Download Free Report

How to enable your business IT Systems:

Is your business struggling to keep up with technology change?

As a business owner are you swamped with IT issues and user requests?
Do your business’ systems seem old and stuck in the past?

IT for most business has changed significantly in the last 5 years. Traditionally Small and Medium Businesses felt they needed to own their own hardware, software and support infrastructure. To have everything located in your office seemed safe and reassuring that your business was in safe hands. Then along came smartphones, Gen Y, and cloud computing!

So how do you take your business IT systems to the new frontier?

Surprisingly the change isn’t as hard or expensive as you think, you just need to see ownership as an old-fashioned way to view IT, you need to think more about access and scale as the key to better IT systems. By leveraging off broadband and cloud technological advances you can now achieve large business outcomes on a SMB budget.

Microsoft Office 365 is now the default software architecture for Microsoft products in Small & Medium Business, it forms the core of new business IT environments with over 80 million users worldwide and growing fast, it has proven to be reliable & solid.

Office 365 Advantages

Office 365 has been built as a cloud “software as a service” product so it is relatively device agnostic, controlled centrally with security top of mind. This means the Microsoft business office 365 environment is flexible, duplicable, accessible & remotely administered. Beyond the standard Microsoft Office suite benefits we have enjoyed for years it delivers additionally on 4 major areas;

  • Bring your own device - particularly smartphones & iPhones (BYOD).
  • Multi Device with Syncing between devices on multiple operating platforms.
  • Tablets, Smartphone & PC smoothing (same software on different device types).
  • Anywhere access – Security enabled and administered remotely.

This translates into 4 key benefits for users;

  • Same Operation - Outlook 365 looks feels and operates similarly on all device types.
  • Cross Platform – Microsoft, Apple, & Android all just work the same.
  • Simple Downloads – once your Outlook 365 tenant has been professionally setup, data migrated, & deployed – downloading the software on extra devices is easy if you know your admin stuff. Software is updated regularly automatically.
  • Syncing – it just works seamlessly regardless of what device you are using, it stays updated and syncs without any drama, knowing that the Microsoft data centre is doing all this in the background makes the value equation easier to swallow.

Personally, having used the combined office software now for some time, and having downloaded my Office 365 on 4 different devices and types (PC, Smartphone, Laptop, & Android Tablet) I am impressed, particularly with Outlook 365 with corporate grade email access from anywhere across the globe, on any device, and all synced and backed up at the Microsoft data centre. This alone is enough to justify Office 365.

Business Owner Considerations

  • Capital investment – do you prefer to invest to upgrade systems or use a pay as you go subscription model?
  • Space and operating requirements – do you need to run your own infrastructure?
  • Maintenance – would hosting dramatically reduce staff or outsource costs for your IT support?
  • Scalability – will you need to add or reduce users in the future?
  • Operating control – can you trust an external IT expert to remotely manage your systems?
  • Applications – can you use hosted applications or do you need to host locally?
  • Data usage and file sizes – are your business characteristics suitable to use hosted applications?
  • Broadband speed and capacity – can your internet bandwidth handle hosted usage?
  • Statutory data retention – does your business have a requirement to hold and protect data?

End user considerations

  • Access anywhere – do your users need access from PC, tablet and phones?
  • Syncing – do your staff need synced email and data?
  • Information sharing – would accessing business information on the move be helpful to your staff?
  • Seamless networking – would eliminating the need for a VPN reduce access complexity and increase productivity?
  • Backup and central control – would automatic backup and centralized control reduce your risk of user originated data loss?

In assessing these considerations, you may need some additional help to determine if the Office 365 alternative is applicable, feel free give us a call to discuss your situation.

Are you ready to IT enable your business?

So hopefully you can see a clear path to IT enable your business using Office 365 as the core software architecture. Office 365 offers a range of advanced tools that enables your employees to be productive anywhere and at any time across a range of devices. With Office 2016 & Windows 10 now fully proven you can combine to get the very latest software across your business knowing it works and is fully compatible.

Checkout our Office 365 Solutions Catalogue that sets out in detail how Office 365 can IT enable your business view either online or we can give you a printed copy.

If you wish to upgrade your IT Systems it will still requires guidance to get it right, so give your local Computer Troubleshooters office a call today and one of our technology professionals will be happy to discuss how Office 365 can benefit your business.

 

Posted in Computer-Repair | Leave a comment

Virus Removal

Do you suspect your laptop or computer has a virus? Is it running slow or do random windows pop up as you browse the web? Your computer may have an infection, or two. The good news is this can be fixed with a few helpful tips and programs. During this four-step process, Computer Troubleshooters guides you through the actions you can take to remove these irritating computer viruses.

4 Steps to Virus Removal – please note this information is regarding simple virus and malware removal – if you have a Ransomware virus such as Cryptolocker or a Locky variant we immediately recommend you turn off your computer and disconnect from the internet then seek professional advice from Computer Troubleshooters on Cryptolocker removal and data recovery, or risk losing all your data.

