<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>widebayit</title><description>widebayit</description><link>https://www.widebayit.com.au/blog</link><item><title>Storing your data on DNA?</title><description><![CDATA[A very 21st century problem, we are on the cusp of an information overload. By 2013, humans had produced an estimated 4.4 zettabytes of data and by 2025, that's set to skyrocket to 160 zettabytes each year! To put that into perspective, if Netflix's entire catalogue was streamed more than 3000 times, that would use 1 exabyte of data. A single zettabyte is 1000 exabytes. Our current infrastructure can only handle a small fraction of the oncoming data deluge, and by 2040 it is expected our total<img src="http://static.wixstatic.com/media/161f3e_8776535d5e1e41818044022599415c5f%7Emv2.png/v1/fill/w_626%2Ch_138/161f3e_8776535d5e1e41818044022599415c5f%7Emv2.png"/>]]></description><dc:creator>Shannon Pepi</dc:creator><link>https://www.widebayit.com.au/single-post/DNA-Storage</link><guid>https://www.widebayit.com.au/single-post/DNA-Storage</guid><pubDate>Mon, 17 Sep 2018 05:24:51 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/161f3e_8776535d5e1e41818044022599415c5f~mv2.png"/><div>A very 21st century problem, we are on the cusp of an information overload. By 2013, humans had produced an estimated 4.4 zettabytes of data and by 2025, that's set to skyrocket to <a href="https://www.seagate.com/www-content/our-story/trends/files/Seagate-WP-DataAge2025-March-2017.pdf">160 zettabytes each year!</a> To put that into perspective, if Netflix's entire catalogue was streamed more than 3000 times, that would use 1 exabyte of data. A single zettabyte is 1000 exabytes. Our current infrastructure can only handle a small fraction of the oncoming data deluge, and by 2040 it is expected our total data will have consumed all of the world's microchip-grade silicon.</div><div>With today's technology, we store most digital archives - ranging from music to satellite images and research files - on magnetic tape. This tape, although cheap, takes up a lot of space and needs replacing every 10 years. According to Victor Zhirnov, chief scientist at the <a href="https://www.src.org/">Semiconductor Research Corporation</a>, &quot;Today’s technology is already close to the physical limits of scaling, DNA has an information-storage density several orders of magnitude higher than any other known storage technology.&quot;</div><div>Just how dense is that exactly? If you formatted every movie ever made into DNA, it would be smaller than the size of a sugar cube and last 10,000 years.</div><img src="http://static.wixstatic.com/media/161f3e_608c909b5d7e49779b72799179cdc0d4~mv2.jpg"/><div>The idea of replacing silicon-chip or magnetic-tape with DNA isn't new, successfully storing Robert Frost's poem &quot;The Road Not Taken&quot;, as well as Deep Purples &quot;Smoke on the Water&quot; and a gif of a galloping horse. So if we have successfully use DNA to store data, where is the issue? Cost. DNA-synthesis companies exist, <a href="https://twistbioscience.com/">Twist Bioscience</a> for example, charge between 7 and 9 cents per base, meaning a single minute of high quality stereo sound would cost just under $100,000.</div><div>With recent molecular data storage breakthroughs, Microsoft plans to have an operational prototype working inside one of its data centres by 2020. Doug Carmean, a partner architect at Microsoft research, said that this storage solution will be offered to &quot;boutique&quot; customers, needing in the gigabyte and petabyte range. Microsoft's long-term goal though, is a much more ambitious and exciting prospect. &quot;We're going after totally replacing tape drives as an archival storage,&quot; says Doug Carmean.</div><div>With plenty to be excited about in data storage, one thing for certain is this is a modern day problem and we're searching for a 3.8 billion year old solution.</div></div>]]></content:encoded></item><item><title>Proactive vs Reactive - Is Prevention better than a cure?</title><description><![CDATA[With the almost endless list of ICT support providers out there, where do you start when it comes to finding the right kind of support that fits inline with your business? The answer very much depends on whether or not you're looking to prevent inevitable issues in your I.T or fix the issues when they arise.What is the difference?Due to the very nature of technology, things will go wrong. Reactive support is built on the idea of supplying IT help and guidance when things do go wrong; essentially<img src="http://static.wixstatic.com/media/161f3e_6d8d6beaa2a941a2bec7a7fe768a09dd%7Emv2.jpg/v1/fill/w_626%2Ch_263/161f3e_6d8d6beaa2a941a2bec7a7fe768a09dd%7Emv2.jpg"/>]]></description><link>https://www.widebayit.com.au/single-post/2018/08/15/Proactive-vs-Reactive---Is-Prevention-better-than-a-cure</link><guid>https://www.widebayit.com.au/single-post/2018/08/15/Proactive-vs-Reactive---Is-Prevention-better-than-a-cure</guid><pubDate>Wed, 15 Aug 2018 04:11:36 +0000</pubDate><content:encoded><![CDATA[<div><div>With the almost endless list of ICT support providers out there, where do you start when it comes to finding the right kind of support that fits inline with your business? The answer very much depends on whether or not you're looking to prevent inevitable issues in your I.T or fix the issues when they arise.</div><img src="http://static.wixstatic.com/media/161f3e_6d8d6beaa2a941a2bec7a7fe768a09dd~mv2.jpg"/><div>What is the difference?</div><div>Due to the very nature of technology, things will go wrong. Reactive support is built on the idea of supplying IT help and guidance when things do go wrong; essentially a safety net for when business applications or servers fail. The biggest disadvantage to a reactive support model within businesses is that there is no visibility into an entire IT infrastructure of your business, often resulting in IT teams having to do a lot of digging around to find the root of a problem. Not only does this approach waste valuable time and resources, it also leaves your IT infrastructure open to potential problems caused by human error, which can lead to thousands of dollars wasted.</div><div>Prevention is better than a cure, Proactive Support is a support model based on prevention. With proactive IT support, IT support teams provide regular maintenance and constant monitoring of your IT infrastructure, finding Similar to taking a car in for regular services rather then driving it until your brake fails. With a fixed monthly cost, Proactive support makes it easy to budget and shows you exactly where you are spending.</div><div>As IT infrastructures become more complex, organisations are opting for the proactive approach to ensure downtime is kept to a minimum, risks are mitigated and problems resolved before they occur. Is the proactive approach best for your company?  and we'll find out what will work best for you</div></div>]]></content:encoded></item><item><title>You Print one. We'll Plant one.