200px wide
1300 378 676
+61 7 3120 0640
[email protected]
CONTACT US
CALL US
CONTACT US
  • Corporate Services
    • IT Support Services
      • Managed IT Services Brisbane
      • IT Consulting
      • Outsource Your IT Department
      • IT Audit & Review
      • Project Services
      • Virtual CIO Services
      • Corporate Apple Services
      • Mobile Device Management
      • IT Support Brisbane
      • IT Support Sydney
      • IT Support Melbourne
    • IT Cyber Security Services
      • Managed Security Services
      • ISO 27001 Services & Consulting
      • IT Cyber Security Audits & Assessments
      • Information Security Management
      • RFFR & DESE ISMS Services
      • The Essential Eight Framework
    • Managed Cloud Services
      • Private Cloud
      • Hybrid Cloud
      • Cloud Consulting
      • Microsoft SharePoint
      • Microsoft Office 365
      • Power BI
      • Amazon Web Services
      • Microsoft Azure
      • Colocation & Server Hosting
      • Cloud Backups
    • Managed Network Services
      • Business Internet
      • Power Apps Development & Consulting
      • Managed Wi-Fi
      • Network Security
      • Private WAN
    • Business Telephony
      • Hosted PBX
      • On-Premise PBX
      • Microsoft Teams
      • Microsoft Teams Calling
      • Call Centre Services
    • Hardware and Software Procurement
    • Supported Industries
      • Accountant & Finance IT Support Services
      • Civil & Construction IT Services
      • Creative Industries IT Support Services
      • Law Firm & Legal IT Support Services
      • Healthcare IT Support Services
      • Real Estate IT Support Services
      • Manufacturing IT Support Services
  • Education Services
    • Education Device Procurement & Technology in Schools
    • IT Support for Education Services
    • Mobile Device Management for Schools
    • Professional Development for Teachers
    • Apple Solution Expert
  • Case Studies
  • News
  • About Us
    • Why Choose Us?
    • Client Testimonials
    • Partners and Awards
    • Careers
  • Contact Us

How to Choose the Right MSP for Your Business

July 30, 2021 By Melissa Hoarau

 

So you’ve decided it’s time to onboard an MSP! That’s great. But now you’re stuck wondering how to choose the right one. As the need for MSPs grows, so does the selection pool. Choosing an MSP is a massive decision and should not be taken lightly – the organisation you partner with should be knowledgeable and consistent with the inner workings and maintenance of your IT infrastructure. Otherwise, what’s the point in having one at all?

Extensive research and comparisons are a must when choosing an MSP. Think about it as hiring a new employee; you wouldn’t just choose the first person who walks through your door and talks a big game with no references to back them up. You probably have a serious vetting process, with multiple prerequisites and questions to ask, and a pool of several possible candidates. It’s the same with MSPs. There are plenty out there who make a bunch of promises, but are really just money-grabbers who lock you into a Service Level Agreement (SLA) with no intention of actually helping your business succeed.

The first step in choosing an MSP is narrowing down your options. A big deciding factor is assessing whether you need an MSP that is local to your business. A local MSP is able to provide onsite support and maintenance (particularly valuable for major IT emergencies), whereas MSPs that are not local will only be able to offer desktop support. Many businesses find that Helpdesk support is more than sufficient for their needs, so it’s really up to you and the level of support you believe your company requires.

Once you’ve made this decision, don’t just rely on Google searches to supply you with a list of suitable MSPs. Google doesn’t base their search algorithm on company reviews, nor does it base it on an MSPs competence as a suitable partner for your business. On top of Google searches, we recommend visiting CloudTango, particularly their MSP50 page, which lists the Top 50 MSPs in 8 different countries (including Australia).

After you’ve narrowed down your search a fair bit, do a thorough check into each MSP’s reviews, testimonials, and case studies. Look through their website and read through their pages; are they informative and transparent? If these all check out, you can move on to assessing their suitability.

 

1. Clear Communication

One of the most important things to note when choosing an MSP is how and when they communicate. If they are taking a while to respond to emails or calls when you begin contact, it may mean they are too busy to respond or that they are inconsistent when it comes to communication with their clients. This could potentially cause issues down the line when you are facing an IT emergency, and no one is answering the phone or responding to your support requests.

