Who is going to keep australia safe online?

Small and medium business and not for profit organizations (SMB) are becoming an easier target than previously understood when it comes to cybercrime. One of the largest problems for these businesses to understand is that they are a very easy target because of their size.

SMB’s do not have the resources or the financial support to spend large amounts of time and money on the protection of their business.   This lack of investment means that they have a “just enough is good enough” attitude to the security of their business, this I am afraid, is false economy.   No matter what the business, the theft of money, clients and / or Intellectual property will have a detrimental effect on the business if not actually putting it out of business.

The introduction of IPv6 in the near future will make the protection of SMB business that much harder.   IPv6 is the next transmission protocol for the Internet and although it is understood by most technical people the basic understanding of the protocol is lost on 99% of the Internet user population.

The introduction of IPv6 as a transmission protocol will make it so much harder to protect your business and your users from the Internet.   The introduction that HAS to be done, IPv4 has already run out of addresses, is being delayed partly because of the security implications of the new protocol.

I really hate it when i have to put calculations into a post, but the primary difference of the transmission protocols is the number of addresses IPv4 has 2 to the power of 32 ( 2 x 2 x 2 (32 times) where IPv6 has 2 to the power of 128 (number of stars in the galaxy plus a couple of billion).

The address pool is huge, but the management of that address pool is going to require some serious computing power and management.   Is that management going to fall on government, industry or someone who is neutral?

I am not going to go into all of the difference but some of them are profound and will have major implications for all users but it will have the biggest effect on Government Departments, defence systems and business infrastructure.   From a technical point of view it will be a vast improvement and some believe that it will speed up the Internet but the down side is also profound.

Security is going to be a major problem.  The proliferation of attack vectors, spyware, malware, viruses and SPAM will mean that SMB’s will be under constant attack.   Is that protection going to fall directly on the shoulders of business to find more expensive or prohibitive security systems, processes and compliance requirements or is there going to be some level of Government  intervention.

I am sorry but I do not have the answer to that question and at the moment, to tell you the truth, I don’t believe that anyone else has either.   Hopefully the powers that be will have an answer in the near future, definitely prior to the global switch, so that everyone is playing on the same field.

Will a managed services (MSP) contract save you money?

DoctorTechnology can be a funny thing, one second it is working and the next second it’s not.   Sometimes you don’t even have to do anything to it to make it break.  If you now apply that to a larger scale, then a break in your business technology can have a sudden and lasting impact on your business and your staff.

When your ICT systems fail you need to have someone who has the correct skill set to resolve the problem.   Not only do you need the hard skills to resolve the problem but you also need the soft skills to reassure your staff and management that everything is being done as fast as possible but also with the greatest care.

Those technical skills including troubleshooting and resolution management are hard enough to find but in combination with the soft skills required you really need to ensure that the problem doesn’t happen to start off.

With a failure in technology you now have the additional problem of lost revenue, lost sales, the cost of down time and the cost of the fix or resolution of the problem.   How can you protect your business from this level of inconvenience?

There are a number of ways but the best solution to this inconvenience is the implementation and installation of some level of network, computer and user management that will protect your business.   This can be done in a number of ways but the best one is to outsource your technology problems to an external business or a managed services provider (MSP).

Some business have problems with this idea, an MSP does not have the same level and commitment as someone who is on staff.  This problem can be resolved by utilising a good Service Level Agreement (SLA), this will ensure that the MSP is committed to protecting your business as if they were a shareholder.

Most of the Other problems can be resolved with the application of common sense, talking to some of the MSP’ s clients, or just basically doing your due diligence to ensure that what they say is reflected in these referrals.

The SLA will also ensure that your business has no hidden costs.   The monthly fee for management and monitoring, should also include help desk, onsite and off site support and the resolution of any problem reported during working hours.   Out of hours and weekend work can be included but the cost will reflect this requirement.   This outsourcing solution will put professional ICT personnel at your fingertips at a monthly cost that you as a business can afford.   This is possible because you have negotiated your requirement at the time of signing the SLA.