</title><description><![CDATA[Through Xerox's new partnership with PrintReleaf, Managed Print Service (MPS) customers will have the opportunity to contribute to the reforestation of global forests. With the tagline 'You print one, we'll plant one', PrintReleaf is leveraging paper usage reporting to calculate the number of trees needed to reforest that usage.Xerox customers around the world will be able to sign up for PrintReleaf as an add-on to their Managed Print Service contract. Using an online portal, customers of Xerox<img src="http://static.wixstatic.com/media/161f3e_65390aeb671b48de9cbc855d3084cd9a%7Emv2.jpg/v1/fill/w_626%2Ch_284/161f3e_65390aeb671b48de9cbc855d3084cd9a%7Emv2.jpg"/>]]></description><dc:creator>Shannon Pepi</dc:creator><link>https://www.widebayit.com.au/single-post/You-Print-one-Well-Plant-one</link><guid>https://www.widebayit.com.au/single-post/You-Print-one-Well-Plant-one</guid><pubDate>Tue, 05 Jun 2018 00:42:04 +0000</pubDate><content:encoded><![CDATA[<div><div>Through Xerox's new partnership with <a href="https://www.printreleaf.com/">PrintReleaf</a>, Managed Print Service (MPS) customers will have the opportunity to contribute to the reforestation of global forests. With the tagline 'You print one, we'll plant one', PrintReleaf is leveraging paper usage reporting to calculate the number of trees needed to reforest that usage.</div><img src="http://static.wixstatic.com/media/161f3e_65390aeb671b48de9cbc855d3084cd9a~mv2.jpg"/><div>Xerox customers around the world will be able to sign up for PrintReleaf as an add-on to their Managed Print Service contract. Using an online portal, customers of Xerox will have the unique opportunity to select the managed forestry projects to have their trees planted as well as have access to tracking and reporting on their direct impact on global reforestation efforts.</div><div>Sustainability is already a strong core focus of the Fuji Xerox brand and has been integrated into the foundation of their Managed Print Services through the innovative development of Xerox print devices and a recycling program for the consumable components.</div><div>&quot;From our <a href="https://www.xerox.com/perl-bin/product.pl?mode=recycling&amp;XOGlang=en_US">Green World Alliance program</a> to the <a href="https://www.xerox.com/en-us/services/managed-print-services/assessment/audit">Xerox Print Awareness Tool</a>, we have long been known for our dedication to sustainability,&quot; said The vice president of Xerox's Environment, Health, Safety &amp; Sustainability, Wendi Latko. &quot;With PrintReleaf, now we’re able to take that commitment one step further by empowering our MPS customers with an industry certified service that will accelerate and promote their efforts as stewards of the environment.&quot;</div><div>This newest partnership with PrintReleaf is another means in which Fuji Xerox is working towards a greater environmental responsibility. CEO and Founder of PrintReleaf, Jordan Darragh stated, &quot;Xerox’s roots in sustainability make it an ideal partner for us in our continued work towards a more sustainable planet&quot;.</div><div>As the only authorised dealer of Fuji Xerox printing devices in the Wide Bay and Burnett region, Widebay IT aligns itself with the same standard of sustainability as Xerox. Our Managed Print solutions are designed from the ground up with sustainability and minimal environmental impact in mind, also minimising our customers costs. If you're interested in how your business can increase it's environmental responsibility and save on costs, call us today on (07) 4152 9066</div></div>]]></content:encoded></item><item><title>With great technology, comes great responsibility</title><description><![CDATA[In an increasingly digital and connected age, our personal details, the information we store in the Cloud even our work lives - these days, it's all online. In a 2016 consumer insights survey, 88% of workers stated it was important that their office remains secure. 60% of workers, unsurprisingly stated said they were concerned about preserving the confidentiality of documents when printing.When the innovative technology already exists to protect us, why should we worry about our information<img src="http://static.wixstatic.com/media/161f3e_4cc583e47a074750878d86c30bacf130%7Emv2.png/v1/fill/w_526%2Ch_254/161f3e_4cc583e47a074750878d86c30bacf130%7Emv2.png"/>]]></description><dc:creator>Shannon Pepi</dc:creator><link>https://www.widebayit.com.au/single-post/With-great-technology-comes-great-responsibility</link><guid>https://www.widebayit.com.au/single-post/With-great-technology-comes-great-responsibility</guid><pubDate>Mon, 30 Apr 2018 05:58:30 +0000</pubDate><content:encoded><![CDATA[<div><div>In an increasingly digital and connected age, our personal details, the information we store in the Cloud even our work lives - these days, it's all online. In a 2016 consumer insights survey, 88% of workers stated it was important that their office remains secure. 60% of workers, unsurprisingly stated said they were concerned about preserving the confidentiality of documents when printing.</div><div>When the innovative technology already exists to protect us, why should we worry about our information falling into the wrong hands?</div><img src="http://static.wixstatic.com/media/161f3e_4cc583e47a074750878d86c30bacf130~mv2.png"/><div>Keeping sensitive documents secure with SecurePrint</div><div>When it comes to keeping your information secure, there is a rather simple solution and it's one that every office can do. SecurePrint is a feature available on your Fuji Xerox device, adding extra layers of security by letting you choose the time to print the document and create a 4 digit passcode at the time of printing.</div><div>By utilising SecurePrint, the communal office printer becomes your own personal office printer, safe and secure.Protecting your documents with your Multifunction device</div><div>Fuji Xerox multifunction printers have a wide range of security features built in and while SecurePrint is revolutionary, it isn't the only way your printer protects you. The following 4 ways are just some of the ways a Fuji Xerox machine can help with document security.</div><div><div>Authentication: Staff can use an access code to print and copy</div><div>Access: Set custom rules to determine who has access to what documents and what can and can't be printed.</div><div>CentreWare Internet Service: Centreware provides you with a device's print, scan and fax history. If a leak occurs within your organisation, you can identify when and where the leak came from.</div><div>Annotation: Imprinting a user name, date and any relevant data on all photocopies that are made.</div></div><div>Tap 'n' Go Technology; A powerful solution</div><div>These days, an efficient workplace and confidential documents can be attributed to SMEs using outdated technology. With Tap 'n' Go, SMEs have a powerful solution that integrates smart software with printing devices.</div><div>Ensure documents remain secure by using a PIN to release print jobs.If the printers go down, your business doesn't go down with them.Improved productivity for both employees and the office, by releasing print jobs at any device, even if it's busy or offline.</div></div>]]></content:encoded></item><item><title>10 benefits to outsourcing your I.T</title><description><![CDATA[I want to start off by pointing that outsourcing I.T isn't a new idea. For years now, businesses and schools have been outsourcing their I.T functions and management, providing themselves with more resources, upgraded technology and a proactive approach towards cost efficiency.In the past few years, I.T outsourcing has evolved so much that it is no longer just about cost savings. These days, outsourcing your I.T is considered a strategic tool for increasing productivity and a businesses<img src="http://static.wixstatic.com/media/161f3e_ba9554c08f574e0c908a7efe9ef4f0ab%7Emv2.png/v1/fill/w_601%2Ch_221/161f3e_ba9554c08f574e0c908a7efe9ef4f0ab%7Emv2.png"/>]]></description><dc:creator>Shannon Pepi</dc:creator><link>https://www.widebayit.com.au/single-post/10-benefits-to-IT-outsourcing</link><guid>https://www.widebayit.com.au/single-post/10-benefits-to-IT-outsourcing</guid><pubDate>Tue, 17 Apr 2018 00:57:49 +0000</pubDate><content:encoded><![CDATA[<div><div>I want to start off by pointing that outsourcing I.T isn't a new idea. For years now, businesses and schools have been outsourcing their I.T functions and management, providing themselves with more resources, upgraded technology and a proactive approach towards cost efficiency.