200px wide
1300 378 676
+61 7 3120 0640
[email protected]
CONTACT US
CALL US
CONTACT US
  • Corporate Services
    • IT Support Services
      • Managed IT Services Brisbane
      • IT Consulting
      • Outsource Your IT Department
      • IT Audit & Review
      • Project Services
      • Virtual CIO Services
      • Corporate Apple Services
      • Mobile Device Management
      • IT Support Brisbane
      • IT Support Sydney
      • IT Support Melbourne
    • IT Cyber Security Services
      • Managed Security Services
      • ISO 27001 Services & Consulting
      • IT Cyber Security Audits & Assessments
      • Information Security Management
      • RFFR & DESE ISMS Services
      • The Essential Eight Framework
    • Managed Cloud Services
      • Private Cloud
      • Hybrid Cloud
      • Cloud Consulting
      • Microsoft SharePoint
      • Microsoft Office 365
      • Power BI
      • Amazon Web Services
      • Microsoft Azure
      • Colocation & Server Hosting
      • Cloud Backups
    • Managed Network Services
      • Business Internet
      • Managed Wi-Fi
      • Network Security
      • Private WAN
    • Business Telephony
      • Hosted PBX
      • On-Premise PBX
      • Microsoft Teams
      • Microsoft Teams Calling
      • Call Centre Services
    • Hardware and Software Procurement
    • Supported Industries
  • Education Services
    • Education Device Procurement & Technology in Schools
    • IT Support for Education Services
    • Mobile Device Management for Schools
    • Professional Development for Teachers
    • Apple Solution Expert
  • Case Studies
  • News
  • About Us
    • Why Choose Us?
    • Client Testimonials
    • Partners and Awards
    • Careers
  • Contact Us

Mastering Microsoft Ep 5: How to Update Your Microsoft Account Security Information

May 18, 2022 By Angie Jones

In the event of an account-related support issue, Microsoft will use your security information to help rectify the problem. For this reason, it is important that you set up at least one additional sign in method by adding an alternate email address and/or phone number to your account. This way, Microsoft can send you a security code through one of these channels to verify your identity if you’ve forgotten your password. It also helps to protect your private information in the event someone else tries to access your account.
Your security information should always remain up to date. For example, if you get a new phone number or lose access to your alternate email address, then your security information should be updated to reflect these changes.

How to Update Your Security Information

  1.  Open internet browser
  2.  Go to www.office.com
  3.  Sign in to your Microsoft Account
  4.  Click on your profile icon in the top right corner
  5.  Click on ‘view account’
  6.  Click on ‘update info’ in the Security info panel
  7.  To forcefully sign out any devices currently signed in to your Microsoft account, click on ‘sign out everywhere’
  8.  To add an email or phone number, click on ‘+ add sign in method’
  9.  You’ll be asked which method you’d like to add, choose email or phone number from the drop down menu and click ‘add’
  10.  Enter email address or phone number
  11.  A verification code will now be emailed or texted to you
  12.  Enter verification code

Filed Under: News

iPads in Schools: What are the Benefits?

May 12, 2022 By Angie Jones

Technological advancements impact the way we do a lot of things, including how we learn. Whether we like it or not, classrooms are embracing the digital era, replacing blackboards with smart boards and books with tablets. A favourite amongst educators and students, iPads are becoming increasingly integral to school curriculums. They boost student engagement, foster better learning outcomes and improve digital literacy skills. With over 15,000 education apps in the Apple App Store that cater to students of all ages and encompass knowledge across a variety of academic disciplines, iPads are a valuable resource that augment the learning experience. The iPad is now an essential tool in modern teaching, and it’s not hard to see why.

11 Benefits of Using iPads in Schools

1. No Student Left Behind

Every student is unique, learning at different paces and in different ways. It can be challenging, if not impossible, for educators to craft lessons that cater to each students individual needs. iPads can help bridge this gap, so no child is left behind. Through the use of iPad devices, students can engage with the content at their own pace, in a way that makes sense for them. For instance, visual learners may prefer to watch instructional videos, while others may choose to work through practice scenarios for a learn by doing approach. iPads are also designed for versatility, whether you choose to use the touch screen, or connect an external keyboard for a more traditional laptop setup. This allows students to work in a way that is comfortable for them, making it a great learning tool for students with special accommodations. The ability to customise the learning experience is one of the greatest advantages of using iPads in the classroom, as it ensures that each student has the support, tools and resources they need to succeed.

2. Easy to Use

iPads are one of the easiest technological devices to pilot. The operating system is far more simplistic and straightforward than laptops and desktop computers. They’re so intuitive that even toddlers can use them! The interactive multitouch display and all-in-one components make it easier for students to take a hands-on approach with their learning. For children who lack motor skills, this is particularly advantageous as they often have difficulty manoeuvring between a keyboard, mouse and screen.