Furthermore a good MSP will look at your requirements and act like a business analyst.    They will put the needed technology at the businesses fingertips because they have gone out of their way to understand your business.   This creates a better business environment for your staff and will improve efficiency and increase revenue which will eventually increase your profits.

This may also be reflected in better client management and better internal systems making the business of doing business easier.   Yes a managed services contract will save you money in the long run.

For more information on MSP’s

Do you budget for a system failure?

3d man director on stage, ACTION !System failures can happen anytime.   A system failure is something that happens with your technology that reduces your ability to do work.   When that happens it can be a costly exercise in both money and time.

The question is how you budget for something that may or may not happen and may or may not have a significant impact on your business.

A small inconvenience like an application hanging on a work station, the printer not functioning properly or a user receiving that email in one minute instead of 20 seconds is usually seen as an inconvenience.   The way of the modern world that inconvenience can expand into a full blown psychological tantrum.   If it happens enough times then your business can suffer.   Additionally there is always the hobby technician on staff who knows computers and then everyone stands around an watches while he

How often have you done business with someone who has said to you on the phone “the computers are slow today this may take a little time” and thought to yourself typical.   There are times when the computers are slow but it usually comes down to user error – doing too much, too many application open, clicking on the same icon numerous times – that is the problem.
Then there are the big system failures, hard drive failure, server failure, database failure and they will have a huge detrimental effect on your business both to rectify the problem and in lost productivity.   These problems and issues need to have a systematic approach to be rectified.

So how do you budget for these types of problems?   Most of the time, when it happens a small and medium business has to dig deep to find the financial resources and technological know how to rectify the problem.   This is not budgeting this is just hoping that it won’t happen to you.

One of the best solutions to how you budget for a system failure is to have a managed services provider manage your business infrastructure.   Why would this help?   Most managed service providers, the good ones at least, have an all you can eat policy on technical support.   This means that anyone in your business during working hours can call, email or fax the help desk and know that they will have the problem resolved.   The resolution may come from talking through the solution, remote management of the PC by a technical expert or having a technical person actually come to your office.

Furthermore a managed service provider will also monitor and manage your main systems.    With a decent monitoring system in place they will know when the system is having problems well before it has a significant impact on your business allowing your business to replace and upgrade systems when it has the least impact on your business.   In addition to the monitoring they would provide you with a monthly report showing whay your system is doing.

The budgeting component comes into play because for all of this work that a managed service provider is going to do will cost you X amount of dollars per month.

With a managed services provider you are budgeting for a failure by having a static monthly cost and professional services at your call.   This would improve your business bottom line.

Using managed IT services to transform your business (MSP)

EngineerThere has been a large amount of press and Internet Talk on what a managed service provider is and why you need one.

So a brief explanation, a managed service provider (MSP) is someone or a company that you outsource your ICT business components and they looks after it for you.   The two important components of an MSP contract is that it has a single base cost and you have a higher level of support for your infrastructure.   Some MSP have additional costs but these are usually covered in the shined contract called a service level agreement.

That is the basic idea behind the MSP business but if done correctly a good MSP can transform your business.   I know that sounds like marketing and sales hype but it is true if you enter into the correct contract with a good MSP.

How would a MSP do that?   At the most basic level a contract with an MSP allows you, as the business owner or manager, to concentrate on your core business.   You no longer need to balance core business with keeping the business running.  The MSP would keep you informed of what your infrastructure was doing and to act as help desk and monitoring and reporting component.   This removes these components from the worry of your normal business requirements.

The MSP should allow anyone in your business, no matter where they are, to call the help desk during working hours and you know that they will get the best available support.   It would also include a high level of proactive support so that little problems are rectified well before they become noticeable.

A spin off from the employment of a MSP is that because you know have experts managing your business systems the complicated business infrastructure now becomes a whole lot simpler.   It also allows for sound advice and information to flow between management /  owner and the MSP thus helping to move away from either the knee jerk reaction or the purchase the bright shinny new thing that seems to happen.