Step 1: Enter Safe Mode

To enter into Windows Safe Mode, first shut down your laptop. Turn it back on and as soon as you see anything on the screen, press the F8 key repeatedly. The Advanced Boot Options menu will appear, select Safe Mode with Networking, and then press Enter.

If you have Windows 8 or Windows 10, at the Windows login screen, select restart and hold down the Shift key. A window with options to troubleshoot your system will appear and you can choose the option to boot into Safe Mode.

If you log in and see a black screen, press CTRL, ALT, DEL to bring up the selection screen, and choose logout and then restart. Next, hold down the Shift key and select choose Safe Mode.

Step 2: Delete Temporary Files

Deleting any temporary files that you have on your laptop will speed up the virus scanning, free space and can even remove malware. Select Start > All Programs > Accessories > System Tools > Disk Cleanup > Select Delete Temporary Files

Step 3: Download and Run Malwarebytes

First, download, install, and update Malwarebytes onto your laptop. Once the program opens, keep the default scan option “Perform Quick Scan” selected and click the Scan button. Although it offers a full-scan option, Malwarebytes recommends that you perform the quick scan first. Depending on your device, the quick scan can take about 5-20 minutes and the full scan about 30-60 minutes.

If the quick scan does not find any infections, it will show you a text file containing the scan results. If you still think that your laptop has a virus, consider running a full scan. If Malwarebytes finds any infections, a dialog box informing you of the detection will appear. To see the files detected, select Scan Results. It automatically removes the infections that are known to be unsafe. If you want to remove other identified items, select those as well, and then click Remove Selected.

After removing the viruses, a list of the scan and removal results will appear. Review the results to confirm that the antivirus program successfully removed each item. Malwarebytes may prompt you to restart your laptop to complete the removal process.

Step 4: Tying Up Loose Ends

Your laptop should now be free of viruses, but your device may not be free of the effects the infection created. You may experience glitches to a particular search engine or homepages may come up that you did not choose. It is vital that you change all of your passwords and login data for anything that contains personal information like email and social media accounts.

If you are still having issues with your laptop or experiencing virus related behaviour, such as pop-ups or slow operation, get your device serviced at your local Computer Troubleshooters.

Of course, if removing the virus yourself seems dangerous & complicated or just don’t have the bandwidth to DIY, we can do it for you.

Alternatively, on our managed plans you get Anti-Virus and Malwarebytes included so they prevent the infections in the first place. Prevention is always better than cure.

We are here to advise you with the best security services and can install security measures on all of your computers and devices, provide information about online safety, place hardware to protect your private information and more! To keep your devices protected from hackers and viruses, call your local Computer Troubleshooters office today!

Posted in Computer-Repair | Leave a comment

Scams & Fraud everywhere – Beware!

Recently we have seen a spike in internet & email scams that could cost you time and money. The nature of these attacks may vary, but ultimately they all seek to make money from you in one form or another. We thought it would be worthwhile giving you, and those around you a heads up on the most preventable fraud attacks we have seen in the last few months:

  • Microsoft Support Pop- Up scam –  this latest malware looks to be using Google Chrome & Edge search browsers to enable a fake Microsoft Support Pop-Up on your screen it advises “Your Computer has been Blocked” and to Call for Support on 1800 152 454 – this connects you to a fake help centre who then do their best to convince you let them take control on your computer remotely.
  • Telstra Telephone Scam – in this scam you are randomly called by “Telstra” and told you have errors on your computer. To prove they are from Telstra they get you to login to your computer & access your CLSID, they then tell you your ID (amazingly this is the same on all computers). If you buy their story they then get you to remotely to connect with their TeamViewer connection so they can fix your machine. Once they have access they can install their own malware that starts to infect the machine, ultimately they will seek to charge you for fixing the malware they installed.
  • Invoice Reminder Scam –using electricity & gas company names and logos they just seem to be sending the latest bill to your email with an instruction to click to download, unfortunately they can link you to a purpose built website that downloads cryptolocker to your computer. cryptolocker is a form of ransomware that encrypts all your files and demands a payment in bitcoins to release, it is almost impossible to crack.
  • Prize Win Scam – generally targeting the more gullible these can arrive by SMS or email indicating you have won a prize (in a draw you never entered) and by clicking on a link and supplying details they either seek to gain personal information for fraud or to place phishing software on your computer to gain access to bank and credit card details.
  • Government Business Scam – this email scam generally takes the form of a government agency seeking to verify information examples include speeding tickets from police departments, tax office refunds, or complaints from agencies. Similar to other scams, by clicking on a link they install malware, phishing or cryptolocker to get a result.
  • Parcel Pickup Scam – Using recognized names such as Post, UPS or FedEx these emails indicate you have a package waiting for collection and by clicking on the link you can arrange delivery. Once again by clicking on a link they install malware, phishing or cryptolocker to get a result.

