Virtually every day, Computer Troubleshooter’s engineers receive an inquiry from small business clients and residential customers asking for assistance with recovering data files. By the time they call, panic has set in as they fear that they have lost their valuable information. The client is often willing to do anything to recover the file and the valuable information contained in the file.
In today’s environment clients are constantly storing data in digital format using a variety of devices. The risk of human error is ever increasing, and it is a known fact that over a quarter of data recovery requests are a result of human error.
Customers are often relieved when they hear that accidentally deleted files have the greatest chance of being successfully recovered. It is still a complicated process and often involves using data recovery software to achieve the recovery. Data recovery software is required to examine the storage of the computer to find the remnants of the deleted data files and then extract them back into a recognizable form.
Computer Troubleshooters recommend that if the information is valuable then you should have a data backup solution in place. This applies to residential clients as much as business clients. Key elements of this solution today are to include a cloud storage element enabling you to recover files quickly and efficiently. Computer Troubleshooters also recommend that the solution needs to include regular maintenance checks confirming that your data has indeed been backed up. Look at our affordable monthly subscription plans.
What to do if you accidentally delete a file?
Don’t Panic – we recommend that you keep the computer turned on, and all applications open while you investigate the simple solutions below:
If you tried these simple solutions with no luck, then it may be time to get serious,
After completing the above procedures you may have recovered your deleted files. Of course, being proactive about protecting your data is always the best protection. Back up regularly whether it’s for your business or your personal data. Denial is not a river in Egypt.
Even with a tested and reliable backup system, sometimes unexpected accidents can still happen. 74% of data recovery involves physical damage or corruption which can happen to all data storage devices including hard drives, cell phones, and memory sticks.
For the more sophisticated problems we can use our Data Recovery Partner for the following specialized data recovery services:
Computer Troubleshooters is Here to Protect You and Your Data
If you have accidentally deleted files; don’t panic, if approached logically the deleted files can generally be retrieved.
If you need for help recovering a deleted file, or more serious data recovery services, or assistance in establishing solution call Computer Troubleshooters and one of our technology professionals can help you.
Ho Ho Ho – Have a virus-free Christmas and a malware free New Year. It’s only a few days and holiday season will be with us. At this time of year, we often see an increase in malware activity and clients concerned about shopping online. This article is intended to help our clients and prospective clients stay virus free. Christmas has always been a virus author’s paradise, and a computer user’s nemesis.
The short-history of Christmas malware.
Hints for Staying Safe and Virus free.
Microsoft Office 365 provides so many benefits for an organisation in terms of increased productivity, mobility and access to your data and communications no matter where you are allowing a quicker response to problems. All this, plus greater collaboration between staff members due to the power of the cloud.
For many organisations the fear of the unknown stops them from reaping the benefits of Microsoft Office 365 but once you have experienced its power there is no going back. Computer Troubleshooters as an Office 365 expert helps organisations minimise the risk and disruption of a migration to Microsoft Office 365.
How does Computer Troubleshooters mitigate the risks of transitioning to Microsoft 365?
The key services provided by Computer Troubleshooters include an initial IT assessment. This is supported by the development of a plan that outlines how an organisation can benefit through the application of Microsoft Office 365 in terms of daily communications and workflows. This includes a plan for migration and the ongoing maintenance and management of Microsoft Office 365.
One of the key benefits is less headaches around licence version control, renewals of licences and ensuring all licences are legitimate, let alone concerning yourself with infrastructure (email servers, back up security) to run your email system.
This combined with a subscription monthly fee means it is a lot easier to plan and budget for the IT expenditure related to software, infrastructure and maintenance of your IT System.
How does support work for Microsoft Office 365?
For a small monthly fee, you can engage your Computer Troubleshooter technician to manage your Microsoft Office 365 environment. This means you have peace of mind and a first level of response with a person you have trust in and a person who understands your business.
Your Computer Troubleshooter technician will constantly ensure that you are managing your users, maintaining and resetting passwords. At the same time, they will be checking that your system is running at optimal performance and therefore they are preventing issues that may be brewing.
Microsoft offer standard technical support and if an event is classified as critical, this is defined as an event that prevent you from accessing or using services, you can expect a response within one hour. Microsoft Office 365 support is focused around the operation of their centralised hosted applications theta they control within their data centers.
