Fax – (07) 3120 0641

Interstate Contact Details

Sydney – PH: (02) 9188 5148
Melbourne – PH: (03) 9088 6431

Latest News

  • Microsoft Surface Pro 7. Is it worth the upgrade?
  • The 3 keys to high performance & cost savings with IT
  • A Framework for identifying and assessing emergent technology
  • What we can learn from the Baltimore services hack
  • The 5 Key Areas of Efficient Cloud Management

Client Tools

Pay Invoice
Remote Support
Additional Support
Create a Ticket

QAssure - 10805 - eStorm
GITC: Q-4675
Terms of Service
Refund Policy

Brisbane Lions Official Sponsor Logo eStorm

© 2019 eStorm Australia. All Rights Reserved.