archive-au.com » AU » S » SMILEIT.COM.AU

Total: 277

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Data Breach Plan: Does Your Business Have A Strategy? Just In Case. - Brisbane and Sunshine Coast IT Support
    passwords and or appropriate security measures Security policy and or system failure While cyber attacks are a common cause of data breaches other types of breaches occur on a regular basis As a business owner you must be prepared to face cyber attacks and insider threats Often employees may accidentally or unknowingly expose or lose sensitive data In contrast resentful current or former employees may purposely expose or lose sensitive data Data breaches are damaging regardless of the cause It s critical to use proper security measures to minimize the likelihood of a data breach In addition you must create an effective breach response policy in order to be prepared to detect and respond to a data breach Security Measures to Minimize the Likelihood of a Data Breach Here s a few tips to help you minimize the likelihood of a data breach Document sensitive information maintained and stored by your organization Document what systems contain sensitive information including backup storage and archived data Conduct regular risk assessments and evaluate privacy threats Implement adequate security controls such as encryption where possible Review and update your data destruction policies to ensure data is wiped prior to disposing or recycling equipment Implement controls to prevent and detect unauthorized access to or misuse of sensitive information Review access policies to ensure trustworthy users are the only individuals with access to sensitive information Be Prepared to Respond to a Data Breach You must design and implement a comprehensive data breach response plan This plan must be kept up to date by conducting regular data threat assessments and staying informed on relevant privacy laws Here are the steps necessary to create a comprehensive data breach response plan Consider relevant breach notification legal requirements Specify incident handing procedures Specify procedures for communication with your leadership team

    Original URL path: http://www.smileit.com.au/data-breach-plan-does-your-business-have-a-strategy-just-in-case.html (2014-07-08)
    Open archived version from archive


  • Malware Increases 26% in the Third Quarter with Android Accounting for 97% of Mobile Threats - Brisbane and Sunshine Coast IT Support
    3 of the total market share in tablet and smartphone devices According to the report one in five mobile threats are bots which proves the sophistication of Android malware is increasing In July researchers discovered a new toolkit known as Androrat APK binder which helps malware developers by streamlining the process of inserting malicious code into Android apps In addition the third quarter experiences another trend involving the growth of profit motivated threats With profit motivated threats the attacker makes monetary profit by sending premium rate SMS messages from smartphone devices without the users knowledge or consent The rise in profit motivated threats is known to be caused by the growth in large SMS sending Trojan families including SmsSend PremiumSms FakeInst and OpFake Mobile malware can be a serious threat to businesses as well With malware infected smartphones an attacker can use the malware as a gateway or proxy to obtain access into a restricted business network As for the Google Play store fewer malware threats have appeared due to increased security measures However Google Play apps tend to invade user privacy by collecting excessive amounts of data While this is concerning Google does maintain established privacy practices With malware infected apps users aren t aware of what happens to their data When malware developers obtain user data they often end up selling the data to marketing networks It s important for Android users to be weary of downloading apps to avoid the potentially harmful aftermath Here are some of the most common Android malware attacks Android Geinimi A form of malware that s already corrupted many legitimate Android game apps on Chinese download websites Fake Banking Apps A form of malware which persuades the user to enter their online account login information DroidDream A form of malware that breaches

    Original URL path: http://www.smileit.com.au/malware-increases-26-in-the-third-quarter-with-android-accounting-for-97-of-mobile-threats.html (2014-07-08)
    Open archived version from archive

  • Attention All Retailers: Beware of The New Memory-Scraping Malware - Brisbane and Sunshine Coast IT Support
    scraping malware It s critical to protect Windows based PoS systems in the same way you d protect Windows based computers For example hardware based encryption should be implemented on card readers rather than in the PoS software The following are a few additional best practices to increase security of your PoS systems and prevent unauthorized access Use Strong Passwords Default passwords can be used to keep the PoS system installation process simple These default passwords can be obtained online by cybercriminals As a business owner it s critical to change all your default passwords on a regular basis including the passwords to your PoS system Use strong passwords with a combination of letters numbers and systems Prohibit Remote Access Cybercriminals can exploit remote access configurations on PoS systems to access the network It s critical to prohibit remote access to the PoS network at all times Install a Firewall Firewalls can protect your PoS system from cyber attacks by preventing unauthorized access to a private network A firewall will prevent traffic from hackers viruses and other types of malware designed to compromise your PoS system Use Antivirus Software An antivirus program is used to prevent detect and remove malicious computer viruses Remember to continually update your antivirus software otherwise it won t be effective Update PoS Software Applications PoS software applications must be updated with the latest software application patches When updates aren t installed in a timely manner PoS systems are vulnerable to malware attacks Restrict Access Restrict access to PoS system computers or terminals to prevent users from unknowingly exposing the system to security threats on the Internet Only use your PoS system online to conduct PoS related activities and avoid general Internet use To learn more about memory scraping malware and how to protect your PoS