Secondly, the biggest benefit of onboarding an MSP is the fixed monthly costs, but inferior MSPs may try to slip hidden costs into your agreement. Thoroughly check your SLA before signing! Are there any hidden costs? Do they charge extra for onsite visits? What happens when your equipment needs to be upgraded or replaced? A quality MSP will be upfront with these costs, and will happily answer any questions you have about your SLA and modify it to suit your requirements.

 

2. Adaptability

As your business grows, so will your technology, software and IT support needs. One of the biggest benefits of partnering with an MSP is that you won’t need to hire more IT technicians to keep up with the demands of your growing IT infrastructure.

However, an inexperienced MSP may not have the capacity to support you as your business and IT requirements expand. Before signing on, ensure that your MSP is flexible, able to easily scale their support, and can quickly adapt to new projects and initiatives.

 

3. Consistency & Knowledge

An MSP that is able to maintain consistent results and delivery is of the utmost importance. Your potential MSP should be able to provide case studies, policies, and procedures to back up their claims and prove they are experienced and dependable. If they are unable to explain what they do, how they do it, and why it is effective, then you should question their validity. In the same vein, your MSP should possess a deep understanding of the processes and solutions they are offering.

 

Conclusion

Deciding who to trust with your IT infrastructure is a daunting and difficult decision. However, doing the appropriate research into a potential MSP allows you to bypass issues that could occur in the future. Just remember, don’t be afraid to ask potential MSPs questions, and if they get annoyed or frustrated, move on.

 

QUESTIONS TO CONSIDER ASKING:

  • What does their onboarding process entail?
  • Do they provide 24/7 support? If not, what are their emergency costs?
  • Do they have references, testimonials, and case studies?
  • Do they provide detailed invoices?
  • What’s NOT included in their managed service agreement?
  • Do they have a guaranteed response time? What is it?
  • How experienced are their technicians? Do they have relevant qualifications?
  • How flexible/scalable is their company? Do they have the means to support a growing organisation?
  • Do they provide onsite support, remote support, or both?
  • How often do they provide progress reports?
  • How can you get in contact with them when support issues arise?
  • What are their cancellation policies?

 

eStorm is a CloudTango MSP50 finalist dedicated to helping you get the most out of your managed it services partnership.

Contact our friendly and knowledgeable team today to discover how we can help!

Email: [email protected]
Phone: 07 3120 0640

Filed Under: Brisbane IT Support And Managed Services – EStorm Australia, News Tagged With: IT managed service provider, it outsourcing, IT services

JAMF PRO your Apple MDM solution

February 13, 2017 By eStormAdmin

Give employees and students the tools they need to have more ah-ha moments at work and in the classroom. Designed to automate device management for you while driving end-user productivity and creativity, Jamf Pro (formerly Casper Suite) is the EMM tool that delights IT pros and the users they support by delivering on the promise of unified endpoint management for Apple devices.

~JAMF

eStorm has extensive experience supporting our clients with MDM solutions. Jamf Pro is one such tool that we believe outperforms other MDM’s particularly in the Apple space.

Hands-on, user-initiated or zero-touch deployment. Jamf integrates with Apple Device Enrollment Program (DEP), so you can automatically enroll and configure new Macs, iPads or iPhones remotely. Time-consuming imaging and manual configurations can now be a thing of the past. Together, Jamf and Apple DEP go beyond the basic mobile device management (MDM) capabilities to help you deliver a streamlined experience.

For this looking for a more hands on approach, Mac imaging lets you take part in a manual approach to deploying computers. Utilize Jamf Pro to build modular or monolithic images and deploy them fast. Or you can completely wipe the computer’s drive and start with a fresh image.

If you’re implementing a bring your own device (BYOD) program or managing devices already in use, user-initiated enrollment is the way to go. Through a webpage, allow users to self-enroll their devices into Jamf Pro. This is all done on demand and at the user’s discretion, easing the burden on the IT department.