</div><img src="http://static.wixstatic.com/media/161f3e_ba9554c08f574e0c908a7efe9ef4f0ab~mv2.png"/><div>In the past few years, I.T outsourcing has evolved so much that it is no longer just about cost savings. These days, outsourcing your I.T is considered a strategic tool for increasing productivity and a businesses competitiveness. Outsourcing gives you the opportunity to take a step back and consider what is at the core of your business and what could be performed more efficiently.</div><div>So, what are the benefits of outsourcing my I.T?</div><div>Your capital isn't spent on expensive hardware, giving you the chance for other investmentsEfficient cost managementOperational flexibility is improvedImproved levels of serviceManagement overheads are reducedHave the latest technology and updates with the option to rapidly deploy new capabilitiesMeet your tactical and strategic objectives fasterObtain the skills of highly trained professionals that would otherwise be unaffordable on a full time basisRisk burden is shared and accountability is taken off of you.Re-focusing your priorities onto what your business does best.</div><div>Lastly, many small businesses simply cannot afford to match the support services of larger companies. Outsourcing helps small businesses to seem &quot;big&quot; by providing them access to the same scale, efficiency and expertise that larger competitors enjoy, essentially leveling the playing field.</div><div>It is an undeniable fact that we live in an age where data is the new currency; Facebook's latest scandal anyone?. Everything and everyone is connected to a data management of sorts. How we manage that data or information can and will drastically affect businesses operations, which is why I.T outsourcing is becoming more important for a businesses sustainability.</div></div>]]></content:encoded></item><item><title>Clouds vs The Cloud?</title><description><![CDATA[The cloud - A tech term that seems to be very trendy as of late and yet, few people can actually explain what 'the cloud' is. What is the cloud? When are we using it? How does it actually benefit my business? All questions we here at Widebay IT receive all too often.So, what is the cloud exactly?First and foremost, the cloud is not a physical thing. It is a network of servers, each with its own function. Some servers use computing power to run applications or deliver a service.As an example, a<img src="http://static.wixstatic.com/media/161f3e_668767d620834228ae2a4d4e1d3e245c%7Emv2_d_4500_2344_s_2.jpg/v1/fill/w_520%2Ch_271/161f3e_668767d620834228ae2a4d4e1d3e245c%7Emv2_d_4500_2344_s_2.jpg"/>]]></description><dc:creator>Shannon Pepi</dc:creator><link>https://www.widebayit.com.au/single-post/TheCloud</link><guid>https://www.widebayit.com.au/single-post/TheCloud</guid><pubDate>Thu, 22 Mar 2018 00:56:37 +0000</pubDate><content:encoded><![CDATA[<div><div>The cloud - A tech term that seems to be very trendy as of late and yet, few people can actually explain what 'the cloud' is. What is the cloud? When are we using it? How does it actually benefit my business? All questions we here at Widebay IT receive all too often.</div><img src="http://static.wixstatic.com/media/161f3e_668767d620834228ae2a4d4e1d3e245c~mv2_d_4500_2344_s_2.jpg"/><div>So, what is the cloud exactly?</div><div>First and foremost, the cloud is not a physical thing. It is a network of servers, each with its own function. Some servers use computing power to run applications or deliver a service.</div><div>As an example, a few years ago Adobe moved their entire creative services offering into a cloud based Software-as-a-Solution (SaaS). This meant, instead of spending money on an expensive suite of programs that comes in a box, you subscribe to each service with a monthly fee.</div><div>Then there are other servers in the same network that are responsible purely for storing data.</div><div>For example, taking a photo on your phone stores it in the phones internal storage however when you upload that to instagram or facebook, it's stored in their cloud.</div><img src="http://static.wixstatic.com/media/161f3e_d05eb84c9c5941f19bb29cd2be613964~mv2.jpg"/><div>Okay, well what are the benefits of working in the cloud?</div><div>A businesses decision to move to the cloud, in our experience, in very often financially motivated. Traditionally, companies had to buy their own hardware and equipment. Not only does this have a initial cost but the value of the hardware depreciates quickly. With the cloud however, companies are now able to pay for exactly what they're using. This new model means that its easy and quick to scale up and down as a company grows or shrinks.</div><div>This is the main reason 'the cloud' seems to be everywhere today. Not only does it give us all the opportunity to show off how extravagant our lunch is but it also helps companies save thousands of dollars every year.</div><div>If all that data is in the cloud, how big IS the cloud?</div><div>This is an interesting question we get asked all the time and the honest answer is, No one knows exactly just how much space cloud based services such as Google or facebook can offer; however according to this <a href="https://i.amz.mshcdn.com/B3csdFKFLg5NE_fDHWvAj4gwxkc=/fit-in/1200x9600/http%3A%2F%2Fmashable.com%2Fwp-content%2Fuploads%2F2012%2F10%2FTheCloudREVISED2.jpg">infographic</a>, around 1 Exabyte, which is such a huge number without visual representation, it's hard to picture.</div><div>Summing it all up. The cloud is a network of servers with varying uses from computing power to storage solutions. The main selling point for businesses switching to the cloud is the scalability and cost savings associated with the service. If this is something you're interested in hearing more about  to speak to one of our professionals about moving your business into the cloud and we'll show you just how much you could benefit.</div></div>]]></content:encoded></item><item><title>ACCC prioritising consumer NBN issues this year</title><description><![CDATA[ACCC chairman Rod Sims has stated that consumer broadband issues will be a major focus this year. The communications watchdogs will be continuing to focus on NBN speed advertising.On Tuesday, 20th February, Rod Sims publicly spoke and warned NBN retailers that the ACCC are going to be getting involved when consumers are not provided speeds they are paying for. With recent enforcement action from the ACCC, Telstra, Optus and TPG were forced to refund tens of thousands of NBN customers.During his<img src="http://static.wixstatic.com/media/161f3e_9987e5c1ee63402c80ff74aac67fd541%7Emv2.jpg/v1/fill/w_626%2Ch_219/161f3e_9987e5c1ee63402c80ff74aac67fd541%7Emv2.jpg"/>]]></description><dc:creator>Shannon Pepi</dc:creator><link>https://www.widebayit.com.au/single-post/ACCC-to-target-NBN-issues</link><guid>https://www.widebayit.com.au/single-post/ACCC-to-target-NBN-issues</guid><pubDate>Fri, 23 Feb 2018 01:35:02 +0000</pubDate><content:encoded><![CDATA[<div><div>ACCC chairman Rod Sims has stated that consumer broadband issues will be a major focus this year. The communications watchdogs will be continuing to focus on NBN speed advertising.