Your MSP should firstly implement and create an ICT strategy for your business and this would create innovation that allows your business to improve its business processes and systems.   Your MSP knows technology and how to use technology for your business it will also allow better and improved technology to improve your business.

The final point of an MSP is that you now remove the hobby technician that you have in your business allowing them to get on with the job that they were employed for.   This again allows your to improve the business.

A good MSP will cost significantly less than what you would pay for an on staff technician, it allows for better system management and  supplies onsite support within the definition of your service level agreement.

Business security is the beast that needs to be tamed otherwise it will eat you alive.

EngineerThe digital revolution is here and if you haven’t noticed you are either living under a rock or haven’t grasped the significance of what is happening around you.

By the year 2015 there will be more than 3 billion people connected to the World Wide Web and the Internet through mobile devices, business systems and normal computers.    It is something that has revolutionized the way we think, relate and work and who knows what else it will change in the future.

There are only two things that you need to take into consideration in this connected age, how you are going to use this new found wealth of information and connection availability and how are you going to protect yourself from those same people.

Utilisation of the World Wide Web is no longer a problem anymore, buy a phone, tablet or computer and it is immediately available to you, the second consideration is slightly more complicated. Somewhere along the way you need a framework, blueprint or system that is going to help with the management and protection of your business information.

In most cases how you protect your business information, your staff, your client information and your intellectual property seems to be second to and not as important as cash flow, profit, marketing, sales and revenue.   The trouble is, that is incorrect.  The security of your business information and data is just not set and forget.    It is a beast that needs constant care and attention otherwise it could just bite you hand off.

This beast that is your business information has 3 components, the what (information that is critical to the wellbeing of your business), the where (location of that information) and the how (measures you use to protect it).   Protecting that information does not need to be a full time job but it can be time consuming.   It doesn’t need to be expensive but at times it can be.

You can separate your protection into these three focus areas – the technology you are using, the command and control processes that you incorporate into your business and the sustainability of your business.

These three components go a long way to creating a stable, well protected and resilient business that will support you, your business and your family for the foreseeable future.   With all of the turmoil that the future World Wide Web can deliver your business security needs to be able to handle any changes that are thrown at it.  The system needs to be able to adapt to future change as well as allow you to do the business that you want.

A decent system of business information protection does not necessarily have to cost large amounts of money, but it can if you are not careful.  It does not need to implement by an expert especially considering most of it is common sense and it can be incorporated into your normal business practice.    A classic example is password control.   Complicated passwords can be enforced through technology and training.  You no longer need to be able to make sure that all users have passwords that are hard to guess as the operating systems and website can enforce their creation.   You just have to teach your staff how to do it.

I bought in my iPad can I use it for work?

3D Small People - Flight On PhoneMobile devices are invading our homes, workspace, businesses and organisations.   They are being demanded by workers, Y gen users and teenagers.   Management are always in the situation of trying to catch up with their use and fold them into their business model.

One of the major problems with mobile devices is the how do you secure them and what needs to be secured on the device.    Mobile defence and security consists of 3 areas – the device itself, the data, apps and access to information and the rest of the network.

Here are some ideas for making sure that mobile devices are as secure as possible.

The device – what happens if the device is lost or stolen?    Without a good security strategy it would not matter if the device is issued by the company or it is personal there will be incriminating and business critical information available on the device.   Passwords and encryption is widely used to restrict access to mobile devices, even home users can use
“mobileme” to find their iPhone / iPad or set it up that after 5 failed attempts at access it wipes the device and can only be reactivated by talking to the provider with the account holders information.   There are even better applications available at a business and corporate level.

In the business world it depends on whether you only allow access to the business through business supplied devices or it is open slather you still need to have some level of control.
If you control the device then you can wipe the device if it is lost, stolen or misplaced without any repercussions.   You also need to ensure that all devices have some level of backup and
recovery feature to ensure that important business data is not lost.   If the business doesn’t own the device then you also need to ensure that control over the system allows for the remote
removal of information deemed business critical.