Why engage a professional technician to support your Office 365 implementation?
The simple reality is that for every minute your business is affected by an IT event that creates downtime then your businesses productivity is impacted and as a result impacts your revenue, and profitability.
The other factors to consider are cost control as you now have affixed monthly cost that is directly aligned to the number of staff you are employing. You only pay for what you need supported.
As Microsoft 365 is a cloud product, so consequently there is rarely fees for call outs as the product is supported remotely by the technician.
Access to an expert who specialises in Microsoft Office 365. This means you can rest easy knowing that your local expert is able to utilise their years of experience to your businesses benefit. Microsoft Office 365 is a critical platform of your business and by outsourcing to the specialist means no headache employing people, training them and managing their performance. All these activities are draining and divert your attention away from your core business activities.
How does Microsoft Office 365 allow my business to grow?
Given today’s changing technology environment, changing expectations of the younger generation, and the need for greater flexibility as to where employees work, Microsoft Office 365 allows a small business to meet these challenges head on.
How? With the power of the cloud, flexible communication technologies, and the applications available MS Word, MS Excel, Powerpoint, Outlook and Skype for Business, allows each small business to develop efficient collaboration between staff and increased communication capability between staff no matter what location, device being used or time of day.
It means every business can look professional and compete against each other no matter what size they are.
A Dimensional research survey of 300 SMB professionals indicated that the key requirement, for small business is “anytime, anywhere access to data and applications makes employees more effective” (1) using Office 365 enables this ensuring that a business is maximizing the opportunity for staff to be more productive, through effective sharing of documents no matter where your team is.
The new generation of workers are using mobile technology at levels we have never seen before. They are mobile in nature and expect to be able to work from any device. Email delivered to the phone, the ability to access documents and work on those immediately is all possible on the phone with Microsoft Office 365.
What is your first step to make certain you are utilising Microsoft Office 365 effectively or the first step to see how you can benefit from Microsoft Office 365 is to call your nearest Computer troubleshooter on 1300 28 28 78 or visit www.computertroublehsooters.com.au
1) Bridging the Information Worker Productivity Gap: New Challenges and Opportunities for IT, IDC, September 2012
The latest Security Flaw: Wifi KRACK
Sounds scary and technical, another vulnerability, another frightening acronym KRACK, makes one think what is the risk and how does one overcome this concern?
It’s been everywhere in the news, social media and blogs for the past week and this article will aim to try and simplify the technical side and answer some of the questions one has.
What does KRACK stand for?
Discovered and named by Marty Vanhoef a Belgian researcher, KRACK stands for Key Reinstallation Attack. This in effect is a security flaw which allows a hacker (attacker) to break the internet communications between a router and a device. For the weakness to be exploited though the hacker needs to be in close physical proximity of the access point of the communications.
What does this mean for an individual or a business?
It means there is a potential for a cyber security incident where the attacker can capture or interrupt the flow of information from your communications or they can use the weakness to potentially inject and manipulate data. For example, this may mean an attacker injecting ransomware or other malware into websites.
What is at risk?
Like all vulnerabilities, the risk is the loss of sensitive information such as credit card numbers, passwords, emails, photos, and documents.
What is the most likely scenario for a KRACK attack?
This is difficult to say as there are potentially so many situations, however, one potential target is those organizations that provide wifi access without a lot of IT resources. An example of this would be your local coffee shop.
Is changing passwords the best way to protect myself?
Changing passwords regularly is a basic security measure that is recommended, however, this will not prevent or mitigate an attack. In fact, the key element to protect yourself includes ensuring all devices are up to date with the latest updates. This includes ensuring the firmware on your router is updated.
A simple tip is to ensure you have automatic updates turned on which will help ensure you have the latest versions and protection installed.
Until you are sure that your device has been updated limit your usage of public networks especially with phones utilizing the Android operating system.
Only transact with websites that have an SSL certificate meaning that the sites URL will start with https instead of HTTP. This in effect means the site is using encryption which therefore makes it difficult to see what data is being transferred.