Device management requires more than just the basics. Go beyond simple troubleshooting and keep devices up to date and secure – all while ensuring users have the resources, apps and services they need. Jamf Pro utilises key functions to provide a great user experience. Configuration Profiles allow you to define settings with iOS and macOS and distribute them to devices utilizing Jamf Pro. Easily apply Wi-Fi, VPN, email settings and more so users can seamlessly connect to the resources they need. Unique to macOS management with Jamf Pro, policies go beyond the basic device management capabilities of configuration profiles and help you install software and printers, manage local user accounts and conduct advanced management workflows. Run scripts on macOS utilizing the Apple device management capabilities of Jamf Pro. Scripts provide more flexibility than standard configuration profiles and open the door to infinite device management capabilities.

Jamf Pro is feature rich software that supports device, App, inventory, self service and security features that are unmatched on the Apple MDM platform. Speak to eStorm about Jamf Pro and how it can improve your staff or students experience and minimise IT department stress.

Filed Under: Brisbane IT Support And Managed Services – EStorm Australia, Education, eStorm News Tagged With: Apple

Ransomware – Just how much of a threat is it?

May 20, 2016 By eStormAdmin

cryptoman
RANSOMWARE ACTIVITY IS INCREASING THROUGHOUT 2016
Ransomware is becoming quite a common method of cyber extortion for financial gain.  This is a type of malware that prevents users from accessing their files, applications or systems until a ransom is paid, usually using an anonymous currency such as Bitcoin. While individual computer users have long been targets of ransomware, over the last couple of years, the threat has expanded. Ransomware has been in mainstream media of late due to attacks against organisations such as hospitals.

It’s important to note that not all ransomware operates the same way. The file-encrypting type is probably the most dangerous.  Not only have you lost access to your own files, but this data often contains confidential material, and the perpetrators technically do have full access.  The issue is made worse however because paying the ransom offers no guarantee that the files will be unlocked.  Ultimately, making frequent backups is by far the best defence against ransomware.

Since the average figure demanded is relatively low, usually only a few hundred dollars, the attackers tend to spread the attack quite far, and just randomly to maximise their potential gains.  These are usually in the form of emails with malicious attachments, or links to malicious websites.

Ransomware Variants

CryptolockerThrough this increase in ransomware activity from mid-2015 to early 2016, there has been a myriad new variants of the attack.

Common Ransomware Families

We continue to see sustained distribution of many well-established ransomware families used in mass infection campaigns. In many cases these renowned variants, such as CryptoWall and TorrentLocker, spawned updated versions with improved encryption capabilities and obfuscation techniques. These established attacks will continue to be a significant threat to global enterprises as malware functionality, encryption techniques, and counter-mitigation measures are adapted and introduced into new versions. Examples include:

  • TorrentLocker: Throughout 2015, we’ve seen the continued distribution of TorrentLocker, a ransomware attack based on both CryptoLocker and CryptoWall. TorrentLocker has been active since at least early 2014 and is most often used in geographically-specific spam campaigns.
  • CTB-Locker: CTB-Locker – a name that represents the key elements of the ransomware, Curve (for Elliptic Curve Cryptography), Tor and Bitcoin, was first reported around mid-2014 and remained steadily active throughout 2015. During this time, we saw many campaigns spreading CTB-Locker and its variants, including CTB-Locker distributors capitalising on the free upgrade to Windows 10.  They did this by sending out emails masquerading as Microsoft emails offering the upgrade.

We have also seen several new ransomware variants that use a range of new tactics.  Based on increased growth, we expect ransomware developers to continue developing variants with novel features in order to expand their targets

  • Chimera: The operators behind the Chimera ransomware used the malware to encrypt victims’ files, but also threatened to publish the encrypted data if victims refused to pay the ransom. The attackers targeted German-based small and mid-sized businesses in mid-September 2015.
  • Ransom32: Ransom32 was first publicly reported in late December 2015. It was one of the first ransomware variants based entirely on JavaScript.  This potentially allowed for compatibility with not only Windows, but also Linux and Mac OS.
  • LowLevel04: Operators of LowLevel04 purportedly spread their ransomware using the less commonapproach of exploiting Remote Desktop and Terminal Services.
  • Linux.Encoder.1:Linux.Encoder.1 debuted in late 2015 as one of the first ransomware variants targeting Linux web-based servers. While the encryption capabilities in the early versions proved to be suspect, many reports alleged faults in its predictable encryption key.  The targeting associated with this branch of malware family is far from more traditional Windows-based attacks.
Where to from here?