How to prevent becoming a Scam victim? Prevention – don’t open or click on unsolicited emails or SMS

  • Educate everyone on the risk of opening email attachments that they shouldn’t. They may receive an email that they weren’t expecting or something may look wrong about it. These emails can also come from a spoofed account that may look legitimate or even appear to be from someone you know. The bottom line is to always be careful when opening email attachments.
  • Be Skeptical – if something looks too good to be true then it is probably is! Think before you click – check the sending email address is actually a domain that would be associated with that business. You can also preview links to see if they look legitimate with the business name.

    Your Checklist to protect Yourself, Your Family and Your Business from Scams & Threats We suggest that you start with this brief checklist:

  • Maintain a Clean Machine by running the most recent operating system, security software, apps and web browser as a defense against online threats such as viruses and malware.
  • Security Software – every computer should have internet security protection to help detect infections such as Cryptolocker, it may also limit the harm done by warning you before the file is executed, should you accidently click on a malicious email.
  • Firewalls and Encryption should be in use by businesses to secure their internet connection. Educate employees about passwords and internet security guidelines.
  • Using a hybrid cloud service – Office 365 as a hosted email & file service that will always have a copy available in the cloud that will not be infected by some of these type of malware, so if your computer is inflected the original copy is located in the cloud can be accessed by a different device
  • Have a regular backup copy – have a scheduled backup so you always have a recent copy of your files.
  • Have a Backup to non-networked drive – Cryptolocker and its lookalikes can find mapped and shared drives. For your backup either rotate external drives or have off site scheduled backup. Beware of using sync backups such as OneDrive as they can also be encrypted.

Computer Troubleshooters Can Help Your Family & Business with Cyber Security Computer Troubleshooters can do an assessment of your business’ computer network. We can also provide recommendations for establishing a strategic approach to cyber security and assist you with a variety of solutions to reduce the risk of a security breach.  We strongly encourage you to prepare your business for the threat of a cyber security crime, call your local Computer Troubleshooters office today for help and advice.

Posted in Computer-Repair | Leave a comment

Business Continuity Planning (BCP) – Surviving a Disaster

Protecting your business from disaster seems like an obvious strategy to reduce the risk of failure. How many businesses have a Business Continuity Plan to minimize loss in the face of disaster?

What are the 5 key risks to business?

  • Natural Disaster – fire, flood, earthquake, & cyclone.
  • Security Breach – burglary, employee theft, vandalism & cyber-attack.
  • Equipment Failure – infrastructure failure (sprinkler systems), IT hardware failures, broadband & utility failures.
  • Compliance Breach – privacy, data confidentiality, data retention, tax, & OHS.
  •  Operational Breakdown – data loss, product recall, & service delivery failure.

Most of these risks effects on your business are predictable so you should be able to determine the correct course of action to minimize the impact an event on your business.

Focusing on the IT side of the risk mitigation:

  • Natural Disaster - Offsite replication of data & cloud based infrastructure.
  • Security Breach – Unified Threat management & scheduled backup of systems & data.
  • Equipment Failure - Redundancy of broadband links & standby hardware.
  • Compliance Breach – Centrally controlled IT security polices, user access & data retention.
  • Operational Breakdown - Standby hardware & UPS power systems.

How can this be achieved in SMB Business?

Many of these goals can be achieved by using off the shelf solutions & professional IT support. Most businesses have similar IT requirements and can achieve a large number of BCP goals by simply implementing an ecosystem approach like Microsoft Office 365. Office 365 is a hybrid cloud solution that provides hosted email & file storage that can means some goals such as backup, redundancy, compliance & operational control can be easily maintained in the face of a disaster. Office 365 is controlled from a remote central console so other areas such security policies, user access, and data retention can be maintained remotely by an outsourced IT specialist. Of course, some of these risks remain within your premise and need to be assessed by an experienced IT person who can make recommendations as part of your plan. These would include plans for local backups, on site essential server replication to an offsite location, local user internet protection & core business application protection & data backup.

IT Assessment Recommendations

Ideally you should get an IT professional to look at your business as part of a bigger review of your operations with other experts. However just getting an IT assessment done on your business and listings their recommended solutions for to each type of risk outlined above will at a minimum will give you sense of the solutions and the time taken to recover.

Your Business Continuity Plan

Your BCP should be also part of your business strategic plan that in IT determines the longer term structure and IT risk that is acceptable to your business. In reality getting an IT assessment with a view to accepting an off the shelf solution like Office 365 with support by IT professional may provide 80% of the IT BCP plan with the local premise solutions evaluated individually, Talk to your local Computer Troubleshooters about doing an IT assessment to keep your business running smoothly if you’re suddenly without your technology.

Posted in Computer-Repair | Leave a comment

Windows 10 Update – Should You Update Now?