The data, apps and access information that is on a device can be business critical.   Specific apps developed for the business may have critical implications if accessed by unauthorised people on a stolen device.  Some applications also deliver and retain business data on the device itself.   Finally all of those web sites or applications that have access to personal information – banking software, linked in, Facebook, what happens if that information is compromised.   As a safety system never allow the device to save your password, yes I know it is so convenient to have that one click access but!

The use of mobile devices is also compliant on the main business security strategy.   They should always comply with traditional defences like firewalls, encryption and secure passwords and should not be used as a bypass for information access on the business network.   If possible wireless access to information through a device should be done through separate network
access and VPN’s thus adding additional levels of protection and security.

How you protect your information is compliant on your business security strategy.   If you want your people to bring in their own devices or you are going to supply them then
that is your decision but it needs to fit in with your business direction and requirements.    If you have staff that constantly loose or misplace equipment I would seriously think about making the systems as secure as possible.

3 quick things you can do to secure your home computer?

Everyone knows that computers are the most influential piece of equipment for both the office and home to come around since the ball point pen.  An office environment has the benefit of having either a managed services or outsourcing company or onsite technical expert and expertise to protect their data but a home computer doesn’t.  The technical support usually comes from mum or dad or from the teenager.  This can be disastrous especially if the computer is used for other purposes like internet banking, internet purchases or keeping confidential personal data safe.

Most of the time the protection for a home computer is the installation of an antivirus software package and then the whole thing is forgotten in the euphoria of accessing the internet, doing the “Facebook thing” and playing games either on line or against the computer.   Don’t get me wrong I “LUV” playing games on my computer but I believe that I have a relatively secure laptop most of the time, but I have the luxury of having a little training and experience behind me.

So what can YOU do to protect not only your computer but also your personal data and your internet banking?   These are 3 of the most basic things that you can do in the never ending process of keeping yourself secure:

AntiVirus: There is no excuse for not having some level of antivirus installed on your computer.   There are a number of freely available packages – Security Essentials (Microsoft), Avast or Avira, that will stop most viruses in the wild but there are times where they will not pick up viruses that have not been discovered.  A more secure antivirus that does a lot more will have to be purchased.    If you are looking to purchase one of these packages then you should be looking at Kaspersky, Norton (Symantec), Trend or the like.   These packages do a lot more than just track your antivirus.   They will protect your computer from Malware (Scripts being run from a website), I had this experience just the other day when I was doing some research and went to a website that wanted to infect my computer.   My antivirus protected me.  Most of them also have a decent Anti-SPAM component as well as a fairly substantial firewall.   I can hear you from here – I have a MAC and it never gets a virus.  Sorry that is no longer true.    Some malware will infect a MAC and they are very painful to remove.

Firewall:  By having a firewall installed at all times especially when you are surfing the internet is not only a necessity but it can honestly save your wealth.   They can at times be problematic with false positives (incorrect readings) but as a first line of defence they are indispensable.   Although most firewalls are set and forget, if they detect something wrong they will pop up a warning – Please read it – so that you can make a decision on letting something in or not.  Again there are free variants available but good ones come packaged with the antivirus.

Update: I cannot say this often enough update as often as possible and don’t put it off unless there is a good reason.   The update process is designed to patch holes in operating system software as well as application of all types.    A hole in software is where the virus writers target their programs because they know that people are lazy and don’t like to update their computers and even worse restart their computers after the update process.   All of the big software companies, including game writers, now have an update process and after you install an application it will check the website through the application or every time that you open it.

As an additional point if you are running Peer 2 Peer software on your computer, normally installed by the teenager to download music and movies for free, then I suggest that you remove it.   Peer 2 Peer software is designed to punch holes through firewall and disable antivirus so that they can be seen on the internet.  Peer 2 Peer software works on the principle that there are numerous sources or copies of the wanted download that you want.   The problem is that the available directories can be used by outside people to store child porn, pornography or pirated movies and music that you may not even know about.