3. A Library of Resources

Who needs the library when you have one at your fingertips? The days of digging through hundreds of books for information are over! Thanks to the internet, all it takes is a couple of taps and students have access to a plethora of Open Educational Resources (OER) including books, journals, videos and websites. The iPad itself enables students to download thousands of educational apps from the Apple App Store. Calculators, atlases, foreign languages…there’s an app for everything! Apple will even offer schools a generous discount on bulk purchases. A review of studies in the Journals of Computer Assisted Learning determined that the overwhelming majority of students who used digital tools showed positive gains in “literacy development, mathematics, science, problem-solving.” iPads are making it easier than ever for students to grasp challenging material, thanks to the never-ending fountain of knowledge in the palm of their hand.

4. Boosting Student Engagement

One of the greatest challenges educators face is delivering learning content in a way that engages their pupils. Thankfully, most students in this day and age are technologically savvy. Incorporating devices like iPads in the classroom can be a great technique in capturing their attention and bolstering student participation. In addition, instructional apps often ‘gamify’ education, mixing elements of learning, interactivity and fun together to create a more enjoyable educational experience. One study in Northern Ireland even discovered that children who used digital tools referred to learning as “play”. iPads also help support independent study, as students can test their knowledge through interactive quizzes and virtual flashcards.

5. Encourages Creativity

iPads have all the bells and whistles to help students unlock their creative potential. Filming and editing videos, designing graphic presentations, composing music, experiencing virtual field trips through augmented reality – iPads can facilitate new and innovating ways to complete educational tasks. The tablet design encourages students to take an active role in their learning, while also providing endless opportunities to express themselves creatively. The next generation of artists, designers and entrepreneurs might have learned it all on an iPad!

6. Portability

iPads are lightweight, compact and less cumbersome than the majority of other learning devices. Their streamline design make them particularly well suited to learning environments, as students can easily transport them between classes, to outdoor excursions or even on field trips! Beyond offering a truly mobile learning experience, iPads can also be used to encourage students to interact with their environment. There is a host of features that allow students to digitally capture, record and document their surroundings. Many educational facilities such as zoos, aquariums and museums also offer facility-specific content that may be accessed through iPads via an app or QR code.

7. Learning Digital Literacy

Digital literacy is becoming an essential part of our everyday lives. It is estimated that 87% of jobs in Australia now require some degree of digital skills. Exposing children to intuitive devices like iPads at any early age can help them build a foundational knowledge, allowing computing technology to become second nature and helping them adapt to any new technological innovations. While students may not have to worry about their careers quite yet, schools can still set them up for success. The next Steve Jobs might even be sitting in your classroom!

8. No More Paper

Looking to reduce your schools carbon footprint? Switching to a paperless, digital format is a great way for schools to help the environment. Every year over 4 million tonnes of paper is used in Australia, nearly half of which isn’t recycled. iPads eliminate the need for paper in the classroom, even art classes can be conducted on them thanks to the touch screen display! Going paperless can have a huge impact on the environment and help make our world cleaner and more sustainable for future generations.

9. Economical

Did you know that schools in Australia spend over $20,000 each year on paper? iPads can often be a more economical purchase, as they reduce the need to print, photocopy and file documents. Using less paper also saves time, as teachers spent up to 10% of their administrative time managing paperwork, with only 1% devoted to lesson planning, fundraising and professional development. Furthermore, digital versions of learning assets are often much better value for money. For example, e-textbooks are usually far cheaper than their physical counterparts and aren’t subject to wear and tear.

10. Better Organisation

Whether they’re in kindy or university, many students struggle with keeping their assignments, books and learning materials organised. Messy folders, lost sheets and forgotten homework are a nightmare for teachers to deal with. Thankfully, iPads can help consolidate all important documents, schoolwork, books and other learning materials into one place. Any lost files can also be located by simply using the iPads search bar. iPads also support a number of apps designed for note-taking, studying and keeping on track of assessment due dates. In addition, iPads can minimise the amount of manual grading and reporting required of teachers. Apps like Khan Academy and Kahoot offer a variety of lessons and quizzes for all ages on subjects like math, history, science and English. It records students results in real time, offering instant grades and feedback.

11. Direct Communication

Let’s face it, when it comes to communication a lot can get lost in translation. How many notes from teachers never make it home to parents? Whether intentional or accidental, the bottom line is that important communication can often be misplaced or overlooked. This is almost never the case with digital data. iPads can connect students, teachers and parents to ensure that all important communications are properly sent and received. The ‘I forgot’ excuse will simply no longer do! Teachers now have the ability to track their students progress and email any feedback, congratulations or concerns to parents in real time. Better access to grades and reports also helps parents get more involved in their children’s schoolwork. A study named “Parental Involvement in Education” found that when parents engaged more with their child’s education, it lead to reduced absences and better academic performance.

Conclusion

iPads are not only a great vehicle of education, but they help students gain confidence and skills that will help them thrive in all areas of life. They offer a diverse scope of learning structures and can support children who struggle with traditional teaching methods. Teachers also benefit from iPads, saving time, money and energy that could better be spent elsewhere. iPad devices can also lead to improved communication channels, better organisation and less time devoted to administrative duties. In addition, the wide range of apps, creative tools and easily accessible information aid children in developing interests, discovering new talents and following their dreams.