</div><img src="http://static.wixstatic.com/media/161f3e_9987e5c1ee63402c80ff74aac67fd541~mv2.jpg"/><div>On Tuesday, 20th February, Rod Sims publicly spoke and warned NBN retailers that the ACCC are going to be getting involved when consumers are not provided speeds they are paying for. With recent enforcement action from the ACCC, Telstra, Optus and TPG were forced to refund tens of thousands of NBN customers.</div><div>During his speech, Rod said &quot;Consumer issues in the provision of broadband services, including addressing misleading speed claims and statements made during the transition to the NBN, have become one of the ACCC's most prominent issues in the past two years and highlights the importance of both our consumer and competition focus&quot;</div><div>&quot;The first report of the ACCC's Measuring Broadband Australia program will be released shortly, and our commitment to truth in advertising related to broadband speeds is making it easier for Australians to choose a service provider.&quot;</div><div>&quot;You have seen a number of ACCC enforcement actions in 2017, and can expect further interventions this year.&quot;</div><div>It's only early 2018, but already there has been more action towards making the NBN consumer friendly then we have previously seen. How has your NBN experience been so far?</div></div>]]></content:encoded></item><item><title>O365 Business &amp; Ransomware: The Lurking Threat</title><description><![CDATA[For SMB's, Windows and Microsoft based systems remain the dominant choice. Windows continues to be the OS most widely used on desktops and laptops and Microsoft Office remains the most widely used work office suite. So it’s no surprise that Windows systems remain the top target for Ransomware. Before Office 365, you wrote a Word document on your laptop, saved it on your system or file server, then emailed it as an attachment to share outside your organization. Copies of your file could exist in<img src="http://static.wixstatic.com/media/161f3e_635777390fcf4a42af2db6d8facba5fd%7Emv2.jpg"/>]]></description><dc:creator>Shannon Pepi</dc:creator><link>https://www.widebayit.com.au/single-post/The-Lurking-Threat</link><guid>https://www.widebayit.com.au/single-post/The-Lurking-Threat</guid><pubDate>Wed, 14 Feb 2018 01:53:51 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/161f3e_635777390fcf4a42af2db6d8facba5fd~mv2.jpg"/><div>For SMB's, Windows and Microsoft based systems remain the dominant choice. Windows continues to be the OS most widely used on desktops and laptops and Microsoft Office remains the most widely used work office suite. So it’s no surprise that Windows systems remain the top target for Ransomware. Before Office 365, you wrote a Word document on your laptop, saved it on your system or file server, then emailed it as an attachment to share outside your organization. Copies of your file could exist in several places: your laptop, a file storage server, your sent email, and the inbox of the recipient. The collaborative capabilities of Office 365 make ransomware defense more challenging thanks to shared files and OneDrive sync.</div><div>A stunning 100% of IT professionals reported they had seen Windows systems infected by ransomware, as reported in Datto’s State of the Channel Ransomware Report. The following strategies and tactics will help reduce your ransomware risk, protect your networks and devices, and ultimately help you recover your data when a ransomware event occurs.</div><div>Update to Reduce Risks</div><div>The War on Ransomware's second line of defense is Security and that begins with an up-to-date operating system, an up-to-date browser, and up-to-date patches.</div><div>For a single user, that’s relatively easy to achieve but businesses must manage a large number of devices. While tools exist to help upgrade, update and patch systems at scale, too often administrators leave things alone. In the real world we see out-of-date, unpatched software more than necessary. So review the following items to reduce your ransomware risk wherever possible.</div><div>Operating System</div><div>Microsoft system requirements list Windows 7 Service Pack 1 as the oldest desktop operating system suggested for Office 365. Remember, though, that Microsoft first released Windows 7 in 2009, and that mainstream support for it ended in January 2015.</div><div>Run Windows 10 to reduce your ransomware risk. Microsoft found that “devices running Windows 10 are 58% less likely to encounter ransomware than when running Windows 7” in a “<a href="https://wincom.blob.core.windows.net/documents/Ransomware_protection_in_Windows_10_Anniversary_Update.pdf">Ransomware Protection in Windows 10 Anniversary Update</a>” report.</div><div>Browser</div><div>Microsoft built Office 365 to work with a variety of browsers, including Chrome, Firefox, and Safari, as well as Internet Explorer and Microsoft Edge. If you deploy Chrome, Firefox, or Safari in your environment, make sure these stay current, as well. Google updates Chrome about every six weeks, while Mozilla releases a new version of Firefox roughly every six to eight weeks. A once or twice-a-year browser deployment leaves people needlessly vulnerable to known and patched problems.</div><div>Patches</div><div>Finally, while it may seems obvious, apply patches promptly. Ransomware and other malware pursue multiple paths around defenses—so it’s not enough to just update to devices monthly. An unpatched laptop that connects to your network, servers, or OneDrive today, may deliver malicious code to encrypt every file it can find tomorrow. So patch promptly.</div><div>Security</div><div>Ensure there is a line of defense between you and the web. A reliable, corporate grade security solution is a must. There are a plethora of security software options and when choosing just one, there are a number of must have features to look for:</div><div>- Real-time scanning: All antivirus software is designed specifically to detect malware; just not all in the same way. Higher grade antivirus software have dynamic scanning features that are repeatedly checking your pc for malicious files.</div><div>- Automatic Updates: Although no substitute for regularly checking for updates manually, built in automatic updates add an extra layer of assurance.</div><div>- Protection for Multiple Apps: From email clients to instant messenger platforms and certainly internet browsers, harmful software can sneak into your system from a variety of different sources. Antivirus programs need to protect multiple vulnerable apps from potential dangers, otherwise you’re leaving your hardware dangerously exposed.</div><div>- Auto-Clean: If the antivirus software immediately detects malicious software, why wouldn’t it delete the code on the spot? Since there’s no reason to leave potentially harmful software on your system, you should choose a program that utilizes an auto-clean feature to rid itself of viruses.</div><div>- Fights Against All Types of Malware: Between trojans, bots, spyware, viruses, etc., there are many different types of malware that can harm your computer, and antivirus programs are sometimes designed only to target a specific type of software. It’s better to go with a program that can comprehensively detect all or almost all of the various forms that malware takes.