We expected to see the ransomware threat landscape increase from levels observed in 2015, and sadly we have been right. Cyber extortion has gained notoriety and momentum, with huge profits from highly publicised campaigns spreading among cyber criminals. Recent campaigns in which victims paid the ransom reinforce the success and popularity of this particular attack method.

One of the most worrying threats is the deployment of ransomware after the attackers have already had access to the network. In these cases, attackerscould conceivably conduct reconnaissance and even disable or delete backups, or identify systems that are most critical to an organisation’s operations before deploying the ransomware.  To increase the difficulty of such an attack, enterprises are encouraged to properly segment networks and implement strong access controls. In addition, companies should evaluate backup strategies regularly, and test those backups to ensure that recovery is successful.  As always, “offline” copies of backups should be stored offsite in case onsite backups are targeted.

Overall, the best way to stay protected is through education.  Emails that insist you change settings so you can read them, or ask you to follow a links to access information should be heavily scrutinised.  Do you know the sender?  Is it likely that person would be trying to share files with you that require you accessing a website to get them?  Commonly we say the malicious emails appear from a courier company, or Australia Post telling you a package is waiting for you, and click here fore details etc.  Also we have seen emails claiming to be from the Australian Federal Police (AFP) asking you to appear in court.  We have also seen others appearing to come from your local council and is referring to parking fines and things like that.

Make your staff aware of the real risks of an infection like this, and encourage them to not take the risk opening those Heavy chain with a padlock around a laptopattachments.
As soon as you notice the infection, shutdown your PC.  If you are on a network and you leave the system running, these infections will spread to the server rendering that data useless.  The sooner the infected machine is switched off, the less impact it will have.

If you do find yourself a victim of one of these attacks, contact the team at eStorm immediately so we can get you back on track. In saying that, prevention is always better than a cure, so call us so we can make sure your backup strategy is comprehensive enough to minimise the impact of an attack like this.

Filed Under: Brisbane IT Support And Managed Services – EStorm Australia, IT Support Tagged With: cybersecurity

Solid State Drives vs Traditional Hard Drives. Which is right for you?

April 19, 2016 By eStormAdmin


  Gone are the days of simply choosing the drive that had the largest capacity that your budget could afford. Solid-state drives have made huge advances in recent years and have started to become affordable for the average consumer. So which should you choose?

 

hard_drive_western_digital_sataHard-Disk Drives

These are the traditional type of computer storage and have been around for decades with minor changes under the hood. Due to there age, they’re a mature technology and considered by many as the default storage medium. Basically they are rotating magnetic platters and with read/write heads that move across the surface to access the data. These drives are called “mechanical” because of the moving parts, and are susceptible to failure from time to time… usually at the least convenient time.

They are available in several speeds that are measured by how fast the platters spin.  Most drives in desktop PC’s are 7,200 RPM, but in laptops you may find 5,400 RPM.  Occasionally in servers or higher end storage you will find 10,000 RPM.  The faster they are, the more expensive they are.  You can increase performance and speed by using other technology such as RAID, but that’s another article.

Modern drives are readily available in up to 8TB these days, with 2 or 3TB being considered pretty standard.

In summary. HDDs are best used when you need to store a lot of data, and high performance is not essential. As a result, HDDs are the norm for a desktop computer, and every day home consumer.

ssdSolid-State Drives

Solid-state drives essentially perform the same role as a HDD. But rather than using mechanical moving parts, they use NAND flash memory. This means they are far more robust than traditional hard drives, and offer significantly greater performance.

Solid state drives normally connect using the same SATA interface as a HDD, but a few can use PCI for very high performance applications. Data access is typically a fraction of a millisecond and data transfer can be in excess of 500MB per second.

With those fast data access speeds, your operating system usually boots within a few seconds.

So far this all sounds pretty good!  So where’s the catch?  As always, it comes down to money.  This performance, when compared to HDDs, does not come cheap. If you want to spend the same money as you would on a HDD, but you want the performance of SSD, expect to be dealing with a much smaller capacity. The capacity of SSDs range from about 60GB to 2TB with the larger cost around $1300. In most cases, this is above the budget of the average consumer. It is however becoming popular to buy a smaller SSD for installing applications and your operating system, and then a larger traditional HDD for storing your data such as photos, music and movies.  Be warned though, HDDs would often give warning signs of imminent failure… SSDs will tend to simply go from working perfectly, to being completely dead in the blink of an eye.  BACKUP BACKUP BACKUP!