Filed Under: News

Mastering Microsoft Ep 4: How to Maximise Your Teams Meetings

April 28, 2022 By Angie Jones

Welcome back to eStorm’s Guide to Mastering Microsoft! In this episode we’ll be exploring all that Microsoft Teams meetings have to offer. We’ll show you the best ways to foster collaboration, engage with content and record important information!

Don’t know how to share your screen? Can’t remember how to turn your camera off? Not sure what a breakout room is? Episode 3 is here to help you maximise your Microsoft Teams meetings.

How to Maximise Your Microsoft Teams Meetings

 

Topics Discussed:

  • How to start a Microsoft Teams meeting in a team or channel
  • How to turn your camera and microphone on/off
  • How to change your audio input and output
  • How to connect to an external speaker
  • How to share a meeting invite
  • How to use the chat feature
  • How to use the reactions feature
  • How to use breakout rooms
  • How to record the meeting as a video
  • How to share your screen
  • How to share files
  • How to use Microsoft Whiteboard
  • How to leave or end the meeting

eStorm offer Microsoft Office 365 support, troubleshooting and management. Contact us at 3120 0640 or [email protected] 

 

Filed Under: News

Mastering Microsoft Ep 2 & 3: Scheduling Teams Meetings

April 28, 2022 By Angie Jones

When was the last time all of your employees were in the same place at the same time? Let’s face it, organising an in person team meeting can quite often be an exercise in futility. So why not make your next meeting virtual with Microsoft Teams? Microsoft Teams meetings include audio, video and screen sharing capabilities. They are collaborative, engaging, and are the cure for all your scheduling headaches!

Join us for the next instalments of eStorm’s Guide to Mastering Microsoft, as we breakdown the easiest ways to schedule a Teams meeting.

How to Schedule a Teams Meeting Using Outlook

One of the best parts of Microsoft Teams is its compatibility across the Microsoft Office 365 family of products. This means that your Outlook and Teams calendars are connected to one another! So any changes to one will appear on the other. With many people now living life on the go, this level of organisation is a major help when trying to plan around other work, social and family commitments.

Here’s how to schedule a Microsoft Teams meeting via Outlook:

  1. Sign in to Outlook
  2. Open the Outlook Calendar
  3. Click the ‘New Event’ button
  4. Turn on the ‘Teams meeting’ toggle
  5. Fill in meeting details (time, date, location, etc)
  6. Add the email addresses of the attendees you wish to invite
  7. Click on ‘Scheduling Assistant’ to check for any conflicts and resolve them
  8. Set a meeting reminder
  9. Click the ‘Send’ button to send out the meeting invitations
  10. Your meeting should now appear in both your Outlook and Teams calendars

How to Set Up a Meeting on Microsoft Teams

Here’s how to set up a meeting on Microsoft Teams:

  1. Sign in to Microsoft Teams
  2. Open the Teams Calendar
  3. Click the ‘New meeting’ button
  4. Choose a date and time (don’t forget to check the time zone)
  5. If you wish to change the meeting to a webinar, change the registration requirement from ‘none’ to any of the other options
  6. Fill in meeting details
  7. Add the email addresses of the attendees you wish to invite and/or add the channel you want the meeting posted to
  8. Click on ‘Scheduling Assistant’ to check for any conflicts and resolve them
  9. Click the ‘Send’ button to send out the meeting invitations
  10. Your meeting should now appear in both your Outlook and Teams calendars, as well as posted to any channels you added in Step 7
  11. If you’ve forgotten to invite anyone, open the meeting from your calendar or channel
  12. Click ‘Copy link’
  13. Paste the link into a message or email, then send it to the attendee

eStorm offer Microsoft Office 365 support, troubleshooting and management. Contact us at 3120 0640 or [email protected] 

Filed Under: News

eStorm’s Guide to Mastering Microsoft Ep 1: How to Change Your Microsoft Teams Password

April 28, 2022 By Angie Jones

When it comes to boosting productivity and workflow, Microsoft Office 365 is one of the best options on the market. Microsoft Office 365 is a suite of tools and applications designed to improve communication and collaboration in the workplace. With a range of unique features and benefits, Microsoft Office 365 gives users access to the people and information they need, from any device, at anytime, from anywhere in the world! Its subscription-based model caters to the specialised needs of your organisation, allowing you to expand or contract services as needed.

Want to learn the ins and outs of using Microsoft to your advantage? eStorm has you covered! We’ve put together eStorm’s Guide to Mastering Microsoft, a video series that gives you all the tips and tricks to navigating the Microsoft Office 365 suite.

For the first part of the series we will be looking at one of the most popular applications used by businesses…Microsoft Teams!

What is Microsoft Teams?

Microsoft Teams is a communication platform developed to support hybrid working environments. It supports a variety of features designed to keep your team well informed, organised and connected, even when working away from the office. Instant messaging, virtual meetings, shared calendars…the possibilities are endless with Microsoft Teams!

In the first episode, we tackle one of users most asked questions: how do I reset my password?