Recently Microsoft has stepped up its messaging for the free Windows 10 update. Almost every day you will get a Microsoft pop up message inviting you install Windows 10 and suggesting a date for this to commence. So while Microsoft are keen to for you to schedule your Windows 10 download, is it going to be in your best interests to complete the update?

Since the launch of Windows 10, Microsoft has offered a free upgrade to Windows 10 for Windows 7, 8 & 8.1 users, this offer is set to close at the end of July 2016. No indication has yet been made by Microsoft of extending this offer.

First released in July 2015 the Windows 10 operating system is now on over 300 million devices worldwide and by most reports is an improvement on Windows 7 & 8 in both speed & functionality.

So if you choose to do the Windows 10 down what do you expect:

  • The upgrade will take a significant amount of time usually 30 minutes to 1 hour, however this will depend on the internet connection you use.
  • The upgrade will use around 3GB of data so make sure you have sufficient data allowance to download.
  • It is recommended not to use a wireless broadband connection, as quite few have found themselves stuck mid download after losing a connection or racking up huge mobile data bills.
  • Once installed the opening desktop screen will look completely different to the traditional Windows (pre Windows 8) desktop, dominated by icons and tiles, but don’t panic the underlying system logic remains fairly much the same.
  • Within a few days most users are navigating the Windows 10 system as they always have, you just need to be patient.
  • Just remember to take a backup before you embark on the Windows 10 update journey for your own piece of mind.

Are You Currently Using Windows 8 or 8.1?

For many users that are currently on Windows 8 or Windows 8.1, the new Windows 10 has the same look and feel but has improvements that make it faster & more featured. One of the main focuses of Windows 10 was to address the many complaints that were lodged about some of the downfalls of Windows 8. However, there are still issues that you need to consider.

If you are considering upgrading your PC or laptop from Windows 8, you will likely be thrilled with the changes and again should take advantage of the free offer. If you are a business that is considering upgrading from Windows 8, you will want to consult with a technology professional about the impact this type of change will have your business.

Are You Currently Using Windows 7?

Microsoft intends to keep Windows 7 on extended support until at least 2020, so there is no requirement that you change anything at this time. So you have a choice to stay where you are, or take on a free version of the new look operating system. If you are perfectly happy with your system today, then you can wait to move to the new operating system when you naturally upgrade your hardware.

Are You Using an Old Operating System or Software?

If you have a device that is currently using an operating system that was released before Windows 7, like Windows XP or Vista, you will have to pay for the upgrade. However, if you are still using a device with one of these older operating systems you need to consider an immediate upgrade to at least Windows 7, as your system is likely no longer secure. If you are using an older OS such as Windows XP you need to understand this is no longer supported by Microsoft and you are at considerable risk of malware & viruses.

You also need to be aware that older printers and applications may not be compatible with the newer operating systems. Therefore, if you are using older peripheral equipment or an older piece of software that you cannot live without, you will want to do some research on what your options are before you choose to upgrade.

In Summary

The Windows 10 update is now a proven product, though not perfect, & those with Window 8 & 8.1 should take the free Windows 10 upgrade while it is available.

Those with Windows 7 should consider the change in look and feel before they upgrade – thankfully Microsoft has made downgrading back to Windows 7 relatively easy.

Those with older operating systems are confronted with the need to update regardless as XP & Vista become unsupported and over time more vulnerable to attack.

Computer Troubleshooters can provide Windows 10 update help or if you experience an issue with a Windows 10 download we can support you to make it work correctly. Or if you simply are wary of doing the Windows 10 update yourself we can complete the download & setup for you. Call your local Computer Troubleshooters today for Windows 10 support & advice.

 

Posted in Computer-Repair | Leave a comment

Tech Support:  7 Deadly Signs You Should Never Ignore

We have all done it, we all ignore some very blatant signs that something is wrong with our computers deferring the call for tech support.  We will let it go or find a workaround to push off having to deal with the problem as long as possible. Unfortunately, that often means we put it off until something really bad occurs and we are thrust into a very costly or even devastating situation.

To avoid the risk of a serious emergency for your business, watch for these signs indicating your technology may be in need of professional tech support:

  • Regular pop up messages;
    • This often includes critical issue like renewing your security software or installing important updates for your operating system or applications, if they not being completed you are vulnerable to security attacks.
  • One or more systems are running unusually slow;
    • This can be a sign of hardware starting to fail or software corruption.
  • Your system regularly freezes up and forces a reboot for no apparent reason;
    • You may have a hard drive on the brink of complete failure and the potential for loss of important data if not addressed immediately.
  • You face the “Blue screen of Death” or a blank black screen;
    • This generally happens with older systems, when disk sectors are failing they can often have difficulty loading the operating system, while it may work when you reboot it is a sign that all is not right and a future catastrophic disk failure maybe round the corner.
  • An application closes without warning;
    • When a business application closes without warning it could mean you don’t have the latest version of the application or that your operating system is not compatible with the version you are using.
  • Your system is making noises;
    • Like any electronic device, computers need to be properly maintained and regularly cleaned.  Any unusual noise should be looked at right away and can be as simple as a dirty fan or as critical as a failing hard drive.
  • Blinking or flashing screens;
    • If you experience screen resets in the middle of using applications it may mean your video card or graphics chip is failing and is a clear warning sign that it will fail permanently in the future.