So there you have it.   Home computer security is mostly common sense and thinking ahead.    These 3 points will ensure that your computer is well on its way to being protected when you use it.

Do you rely Just On Security Technology to protect your business information?

Nearly every day you hear about another security threat spreading across the internet. As a small or medium business, or a not for profit organisation (SME) how vulnerable are you to these threats?

SME’s are connecting to the internet in record numbers to support improved and greater market opportunities, to increase productivity and to strengthen communications with staff, management, customers and suppliers. The problem is, the more you open your network and business to the internet the more your confidential business information and data is at risk.

So you think you are too small to be a target?

Think again, if you use Microsoft software then you are a target by default. Microsoft is not bad but it has the largest market share, therefore any released virus, worm or application created by a hacker can achieve more with less. These programs spread rapidly and inflict damage on a global scale and you, as an SME can be caught in their net.

Security threats are constantly emerging and evolving, the job of securing your business information becomes all consuming. Little jobs take time – updating and checking anti-virus, patching and updating operating systems and applications, checking firewalls with renewed rules and policies are a critical requirement of your business risk analysis.

They still have to be done regularly.

The importance of checking these components in a timely manner cannot be underestimated. Consider the cost in lost productivity, reputation and non-compliance penalties that a breach could visit on your business. Effective security can be costly, time consuming and difficult for SME’s to implement successfully. Skilled security people are often difficult to find and cost prohibitive to have on staff. As a result the job often falls on the technologically savvy staff member who is already snowed under with other ICT matters or their own job to implement security features properly.

Today’s security threats are business size neutral. They leave a SME with the same security challenges as large corporations. The trouble is that SME’s do not have the depth of resources to handle them. This is where a Managed Services Security Providers (MSSP) can be of benefit to your business.

What are the benefits to your business of outsourcing your security?

You can focus on your core business

Outsourcing allows all of your staff to concentrate on revenue generating business initiatives instead of computer, security and infrastructure issues. Having limited IT resources on staff takes business resources away from your core business.

Reduced Cost

Outsourcing security sources provides your business with access to “big business” security protection at an affordable price.  The expense is more cost effective than hiring or contracting a security expert and the consistent monthly billing helps ensure security services that you need are available without unforseen hassles and expenses. An integrated and comprehensive solution that can help reduce the expenses of maintenance, upgrades and add on security solutions is a benefit to any business.

24 X 7 (always available) expert security staff.

You’re on staff, in house expert is normally available only during working hours. In most cases your outsourced Security Company can act as an always available security and ICT management department. They can also provide your business with access to an internet security expert without incurring the cost of hiring, training and retaining highly skilled staff.

Gain Customised Service

All MSSP’s have service plans and you can select the service plan that will fit your requirements.

Receive up-to-date protection

Technical security solutions such as firewalls, antivirus software, content filtering solutions, and virtual private networks (VPNs) are far more effective when they are maintained regularly with the latest system updates.  Changes to your business resilience and regulatory requirements can also have a detrimental effect on your business stability.

Why R & I ICT Consulting Services is right for you!

How do you know you are getting what you paid for?

  1. Company reputation – see what our clients are saying about us. We have references and referees that you can ask.
  2. Plans and services – we have a comprehensive assortment of plans and services depending on your business requirements and size.
  3. Service Level Agreement – all of our plans and services have a service level agreement incorporated into them so that you know what will be delivered in protecting your business.
  4. Guarantee – We guarantee all of our technicians work with a 100% money back guarantee. We also stick to any pricing that we put forward to you. All projects are priced on a per project basis so that no matter how long it takes it will not cost you anymore. No more “time and materials” projects based on how long is a piece of string that have costs blowing out uncontrollably.
  5. Monthly Reports – we supply monthly reports that are delivered with your next month invoice. We like to prove how much we have done for your business in the last month.