News Articles

We frequently release articles relating to the IT industry and how it may affect you. Stay up to date and be confident that you are always informed of the latest developments in the industry.

One way to win financially in the cybersecurity wars

CeBIT 365 - Reported estimates cost of data breaches will rise 4 times to $2.1 trillion by 2019. You can't legally invest in the hackers but one way to win is to invest in the companies at the frontline of defence. Betashares annouces Global Cybersecurity ETF - (HACK) "The spectacular growth in online activity and information technology in recent years has, unfortunately, also seen equally strong growth in cybercrime. As a result, global spending on cybersecurity has increased 8% p.a. since 2011, reaching US$82B in 2016 and...

read more

6 questions you should be asking your IT people

We've looked the risks of not having a business continuity plan, ransomware and other nasties. Still on the topic of protecting your network, today we focus on IT people. What would happen if your in-house or external IT person suddenly quit, company went bust or the individual was hit by the proverbial bus? Most business owners think it would only be a temporary inconvenience when in fact we have found the opposite is usually true. If you're the IT person have you prepared for the worst? Want to know how much you’re at...

read more

Tech Precision shortlisted as one of “25 Most Promising Disaster Recovery Solutions Providers” APAC CIOoutlook

Tech Precision has recently been approached by APAC CIOoutlook: "Our editorial team has analyzed offerings, top management and reputation of about 925 companies offering Disaster Recovery Solution to Enterprises in Asia pacific Region. We also take input and feedback from our advisory board which consists of top CIO's and senior IT managers from medium to large companies in APAC. We are very pleased to inform you that Tech Precision has been shortlisted by our editorial board to be honored as "25 Most Promising Disaster Recovery...

read more

ABC 4 Corners – Cyber Crime

If you missed 4 Corners on Monday 29th August it's worthwhile viewing. They covered the Def Con hacking convention in Las Vegas, where people were warned to turn off wifi and bluetooth as stealing passwords and data is easy, especially with all the tools available. The Australian Tailored Access Operations (TAO) playing defence and offence, international cyber war targeting taking down key infrastructure. It reveals the strategic Australian companies and institutions that have found themselves hacked. It's not just nation states...

read more

Why you should open a Bitcoin account

Why you should open a Bitcoin account.  An Australian Dentist recently got hit with a ransomware attack with CryptoLocker. They had three surgeries with centralised IT. 10 years of client’s files including X-rays and photos were encrypted. They did not have adequate backup/restore solution in place and needed to pay the ransom. Bitcoins are untraceable and this is the preferred method of payment. However to make matters worse, while getting confirmation that they were unable to restore from existing backups (for most solutions it...

read more

Free White Paper – Backup vs Business Continuity

Overview: SMBs in general don’t have the same IT budgets and staffs as larger enterprises. Yet just like larger organizations they need to protect their data—and make sure they can get back to business rapidly after a disaster or other event that compromises their data and systems. In this white paper, we’ll discuss what’s at stake when it comes to not just protecting, but also managing, your data (hint: your business). We’ll explain why it’s important to think in terms of business continuity rather than simply data backup. And...

read more

Ransomware attackers raise their fees

Following up on self-propagating ransonware, here is an article by Tom Pullar-Strecker via The Age.  It's reinforcing why instant restore from backups (with multi-restore points) is key to permanently eliminating downtime... Cyber criminals have adopted a "gold rush" mentality after successfully using ransomware to extort money from businesses, United States security software firm Symantec has warned. It might only be a matter of time before they took a leaf out of the "Stuxnet" book and held industrial computer systems used to run...

read more

Beware there is now Self-Propagating Ransomware

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital to fully understand the possible risk of infection. Ransomware, the malware that locks up infected systems and demands payment to return access to users, has been steadily increasing its infection rate over the course of this year....

read more

The Ultimate Disaster Recovery Check List

STAY ONE STEP AHEAD OF POTENTIAL DISASTERS Prepare yourself before disaster strikes. When it comes to data backup and disaster recovery (BDR), being prepared for potential disasters is key to keep your business running. It’s not only important to have a disaster recovery solution you trust, but to make sure you test it as well. Keep this DR checklist on hand. Prior to a disaster ever occurring (and unfortunately it’s a matter of when and not if) ask yourself the following: Do you have a disaster recovery solution in place? Do you...

read more

Data Backup – Often a False Sense of Security

While you may be taking some precautions, such as securing and backing up your sensitive data, sometimes that’s not enough. There is a common misconception that data is safe if backed up once a day, but this outdated practice is no longer sufficient for several reasons: If you forget to perform the backup or the backup process fails, you’re not protected. If you only back up your files once a day, you’re left vulnerable to the loss of an entire day’s work. If you don’t properly validate your backup files, you could be in for an...

read more

Different Types of Hackers Explained

The Australian government are madly running around trying to upgrade our defences against Cyber Security. Have you asked yourself why? Well the truth is, like it or not, as business owners we now have to be aware of all the nasties within the IT community - because they could potentially put us out of business overnight. Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting another important aspect: motive. Why are they attacking people and...

read more

BYOD Big Security Risk?