Keep yourself informed and be sensible with your usage of public wifi if in doubt do not connect and turn the wifi option off on your device. If still uncertain contact our nearest Computer Troubleshooter on 1300 28 28 78 and ask for a KRACK risk assessment.
Cyber security threats are continually evolving. Viruses, worms, trojan horses, spyware, phishing, adware and scareware have all been around for a long time. Lately, one particular form of malware known as ransomware has been creating havoc with businesses and organizations worldwide.
Ransomware when detonated works by locking up your files using encryption. You are then asked to pay a ransom to get the code that allows you to unlock your files. Lately, some cyber criminals don’t even add value to this “service” they offer. They just take your ransom and don’t give you the code.
Many customers we see during our daily work (and rescues) don’t even have the most basic cyber security measures in place. This article is intended for the non-technical amongst us to assist and educate about the need to protect computer users against these ever-evolving cyber threats.
In every case we have seen so far, the ransomware package has been physically detonated by a human using the endpoint. Ransomware mostly arrives in email as either an attachment or as a link to a malicious or compromised website. It can also be spread from software downloads, websites and advertising delivered over online ad networks.
What can you do?
Educating yourself and your employees are the #1 defense against cyber criminals.
The most basic cyber security needed on your computers and network.
Beyond basic – The next level of cyber security measures.
Once the basics are covered off, we can then talk topics like firewalls, VPS, cloud virus and spam pre-filtering of emails, changing settings in software, 2-factor authentication, and an application that detects and stops unauthorized encryption etc. These will give a much more comprehensive solution beyond basic, however “comprehensive” is probably beyond the scope of this document titled “Basic Cyber Security” and would make it rather long and too technical.
How can Computer Troubleshooters help?
Technical Stuff/Further Reading
Australian Government – Australian Cyber Security Centre – Essential 8 Explained PDF Download
The facts according to the Boston Computing Network’s Data Loss Statistics, are that 60% of companies that lose their data, will shut down within 6 months of the disaster. This is something that every business wants to avoid.
The following article provides a high-level understanding of how, as a business owner the question for you is one of Business Continuity of which Backup is a key component.
What is Business Continuity?
Business continuity involves a mindset of being proactive and putting plans, processes and systems in place, so that when the unexpected occurs you can return to normal operations with minimal delay thereby reducing the level of disruption and cost to your business.
The aim is to ensure that all essential functions can be up and running or be returned to operational status quickly during various unexpected events such as a natural disaster (Flood, Fire), cyberattacks, theft, or major IT system failure.
What is involved?
The key aspect is to develop a plan that then is well communicated and understood by your staff so they know what to do when the disaster occurs. Like all plans, if it is not communicated and shared then it’s not worth the paper that it is written on.
The process of writing the plan involves identifying the key risks, identifying the ways you can prevent those risks occurring for instance:
Then the last element of the plan is documenting the steps in responding and recovery if an incident occurs that does bring down your systems.
Businesses today are more reliant than ever on IT, one of the biggest threats these days being a cybersecurity breach. A fair portion of the plan will need to focus on recovery from an IT disaster.
The plan will need to be reviewed regularly as a business grows and circumstances change and the recovery processes should be thoroughly tested to ensure it will work.
What are your backup options?
There are many options available to businesses these days for backup. With today’s modern technologies and cloud storage services, a hybrid combination of traditional on-site backup plus off-site backup to the cloud, has become the popular choice amongst businesses wanting to ensure high levels of continuity.
The key questions in making a choice is determining the level of risk and the importance of the system and the data that is being backed up. Answering these questions will impact on the choice that you make. You can see I have not mentioned cost or price. One might ask Why? Well because you need to remember this is about having a solution that will minimise the cost of failure which will far outweigh the cost of the solution you choose.
If you are not certain about this statement ask somebody who has experienced the loss of data due to a failed system backup.
What are the traditional onsite backup options?
Onsite with machines all backing up either to tape or disc and then being stored onsite. Usually scheduled to occur daily, every couple of days, or weekly. The greatest weakness is that if something happens to the premises the backups can become corrupted and lost and an external service provider such as Kroll Ontrack may need to be used to try and recover the data.
To overcome the above weakness some business’s will transport the discs/ tapes to an offsite location where they are stored.
