By Chaim Lee / Articles / 0 Comments

Is it time to start thinking about Cyber security and business continuity management?

Today, there is an urgent need for organisations to alter their approach to cyber security and business continuity management. With a manjor global event occurring in the past year with the Covid 19 pandemic, business continiuty has never been so important as it is today.

Business continuity has always been about maintaining critical business functions, not only during a disaster or crises, but afterwards as well.

It has been a long time since businesses have had to consider such an important aspect of their future.

Cyber attacks and breaches of cyber defences have become inevitable as attackers become increasingly well organised and funded.

About our Cyber Security and Business Continuity Management

Aspire Computing offers some of the very best services to help people in remote offices who may wish to be more secure, and who often can’t get expert technical help on the ground.

We are cost effectively, protecting IT Devices, Networks and Data through our Remote Management Systems.

These services start with Pro-Active Care using “Cloud” based services.

Cloud based systems improve efficiency and reduce costs to the customer. Here are 5 offerings from Aspire Computing on cyber security and business continuity management:

  1. Remote Assistance sessions using our Commercial License to TeamViewer and a free downloadable copy at the customers end, so that we can provide direct support and maintenance. We offer this support to people who call us, or email us with a request for help. We can send out an invitation to Download QuickSupport by email, or just ask the Client to uses their browser to download the TeamViewer file directly from the web.
  2. We install Webroot SecureAnywhere on our customers’ devices. This is an AV/Malware/Web Filtering Security System. It is fully Managed by us at Aspire Computing through our Global Site Manager (GSM) for Webroot, on behalf of the customer. It takes all of the pain away from the Customer. We receive emails if there is a problem device.  We are offering this service for only $100- per year per Computer, and less for Android and iPhone devices;
  3. We also offer to put the Customer’s Servers, Workstations, PC, Mac, Laptop, Tablet or iPad, Peripherals, or any other device they may have into our RMM – Remote Monitoring and Management System, that we license and run separately from Webroot. From there we know on a regular basis if there are any problems, often before the customer is aware.
  4. Backup of Data and Complete Systems (System State) to Secure Cloud Storage based in Australia, either in Sydney or Brisbane, with a Local “SpeedVault” Backup as well. This is priced based on the Qty. of Data to be stored per month.
  5. Firewalls – NextGen/UTMs – Unified Threat Management devices to protect your whole network, either as a “Black Box” appliance, as a Virtual Machine, or again as a managed Cloud-based system.

To learn more about cyber security and business continuity management here.

Cyber security and business continuity management

Contact Aspire Computing for  Cyber Security and business continuity management today.

Contact Aspire Computing

Cyber crime case studies Australia
By Chaim Lee / Articles / 0 Comments

Cyber Crime Case Studies australia

Toowoomba is not a stranger to cyber crime. In this post, we present our own cyber crime case studies Australia and in particularly, we demonstrate how what we have done has protected people .

What cyber crime means

In a 21st century society that is dominated by Information and Communication Technology (ICT) many people depend on ICT for their survival. People have computers at home, they use it for online banking or to simply order electronic materials for example.

According to the Australian Federal Police (AFP), cyber crime is:

  • crimes directed at computers or other information communications technologies (ICTs) (such as computer intrusions and denial of service attacks), and
  • crimes where computers or ICTs are an integral part of an offence (such as online fraud)

Where to report cyber crime in Australia

The AFP advises that if you or your business have been victim of cybercrime that you need to report it to the Australian Cyber Security Centre.

Cybercrime Australia

The Australian Government has a website that goes into more detail in relation to what is happening in the country. As a citizen, you can report the following to ReportCyber:

  • Identity theft and fraud
  • Online fraud
  • Cyber-enabled abuse
  • Online image abuse
  • Affected devices

It is important that you DO  NOT report when:

  • Court orders have already been issued against the suspect
  • Any physical crime has been undertaken such as debit or credit has been stolen. Or when the computer itself has been stolen.
  • You have received a scam call, yet you have not had any personal information or money taken.

How can cyber crime be prevented

There are several ways in which you can protect yourself from cyber crime.

Aspire Computing, for example, can installWebroot and we provide our own cyber crime case studies Australia here.

Other ways include:

  1. Use a full-service internet security suite
  2. Use strong passwords
  3. Keep your software updated
  4.  Manage your social media settings
  5. Strengthen your home network
  6. Talk to your children about the internet
  7. Keep up to date on major security breaches
  8. Take measures to help protect yourself against identity theft
  9. Know that identity theft can happen anywhere
  10.  Keep an eye on the kids

 

Cyber Crime Case Studies Australia

The video above highlights one of the most recent cyber crime case studies Australia. In it, it discusses the different scams which have occurred in Australia and what a bank did that was so wrong.