Computers and software are likely one of the most expensive and important assets in your office.  Your business cannot run without them.  It is critical that you make sure that they are properly maintained and that problems are addressed quickly by a professional tech support.

If any of the seven deadly situations listed above sound like your business or home, you need to call your local Computer Troubleshooter professional tech support right away.  They will come to your office and work with you to assess the problems and determine the proper course of action that meet your needs and budget.  Remember, even small issues can be a sign of a much bigger problem, so don’t put it off!

 

Posted in Computer-Repair | Leave a comment

Microsoft Internet Explorer Update

Microsoft Internet Explorer has been at the heart of the Windows Operating system as the default browser on most computers since the rise of the internet. With 11 versions since it made its debut on August 16, 1995 it has evolved with the internet.

Microsoft are keen to migrate everyone to the latest version of Internet Explorer 11 and have announced as at mid-January 2016 they will only push security updates and bug fixes to Internet Explorer 11 users currently running Windows 7, 8.1 and 10.

Those utilizing legacy versions of Microsoft’s Internet Explorer (8, 9, & 10) could be exposing themselves to malware and cyber-attacks that not only demolish your computer, but can lead to a slew of other hazards like identity theft.

To ensure security and an agile browsing experience, Microsoft highly recommends that users upgrade to Internet Explorer 11.

 

What’s new with Microsoft Internet Explorer 11?

If you are currently running on a legacy version of the popular web browser and are uncertain as to why you should upgrade, here’s what you can look forward to in Internet Explorer 11.

  • Elite web browsing. Even if network speeds are slow, new support enables Internet Explorer 11 preview to have the fastest browsing ever. It also allows network requests to be formulated so information is received at lightning speeds.

  • Streamlined navigation. 
    Updates to how information is gathered helps search results feel instant.
  • 2D and 3D capabilities. For gaming and other interactive content, Internet Explorer 11 is equipped with the latest Web Graphics Library standards. Internet Explorer 11 also maintains superior security, dependability, and performance.
  • Excellent for all screens. No matter the size of the monitor or tablet you have, Internet Explorer 11 supports gyroscope input and display orientation lock. For the extra large screens, Internet Explorer 11 also has side-by-side browsing, multi-monitor support, and high pixels per inch (PPI) scaling.
  • Superior compatibility. Internet Explorer 11 enhances compatibility with web standards, and real-time websites. Support has been fully integrated for popular web standards and improvements that forbid older websites from displaying incorrectly.
  • Impenetrable Security. Internet Explorer 11 raised the bar on security to defend you, and your devices. Previous versions blocked 85% of malware, but IE 11 now has a 99% block rate.

 

What are the alternatives to Microsoft Internet Explorer?

On March 17, 2015, Microsoft announced that Microsoft Edge will replace Internet Explorer as the default browser on its Windows 10 devices and will work in tandem with Office 365 products. This effectively makes Internet Explorer 11 the last release, so maybe you might like to try something new & choose other browser providers as your default browser, here are a few alternative you might consider;

  • Google Chrome is a freeware web browser developed by Google. It is estimated that Google Chrome has a 58% worldwide usage share of web browsers as a desktop browser. It is also the most popular browser for smartphones, and combined across all platforms at about 45%. It can easily be loaded onto Windows, Mac, Linux, Android, IPhone & iPad. Generally, it is believed that if your use Google as your home page that it runs better with Chrome.
  • Mozilla Firefox (or simply Firefox) is a free and open-source web browser. Firefox It can easily be loaded onto Windows, Mac, Linux, Android, IPhone & iPad. It is preferred by many geeks and developers not only due to it open source coding heritage, but it is generally regarded as a low resource hungry alternative.
  • Maxthon is deceptively powerful &, stuffed with lots of little features that you would never discover unless you knew they were there. There’s also an option to put the browser in split-screen mode. The browser comes with AdBlock Plus pre-installed, so you’re unlikely to ever be troubled by bothersome pop-up ads or auto playing videos. Maxthon’s trying to position itself as the “cloud browser”, with the option to share bookmarks, password and history from device to device – it has browsers for Windows, Mac, Android, iOS, Windows Phone and Linux. For those who don’t trust big corporations such as Google and Microsoft with such data, it’s another good option.
  • The Tor Browser has a simple purpose: to prevent others from tracing your internet activity. It reroutes your internet traffic around a host of volunteer relays across the world, making it incredibly difficult – if not impossible – for anyone to trace the sites you visit back to your individual IP address. It is a derivative of the Mozilla Firefox open-source web browser and works on most devices and can be contained on a USB for complete anonymity. Why might you want to hide your location or identity? Of course, there are all manner of reasons, but there are some pretty strong legitimate ones too, such as whistleblowing from inside an organisation, to avoid having your browsing activity traced by an employer, or to post with complete anonymity on a forum or message board.

