spy

Ransomware

Fixing Ransomware Problems in Perth by a Local IT Support Business

In May 2017 some Perth businesses were held to ransom by international cyber attacks. FSA Technology IT security solutions help businesses prevent and fix ransomware problems in Perth Western Australia for their business clients’ computer / ITC systems.

What is ransomwareMalicious software that locks a device, such as a computer, tablet or smartphone and then demands a ransom to unlock it.

Where did ransomware originateThe first case of ransomware appeared in 2005 in America but quickly spread around the world.

How are computers infected with ransomwareThe software is normally contained within an attachment to a phishing email. Once opened, it encrypts the hard drive, making it impossible to access or retrieve data and software stored on the drive – such as photographs, documents, financial data or music.

How to protect yourself from ransomwareAnti-virus software and anti-malware software can protect your computers, although cybercriminals are constantly working on new ways to override IT security protection.

How much is a typical ransom demand? Ransom demands vary. $1,000 to millions depending on the cyber criminals and their estimate of the ransom victim capacity.  However, there’s no guarantee that paying will get your data back.

ABC Four Corners Ransomware “Cyber War” Video Report 

Details

office-background

Email Signature Generator

ZippySig is a new online application to help people create free email signatures for their business. You can create awesome looking signatures in just seconds. Outlook and many other email clients are very picky in how they handle HTML signatures.

Details

netflix

Netflix stop VPN tunneling

In recent years, Netflix has been working hard to rapidly expand its services worldwide, and this of course includes Australia. As Netflix became available in Australia, we all knew that one thing was imminent: limited content. For example, the Australian version of Netflix, shows around 10% of the content that Netflix shows in the USA. This is due to the regional content licensing restrictions.

Details

wsh

How to disable Windows Scripting Host (WSH)

Windows Scripting Host is a part of Microsoft’s Windows 32-bit architecture which is installed with some applications such as Internet Explorer. Unfortunately WHS has a serious security vulnerability when the .VBS file type has an association to WHS. Some viruses such as “LoveLetter” were developed due to this vulnerability. The safest and easiest way to fix this vulnerability is by allowing Windows Patches to download and install automatically or downloading Microsoft fixes, however if you would like to disable this manually, follow the steps below.

Details

backup

Are backups important to Perth businesses?

Over the past decade, we have seen some huge changes in the way businesses backup their data. About 10 years ago, Backup Exec was a widely used backup application by some of the biggest businesses in the world. Back then, it was the best backup application out there, and was mainly used in conjunction with backup tapes. This would mean that backup tapes would manually have to be taken out of their slots and taken home as part of a data disaster recovery plan. These days there are much better backup solutions on the market which completely eliminate the chance of human error.

Details

spy

Is Microsoft spying on you?

Over the past week, many computer users worldwide have flocked to install Microsoft’s newest operating system Windows 10, as a free upgrade to their current Windows 7/8/8.1 operating system. Like with any new operating system, there will be changes, some we like, some we don’t. The hardest thing to find is what is actually different.

Details

server

Microsoft Windows Server 2003 End of Support

Microsoft has announced that Windows Server 2003 extended support has ended on 14 July 2015. If you haven’t migrated to a new server operating system by now, you should probably start budgeting for the migration. This means that Microsoft have stopped releasing updates and patches for Server 2003, and it will no longer be a supported operating system. This can have a huge impact on your business in many ways.

Details

1108254_10914851

Telstra Air Wireless Network

On Tuesday 30th of June 2015, Telstra will be switching on, what is believed to be Australia’s largest Wi-Fi network called Air. When was the last time you used a pay phone? The answer is most likely “I dont remember”. Well, as of next Tuesday, you may be using them a lot more, as they have been fitted with wireless hotspots which give you instant internet access. There will also be wireless hotspots in selected cafe’s, shopping centre’s, stadiums and train stations too.

Details

1433221_24551976

LastPass Hacked

LastPass is a very popular password management application that can remember your passwords for you and has the ability to share them between your team members. On June 16, 2015, LastPass released an announcement that some of its user data has been compromised by hackers. Initial news reports state that the master passwords were not hacked, however some data was taken, such as email addresses, password reminders and server per user salts.