 

momentus-100021850-largeHybrid

 

A hybrid hard drive is a mixture of a traditional HDD drive and a small solid-state/flash drive in a single package. The drive monitors the usage of data being read and keeps a copy of the most frequently accessed data on the flash memory as a cache. This results in SSD like performance at a fraction of the cost. They cost slightly more than traditional hard drives but nowhere near as much as solid state drives. They can often make an ideal cost effective solution.

 

All in all, I’m a fan of SSD.  And for me, if it’s in the budget, I will always get, and always recommend SSD.

Filed Under: Brisbane IT Support And Managed Services – EStorm Australia, Hardware, Infrastructure, IT Support, Managed IT Support Melbourne

Cloud Accounting with Xero – Is it right for you?

March 7, 2016 By eStormAdmin

computer-1149148_640

‘Working in the Cloud’, ‘Cloud Computing’, ‘Cloud Accounting’… All terms we are hearing more and more. Momentum is growing for all businesses from SMB to Major Enterprise as people gain a better understanding of the true benefits of Cloud.

Not sure what ‘The Cloud’ is?

Put simply, cloud computing refers to applications and services being made available over the internet. Essentially this means they are available on demand where ever you are, without you having to install applications and servers.

Could ‘Live Accounting’ benefit you and your business? Here are some advantages to consider.

  • Available 24/7 from anywhere in the world provided you have an internet connection.
  • You get a ‘Real-time’ view of your cashflow and bank balances.
  • Automated Bank Feeds can minimise manual and cumbersome data entry.
  • Collaborate with your accountant in ‘Real-time’… no more sending data files back and forth.
  • No hardware or server installations, no manual back-ups, maintenance or support costs.
  • System upgrades occur while you’re offline, minimising your downtime.
  • No longer do you need to send your MYOB or QuickBooks files to your accountant leaving you unable to edit your own file while they work.
  • Fixed monthly costs that are cashflow friendly.

Do you want to know more about Xero?

xero-authorised-integrator-logo-RGB

Filed Under: Brisbane IT Support And Managed Services – EStorm Australia, Cloud Computing, IT Support

What Is a VPN? An Introduction To Virtual Private Networks

Mastering Microsoft Ep 7: How to Set Up Rules in Microsoft Outlook

Our favourite WWDC22 Apple Announcements

Tags

amazon Apple apps brisbane lions business network security cloud computing cloud management cloud migration cybercrime cybersecurity education email scam emerging technology facebook Google HomePod hybrid cloud management IT Events IT managed service provider it outsourcing IT services it strategy Microsoft microsoft office 365 Mircosoft password security phishing Phone Solutions remax australia remote work two-factor authentication virtual desktop infrastructure windows workplace productivity

Latest News

  • What Is a VPN? An Introduction To Virtual Private Networks
  • Mastering Microsoft Ep 7: How to Set Up Rules in Microsoft Outlook
  • Our favourite WWDC22 Apple Announcements
  • What are the benefits of Microsoft Power Apps?
  • Mastering Microsoft Ep 6: How to Set Up an Automated Out-of-Office Email in Microsoft Outlook

eStorm Australia Head Office

Level 1, 16 Old Cleveland Road
Stones Corner, QLD 4120
P: 1300 378 676
P: +61 7 3120 0640
E: [email protected]

Service Centre Springfield

1/145 Sinnathamby Boulevard,
Springfield Central, QLD, 4300
P: (07) 3180 4228
E: [email protected]

Service Centre Toowoomba

11/12 Prescott St,
Toowoomba City, QLD, 4350
P: (07) 4596 6268
E: [email protected]

Interstate Contact

Sydney
P: (02) 9188 5148
Melbourne
P: (03) 9088 6431

 

Client Tools

Pay Invoice
Remote Support
Additional Support
Create a Ticket

NDIS provider

QAssure - 10805 - eStorm
GITC: Q-4675
DET QLD preferred
DoE QLD preferred Supplier

Find us on LinkedIn Follow us on Facebook Find us on YouTube

© 2022 eStorm Australia. All Rights Reserved.

Terms of ServiceRefund PolicyPrivacy Policy