What is happening today?
The cost of online storage has reduced with the introduction of data centre services and the continued adoption of cloud storage services. Today most businesses will have a recovery strategy based around using cloud storage, with onsite backup devices that then replicate to a data centre.
The drivers behind this are many but one can put it down to speed of recovery, ability to quickly monitor and ensure backup has occurred, hence no unpleasant surprises if a data loss breach or cyberattack occurs.
The first step is to make sure you have a plan and an understanding of your options. This is where you should have a chat with your local computer troubleshooter to understand how they can help you to minimise the disruption to your business from a data loss/breach. Visit www.computertroubleshooters.com.au to locate your nearest provider.
Every day, every month there is a new threat to being able to conduct business effectively and efficiently. How do you protect a business from the threat of disruption whether it is a scam, virus, ransomware or simple network or internet failure?
The Australian Competition and Consumer Commission’s (ACCC) eighth annual report on scam activity highlights the significant cost and growth in the disruption to business. The cost of hacking scams had a fourfold increase between 2015 and 2016. Reported at a cost to business of 2.9 million in 2016. This highlights the significant risk of todays digital world to business.
Scams continue to become more sophisticated using modern technology to make fake emails, invoices, and websites appearing legitimate to even the most astute business person. These scams have devastating effects on businesses by eroding the investment they have made in their reputation, increasing operational costs and in certain cases crippling the business from operating.
This article looks at how a business can avoid becoming a victim of a scam by ensuring they have the right support and systems in place to minimise the risk of disruption.
Why does size matter?
Larger organisations have the resources, time and budgets to invest in ensuring they are not subject to an attack. As the headlines indicate even with this effort they are not always successful in defending themselves. The reality is that as smaller organisations are hampered by the amount of money and resources they can spend on IT, means that these organisations are an easier target for the cyber criminals. The cyber-criminal finds it easier to get in and often it takes longer to detect meaning more havoc created.
Smaller organisations are often a means to access and breach larger organisations. Why? Because the smaller organisation is often the weakest link (security wise) in a supply chain relationship thereby providing an entry point to the larger business partner.
What are the key elements to protect Business Continuity?
One must ask if the IT environment something that can just be left alone or does it need to be looked after? The answer is obvious it needs to be managed and looked after, it needs somebody who is accountable and responsible for ensuring that the risk is minimised.
For smaller organisations this leads to either employing a resource or developing a relationship with an IT Service provider who is accountable. It makes sense to develop a relationship where the provider is on the front foot and is monitoring all key elements and maintaining an organisations systems in advance of something going wrong. This is commonsense as it is about protecting against a major disruption to a business.
The key components that need to be looked at are:
The key element for a business owner is to understand how this approach shifts the nature of the relationship with your IT provider from being reactive to proactive. It means the IT provider is preventing breakdowns instead of reacting to a break down. This means a monthly fee for the maintenance rather than a call out figure. It means the provider is monitoring and using tools to remotely manage and perform maintenance activities.
What does this cost?
The key thing to remember this is an investment in ensuring a business is not disrupted. Some providers will charge per device; others will charge a monthly figure based on complexity of what they are managing; others will charge based on per user.
As a business owner understand what is included and what is not and what service agreement does the provider use. For instance, at Computer Troubleshooters we provide a 100% guarantee. To locate your local Computer Troubleshooter at www.computertroubleshooters.com.au
Change is hard to accept for anybody and in the case of IT management it is hard for people to see the monthly outlay as an investment in their future. But this is exactly what it is. It is a strategic investment that allows a business to minimize the risk of disruption and ensure it can continue to grow and develop.
Sources of information for this article:
The world is becoming more connected and the buzz word of the year is “The Internet of Things”. What does this really mean and will small to medium businesses be impacted? The short answer is YES, the harder question is How? Right now, there is no detailed answer but we do know the ‘Internet of Things” will change the way small to medium businesses do business as they use technology to innovate.
This article provides you with an overview of what is meant by the “Internet of Things’ and some of the challenges it creates and the impact on the relationship of the Small to Medium Business IT provider.
Internet of things defined?