How to Change Your Microsoft Teams Password

  1. Open Microsoft Teams
  2. Sign out (if you’re not already signed out)
  3. Click on ‘use another account or sign up’
  4. Enter email address
  5. Click on the ‘next’ button
  6. Wait for the password pop up screen to appear, then click on ‘forgot my password’
  7. Authenticate the account by entering the characters shown in the image into the textbox below
  8. Click on the ‘next’ button
  9. Choose whether you want to verify your account through text or call
  10. Enter the phone number linked to your Microsoft Teams account, then click ‘text’ or ‘call’
  11. Wait for the verification code to be sent through text or call, then enter it
  12. Click on the ‘next’ button
  13. Enter your new password twice
  14. Click the ‘finish’ button
  15. Check whether the reset has been successful by going through the usual sing in steps using the new password

eStorm offer Microsoft Office 365 support, troubleshooting and management. Contact us at 3120 0640 or [email protected] 

Filed Under: News

Government Announces $1.6 Billion Investment For Businesses Going Digital

April 21, 2022 By Angie Jones

The federal government has pledged $1.6 billion in tax relief to help boost small businesses, as well as the Australian tech sector. The Technology Investment Boost will reduce costs for small businesses looking to go digital, while the Skills and Training Boost is aimed at helping upskill both new and existing staff. Tech Council of Australia CEO Kate Pounder said these measures would assist their goal of getting 1.2 million Australians into tech jobs by 2030. She also added that, “Achieving this goal will help more Australian workers get high-paid, secure and flexible jobs.”

Technology Investment Boost

In an effort to help Australian small business expand their digital capacity, the Australian Government is offering $1 billion in tax deductions to businesses adopting digital solutions, operations and strategies.

More than 3.6 million Australian small business will be able to claim a bonus 20% deduction for expense costs and depreciating assets, as well as up to $100,00 of expenditure per annum on eligible items. These purchases may include the procurement of portable payment devices, online sales platforms, cyber security networks, website design and subscriptions to cloud-based storage services.

In order to qualify, the annual turnover of the business cannot exceed $50 million. All expenditures must also be made between 7:30pm (AEDT) on 29 March 2022 (Budget night) until 30 June 2023.

Skills and Training Boost

The Skill and Training Boost encourages small business to invest more in their employees future, by offering $550 million of tax relief towards ongoing training and upskilling. Small businesses who enrol their staff in an external training program will be able to claim a bonus 20% of the cost as a tax deduction. Courses may be online, but must be registered through an Australian provider.

Once again, all training expenditures must also be made between 7:30pm (AEDT) on 29 March 2022 (Budget night) until 30 June 2023.

Now is the time for your business to go digital!

It’s time for your business to join the digital revolution! Whether you’re building a digital platform, looking to streamline online services or updating software and hardware, these government initiatives are the perfect opportunity to invest in your business’ digital growth and future.

 

Filed Under: News

ISO 27001: Why You Should Be Certified

April 21, 2022 By Angie Jones

What is ISO 27001?

ISO 27001 is the global benchmark for Information Security Management Systems (ISMS). Developed through a joint partnership between the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), ISO 27001 encompasses 114 security security control methods that address people, policies and technology. The ISO 27001 provides a framework for organisations to implement a best practice approach to their information security.

What is an Information Security Management System?

An Information Security Management System (ISMS) is a holistic approach to information security. An ISO 27001 ISMS outlines the controls, policies and procedures an organisation needs to implement to ensure the confidentiality, integrity and availability (CIA) of information assets. In order to maintain efficient and successful asset security, an ISMS should be supported by regular security risk assessments.

The Benefits of ISO 27001

ISO 27001 is fast becoming one of the most popular information security standards worldwide. More and more businesses are realising the benefits an ISO 27001 accreditation can have, with the number of certifications rising more than 450% over the last decade.

Secure Exchange of Information

The ISO 27001 standard helps to protect all your private information, whether it be digital, hard copy or stored in the cloud. By identifying the risks your information security may face and devising a risk management plan, your organisation can be sure that you’re prepared for any threat that arises.

Competitive Advantage and Reputation

An ISO 27001 certification will give your organisation a competitive business advantage as it demonstrates that you have done the most to protect both your own information, and any information shared with your company. This will help strengthen the trust your partners and clients have in your ability to safeguard their assets, and distinguish you from competitors who do not have an ISO 27001 certificate.

Reduce Information Security Costs

Having an ISO 27001 accreditation reduces your information security costs in a variety of ways. Firstly, as the gold standard for ISMS, the ISO 27001 minimises the risk of potential data breaches that lead to devastating financial losses. In addition, possessing an ISO 27001 certificate also indicates that your information security is highly effective. This results in less of a need for repeated customer audits and reduces the work of external audits. Lastly, the ISO 27001 standard requires a comprehensive analysis, which helps you make the most of your budget by only implementing the necessary security controls.

Meets All Legal and Third-Party Obligations

ISO 27001 is designed to make sure your information security is in line with all relevant laws and regulatory requirements. Furthermore, it may be the case that your company is contractually obliged by clients, or other third parties, to demonstrate a certain level of information security. In these instances, an ISO 27001 certificate would confirm that your ISMS is of the highest standard.