    Original URL path: http://www.smileit.com.au/attention-all-retailers-beware-of-the-new-memory-scraping-malware.html (2014-07-08)
    Open archived version from archive

  • Your Android Smartphone can ‘Now’ be your Personal Assistant. - Brisbane and Sunshine Coast IT Support
    travels with time to spare and suggest other routes It also has weather recent searches meetings and upcoming event alerts If you are a frequent flyer this is a great app to utilize QR codes are available for boarding passes and flight statuses are available all in a widget format Down to the smallest task at hand Google Now has you covered Never forget to do the small things like take out the trash or grab some eggs on way home from work This is only the tip of the iceberg If you re not quite convinced check out the full list of features here What s the catch You need to allow Google to access your personal information such as your email calendar and location much like a personal assistant If you are already using your Android chances are you have allowed such access through other portals So you may as well make the best use of your time and be extra productive with this new personalized alert system To enable this option just swipe up from the Home button on your Android to see the Google Now app for an explanation of services and check the acceptance box that says OK I m in Client Success CoalMont Pty Ltd is an Australian private company focused on the exploration and development of the Michel Creek Hard Coking Coal Project located in the Crowsnest Coalfield in British Columbia Canada CoalMont aims to become one of Canada s leading exporters of high quality hard coking coal Our Australian office is located in Brisbane Upon setting up our office here in Australia we used Smile IT to set up our IT network and link both our offices located in Canada and Australia We were very pleased with their service communication and job

    Original URL path: http://www.smileit.com.au/your-android-smartphone-can-now-be-your-personal-assistant.html (2014-07-08)
    Open archived version from archive

  • Is Your IT Personnel Cheating On Your Disaster Recovery Tests? - Brisbane and Sunshine Coast IT Support
    to show successful results These are the the top 4 ways your IT personnel may be cheating Saving A Copy Your IT personnel may copy server data onto their hard drive an external drive or a once only tape If the disaster recovery test fails they ll have their backup handy to ensure the test appears successful In a real disaster backup data wouldn t be available This type of cheating also sets up your business for a potential security breach if the data is unencrypted and stored on their hardware Migrating Servers From Physical to Virtual IT personnel can migrate servers ahead of time from physical to virtual then bring them up as virtual machines during the test instead of restoring servers This approach is much less time consuming and difficult compared to restoring physical servers often decreasing recovery time by 8 10 hours They might miss problems with the physical servers when using this method of cheating Getting Information From An Outside Contact During a disaster recovery test your IT personnel may discover a missing file or faulty aspect of the plan and they make a call to an outside contact to transfer the file to them This will be impossible in a real disaster situation Recovering The Easy Systems If your company has a mainframe and end users access data via a middleware application instead of accessing the mainframe directly make sure you IT personnel test the ability to leverage data directly from the mainframe Often IT personnel will focus on bringing up the middleware application and and not the mainframe In a real disaster leveraging data directly from the mainframe might be necessary Ask your current IT personnel for details regarding the disaster recovery test such as steps they ve taken to ensure your communications data

    Original URL path: http://www.smileit.com.au/is-your-it-personnel-cheating-on-your-disaster-recovery-tests.html (2014-07-08)
    Open archived version from archive