</div><div>If you are unsure about your antivirus options, it's best to ask your IT manager or IT provider for help. </div><div>Widebay IT have launched war on ransomware and are dedicated to protecting SMB's against the ransomware threat and stopping the epidemic. If you are interested in learning more or joining the fight along with many other SMB's, visit our war on ransomware page.</div></div>]]></content:encoded></item><item><title>5 of the worst types of Ransomware</title><description><![CDATA[Ransomware has been around since 1989, the first being AIDS Trojan and was unleashed via floppy disks. It wasn't until last year, when the virus named WannaCry caused global panic in only 3 days, that the true threat of malware and more specifically ransomware entered into public consciousness.With the explosion of digital currencies, such as bitcoin, the growing pile of evidence to suggest that digital extortion of an almost untraceable currency could be profitable has made ransomware a far to<img src="http://static.wixstatic.com/media/161f3e_ff270a2ddc65447a999971e5d63eed3c%7Emv2.jpg/v1/fill/w_125%2Ch_70/161f3e_ff270a2ddc65447a999971e5d63eed3c%7Emv2.jpg"/>]]></description><dc:creator>Shannon Pepi</dc:creator><link>https://www.widebayit.com.au/single-post/5-of-the-worst-Ransomware-infections</link><guid>https://www.widebayit.com.au/single-post/5-of-the-worst-Ransomware-infections</guid><pubDate>Wed, 07 Feb 2018 02:07:39 +0000</pubDate><content:encoded><![CDATA[<div><div>Ransomware has been around since 1989, the first being AIDS Trojan and was unleashed via floppy disks. It wasn't until last year, when the virus named WannaCry caused global panic in only 3 days, that the true threat of malware and more specifically ransomware entered into public consciousness.</div><div>With the explosion of digital currencies, such as bitcoin, the growing pile of evidence to suggest that digital extortion of an almost untraceable currency could be profitable has made ransomware a far to common and very real threat.</div><div>The reason ransomware is so dangerous is that it's difficult to stop, even with the most up to date anti-virus software and the only real protection against it is a reliable backup. There are no signs of the threat subsiding, so we are highlighting 5 of the most deadly strains of ransomware to raise awareness and educate.</div><div>1. GandCrab</div><img src="http://static.wixstatic.com/media/161f3e_ff270a2ddc65447a999971e5d63eed3c~mv2.jpg"/><div>One of the latest strains of ransomware, GandCrab was discovered in January 2018. Taking a different approach to infect victims, using exploit kits being marketed to cyber criminals as a &quot;ransomware-as-a-service&quot; package.</div><div>2. GoldenEye</div><img src="http://static.wixstatic.com/media/161f3e_9d1c5685013b48e084631ab915e0d166~mv2.png"/><div>Reported to have hit Ukraine's national bank, the state power provider and Kiev's main airport. Thought by industry specialists to be a combination of ransomware infections. Usually, when ransomware infects, it encrypts the files however GoldenEye acts differently in that it targets an entire systems, preventing the user from even booting the device.</div><div>3. WannaCry</div><img src="http://static.wixstatic.com/media/161f3e_82c4cb995f3645a290a7bd7f96f06d63~mv2.jpg"/><div>Described by EuroPol as unprecedented in scale, WannaCry hit on Friday May 12 2017 and in just 3 days, shut down hospitals all over UK and had spread to 200,000 systems across 150 countries, attacking government agencies, national organisations and put simply, anyone it could with access to the internet. The reason behind WannaCry's ferocity is that it used a leaked exploit, first developed by the National Security Agency (NSA).</div><div>4. Cryptolocker</div><img src="http://static.wixstatic.com/media/161f3e_797e791dd17442f3905cb09420bb205e~mv2.png"/><div>Long since shut down thanks to Operation Tovar in 2014, Cryptolocker showed cyber criminals everywhere just how successful ransomware could be. In of itself, not that different from ransomware today, Cryptolocker is where modern ransomware started.</div><div>5. Locky</div><img src="http://static.wixstatic.com/media/161f3e_cefdb21144bd41d6afd3a58c3d02881b~mv2.png"/><div>Cybercriminals thought of it all with Locky. Not only encrypting data files but also Bitcoin wallets and windows services that were responsible for system recovery, removing any ability from users to reset or recover their system.</div></div>]]></content:encoded></item><item><title>Following 6 Steps will help make the most out of your communications investment</title><description><![CDATA[Anyone could tell you just how rapidly technology is changing and unified communications and collaboration systems are certainly no exception. To ensure your investments are primed for the long haul, below are 6 steps to follow thanks to our partners at Mitel.1. Keep your communications seamlessBy the end of this year, it is expected that 70% of mobile professionals will be doing business on mobile devices. The mobile workforce trend is one that isn't leaving any time soon, and one all business'<img src="http://static.wixstatic.com/media/161f3e_b603ab90456b4b0cbbf923c894ede334%7Emv2.jpg/v1/fill/w_626%2Ch_207/161f3e_b603ab90456b4b0cbbf923c894ede334%7Emv2.jpg"/>]]></description><dc:creator>Shannon Pepi</dc:creator><link>https://www.widebayit.com.au/single-post/2018/01/10/Following-6-Steps-will-help-make-the-most-out-of-your-communications-investment</link><guid>https://www.widebayit.com.au/single-post/2018/01/10/Following-6-Steps-will-help-make-the-most-out-of-your-communications-investment</guid><pubDate>Wed, 10 Jan 2018 00:38:08 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/161f3e_b603ab90456b4b0cbbf923c894ede334~mv2.jpg"/><div>Anyone could tell you just how rapidly technology is changing and unified communications and collaboration systemsare certainly no exception. To ensure your investments are primed for the long haul, below are 6 steps to follow thanks to our partners at Mitel.</div><div>1. Keep your communications seamless</div><div>By the end of this year, it is expected that 70% of mobile professionals will be doing business on mobile devices. The mobile workforce trend is one that isn't leaving any time soon, and one all business' should jump on board with. Your communications and collab systems should be designed with this mobility trend in mind, so the in-office experience is consistent across all mobile devices, regardless of distance from the office.</div><div>2. Boost your bottom line with significant cost savings</div><div>Did you know, that the average cost to a company for bad or non-existent mobile strategies is $36 Million a year. That's a staggering number and one that improving your mobile collab strategy will avoid. Working with a Managed telecommunications provider (Widebay IT) that understands the mobile-first vision can transform your business and improve profit margins.</div><div>3. Engage the best talent, anywhere in the world</div><div>According to a study done by Mitel, 36% of employees would choose flexible working options over a pay rise. Not only increasing morale around the office, but a mobile collaboration strategy helps to create meaningful connections with employees on the road or in remote offices, allowing your business to really embrace collaboration.</div><div>4. Build customer loyalty in a changing consumer market</div><div>Rather than waiting in long lines and being on hold for what can feel like hours, today's customers are a lot busier and constantly on the move. Your customers want the ability to connect with you instantly, through social media, sms, webchat. To take advantage of this and gain the competitive edge talk to a Managed Telco Service provider (Widebay IT).