Improve Security Structure and Focus

The ISO 27001 standard is a great way to add structure and focus to your organisation as it creates awareness amongst your employees and shares the responsibility of information security. An ISMS encompasses people as part of information risk, which aids in developing a better understanding of security risks amongst employees. This results in better training and healthier working practices.

An Independent Opinion on Security Posture

To keep up to date with the ISO 27001 standard, your ISMS must undergo regular reviews and internal audits. An accredited third-party will also have to conduct an external review at specific intervals to establish that all controls are properly functioning. This independent assessment can help your organisation better understand the strengths and weaknesses of your information security, by providing an impartial, expert opinion on the matter.

What are the ISO 27001 requirements?

ISO 27001 provides organisations with 10 clauses that serve as the ISMS requirements. They are summarised below.

1-3 Terms and Definitions

This section provides background information on the terms, definitions and normative references that need to be understood when establishing the ISO 27001 standard.

4- Context of Organisation

In order to successfully build an ISMS, you first need the understand the context of your organisation. Start by investigating your business environment as this will help you identify all the factors that may impact how effective your ISMS will be at achieving its goals. This includes examining which assets you want to protect, all internal and external issues, as well as any interested parties and the expectations they may have. Analysis of this level will also determine the ISMS scope, and how extensively it needs to be applied throughout the organisation.

5- Leadership and Commitment

Strong leadership and ongoing commitment is paramount to the successful application of ISO 27001. A top-tier management system needs a top-tier manager, after all. This clause outlines the various responsibilities required of those in leadership positions, such as: establishing an ISMS policy and objectives that align with the overall business strategy, allocating all necessary tasks/resources, and maintaining clear communication throughout the implementation process. The ISO 27001 requirements state that all roles and duties be assigned.

6- Planning

This clause of ISO 27001 reinforces the necessity of planning and preparation when initialising an ISMS environment. Specifically, it addresses the need for a risk management process that identifies all risks and opportunities. The information gathered during clause 4 will provide the basis of your security risk assessment. Furthermore, the planning clause also outlines the importance of setting security goals that align with the company’s overall objectives. These goals should also be accompanied by a plan to achieve them, and communicated throughout all personnel.

7- Support

The ongoing success of an ISMS is reliant on adequate and continual support. This includes sufficient resources, competent employees, clear communication and thorough documentation of information. ISO 27001 defines resources as any people, time, budget, information and infrastructure needed to implement the ISMS. An employees competency relates to their ability to capably perform their duties in regard to the ISMS. While good communication can sometimes be hard to quantify, in this scenario it is determined by the availability of information to the people who need it, in a timely manner. This may include the facilitation of information access to a range of necessary parties, both internal and external. Lastly, documentation needs to be an ongoing and comprehensive process, with information being continually created, controlled and updated.

8- Operation

By the time your organisation has reached this clause you will have already defined the context of your organisation and scope of the ISMS, identified all risks and opportunities, and planned how best to achieve ISMS goals. Now it’s time to use this information to use and implement the processes and controls. These processes need to be monitored to ensure they are meeting the ISMS requirements, or in case they need to be adjusted to compensate for any unexpected changes.

9- Performance Evaluation

The ISO 27001 standard sets an expectation that the ISMS is subject to constant analysis and evaluation. Management should constantly review the ISMS to confirm that all processes meet with the predefined outcomes and align with the overall direction of the organisation. Furthermore, ISO 27001 expects that the performance and effectiveness of the ISMS processes be determined by an internal audit program.

10- Improvement

Evaluation is followed by improvement. All nonconformities (and their causes) need to be eliminated. While the context of the organisation and scope of the ISMS may be subject to constant change, a persistent improvement process will guarantee that your ISMS will continue to run smoothly.

Annex A

Annex A lists the 114 security controls that organisations need to implement to meet ISO 27001 guidelines. They are divided across 14 security domains.

How Do You Get ISO 27001 Certified?

A company can receive an official ISO 27001 certificate by undergoing a formal assessment by an accredited certification body. The accredited body will perform an audit to determine whether your organisation’s ISMS is fully compliant with the ISO 27001 standard. This audit will verify whether the ISMS meets the requirements of the proposed scope and objectives set forth by your organisation. In addition, it will also confirm whether there are any nonconformities or lapses in the ISMS processes. In the event of a successful audit, an ISO 27001 certificate will be issued. These audits will typically be conducted on an annual basis to ensure that the ISMS remains up to the ISO 27001 standard and continues to operate as normal.

Filed Under: News

What Are Cyber Security Assessments/Audits and Why Do We Need Them?

April 20, 2022 By Angie Jones

Do you remember the last time your business conducted a cyber security assessment or audit? If the answer is no, then your business may be vulnerable to a variety of cyber attacks.

The Common Vulnerabilities and Exploits (CVE) database states that some of the most frequently used software and IT systems have over 11,000 known vulnerabilities. Between June 2019 and June 2020 alone, an average of 164 cyber incidents were reported to the Australian Cyber Security Centre (ACSC) every day…that works out to one incident every ten minutes! With cyber crime at an all time high, businesses in Australia and around the world are growing increasingly concerned. IBM estimates that cyber attacks cost large enterprises $3.92 million (USD) annually. According to them, 60% of these security breaches could have been prevented if a system patch had been applied.