 

What next?

You should upgrade your version to Internet Explorer 11:

  • How to upgrade to Windows 11. Generally, this upgrade will happen through automatic updates in Windows. However, if automatic updates are turned off, you will need to go to Control panel > Windows update > check for updates.
  • How to know what version of IE you’re on. Open browser > click the Tools icon in the upper right > click on, About IE.

If you decide on a different browser:

  • Simply search for the browser online then Download the software onto your device, generally once it is downloaded it will ask if you wish it to be become your default browser: Tick or click yes. The next time you access a link to the internet it will use the new browser.
  • If this doesn’t happen Open your control panel & check your settings under Internet Options

 

Do you need help with your internet browser?

Computer Troubleshooters can help resolve many issues in accessing the internet and fixing the settings and software on your computers. We can also provide recommendations on internet security & network setups to help you get the best performance to reduce the risk of a security breach.  Call your local Computer Troubleshooters office today for help and advice.

 

Posted in Computer-Repair | Leave a comment

Cryptolocker Removal

The Cryptolocker family of ransomware viruses and look-alikes (CTB Locker, Cryptowall, Torrent Locker, Locker, Locky etc.) are now well known as one of the major causes of data corruption and data loss across the world. Cryptolocker doesn’t discriminate, from the single user to the largest corporate network, it can invade and lock down all data inside the network. Once your data is encrypted you are in big trouble! Data retrieval & Cryptolocker removal is a big deal.

Recently new variants have appeared that are essentially the same Trojan, but are much more effective in preventing Cryptolocker removal & data retrieval. Cryptolocker is propagated via infected email attachments, and via abotnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public key cryptography.

The payload hides within an attachment or a link to a website. Once a user opens the attachment or the website link, the virus is activated and promptly goes about encrypting your files (both on the infected machine and on any additional network shares it can find).

Once the encryption process is complete a message, pops up on your screen delivering both the bad news and a ransom demand. Extortion of your hard earned money has begun. Because of the high level of encryption used by the virus, the only way to get your data back is either to pay the ransom or recover your files from last night’s backup. In addition, many extorted business owners have reported that the payment of the ransom does not always get their data back.

How to prevent a Cryptolocker infection?

Prevention – don’t open or click on unsolicited emails

  • Educate everyone on the risk of opening email attachments that they shouldn’t. They may receive an email that they weren’t expecting or something may look wrong about it. These emails can also come from a spoofed account that may look legitimate or even appear to be from someone you know. The bottom line is to always be careful when opening email attachments.
  • Well known examples include emails from Banks, Police, Postal Services & Government agencies – remember if in doubt don’t open or click

How do you mitigate Cryptolocker risk?

Our Number 1 Tip – Always keep a non-networked copy of a backup of your data by rotating storage media – external hard drives or USB or use a non-synced cloud backup resource.

  • Regularly backup important data. Keep it within unconnected storage & rotate storage media.
  • Always ensure your operating system and security software is fully updated.
  • Consider purchase of a specialist anti cryptolocker tool.
  • Consider moving more of your data into cloud storage (not OneDrive or synced storage)
  • Block all .exe and .zip attachments at your email gateway.

 

What to do if you have Cryptolocker?

If you get a Cryptolocker pop up message on your screen it will generally say that all your files have been locked & encrypted, this means the execute file is in progress or finished the encryption. Before you consider Cryptolocker removal you must immediately do the following to minimise impact on your machine and network (it can spread to others on your network)

  • If one of your computers gets infected, then immediately disconnect it from the network & shut down the infected machine. You should also shut down all other devices on your network.
  • If you have been compromised then immediately change all of your organisation’s network and on-line passwords.
  • Disconnect all backups on your network including other non-infected devices.
  • Removal all LAN & device connections.
  • Call an expert to get professional advice on next steps

Cryptolocker Removal?

Once you have isolated your machine & network, a professional such as Computer Troubleshooters, can do an evaluation of your next steps – checking backups, assess other devices, extent of infection, & the best method of data retrieval.

Once this is done we can determine if we can do a data restoration & Cryptolocker removal – it is a complex process, and in some cases if a backup has not be done properly or the steps above have not been followed it can be a compromise solution, or worse case you may need to pay the ransom. Even if you pay the ransom the Trojan still needs to be removed otherwise it can be reactivated,

Prevention is Key

With this type of threat it is better to “think when, not if”, as the human element eliminates even the best planning. Thinking now about business continuity may save considerable time, expense, and disruption.