  • Coca-Cola Security Breach Put Personal Information Of 74,000 Employees At Risk - Brisbane and Sunshine Coast IT Support
    hands you too could experience a data breach Organizations need to be sure they have a firm grasp on their data know where and when it has been copied or transferred and ensure that techniques such as encryption are in place in case it falls into the wrong hands explained Chris McIntosh CEO of security firm ViaSat UK Unencrypted Data And Lack of Proper Supervision Caused The Breach Coca Cola didn t realize the laptops contained personal information until they were recovered in November and December 2013 In total the laptops contained 18 000 personal records with social security numbers plus 56 000 records with other types of sensitive data The affected individuals will be contacted as soon as possible Coca Cola failed to encrypt the records although the company s security policy claims encryption is necessary When trying to explain the delay between the discovery in December and their announcement of the breach on January 24 th Coca Cola stated To expedite the process we brought in extra crews that worked long hours including throughout the holiday period and on weekends Coca Cola had a security policy in place however they failed to adhere to the policy A laptop security policy must be implemented and enforced on employees to ensure sensitive information remains confidential Enforce and Adhere To These Laptop Security Policies To Prevent Disclosure of Sensitive Information Ensure you control the way confidential data is accessed stored and transferred Perform ongoing risk assessments to identify security threats Hold employee training sessions to define security measures and penalties for employee noncompliance Encrypt technologies to secure confidential data stored on laptops Employ physical security measures including biometric finger scanners to provide an extra layer of security Wipe data from laptops and computer devices prior to recycling or disposing of them

    Original URL path: http://www.smileit.com.au/coca-cola-security-breach-put-personal-information-of-74000-employees-at-risk.html (2014-07-08)
    Open archived version from archive

  • Mobile Threat Alert! New Trojan Malware Targets Android Devices Connected To Your PC - Brisbane and Sunshine Coast IT Support
    to infected PCs This is an unusual method as in the past mobile attackers infected devices using social engineering and fake applications hosted on third party app stores Fortunately the Trojan program won t work unless the option called USB debugging is enabled on your Android device USB debugging is used to perform some operations such as rooting the OS installing custom Android firmware or taking screen shots on devices running older Android versions This feature isn t often used but if you ve turned it on it s critical to disable USB debugging immediately The Trojan program also intercepts SMS messages received on the user s device and sends them to a remote service This is usually done if the message contains transaction authorization sent by banks Ultimately the attacker s goal is to perform financial fraud It s important to disable the USB debugging feature on your Android device and be careful when connecting your device to an unfamiliar PC To learn more about mobile malware and how to protect your mobile devices give us a call or send us an email We can help you protect your confidential data from the latest security threats Client Success IT

    Original URL path: http://www.smileit.com.au/mobile-threat-alert-new-trojan-malware-targets-android-devices-connected-to-your-pc.html (2014-07-08)
    Open archived version from archive

  • Security Software Extension For XP Won’t Protect Your Business. - Brisbane and Sunshine Coast IT Support
    deadline because so many organizations were behind on the migration process The extended support applies to the following System Center Endpoint Protection Forefront Endpoint Protection Forefront Client Security Windows Intune running XP for enterprise customers Microsoft Security Essentials for consumers Businesses Using XP Will Be Vulnerable To Security Threats Microsoft claims the extension doesn t affect the end of support date for Windows XP Businesses and individuals alike are strongly encouraged to upgrade to newer versions of Windows A Microsoft blog post states Our research shows that the effectiveness of antimalware solutions on out of support operating systems is limited Running a well protected solution starts with using modern software and hardware designed to help protect against today s threat landscape So why are so many businesses still running Windows XP Microsoft warns against it security experts warn against it IT providers warn against it yet businesses continue to run the operating system without plans for migration They claim to have trouble migrating for a variety of reasons Lack of money Lack of time Lack of technical resources Compatibility problems with older software The potential for downtimes or complete data loss should be a huge concern for businesses running Windows XP after the end of support date If the cost of migration is stopping you from migrating from XP consider the cost of downtime or a data breach In the long run it s cheaper to migrate to another operating system SmileIT can help you migrate to a new operating system in a smooth and timely fashion while ensuring compatibility with your current software We ll help you select and implement a secure operating system to protect your business from security threats and data breaches For more information or a complimentary assessment of your IT system call 07 3173 1991

    Original URL path: http://www.smileit.com.au/security-software-extension-for-xp-wont-protect-your-business.html (2014-07-08)
    Open archived version from archive