These numbers are terrifying and put into perspective just how important it is to conduct frequent cyber risk assessments and security audits. The more you know about the threats you face, the better prepared you are to protect against them.

What Are Cyber Risks?

Cyber risks are negative disruptions to sensitive data, finance, or online business operations. In most cases, they are the result of data breaches and fall into one of the following categories: zero, low, medium and high risk. These levels of risk are dependent on three factors; What is the threat? How vulnerable is the system? What is the possible reputational and/or financial damage if breached or made unavailable? In other words, Cyber risk = Threat x Vulnerability x Information Value.

The most common cyber risks are listed below.

  • Ransomware
  • Data leaks
  • Phishing
  • Malware
  • Insider threats

What Is a Cyber Risk Assessment?

Cyber risk assessments help businesses identify, analyse and evaluate risks. A comprehensive cyber security risk assessment takes stock of all information technology assets and infrastructure that could be potentially targeted by a cyber attack (including hardware, systems, private data, etc.) and identifies their vulnerabilities. In doing this, businesses can minimise gaps in security and implement the most optimal defence frameworks and security strategies. There are a host of added benefits to conducting a cyber security risk assessment, such as:

  • Preventing data breaches and loss
  • Reducing long term costs
  • Improving organisational knowledge
  • Avoiding regulatory issues
  • Eschewing application downtime
  • Providing a cyber security risk template for future assessments

This high level analysis leads to more efficient practices, saving organisations time, effort and money. For instance, defending against attacks unlikely to occur is a waste of resources that could be better spent elsewhere. On the flip side, without a proper assessment, risks can be underestimated or even overlooked entirely. An attack exploiting such weaknesses could cause significant damage and have devastating effects.

Furthermore, a security risk assessment not only prepares your organisation to defend against cyber crime, but also keeps key stakeholders and board members up-to-date on cyber security posture and day-to-day operations.

The Different Types of Assessments

Risks and Vulnerabilities

This is the most commonly used type of assessment. Its purpose is to pinpoint the gaps in your system that are most vulnerable to attack. It is a rigorous test of infrastructure, software and user ability. Specifically, this assessment determines how easy it is to access your data through prevalent hacker strategies (ie. social engineering). When completing this assessment, your team’s cyber security practices, habits and responses will be subject to intense scrutiny.

Cyber Infrastructure

In this assessment, all security controls, tools and practices currently utilised are evaluated for their effectiveness. This often includes penetration testing, wherein cybersecurity professionals (either internal or outsourced) attempt to breach these defences and record their efforts. This method determines how resilient the current security measures are to attack, as well as the systems response and recovery time.

Operational Resilience

Operational resilience is an evaluation of an organisations ability to prevent disruptions to their daily operations or, if failing that, how long their operations are impacted by said disruptions. This assessment encompasses all IT assets and systems, not just those in regard to cybersecurity. Operational resilience is measured by how well a business:

  • Adapts management strategy by learning from previous threats/attacks
  • Monitors critical systems and maintains preparedness for any potential attacks
  • How well they are able to continue normal operations while undergoing a cyber attack
  • How fast tech infrastructure and operations can be restored following an assault

Management of External Dependencies

Nearly every organisation outsources to some extent. While you may not be able to monitor the external parts of your network, you can safeguard them by apprasing your external partnerships. To mitigate the risks of any external relationships, your organisation needs to consider:

  • What strategies your organisation has in place for external dependencies?
  • How are the risks related to these dependencies managed?
  • Has your organisation established any management systems to stay informed about the latest risks?
  • If a threat does appear, is there a plan to maintain continuity?

This assessment can be a long and complex undertaking as it will need to incorporate all parties and departments that liaise with external dependents.

What Are Cyber Security Audits?

Cyber risk assessments and cyber security audits exist as two parts of the same process. Assessments are internal investigations usually done in advance of, or in preparation for, a cyber security audit. The assessment is a diagnostic and requires informed guesswork to predict future risk. The audit, on the other hand, measures the current state of your organisations information technology, policies and controls, against a set of external standards and rigorously tests their effectiveness. This may include making sure that all obligatory policies are being adhered to; the proper documentation of all information technology security processes, clear communication of cyber security procedures and consistent application throughout the entire organization.

Cyber security audits serve an important regulatory purpose as they ensure your business is maintaining best practices and is also compliant with all government and industry regulations. It is a formal and rigid process that should be conducted by an accredited third-party auditor.

Conclusion

While cyber security assessments and audits are not infallible, knowing your security’s strengths and weaknesses can make protecting your organisation against cyber crime significantly less stressful. It is recommended that organisations perform a risk assessment at least once a year, as well as any time the business undergoes a major structural change that impacts the IT environment. Audits, however, typically must be completed in a specific timeframe and follow a rigid set of instructions. It is best to keep in mind that the more accurate, up-to-date information your business has access to, the easier it is to protect your organisation from cyber attack.