Computer Troubleshooters can do an assessment of your business’ computer network. We can also provide recommendations for establishing a strategic approach to cyber security and assist you with a variety of solutions to reduce the risk of a security breach.  We strongly encourage you to prepare your business for the threat of a cyber security crime, call your local Computer Troubleshooters office today for help and advice.

 

Posted in Computer-Repair | Leave a comment

Yammer – What is it?

Microsoft have announced that all Microsoft Office 365 tenants with less than 150 users will have Yammer automatically turned on in their Office 365 tenant. So along with your standard suite of Microsoft Office products (Outlook, Word, PowerPoint, & Excel) you will increasingly see Yammer icons appearing on your screens. So what is Yammer and how can it be used?

Yammer is an enterprise grade Social Networking platform for businesses, and works similarly to Facebook in allowing online conversations between single users and groups.  Yammer can be setup so everyone across your business can access from multiple devices (PC, Mac, iPhone, Smartphones & Tablets) and communicate instantly with groups or other users, this leverages the increasingly integrative cloud capabilities within the core Office 365 product range, cloud applications such as Yammer are fully included in most subscriptions.

Why use Yammer?

Yammer is an integrated communications tool with instant messaging, message posting, group discussions & collaboration that allows security, permissions, & licences. It is controlled by the central admin panel for Office 365, which means you determine who in your organization can use the platform and which groups they can be a member. Unlike Facebook which is a public domain application, Yammer is run as an enterprise grade platform covered by the Office 365 Trust Center with significant privacy & security advantages over public applications.

Yammer is following the huge social shift in communication to online, particularly in the younger generation who have become digital natives with social networking as their preferred method of sharing & nonverbal communication. Many see the Yammer social network for businesses as a way to get work done smarter and faster designed for a generation addicted to social networking. Microsoft say it is a way of “bringing teams together” in a single communication hub reducing email trails, encouraging real time collaboration & feedback.

Users with a license that includes Yammer can start accessing Yammer from Office 365 via the Yammer tile in the Office 365 app launcher or start a Yammer conversation from other Office 365 apps. Existing Yammer users, who are also Office 365 users, can start signing in with their Office 365 credentials, unifying their sign-in experiences

How does Yammer work?

Assuming you have Office 365 you, or your administrator should be able to setup Yammer for your business reasonably easily.

  • User Profiles – The Profile is the starting point for each user with settings for basic personal details, contact information, organisational information, password management, and notification settings.
  • Groups – Groups can be set up internally for employees to share information, set by the group administrator this could be by department, by project, or all company. Users can be invited to join multiple groups & new groups can set setup reasonably easily
  • Internal Networks – Yammer can be set up for both internal & external network communication. The internal (or Verified) network is the main domain that each email is setup against, if all employees have the same domain they can access the full range of Yammer services between internal users.
  • External Networks -Yammer allows you to also join external networks that have members outside your organisation (different domain names), they  can either be public or privately invited (you request to join), there is a great search function that allows you find external networks which you may like to join (e.g. industry groups or subject support groups)
  • Notifications – in settings you can change the notification settings for each group or network, so for an internal group you may wish to see every contribution as it is made and get an daily email summary, while for an external industry network you may wish to get a daily summary as the end of each day. These can be changed by the individual user and generally depends on the traffic & importance  the group or network to the user.

Once your User Profiles, Networks, and Groups have been setup it is time to use the application for communication;

  • Inbox – just like email or on Facebook the inbox shows all activity or posts to have occurred in your internal groups or networks in a conversational flow with images and comments.
  • External Networks – you need to change into an external network to check activity or make a post.
  • Online Now – Yammer has a presence function to identify when other people on your internal network are online and able to chat (each profile online shows a green dot).
  • Update, Poll or Praise – these are types of comments anyone can make to the group to engage members or participate in conversations.
  • Files – Yammer allows files to be uploaded and shared across groups, versions maintained, and stored.
  • Search – The search function in Yammer is powerful using both #hashtags and conversational search it allows users to search group history of conversations, files, & topics, ultimately building a knowledge base within each group.
  • Icons – once you have Yammer working you will have Yammer icon on your PC Taskbar that shows when you have a message in your group.
  • Apps – there are number of Apps that facilitate Yammer on smartphones, iPhone, & Tablets – they all provide notification & user access for contributing on the go. There is an App store for other apps to facilitate specific areas such as awards, suggestion boxes, and milestone reminders for projects.

Do you want to know more about Yammer?

Yammer maybe a great addition for your business & with no additional licence cost as part of many Office 365 subscriptions. Office 365 is increasing the preferred IT platform option for most businesses, we can help with the user setup, data migration, & ongoing administration of the your Office 365 environment, as well as making sure you get the most from the other value added Office 365 services such as OneDrive, Skype for Business, & SharePoint.

Computer Troubleshooters can help you setup Yammer as part of your Office 365 solution and ensure you understand the limitations and recommendations we have around the implementation of these services. Call Computer Troubleshooters today to see how we can get you started with Office 365 and at the same time get you started with Yammer.