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your IT infrastructure and data. If you’re thinking of incorporating BYOD in your office, consider some of the risks involved before making a decision. Data leakage The biggest reason why businesses are weary of implementing a BYOD...

read more

Five Tips on Privacy Issues Around Windows 10

Long gone are the days where private information (like vault combinations and the name of your high school crush) are kept confined within a padlocked journal. Speculation has been circulating that Windows 10 gathers more info than it should. Whether or not you think privacy lines have been breached, here are some tips to protect your privacy in a matter of clicks. Say goodbye to ad tracking Every time you log on to surf the net, you are leaving a trail of breadcrumbs that lead directly to your online profile. This problem is easily...

read more

Five Basic Business Continuity Strategies to Help Keep Your Business Open

Whether your business is hit with a brief power outage or an extreme weather disaster, any kind of interruption to your organization’s productivity can cut into your profits. That’s why it is important to have a business continuity plan and utilise Business Continuity tools to ensure your organisation can stay in operation at all times. Here are some of the key strategies many companies rely on to keep their doors open. Backup your data, applications and servers Today, companies are more dependent than ever on IT and their business...

read more

Don’t let power outages hurt your business

When people think of the causes of downtime and the need for a Business Continuity Plan (BCP), they tend to think big. Powerful storms, massive bushfires and floods are usually what springs to mind. While these disasters can disrupt your business, a small power outage can be just as problematic if you’re not prepared. Here’s what to do to make sure your company isn’t halted when a power outage occurs. Power outages are one of the only disasters that can strike just about anywhere in Australia. If you are in Melbourne chances are...

read more

How to Boost Productivity in 2016

We all experience those days where we feel like we’ve been super productive and have managed to check off a bunch of tasks from our to-do list. But if you feel like these days are few and far between and you’d like to up the ante on a more consistent basis, it’s time to adopt a new approach to productivity. Whether you need to get organized in your personal or working life, laying down ground rules for yourself and considering the following tips could work wonders. When it comes to business, competition is fiercer than ever: you...

read more

IT Security Predictions 2016

Online security has probably never been such a hotly debated subject as it was in 2015. With the recent high-profile attacks on Sony and others, to the leaking of data stolen from the extramarital-affair-facilitating Ashley Madison website. These have pushed cyber security firmly into the spotlight. So what can we expect from 2016? Experts predict that this year will only see cyber crime increasing yet further. Here’s what you need to know. If you think that only big corporations and prominent organizations are targeted by cyber...

read more

Are you insane?

Do you expect business transformation in 2016, while doing the same things you did in 2015? Well that could be defined as insane! The year ahead represents huge opportunities but to improve, things have to change. Across a wide range of industries, business leaders fall prey to a box-ticking mentality. The problem is, doing the same thing and adopting the same technologies that everybody else has cannot deliver the desired competitive advantage. In fact unless you have a great IT system, you’re tying one arm behind your back in a...

read more

Happy Holidays

Well it’s hard to believe that the holiday season is almost upon us again! Wow the year has gone fast, this is often said, but it’s so true. On behalf of Tech Precision I would like to take this opportunity to thank you for being part of this e-letter community. The feedback has been very real world which helps keeps our messages grounded and relative to your needs. I would especially like to thank those who chose to move from having us as your substitute IT partner to now being your lead IT partner. Again this year we are open...

read more

Are you scared of firing your IT provider?

In 2015 many business owners finally made the decision to come with us, but they wish they had moved much earlier. They were just too fearful of: • How much pain it would be to get someone else? • How do I estimate how much this would cost me? • What will the IT person think? • From my limited knowledge how do I pass this on? • What is the cost and risk/exposure for my business to change? They knew they should move to a new IT partner. Little things not being done right, support and service were no longer as good, recurring problems...

read more

Talk to an IT Solutions Expert

 

Need to talk to an IT Expert? Fill the the enquiry form and one of our experts will get in touch with you shortly. If you prefer to give us a call, we are ready to talk on:

 

1300 788 738

  

  • This field is for validation purposes and should be left unchanged.