eBook: 6 Business Problems You Can Solve With A Single Phone Call

6 Business Problems You Can SolveProactive Support or Managed Services can solve many problems in your business, while at the same time opening up a world of growth and cost-saving opportunities. This eBook explores six specific ways your business can benefit from outsourced IT management, with an emphasis on helping you compete and innovate.

 

We have written a free eBook that explains how you can solve 6 problems and improve your businesses growth.

Click here to subscribe to our monthly newsletter and access your copy of this book – don’t worry we won’t share your details and you can unsubscribe at anytime. If you are already a subscriber and would like a copy please email

da***@dp*********.au











. You will also receive a free copy of our other great eBooks including the following so sign up now!

  • Is Your Old Tech Dragging You Down?
  • Spectre and Meltdown: How you’ll be affected.
  • 10 Tips to Stay Safe Online
  • Digital Transformation – What’s In It For You?

The True and Unexpected Costs of Being Hacked

Security BreechThere are the normal costs everyone associates with a computer breach, like employee downtime and the costs associated with getting your network and computers fixed. But really, most businesses that haven’t been hit with a security incident view it as more of an inconvenience than a bottom-line cost. For those businesses who have come out the other side though, it’s a very different story. They know from firsthand experience that the hidden and ongoing costs of a data breach can be crippling and that IT security exists to protect your business on multiple levels. All those surprise costs that spiral out of control are why most businesses close down after a cyber-attack. Here are a few of the hard, but common cold hard realities of life after a hack.

Raiding the budget to reduce downtime

From the moment a cyber-attack compromises your system, things can get expensive, and the longer the attack goes, the more it costs. Latest statistics reveal most breaches aren’t identified for around 191 days and then it can take on average another 66 days to fix and contain the damage – during this time you are cleaning PCs, mobile devices, laptops, servers and even entire networks. Add to this the fees for IT professionals to fix everything up, the costs for new hardware and software to help prevent future incidents  and all the hours/days/weeks when your business is struggling with downtime, businesses will quickly exhaust any emergency funds they have.

The long arm of the law

Depending on what data was stolen and how you handled the situation, you could be liable for fines into the millions. If medical data or legal files are leaked a particularly messy scenario may occur with fines coming from multiple sources.

New privacy laws also mean businesses are liable for large fines if they don’t disclose a data breach. Where this gets trickier is that the burden is on your business to know exactly what data has been stolen or illegally accessed, so that you can report it before the fines stack up. This means that even if you were able to fix up the systems yourself, you will still need to hire an expert who can identify exactly data what the hackers took or accessed.

Customer retention measures

In a double crush to your bottom line, not only does your business bear the cost of fixing the hack and your future income takes a hit as customers lose trust and leave. To offset this, many businesses need to spend more on advertising and public relations just to ensure they survive to fight another day.

The data breach disclosure may still come up in search results for many years to come. The more negative publicity your breach attracts, the more you’ll need to spend on customer retention.

All your secrets exposed

While you may not have high level secrets to protect, your business does have data that you would like to keep to yourself. Hackers love going after those juicy tidbits, and the more closely you guard them, the more attractive they are. While large corporations would be big enough to keep their competitive edge after the breach, your business success relies on at least some information staying secret (databases, client info, financial records etc).

But simply avoiding a breach doesn’t cost much at all…

The thing is, it’s not expensive to stay on top of it all and keep your business protected. For a low monthly fee, we can reverse the entire scenario and secure your systems against the unknown. That means no need to raid other department budgets in a panic, pay crippling fines and make embarrassing public announcements.

DP Computing can help with making sure your systems have the latest security patches and your anti-virus knows the latest tricks to watch for. Our technicians implemented a firewall or UTM device to build a virtual fortress around your business that keeps the bad guys out while letting you thrive. Whatever your needs are, both now and moving ahead, we’re here to help keep you safe.

Ready to secure your business against breaches? Give us a call on 08 8326 4364 or via email at

su*****@dp*********.au











.

Fake Invoice Attacks Are on the Rise – Here’s How to Spot Them

False Invoice Scam

Businesses around the world are being targeted with a cyber-attack that sends victims a fake invoice that looks real enough to fool to most people. It is based on an old scam that used to see invoices faxed or mailed to the victims and now it has made its way into the digital world and instances are on the rise.

You may have already seen some of the less effective attempts – an email advising your domain is expiring (except it’s not from your host and your domain is nowhere near expiration) or others that describe a product or service you would never have purchased.

The new attacks though are much more advanced as they look completely legitimate and are often from contractors and suppliers you actually use. The logos are correct, spelling and grammar are spot on and they might even refer to actual work or products you regularly use. The senders name may also be the normal contact you deal with at that business as cyber criminals are able to ‘spoof’ real accounts and real people. While it is worrying that they know enough about your business to wear that disguise so well, a successful attack relies on you not knowing what to look for.

Here are two types of invoice attacks you may receive:

1) The Payment Redirect

This style of fake invoice either explicitly states that the payment should be made to a certain account (perhaps with a friendly note listing the new details) or includes a payment link direct to a new account. Your accounts payable person believes they are doing the right thing by resolving the invoice without bothering you and unwittingly sends money to a third party. The problem may not be discovered until an invoice from the real supplier comes in or the transaction is flagged in an audit. Due to the nature of international cyber crime, it’s unlikely you’ll be able to recover the funds even if you catch it quickly.