Details

1326722_21034489

Windows 10 is coming

Microsoft have recently announced that Windows 10 will be coming out on July 29, 2015. The release of Windows 10 is FREE as an upgrade to Windows 7 and Windows 8.1. If you dont have Windows 7 or 8.1, you will need to purchase the new operating system for $156 for the Home Edition or $262 for the Professional edition. If you purchase the Home edition and then want to upgrade to the Professional version, this will cost $130.

This of course brings some hesitation and excitement to users who are unsure whether to upgrade or not. People using Windows 7 and Windows 8.1 should already have a “Get Windows 10″ icon in their taskbar which allows you to reserve for the free upgrade to Windows 10 when it is released. You will be notified by email when it is ready to be downloaded and installed.

Details

parental controls

3 Ways to Control Internet Access

3 Ways to Control Internet Access (Well, ways to make more challenging for your kids.) Our kids are often more comfortable than us with technology. They leave us in their dust as far as the internet and technology goes.  As parents, we wonder how we are going to protect our kids from the dark corners…

Details

data security

Data Security – Done Right

Data Security – Done Right Over the last year, the issue of data security has been thrust into the spotlight, first Julian Assange, then Edward Snowden, followed by Heartbleed and now Shell Shock.  It is a vicious cycle between releasing new software and fixing the inevitable problems. Companies including Facebook, Microsoft, NBC, Evernote and Twitter…

Details

BYO

BYOD or BYOS

BYOD or BYOS A transformation was taking place at the most recent Mobile World Congress.  We are moving from the smartphone to a plethora of devices.  I wonder if “Bring Your Own Device” is still a relevant term is given this shift in the mobile space. A mobile device refers to many more things these…

Details

Build your Business

5 Technologies to Build Your Business

5 Technologies to Build Your Business Technology is an important tool that’s leveling the playing field for small business owners who compete head to head against big, traditional stores every day.  If used correctly, technology can help a small businesses exceed their customers’ expectations, even surpassing those reserved for bigger companies they are competing with.…

Details

The Internet of Things

The Internet of Things – A Marketing Tool

The Internet of Things – A Marketing Tool “The Internet of Things” is destined to change our lives and how all the physical things within it work, if you listen to all the buzz.  According to general consensus, every device will soon be connected to the Internet.  Apparently, this is meant to increase our productivity,…

Details

targetted advertising

Targeted Advertising

Targeted Advertising Imagine that you are killing time in your favourite store when you hear a beep from the band on your wrist.  You look at a small screen on your wrist to be told to check out a red jacket in the back of the store. Your phone displays a picture of the jacket…

Details

future proofing IT

Future Proofing Information Technology

Technology is constantly changing.  According to a simplified version of “Moore’s Law”, computing power doubles every 2 years. Is it possible to “future proof” your IT assets, given this state of continual change within the IT industry?  Small and mid-sized businesses who want their Information Technology assets and strategy to be as future-proof as possible…

Details

cloud computing

Cloud Computing Is the Future

Cloud computing has been advertised as a game changer for more than 10 years within the IT industry. It is only now that businesses have become calm enough with the model that we are finally seeing real advances in the market.  Having said that, I think that cloud computing is not being used to its full potential…

Details

web design

Mistakes in Web Design

This article may make some website designers feel uncomfortable. The reason for this is that this article will provide information regarding the pitfalls when selecting a web designer.  This article will also cover some of the secrets behind the marketing strategies used by web designers to sign you up. Paying Too Little In an ideal…

Details

SEO1

SEO – Fad or Marketing Strategy

I have been working in the IT industry & with the internet for 20+ years.  I have seen a number of changes in that time.  The biggest, underlying change I have witnessed is with the growth of the internet itself & the number of websites it now hosts.  According to the website “Internet Live Stats”, there are 979,739,200 at the time of writing this article.  With great success, sometimes comes great problems & the internet is no different.  How does one find what they are looking for amongst all those websites?

Details