The IT world is at its best with the use of jargon and having a language of its own that makes it hard for the ordinary person or the small to medium business owner. Let’s break down the mystique of the Internet of Things. (IoT)
Internet of things is defined as: the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.
Consumers are experiencing the impact of this convergence in all technologies everyday e.g., Smart TV, Internet Fridges, Cameras, Motor vehicles, home security systems, Smart homes electricity, hearting etc. The continued adoption is driven by the benefits delivered to each consumer in the way it improves their daily life.
Is it any different for a small to medium business? The answer is no. Every single business will look at ways they can use the interconnection of computing devices to achieve improvements in their business.
What are the Business benefits for small to medium businesses?
Every business owner will look to 1) improve the top line by increasing revenue from existing customers or from finding new customers, 2) gain efficiencies and improvements in the way products/services are delivered. 3)Reduce costs by streamlining processes, and 4) being able to accelerate the time to market increased responsiveness.
This impacts the way the small to medium business owner thinks about IT and the relationship they have with their IT advisor/technician. No longer is it about a break/fix relationship but rather one that requires the advisor to understand what the game plan is for the business and then provide the strategic advice of how technology can be used and the final part is the buying of and the implementation of the actual technology solution.
A recent Telstra report “Digital transformation. Are you disrupted or disrupting” reported that “55% of all respondents are actively seeking to disrupt current or new market’s”
What are the challenges confronting us with the evolution of IoT?
Security: With an increase in the number of network connected devices serious security measures need to be taken to prevent data leakage. More devices increase the number of vulnerable points. This changes the face of security and requires a total management perspective to ensure you are minimising the risks of a security breach and loss of data. The other challenge that goes with this is simply the volume of data that is being collected. This raises the challenges of data recovery and Business disaster recovery strategies. Without the data, it becomes very difficult to do anything.
Connectivity: As more devices are connected this will impact the thinking around the underlying infrastructure requirements and will drive a move away from traditional centralised server/client paradigms to authenticate, authorize and connect different nodes in a network.
Extended Network Management: IoT creates a need to work with larger data capacity and manage more IP addresses this means more work for the IT support group and they need to be managing around the clock as a business cannot afford the network to be down. This changes the nature of IT from Break/fix to proactive monitoring.
IoT is an issue that the smart business owner is going to take notice of. Why? Because of the benefits it delivers in being able to run a successful business whether that’s moving to a new business model or disrupting an existing market, or using data more effectively to gain improvements and reduce costs.
Stay tuned as this evolves over the coming months and years.
Some interesting reading:
“Digital transformation Are you disrupted or disrupting” Telstra
“Asia Pacific Industrial IoT Cloud platforms 2016” Frost & Sullivan commissioned by Bosch
In today’s connected business environment communication solutions are more critical than ever, yet deciding on what system, which technology, which provider is very difficult due to the variety and mix of solutions that are available. This article looks at assisting a business in navigating this very complex and difficult decision.
What is the starting point?
This is the easy part start with documenting what it is you require by analysing the business environment that you operate in. Sounds simple enough but it is often overlooked or not completed. This is where you will gain a clear picture of your requirement and your needs.
Some of the factors/questions that need to be looked at are: how does your business interact with customers? Do you have a dedicated team undertaking outbound activities, do you run a support centre? How big is the sales team? Is the sales team office based or mobile? How many calls will be active at any point in time? How many locations are employees located at? Do you have any compliance issues? What is the expected new numbers of employees next 12 months, 24 months? What level of integration is required across your systems and technologies? E.g. CRM System.
The above list is by no means exhaustive but it does start to provide a guideline for what is needed to consider in defining the requirement.
What are the key factors in evaluating a solution?
When evaluating a solution, the key criteria will cover Cost both initial investment and ongoing monthly recurring costs, Quality i.e. sound voice quality, including reliability of connection and speed, Ease of implementation i.e. level of training required, feature functionality, level of support provided and Adaptability being the ability to scale with expansion or contract if required.
Understanding your requirement by documenting it enables one to better identify the key criteria by which every solution can be rated and evaluated. This process enables an effective decision to be made.