</div><div>5. Protect your investment as your business grows and needs change</div><div>Unless you don't plan on your business growing, flexibility is a must. Partnering with the right Managed telco service provider ensure that as your business grows, your communications and collaborations systems grow along side you. Whether you're on-prem today, moving to the cloud or starting to test a hybrid model, your communications environment needs to easily scale as your business expands.</div><div>6. Trust a partner that delivers all this and more</div><div>From how your employees innovate to how you engage with your customers, your communications are critical. Take your team collaboration and customer experience to the next level by partnering with a Managed Telco Service provider (Widebay IT) that can support you today and tomorrow, no matter what the future brings.</div></div>]]></content:encoded></item><item><title>Cloud, Premises or Hybrid communications for your business?</title><description><![CDATA[If at some point, you've gotten angry, annoyed or even just slightly irritated at your business telecommunications systems, it's very likely you've considered looking at different options and have come across Cloud hosted, On-Premises and Hybrid communication options.So you have uncovered a ton of information about all the different options, but what are you suppose to do with all that information? Has it put you any closer to a decision? In most cases, the answer is no. With all the information<img src="http://static.wixstatic.com/media/161f3e_60c515bf5499471e912d5afda6ca7970%7Emv2_d_2522_5154_s_4_2.png"/>]]></description><dc:creator>Shannon Pepi</dc:creator><link>https://www.widebayit.com.au/single-post/2017/12/13/Cloud-Premises-or-Hybrid-communications-for-your-business</link><guid>https://www.widebayit.com.au/single-post/2017/12/13/Cloud-Premises-or-Hybrid-communications-for-your-business</guid><pubDate>Wed, 13 Dec 2017 01:52:13 +0000</pubDate><content:encoded><![CDATA[<div><div>If at some point, you've gotten angry, annoyed or even just slightly irritated at your business telecommunications systems, it's very likely you've considered looking at different options and have come across Cloud hosted, On-Premises and Hybrid communication options.</div><div>So you have uncovered a ton of information about all the different options, but what are you suppose to do with all that information? Has it put you any closer to a decision? In most cases, the answer is no. With all the information available online, it's difficult to filter out what is right for your business.</div><div>Our cloud communications partner, Mitel, put together this simple decision tree to help make things easier. It helps you work through the most common, critical decision points that most businesses have to take into account. Is it a substitute for a consultation with one of WideBay It's trained telecommunications staff? Probably not. But it's a great place to start and will give you a much better idea of which way you should be leaning and if you choose to have one of our professional sales team visit your business you won't be completely blindsided.</div><img src="http://static.wixstatic.com/media/161f3e_60c515bf5499471e912d5afda6ca7970~mv2_d_2522_5154_s_4_2.png"/><div>So what's next?</div><div>Hopefully after going through the above chart, the many options are a lot less overwhelming. Have you made a decision on what's best for your business based on what you found out, congratulations! Are you still lost on what all of that means for you specifically or need our trained telecommunications team to assist you and making the correct decision? We strongly suggest taking advantage of WideBay I.T's obligation free business audit.</div><div>Our free business auditing service that we offer is what helps set WideBay I.T apart from the Office technology market. We wholeheartedly believe in our approach to offer the most outstanding customer service with our willingness to go the extra mile to ensure that our customers are happy. Have one of our highly trained professionals conduct a comprehensive analysis of your business, because we guarantee you'll be surprised with the outcome, after all it's free. Book an appointment online now because other than large printing bills, what have you got to lose?</div></div>]]></content:encoded></item><item><title>4 ways your small business can benefit from a modern printer</title><description><![CDATA[When you think of the word 'printer', what comes to mind? Do you think of a big, boxy device that takes up way too much space in the office? Maybe you just think of a device that prints, scans and copies and that's it. While this is true for older printers, the modern printer is far more powerful than it has ever been. While there is so much to say about modern printers, I'm going to focus on one particular feature in the incredible innovative Fuji Xerox SMARTseries printer range a range of<img src="http://static.wixstatic.com/media/161f3e_84508704e8e14a20943f963d154a8442%7Emv2.jpg/v1/fill/w_626%2Ch_287/161f3e_84508704e8e14a20943f963d154a8442%7Emv2.jpg"/>]]></description><dc:creator>Shannon Pepi</dc:creator><link>https://www.widebayit.com.au/single-post/2017/12/04/4-ways-your-small-business-can-benefit-from-a-modern-printer</link><guid>https://www.widebayit.com.au/single-post/2017/12/04/4-ways-your-small-business-can-benefit-from-a-modern-printer</guid><pubDate>Mon, 04 Dec 2017 02:17:12 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/161f3e_84508704e8e14a20943f963d154a8442~mv2.jpg"/><div>When you think of the word 'printer', what comes to mind? Do you think of a big, boxy device that takes up way too much space in the office? Maybe you just think of a device that prints, scans and copies and that's it. While this is true for older printers, the modern printer is far more powerful than it has ever been. While there is so much to say about modern printers, I'm going to focus on one particular feature in the incredible innovative Fuji Xerox SMARTseries printer range a range of amazing printing solutions and the same benefits as a large multifunctional device, but at a fraction of the cost and footprint. Here are four ways the modern printer can help you run a more efficient and profitable small business.</div><div>1. Protect your documents with server-less on demand printing.</div><div>Arguably, one of the best features of modern printers are their security capabilities. Australian companies are the second most likely in the world to fall victim to malicious and/or criminal data breaches, averaging 34,249 compromised documents during a single breach.</div><div>The Fuji Xerox SMARTseries printers offer the Server-less on demand option, in order to stop documents from being stolen.</div><div>2. Improve staff productivity and automate the workflow.</div><div>Every minute of the working day is valuable, and today's workforces are moving at lightning pace to keep up. Nobody has the time, nor should waste the time on carrying out menial tasks such as scanning and faxing. The SMARTseries range of printers is capable of being programmed to eliminate the human factor of repetitive tasks almost completely - For example, multiple emails, faxes, printouts and scans can be completed within seconds at the touch of a button, giving staff more time for important tasks.</div><div>3. Cut costs with Capture, Monitor and Control.