Filed Under: News

Financing Your School’s 1:1 Technology Program

April 13, 2022 By Angie Jones

As our world becomes increasingly dependent on technology, schools are desperately trying to keep pace within the classroom. Most students today don’t even remember a time before smart phones! As a result, schools are introducing more digital tools into their curriculums to strengthen the relationship between their students and the learning content. For many schools, a 1:1 technology program is a must to ensure that this content is being delivered in a way that is familiar, accessible and digestible to their students.

But outfitting every student with their own device can be an overwhelming endeavour, with schools often left asking…exactly how are we going to pay for this? Well eStorm has the answer. We’ve put together a rundown of the best financing options, to help your school find the right option.

1. Buying Outright

If you’re one of the lucky few educational institutions with the budget to be able to do so, then outright purchasing devices and accessories can be the most straightforward option to financing your 1:1 program. While an outright capital expenditure can be costly upfront, it often leads to long-term savings. From the outset you have full ownership of your assets and can decide their useful lifetime, enabling you to maximise the return on your investment. Buying outright also means an end to contract negotiations, interest fees and minimum terms. Without these constraints, your school has the freedom to develop and adapt your 1:1 strategy as you please.

2. Leasing

For many schools, an outright purchase is simply well outside the realm of possibility. In these circumstances, a finance lease can be an efficient use of funds, as it requires little to no upfront payment. Larger initial orders of equipment may be made, with repayments spread over an agreed upon span of time and the option to own at the end of the leasing period through compensation of any residuals owing. These fixed payments keep costs predictable and allow for more reliable forecasting of revenue spend. Financing through a leasing facility also relieves some of the hassle around a 1:1 program, as hardware, software, maintenance, installation, warranty, and other services may all be included in your contract. Leasing agreements can vary drastically between providers, so careful consideration is key to ensuring your school gets the right deal to suit your needs.

3. Renting

Renting is one of the simplest ways to finance your 1:1 program and can be beneficial to schools who approach technology as an ongoing expense. Much like leasing, renting grants schools access to equipment and IT services through ongoing payments. However, rental periods are often much shorter and more flexible than those of leases, relieving schools of long-term commitment. With rapid advancements in technology, many assets are quickly becoming obsolete and need to be upgraded more frequently. Through renting, schools are able to maintain a state-of-the-art classroom for a fraction of the cost, without the risks associated with ownership. 

4. Parental Contributions

Parental contribution schemes can be a great way of supplementing a 1:1 technology program, without impacting school budgets. Schools may approach a co-contribution model in a variety of ways. Devices may be offered on loan from an equity pool, allowing students to take them home or restricting their access to within school premises. Through the Student Resource Scheme, schools may also purchase devices on behalf of students and then offset the cost to parents. The SRS is a great cost-effective option for parents who wish to purchase a device for their child, as the school’s bulk buying processes heavily discounts the price of hardware. Furthermore, schools can also partially cover the cost of a 1:1 program by asking parents for a Voluntary Financial Contribution (VFC), as outlined in section 56 of Queensland’s Education (General Provisions) Act 2006. Both VFCs and participation in the SRS are voluntary. However, once enrolled in the SRS, a parent is invoiced and liable for any outstanding debts, whereas VFCs are not fees and cannot be enforced.

5. Buyback Schemes

To kickstart your schools 1:1 technology program, consider trading in your classroom’s old laptops, desktops and tablets. Older assets may be worth more than you expect, and their value can be used towards purchasing a whole new fleet of devices. Schools should be wary however, that the buyback industry can be complex to navigate, and not every company will have their best interests at heart. Device trade-in schemes are also a green initiative, helping schools to recycle out-dated technology responsibly and sustainably.

6. Apple Finance

Apple’s education finance program is both flexible and designed to create more engaging learning by offering access to a variety of fringe benefits. Apple Finance is tailored to your school’s specific needs, offering flexible term schedules and no down payments. Apple Finance also includes a variety of optional extras. For instance, by setting up an Apple School Manager account with Apple Finance, your school can save up to 50% off on bulk app purchases. In addition, AppleCare provides expert technical advice, as well as a range of programs to streamline your day-to-day operations. Older generational Apple devices can also be recycled through Apple Trade In and in some cases may even be used as credit towards upgraded devices.

 

Want to chat about your financing options? eStorm is here to help you choose the right option for your school. Contact us at [email protected]

Filed Under: News

What Is .au Direct and What Does It Mean for Your Domain?

March 31, 2022 By Angie Jones

Great news Australia, a new category of domain name has just launched! As of the 24th of March 2022, .au direct names can now be obtained from select auDA accredited registrars. Not sure what this means for you? Read on as we answer all your most asked questions and look at what this means for the future of Australia’s internet domains.

What is .au direct?

Also known as ‘.au namespace’, ‘second level names’ and ‘direct registration’, .au direct refers to any domain names directly before the .au (e.g. yourbusinesshere.au).