Cloud Based Phone System V Traditional Physical Phone systems
Cloud phone systems have been heralded as the future of business communications. A cloud based system is simply a service that delivers calls and PBX -style functionality over an internet connection (Voice over Internet protocol VOIP)
Traditional phone system is based around a copper landline that is serviced by a telephone company such as Telstra. Typical equipment required includes an on-premise PBX hardware that may need to be upgraded as your employee numbers grow past the capacity of the PBX hardware you have purchased.
Feature comparisons between Traditional and Cloud Based systems
Both traditional and Cloud based phone systems have extensive functionality that will meet many business needs. Some people consider that there is greater programming capability with a VOIP system and less capital investment is required with VOIP solutions. My comment is that you need to ensure you have a solution that gives you the features you need now and in the next five years. You do not want to be changing phone solutions every 3 years. That is a very expensive exercise.
Speed of deployment/ Business Interruption
When assessing which system to purchase ensure that you have identified how much time is required to install and deploy the system as it is a key to minimizing the disruption to a business. Every minute a business is not available to conduct business the greater the impact on overall viability of the business.
A VOIP system requires a broadband connection and the more simultaneous users using the system means more bandwidth is required. Check to see if your Internet Service provider has a bandwidth cap in place and check the data usage regularly so you do not exceed the cap. Exceeding the cap is going to impact quality.
As a small to medium business you need to decide for your communication systems that is right for the business. A Computer Troubleshooters Service provider can assist you at all stages of the process of implementing a phone communication system. This is from the initial selection to implementation and ongoing support.
While there are many positives in implementing a VOIP system remember no matter what solution you choose there is always positives and negatives the final decision should always be based around the objective criteria you have defined.
VOIP Phone Systems
Sophisticated Provider response times
Easily set Up and configured Extent of support
Cost Dependence on provider
Easy to scale Educating staff in the system
Expansive Features System Software upgrade disruptions
Comparable call quality to landlines Availability of Bandwidth
No investment in hardware PBX Reliability of provider network
Soft calls receiving calls via your desktop or laptop Power outages
In conclusion, The Australian Communications and Media Authority (ACME) reported in 2014 (Australian SME’s in the Digital Economy 5-6) “that cloud services continue to gain acceptance and popularity with small and midsized businesses.”
The move to VOIP Unified Communications will continue and your local Computer Troubleshooter is there to help you make the right decision.
For every business owner, no matter what size of business you are managing knows that a key to success is ensuring that your business is increasing staff productivity. Why? Because the more productive you are means that you are increasing the output of the business at a lower cost per unit of output which means an increase in profits. In simple terms getting more done with less.
What is the role of technology?
The answer to that is quite simple as technology permeates our daily working lives. Think about what life was like with no mobile phones, no email, no internet, no electronic calendars, no collaboration tools and technologies like Skype. Technology today is so cost effective that all businesses can now afford to use these technologies to increase productivity.
Business productivity is the absolute focus of Microsoft Office 365. It is about ensuring that staff have access to: email 24/7 on any device that they use, remote access to data through the cloud and being able to work on that data via software such as Excel and Word etc.
One of the keys for every small to medium business is to ensure that technology is being managed and implemented across the business in a smooth and seamless manner so that their people are working at optimal levels to maximize the businesses productivity resulting in the best possible results.
How does technology impact on business productivity?
Overcoming the challenges of executing on a business strategy daily is where technology has the biggest impact for businesses. Using technology to create automation of tasks allows employees to communicate faster and effectively, give employees an ability to focus on the priorities that will deliver the results that the business is looking for.
When assessing business productivity tools such as MS Office 365, it is imperative that the business understands how it will help?
How can Computer Troubleshooters help you with Office 365?
The team at Computer Troubleshooters can help you across all stages of your implementation, from assisting you to identify the plan you need, implementing the package including the setup and migration of your email to Microsoft Office 365, to the ongoing management of your solution under a monthly subscription plan. To locate your nearest Computer Troubleshooter Click here
What are the key benefits for Business Owners?
Some things to think about are:
By implementing Office 365 will productivity increase?
Productivity does not increase simply by implementing Office 365 it is important that you educate your staff in how to use the technology effectively and to have identified a range of business processes and activities that can benefit from the technology and make certain you get the buy in of your staff to those changes. The lesson to remember is to have a plan of action for the change you are introducing to your business.