</div><div>According to Fuji xerox's 'Office Printing Habits Report', printing costs can account for up to 4% of revenue, for 90% of SME's. Unfortunately printing is a cost ALL businesses need to account for to keep running efficiently and organised, however companies are spending more than they need to because of a lack of knowledge when it comes to monitoring and controlling. High printing costs can be the result of a number of factors, like; unnecessary printing, personal printing, lack of training and outsourcing colour printing.</div><div>The SMARTseries range of printers can help cut those costs using Capture, Monitor and Control (CMC). CMC allows businesses to establish rules to minimise office printing costs. For example, you can the default device settings to mono and duplex printing, and also put printing quotas in place to cap and control printing costs.</div><div>4. Digitise important documents, and turn them into searchable PDF's</div><div>Thanks to multifunction devices that can digitise documents instantly and retrieve them at the click of a button, the labor intensive task of finding specific files from cabinets and cupboards is a thing of the past. the searchable pdf option in the SMARTseries printers automatically read the scanned document, allowing you to CTRL-F any document and search for specific keywords.</div></div>]]></content:encoded></item><item><title>Instant Virtualization</title><description><![CDATA[As part of our ICT service offering, data backup is one of the most vital aspects of survival as it ensures business continuity, even in the most severe of storms, that we lucky few in Queensland get to experience.Instant Virtualization allows a protected system to be virtualized and hosted either locally, through the use of Datto's BDR appliance (SIRIS), or off-site in the Cloud with minimal downtime.How can Instant Virtualization benefit your business?True local Virtualization: Having access]]></description><dc:creator>Shannon Pepi</dc:creator><link>https://www.widebayit.com.au/single-post/2017/11/27/Instant-Virtualization</link><guid>https://www.widebayit.com.au/single-post/2017/11/27/Instant-Virtualization</guid><pubDate>Mon, 27 Nov 2017 04:19:03 +0000</pubDate><content:encoded><![CDATA[<div><div>As part of our ICT service offering, data backup is one of the most vital aspects of survival as it ensures business continuity, even in the most severe of storms, that we lucky few in Queensland get to experience.</div><div>Instant Virtualization allows a protected system to be virtualized and hosted either locally, through the use of Datto's BDR appliance (SIRIS), or off-site in the Cloud with minimal downtime.</div><div>How can Instant Virtualization benefit your business?</div><div>True local Virtualization: Having access and the ability to run virtual machines directly on the Datto appliance, simplifying the process of system restoration, reducing downtime and money wasted on outdated recovery processes.</div><div>Protect &amp; Virtualise anything, restore anywhere: Instantly backup anything that can be protected (Physical and virtual systems - with agents or with agentless backups), virtualise physical with virtual BDR, or even virtual with a physical BDR.</div><div>Hybrid Virtualization: Backup and restore any recovery image within seconds - even from an archive of old, dusty recovery points.</div><div>Physical Server restore, before repair: Backup data is available immediately, and accessible for restoration by physical servers, even before any replacement disks have arrived in the mail.</div><div>Still asking yourself what Instant virtualisation is? The below video should help</div><iframe src="//static.usrfiles.com/html/151f11_ada6c4d1a44af61b77b65af2017be960.html"/><div>For more information regarding your business' BDR options, and the very real dangers of not having a correct backup solution in the age of Ransomware, read my post about the <a href="https://www.widebayit.com.au/blog">state of ransomware</a>.</div></div>]]></content:encoded></item><item><title>The State of Ransomware</title><description><![CDATA[With survey findings gather from 1,700+ Managed Service Providers (MSPs) serving over 100,000 small to medium sized businesses (SMBs), Datto's Ransomware Report provides a unique look into the state of ransomware from the perspective of the IT Channel and their SMB clients who are dealing with these infections on a daily basis. The report provides a wealth of detail on ransomware, including year-over-year trends, frequency, targets, impact and recommendations for ensuring recovery and continuity]]></description><dc:creator>Shannon Pepi</dc:creator><link>https://www.widebayit.com.au/single-post/2017/11/07/The-State-of-Ransomware</link><guid>https://www.widebayit.com.au/single-post/2017/11/07/The-State-of-Ransomware</guid><pubDate>Tue, 07 Nov 2017 04:22:46 +0000</pubDate><content:encoded><![CDATA[<div><div>With survey findings gather from 1,700+ Managed Service Providers (MSPs) serving over 100,000 small to medium sized businesses (SMBs), Datto's Ransomware Report provides a unique look into the state of ransomware from the perspective of the IT Channel and their SMB clients who are dealing with these infections on a daily basis. The report provides a wealth of detail on ransomware, including year-over-year trends, frequency, targets, impact and recommendations for ensuring recovery and continuity in the face of the growing threat.</div><iframe src="//static.usrfiles.com/html/151f11_0b119597cbf37b86a2983a28cc0c51ee.html"/><div>So what are the costs associated with a ransomware attack?</div><div>1. Without a decryption key, data is lost.</div><div>After an SMB has fallen victim to a ransomware attack the users' files become encrypted. There is no way to recover the affected files without the decryption key, forcing users to pay the ransom.</div><div>2. Just because you pay, doesn't mean you'll recover your data.</div><div>You never want to feel the need to negotiate with criminals for your encrypted files. There is no guarantee that after you pay the ransom you will receive the decryption key needed, and hackers could even take your money and then charge a higher price.</div><div>3. Local isn't the only device affected.</div><div>If the device that has fallen victim to ransomware is connected to a network or shared drive, any and all other devices connected are at risk to data loss and corruption. More often than not, networks are infected by a botnet, or groups of devices connected to the internet configured to forward spam and viruses to other devices.</div><div>4.The ransom cost is increasing.</div><div>In the early days, ransom payments started out around $300, but have since increased to $700 per attack. As time goes on ransom costs increase, pressuring SMB's into paying quickly to avoid 'late fees'.</div><div>5. Business Downtime.</div><div>How long can your business afford lost productivity, profits and labor time? As a result of ransomware SMB's face business-crippling downtime. <a href="http://tools.datto.com/rto/">Use this tool to calculate downtime costs</a></div><div>So what can you do to protect your business?</div><div>The only way to ensure your business is protected from ransomware, is to have a Business Disaster Recovery Plan (BDR plan) in place. Did you know that 52% of business experience more than one backup failure every year?