Many scammers send links to pages that look like your bank or something else that is familiar to you.

In this example, the bank did just that to ask for personal information and of course, Martin North, the creator of the video did not follow through and made an official comlaint.

 

On a more local note, the benefits of you as a customer having installed by Aspire Computing protective software such as WebRoot was made very clear when the other day we we were informed that our warning page popped up for one of our customers.

It was noted that various links were sent to this person which they had clicked. Fortunately, due to the WebRoot system that we had installed those pages were blocked and that person was protected from going any further.

 

At Aspire Computing, we currently use a device that is known as a UTM (Unified Threat Management) firewall. It monitors, filters and protects all of my network traffic and informs me of problems and access attempts that have been blocked. I would strongly recommend business owners look at this system.

Information as to what is actually going on can be monitored, logged and delivered to technical support personnel by these UTM firewalls. Without getting such devices installed, business owners and managers may have absolutely no idea whatsoever, whether they are being accessed externally (hacked) or not.

 

Cyber crime case studies Australia

 

Cyber crime is on the upswing and everyone is at risk. All businesses are at risk including small businesses in country towns such as Toowoomba.

 

cyber crime news
Cyber crime news for Toowoomba

 

By Chaim Lee / Articles / 0 Comments

Aspire Computing – Patch Management Services

Does your business have the skills to maintain active patching?

Part of any modern Cybersecurity Service is having all of your programs checked and updated on a regular basis.

This is now considered an essential service.

 

People say to our technicians:
“I have these messages popping up on my screen telling me to Install Updates.
I don’t know if it is safe to do so, and if it is, how do I do it?”
Should I say “Yes, Allow, or No?”

 

Aspire Computing patch management services provides the personnel, resources and knowledge of the latest industry practices to ensure that your computers systems are always operating at their peak performance.

 

What is a patch management service?

A patch management service provides a software patch that is a piece of code tailored to fix a bug, or to add new features in an application. Patch management is the process of managing a network of computers by regularly adding patches of software to keep computers up to date.

Aspire Computing provides an automated patch management service that provides key benefits for you as the comptuer user. An automated patch management service enables the detection of missing patches and the patch deployment endpoints with the tools we employ.

Patch management service

Why is patch management important?

There are a number of reason why a patch management service is important. The number of ransomware attacks is rapidly increasing every day.

  • Patch management is one of the most important IT tasks in any organization as leaving software and operating systems unpatched puts your organization at risk of serious security breaches.
  • Soon after a security update is released, cyber criminals are already on the move, looking to exploit any unpatched systems. This is why security updates should be deployed in your systems as soon as possible.
  • Manually monitoring and applying these security updates is not only difficult but dangerous; even a slight delay in installing security updates could put your systems in a vulnerable position. Do you feel confident enough to bet on yourself in a race against today’s cybercriminal?
  • Our patch management tool provides an automated patch management system which frees your IT administrators from the routine work of manually patching computers, so they can focus on other critical tasks.

 

Get industry-proven and leading patch management

to keep ALL your computer operating systems up-to-date.

Automated patching across your systems

Aspire Computing can do the following:

  • Patch everything – Windows OS to 3rd party app as well as Linux, Unix and Macs.
  • Endpoint monitoring
  • Bridge the gap between operations and security

 

KEEP PACE WITH THE CONSTANT STREAM OF SECURITY THREATS AND PATCHES – REQUEST A QUOTE

 

A good security program requires multiple layers. And while you can’t remove the biggest threats to your network, we can help you identify and eliminate vulnerabilities attackers exploit, helping you ensure compliance. Patching is the first step to reducing the risk of ransomware and other malware.

We do the following things to help maximise your computer system’s performance:

  • Synchronization: We collect all the vital patch information from vendor sites and is fed into the patch database. It is then synchronised with the patch database in WebRoot.
  • Detect: It is important that we then identify all the computers that require these patches. Our system automatically scans the computers in the network to detect missing patches.
  • Download: Those missing patches are downloaded from vendor sites and includes security updates, non-security updates, service packs, rollups, optional updates, and feature packs.
  • Test and approve: The downloaded patches are first tested in non-production machines; deploying untested patches in a production environment can be risky – some patches and updates may lead to post-deployment problems like compatibility issues, which only make the admin’s job tougher if incompatible patches and updates require uninstallation. The patches are approved only if they cause no issues post-deployment.
  • Deployment: With flexible deployment policies, you can not only select the deployment window but create patching policies as well.