Posted in Computer-Repair | Leave a comment

How to reduce your business costs?

Reducing business costs is a “no brainer” win for most businesses, you get the upside directly into your net profit without investing more capital & the gains are ongoing. So in your business, where are the best areas to look for cost savings?

The hierarchy of costs in most business are;

  • Cost of Goods – cost of goods sold, distribution costs, inventory holdings and losses.
  • Payroll – staff wages, superannuation, annual leave, long service leave, workers compensation,
  • Overheads – rent on premises, travel, insurance, car, utilities, telecoms, broadband, & IT systems.
  • Marketing – advertising & promotion, printing, postage, web marketing, agency & creative costs.
  • Transactional Costs – banks charges, credit card charges, freight.
  • Outsource – accountant, lawyer, cleaning, specialist support services.

How to finding cost savings in your business?

While every business is different, as a business owner you can employ the same strategies as large corporates or cost analysis teams use to find cost savings:

  • Request Quotes - from existing & alternative suppliers.
  • Reduce Investment – seek alternatives to investing in new infrastructure or assets.
  • Operations – is there a better or new way to operate to achieve your operations goals?
  • Review Business Practices – does your current staff structure match your current requirement?
  • Support – internal staff versus external outsourcing.

When performing this task to finding cost reductions, quite often the answers are not available internally. Often external suppliers & outsourcing companies can tell you about alternatives and what competitors have done that might deliver savings to your business.

In our business we call this an “IT assessment”, where we go into a company and look at their current IT setups, review their business practices, assess their operational goals, and then give recommendations.

How to find ICT cost savings in your business?

We recommend the same approach as the generic saving strategies above: here are some examples of how these types of saving can be achieved;

Telephones & mobiles

  • Ask you existing supplier for a current contract, approach alternative telco for quotes on mobiles, landlines & broadband; this should be done every 2 years as plans change often, particularly with data allowances growing. Remember to approach the SMB focused channels as they generally have cheaper plans to retail shops.
  • Introducing a BYOD (Bring Your Own Device) policy for your business, providing only calls and data to employees this saves contracting phones and tracking devices while the employee get to use their favourite device (iPhone or Android) without you footing the bill.
  • VOIP (Voice over broadband) developments have meant that roaming between office, home, travelling, or even overseas can be seamless to the caller – this means your phone number can follow you around and have integrated messaging with email & SMS.
  • Businesses can reduce investment by not investing in a physical PABX, but using a hosted PABX which is VoIP enabled. Charges are typically by the seat by the month but with cheaper calls and full PABX capabilities.
  • Office 365 includes features such as Skype for Business & Yammer (an internal social media platform) that allows teleconferencing, cheap external calls, internal messaging, and profile tracking that could reduce your external communication & travel costs.

 

IT Systems

  • If you have an external supplier for IT support ask them for a new contract and at the same time seek an IT assessment from another supplier. The key is to compare similar service levels and requirements, at the very least you can be assured you are getting value.
  • If you have internal staff managing your IT then you need to compare costs against the outsourced alternatives. Requesting an IT assessment from an external IT support supplier will be enable you to compare costs, remembering internal staff carry at least a 30% overhead component above their wage cost. Internal staff are often not aware of alternatives or may have a vested interest in not recommending substantial changes to IT support & systems.
  • The development of Cloud Computing has meant that many SMB’s can change business practices & IT structures by shedding internal IT staff, reducing internal IT infrastructure, and outsourcing the remaining support requirements with savings of up to 50% of costs.
  • Switching from internal infrastructure to hosted infrastructure, such as Office 365, can save you on the substantial initial capital investment for hardware & licences. It can also provide flexibility for future growth/decline, plus you save on running costs for rent, air conditioning, electricity, and on premise support that is a necessary part of having an on-premise infrastructure.
  • Cloud hosted systems such as Microsoft Office 365 offer great flexibility & save time for staff to access email and data while not in the office (in fact it can be accessed from anywhere around the world), & from multiple devices. This can only be delivered securely by the centralised Office 365 portal developed for remote management & administration of business accounts.
  • We often find that some companies just use their main business application vendors support desk for general IT support. This can be a very expensive approach to IT support – we recommend splitting applications vendor support from the general IT on premise & user support, this can again save up to 50% of the general IT support costs.

Reducing business costs is great way to improve your businesses bottom line, but it does require a focus on seeking alternatives to current operations and structures.

Call us for an IT Assessment to help find cost savings & reduce your IT costs?

So there are few ways you can drive more savings from your ICT. Ultimately for business we recommend giving us call so we can make a time to discuss your needs and put together recommendations on how we could help your business save ICT costs.

Let the experts at Computer Troubleshooters work with you to assess your IT needs and develop a customized plan for your business to reduce your costs. Give your local Computer Troubleshooters office a call and one of our computer professionals will be happy to help you

 

 

 

 

Posted in Computer-Repair | Leave a comment