2) The Malware Link

Rather than an immediate cash grab, this style of attack asks your employee to click a link to download the invoice. The email may even look exactly like the ones normally generated by popular accounting tools like Quickbooks, Xero or MYOB. Once your employee has clicked the link, malware is downloaded to your systems that can trigger ransomware or data breaches. While an up-to-date anti-virus should block the attack at that stage, it’s not always guaranteed (especially with new and undiscovered malware). If it does get through, the malware quickly embeds itself deep into your systems and often remains silent until detected or activated.

How to Stay Safe

Awareness is key to ensuring these types of attacks have no impact on your business. As always, keep your anti-virus, firewalls and spam filters up to date to minimize the risk of the emails getting through in the first place.

Secondly, consider implementing a simple set of procedures regarding payments. These could include verifying account changes with a phone call (to the number you have on record, not the one in the email), double checking the invoices against purchase orders, appointing a single administrator to restrict access to accounts or even two-factor authorization for payments. Simple preemptive checks like hovering the mouse over any links before clicking and quickly making sure it looks correct can also help. If anything looks off, hold back on payment / clicking until it has been reviewed. Fake invoices attacks may be increasing, but that doesn’t mean your business will become a statistic, especially now that you know what’s going on and how you can stop them.

We can help increase your security, talk to us today. Call us at 08 8326 4364 or on

su*****@dp*********.au











Why Do Computers Break?

Why Do Computers Break?As you know computers always break at the worst possible time, but what things can actually cause that that failure? It is easy to think it was something you did at the time of the crash, but normal user actions are rarely the cause of the issue. In this blog post we list some of the real reasons for a computer crash.

1. Physical Damage

People drop their laptop or spill things on their systems. Liquid damage is a big problem with spills the main cause – this could be anywhere from a spill on the keyboard or even a flood that reaches the computer. Laptop users need to be really careful when putting down their systems – surfaces can often have small puddles (especially cafes and kitchen tables). If you are lucky and the liquid didn’t fry the circuits and ongoing corrosion is likely.

A dropped or knocked computer isn’t going to be happy. Even a light bump can cause loose cables, disconnections and internal damage.

2. Age

Computer parts have an expected lifetime, especially moving parts like fans or mechanical hard drives. Some computers can run 24/7 for up to a decade, while others can be barely used but fail within warranty. When age is the issue there are usually early warning signs like extra noise or slowing down, but the actual ‘break’ generally happens when you go to turn the computer on, perhaps after a crash or overnight – either it makes a valiant effort before giving up, or nothing happens at all. Sometimes lasting age is the luck of the draw with how it was manufactured, and quality does play a big part in how long it can keep churning.

3. Power Surges

Computers are very sensitive to both surges (too much electricity) and brownouts (not enough electricity). Some indicators of power issues are when the lights are dimming or flickering (during a brownout) or glowing just a tad too strong (during a surge). These variations usually last long but they can easily break your computer. A surge protector can guard against mild increases in voltage, but brownouts and strong surges can still cause damage unless a high end UPS (Uninterruptible Power Supply) is used.

4. Heat

Overheating is a big contributor to a computers death. The insides of a computer runs hot and they need plenty of cooling to keep them working optimally. You might not feel it from the outside, but internal components can rapidly build up heat that needs to dissipate. When fans and vents get blocked with dust the temperature continues to rise and components can bake themselves to failure. When the computer reaches a certain temperature the computer will automatically switch off (to try and cool down), however the more times this happens, the more likely your computer is to die.

5, Hard Drive Failure

Your data is stored on a hard drive and if you have a mechanical hard drive (most people do), it works a bit like a record player with a spinning ‘platter’ and a needle that reads it. General usage, small bumps, liquid, age, surges and overheating can all trigger hard drive failure. As well as making your computer unusable, hard drive failure means your data is also lost. While sudden breakage might leave you surprised, take note of any strange noises or repeated crashes and always back up your data.

Like a car, your computer needs to be serviced regularly. We can check your computer to make sure it is running right and will keep on working for you. Give us a call at 08 8326 4364 or drop us an email at

su*****@dp*********.au











.

eBook: Digital Transformation – What’s In It For You?

Why Digital Transformation  is a Top Priority for Small Businesses

Digital Transformation eBookNew technologies are opening up new opportunities for business.

They are driving a revolution known as DIGITAL TRANSFORMATION, where processes are simplified, ideas are implemented, and businesses are benefiting like never before.

We have written a free eBook that explains what digital transformation is, and the possibilities that even small changes can provide to your business growth.

Click here to subscribe to our monthly newsletter and access your copy of this book – don’t worry we won’t share your details and you can unsubscribe at anytime. If you are already a subscriber and would like a copy please email

da***@dp*********.au











. You will also get a free copy of our other eBooks including the following so sign up now!

  • Is Your Old Tech Dragging You Down?
  • Spectre and Meltdown: How you’ll be affected.
  • 10 Tips to Stay Safe Online
  • 6 Business Problems You Can Solve With A Single Phone Call