On: October, 27th 2013 | Under: Uncategorized
Cloud Computing is the latest buzz word in IT, but what does it really mean for Small Business in Australia. What IT services will Small Business use? What IT support will they require to migrate and maintain their IT systems?
The reality is that cloud computing can come in a few different varieties and the chances are you are probably using one already.
- Software as a Service – this is where the software that you would use in your business are physically running in data centre and you are access via your internet connection. The advantage of this type of relationship is that the provider does all the system and application maintenance, you can generally access from anywhere on the internet and the systems are often designed for multiple users access. Most of the financial products such as MYOB, Quickbooks and Xero have this as an alternative.
- Infrastructure as a Service – With advances in virtualization technology it is now possible to have all of the business benefits of a server. With the physical server located in a data centre the provider is able to partition servers to multiple clients sharing the costs and allowing businesses to avoid the initial purchase & licencing costs, and share the running and upgrade costs such as electricity, and end of life replacement. If your current Hardware is more than 3 years old is may be worth checking this alternative.
- Platform as a Service – This is when a both the Software & Infrastructure can be provided in such a way that your business systems are located in the cloud. Increasingly software providers and integrators offer complete platform service that allows your business to outsource IT to a specialist who can run you business systems for you remotely. Microsoft Hosted Exchange email is a great example where an outsource provider can manage the administration & management of the system, while your business can enjoy enterprise grade IT delivery without the big business price!
- Hybrid Cloud – Hybrid is really a combination of your traditional on premise infrastructure with any of the 3 Cloud components mentioned above. It is not only regarded as migration strategy, but also a legitimate IT approach that allows you to cherry pick the suitable components for your business and integrate with your current infrastructure. Hybrid is a sensible alternative to gaining the benefits of cloud with the advantage of traditional on premise equipment.
Increasingly application development & Microsoft licencing is pushing all Small Business in Australia along the cloud path in one way or another. Our love of mobile and multiple devices also make the cloud approach more manageable. With soaring costs of electricity, & building of more of data centre capacity, the opportunity for Cloud services for Small Business is now a reality especially with additional benefits such as power redundancy, centralized backup, and core systems management.
Some of the downside of Cloud computing still exist, issues such as internet access speed, internet redundancy, data security, and data sovereignty (is it in Australia?) need to be understood and managed. An IT support provider such as Computer Troubleshooters have considerable experience in setting up a migration and system plans that maximises the benefits and minimises these risks.
Having an IT support expert like Computer Troubleshooters who interests are aligned with your business interests will ensure you get the best solutions at the right price. We would only suggest embarking on the Cloud journey with a guide who will help you along the way.
Talk to your local Computer Troubleshooters to see if your business would benefit from having more of it Business Systems in the cloud.
On: October, 16th 2013 | Under: Uncategorized
Cyber Crime continues to grow at an alarming rate worldwide and we are all potential victims unless we take a few precautions, here is a brief explanation of the risks & our prevention checklist.
What does “cyber environment” actually mean? We can interchange that term with others such as information technology, computer networks, Internet, digital, wired and virtual. It’s the non-physical terrain created by computer systems that is keeping us more interconnected than ever before. The average person now spends over five hours a day in online activities related to jobs, education, e-mail, mobile banking, health care, online shopping, travel, entertainment and social media communications. All of this digital convenience also presents a wide range of threats, dangers and responsibilities. Especially with more information shared via Smartphones, tablets and other mobile devices, we need to be increasingly vigilant about the security of our personal data.
The Dangers of Cyber Crimes
For individuals, the ever-present danger of cyber crimes includes hacker theft of confidential information, money, credit, banking and even medical information. This type of crime often results in personal identity theft. Other facets of cyber crime include online bullying and stalking that can affect your children. Malicious business scams are probably the most common. The threats to businesses include the loss of intellectual property, stolen client data or harm to the business’ computer network. The statistics on cyber crime are sobering. In 2013, online scams had increased by 355%. Cyber attacks on small businesses had increased by 18% over the past two years, with over 60% of these targeted businesses closing their doors within six months.
How to Protect Yourself, Your Family and Your Business from Cyber Crime
In both our professional and private lives, each of us needs to assume responsibility for our online activities. These responsibilities involve a combination of equipment maintenance and software updates coupled with appropriate online behavior and a constant vigilance against criminal activities. We suggest that you start with this brief checklist:
- Maintain a Clean Machine by running the most recent operating system, security software, apps and web browser as a defense against online threats such as viruses and malware.
- Firewalls and Encryption should be in use by businesses to secure their internet connection. Educate employees about passwords and internet security guidelines.
- Spam and Phishing are hazards you can avoid. Don’t open e-mailed attachments from strangers and never click on unknown links contained within e-mails. Enable the filters on your e-mail programs to screen for spam. Beware of messages indicating upgrades, technical updates and special offers. These tactics are no longer limited to e-mail, so be vigilant when on social networking sites.
- Backup Your Computer and Mobile Device in the event that your equipment is physically stolen or lost. You might have lost the device, but the data is preserved by the backup system. The theft of smartphones has become a major crime. Be aware of where your smartphone is at all times. If your phone is missing, consider using locator apps and you can even use a remote wipe to clear information from your missing phone.
- Secure Your Device by activating the key-lock feature and using a password. A particularly complex password is suggested. Change your passwords periodically.
- Safeguard Your Personal Information when using unsecured, public connection by avoiding apps or websites that require your password. These are the types of connections accessed in airports, hotels, coffee shops and libraries. You might want to reconsider doing your online banking in an airport.
- Manage Your Social Network Privacy by reviewing the latest changes to privacy settings and be sure you are using these settings properly. Think twice about what you are posting on these sites – more people might see this than you think. Educate your children about social media behaviors. Hide your e-mail address from online profiles.
- Disposal of Older Computers is another source for the theft of data. Remember when you delete files, the information is not actually erased. The hard drive should be overwritten, degaussed or physically destroyed. Never dispose of a computer that hasn’t been secured. Your information could end up in the hands of a criminal.
Computer Troubleshooters Can Help Your Business with Cyber Security
Computer Troubleshooters can do an assessment of your business’ computer network. We can also provide recommendations for establishing a strategic approach to cyber security and assist you with a variety of solutions to reduce the risk of a security breach. We strongly encourage you to prepare your business for the threat of a cyber security crime, call your local Computer Troubleshooters office today for help and advice.