Following in the footsteps of other country code Top Level Domains including the United Kingdom (.uk), Canada (.ca), the USA (.us) and New Zealand (.nz), .au direct is an exciting development that will supplement current Australian internet domains (e.g. com.au, net.au and org.au). While shorter than names registered in these pre-existing namespaces, .au direct names will function in the same way and provide key benefits to users.

For instance, the introduction of .au direct expands the pool of available names in the Australian domain and grants users a wider range of choice. Furthermore, these shorter online names are punchier, more memorable, and easier to type on mobile displays.

Am I eligible for .au direct?

.au direct names are general use and available to anyone with a verifiable connection to Australia. Australian citizens, permanent residents and businesses registered within Australia are all eligible and can acquire .au direct names through auDA registrars.

If you’re unsure whether you or your organisation meet the requirements, head over to the definitions section of the .au Licensing Rules for a full breakdown of the eligibility criteria.

How do I register a .au direct name?

From the 24th of March 2022, all eligible individuals and businesses may license new .au direct names via an accredited auDA registrar.

.au direct is different than other Australian namespaces as it does not use selection criteria to determine which names are available to register. For example, commercial entities are reserved for com.au and net.au, not-for-profits for org.au and educational institutions for edu.au. However, a .au direct name can be anything and is not dictated by the service, good or intended purpose provided. Any name can be registered so long as it’s available, meets syntax requirements and is not already registered in another namespace.

All .au direct name purchases are subject to the prices set by the auDA registrars. While costs may differ between registrars, the wholesale price of a .au direct name is the same as that of those in other namespaces (com.au, net.au, org.au, asn.au, id.au, etc).

What about registering an existing name?

Any license holders of an existing .au domain name (e.g. yourbusinesshere.com.au) will have the first opportunity to apply for the .au direct counterpart through the Priority Allocation Process. Registrants will have between 24 March to 20 September 2022 to apply for Priority Status through a participating auDA registrar. During this time, all .au direct names with an exact match in another namespace will be placed on Priority Hold, making them unavailable to the public for the six-month period. Afterwards, they will be offered on a first come, first serve basis.

However, in some cases there may be multiple candidates eligible for Priority Status for the same .au direct name. This can happen when the same domain name has been licensed in different namespaces to different registrants. For example, Registrant 1 holds the domain license for yourbusinesshere.com.au while Registrant 2 holds the license for yourbusinesshere.net.au. In situations where this occurs, the name will be allocated according to a priority category and the creation date of each applicant’s domain name license. Relevant parties may resolve any further disputes with direct negotiation, or also have the option to file a complaint through the auDA’s .au Licensing Rules and the .au Dispute Resolution Process (auDRP). The auDA website contains further information on Priority Allocation, as well as a Priority Status Tool to help registrants better understand the processes and check whether there are any other registrants entitled to the same .au direct name.

How does .au direct affect my existing domains?

.au direct is completely optional and has no bearing on existing .au registrations. No changes will be made to domains in other namespaces, regardless of whether you (or anyone else for that matter) register them with .au direct or not. Your domains will continue to operate as normal for as long as the registration renewal remains up to date.

Filed Under: News

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 19
  • Go to Next Page »

Mastering Microsoft Ep 5: How to Update Your Microsoft Account Security Information

iPads in Schools: What are the Benefits?

Mastering Microsoft Ep 4: How to Maximise Your Teams Meetings

Tags

amazon Apple apps brisbane lions business network security cloud computing cloud management cloud migration cybercrime cybersecurity education email scam emerging technology facebook Google HomePod hybrid cloud management IT Events IT managed service provider it outsourcing IT services it strategy Microsoft microsoft office 365 Mircosoft password security phishing Phone Solutions remax australia remote work two-factor authentication virtual desktop infrastructure windows workplace productivity

Latest News

  • Mastering Microsoft Ep 5: How to Update Your Microsoft Account Security Information
  • iPads in Schools: What are the Benefits?
  • Mastering Microsoft Ep 4: How to Maximise Your Teams Meetings
  • Mastering Microsoft Ep 2 & 3: Scheduling Teams Meetings
  • eStorm’s Guide to Mastering Microsoft Ep 1: How to Change Your Microsoft Teams Password

eStorm Australia Head Office

Level 1, 16 Old Cleveland Road
Stones Corner, QLD 4120
P: 1300 378 676
P: +61 7 3120 0640
E: [email protected]

Service Centre Springfield

1/145 Sinnathamby Boulevard,
Springfield Central, QLD, 4300
P: (07) 3180 4228
E: [email protected]

Service Centre Toowoomba

11/12 Prescott St,
Toowoomba City, QLD, 4350
P: (07) 4596 6268
E: [email protected]

Interstate Contact

Sydney
P: (02) 9188 5148
Melbourne
P: (03) 9088 6431

 

Client Tools

Pay Invoice
Remote Support
Additional Support
Create a Ticket

NDIS provider

QAssure - 10805 - eStorm
GITC: Q-4675
DET QLD preferred
DoE QLD preferred Supplier

Find us on LinkedIn Follow us on Facebook Find us on YouTube

© 2022 eStorm Australia. All Rights Reserved.

Terms of ServiceRefund PolicyPrivacy Policy