</div></div>]]></content:encoded></item><item><title>ICT Security - Australian Government Legislation</title><description><![CDATA[How does the new privacy legislation affect you. Guide to information security The new privacy laws coming into affect mean that you now have to ensure that you have taken all reasonable steps to protect not only your data, but your customers data. If you retain any information on your customers on your network, computers, servers, mobile devices etc than this law will have an impact on how you do business. Cyber criminal activity is now reported to be larger than the illicit drug trade. The<img src="http://static.wixstatic.com/media/161f3e_1286590ac5fe4732ba06344689b9b8fe.png"/>]]></description><link>https://www.widebayit.com.au/single-post/2014/11/13/ICT-Security-Australian-Government-Legislation</link><guid>https://www.widebayit.com.au/single-post/2014/11/13/ICT-Security-Australian-Government-Legislation</guid><pubDate>Thu, 13 Nov 2014 22:32:33 +0000</pubDate><content:encoded><![CDATA[<div><div>How does the new privacy legislation affect you.</div><div>Guide to information security</div><div>The new privacy laws coming into affect mean that you now have to ensure that you have taken all reasonable steps to protect not only your data, but your customers data. If you retain any information on your customers on your network, computers, servers, mobile devices etc than this law will have an impact on how you do business.  Cyber criminal activity is now reported to be larger than the illicit drug trade. The activity has changed from attacks on large corporations and governments or by 'kids' having fun into coordinated and targeted attacks on all sizes of business by organised criminal gangs. </div><div><a href="https://gallery.mailchimp.com/b857830c3b46ec080d0822a9e/files/Guide_to_information_security.pdf">Click to read an extract from the Federal Government's &quot;Guide to information Security&quot;</a></div><div><a href="https://gallery.mailchimp.com/b857830c3b46ec080d0822a9e/files/Guide_to_information_security_summary.pdf">Click to read the Federal Government's &quot;What are reasonable stels?&quot;</a></div></div>]]></content:encoded></item><item><title>Cyber Security - Part 1</title><description><![CDATA[Last week you may have heard of a company claiming that a Russian hacking gang dubbed CyberVor had hacked various online sites and stole 1.2 billion passwords. There is some concern that this report is legitimate, with the company which is called 'Hold Security' asking for $120.00 from you to check if your credentials have been stolen. I am airing on the side of caution & scepticism with this one, it doesn't feel right to announce such a big breach and then ask for money to be handed over just<img src="http://static.wixstatic.com/media/161f3e_8eb0057901364b57917fe4b2c0cca48c.jpg"/>]]></description><link>https://www.widebayit.com.au/single-post/2014/08/11/Cyber-Security-Part-1</link><guid>https://www.widebayit.com.au/single-post/2014/08/11/Cyber-Security-Part-1</guid><pubDate>Mon, 11 Aug 2014 04:19:33 +0000</pubDate><content:encoded><![CDATA[<div><div>Last week you may have heard of a company claiming that a Russian hacking gang dubbed CyberVor had hacked various online sites and stole 1.2 billion passwords.</div><div>There is some concern that this report is legitimate, with the company which is called 'Hold Security' asking for $120.00 from you to check if your credentials have been stolen. I am airing on the side of caution &amp; scepticism with this one, it doesn't feel right to announce such a big breach and then ask for money to be handed over just to see if you were affected in any way.</div><div>Whilst I’m being sceptic on this one, if you want to find out more about it and make up your own mind fire up your favourite browser and Google CyberVor.</div><div>With this kind of reporting out there, it does really hit home that regardless of if the CyberVor threat is true or not you have to remain vigilant in the online world and really take note of the best practises for safeguarding your privacy. It can get mundane and people often fire back I have heard this all before, that’s all well and fair but the message just isn't getting across to some people, to prove my point here are some staggering statics from Sophos warbiking exercises.</div><div>Before I jump in the stats, warbiking is the same as wardriving but just on a bike! James Lyne who is Global Head of Security Research at Sophos has equipped his push bike with network detection equipment to uncover how Wireless networks are protected. </div><div>In his ride through San Francisco he had detected 73,312 networks with the following broken into how they were secured</div><div>9.5% WEP19.3% No Encryption57.7% WPA13.5% WPA229% WPS</div><div>The following is a straight extract from Sophos the World of Warbiking to give you an understanding of what each of the acronyms are, if you want to read the report in full you can visit the report by clicking here </div><div>WEP Networks</div><div>WEP, or Wired Equivalent Privacy, has been understood to be severely broken since as far back </div><div>as 2001. There are a number of faults that enable an attacker - equipped with readily available </div><div>software and tools (even available on Amazon for a low price) - to retrieve pretty much any </div><div>password combination in seconds. </div><div>Once the attacker has your password they can not only join your network and start attacking </div><div>connected devices, but they can also monitor (or change) all your network communications. Your </div><div>encryption becomes worthless.</div><div>No Encryption</div><div>Of the relatively large number of open networks, we discovered the majority looked to be open by </div><div>design – that is to say they were networks with captive portals that people had to authenticate to </div><div>before being able to access the network or the Internet. </div><div>A small number of networks were open and did not fit this profile (such as default named </div><div>Linksys routers). Many would assume that the open by design networks are OK (they have made </div><div>the decision to be open intentionally after all) but this does not necessarily follow. The lack of </div><div>security when joining the network means that any information subsequently sent on the wireless </div><div>network is unencrypted. Unfortunately most users do not take additional steps to encrypt their </div><div>traffic and therefore any of their activities online can be easily monitored or even modified by an </div><div>attacker</div><div>WPA</div><div>There are a variety of different security configurations that can be used with WPA (Wi-Fi </div><div>Protected Access) mode, though WPA+TKIP is the most common at 57.7% of networks detected. </div><div>TKIP (Temporal Key Integrity protocol) was implemented as a quick fix to the security problems </div><div>that WEP encountered and has been shown to have a number of flaws. On this basis, the Wi-Fi </div><div>Alliance and the IEEE have shunned it for some time now. It is considered deprecated in the 2012 </div><div>revision of the 802.11 wireless standard. In other words, while this standard certainly does not </div><div>have the overt flaws that WEP (or no encryption) it is far from the recommended best practice in </div><div>2014! This was by far the largest percentage of networks identified by Warbiking San Francisco </div><div>as most devices operate a WPA2+WPA mode to insure backwards compatibility.</div><div>WPA2</div><div>Only 13.5% of the networks in San Francisco used WPA2 (WPA2+AES being the majority and </div><div>recommended best practice). Of course, this number of networks is a best-case scenario </div><div>given that a number of these will have bad passwords. London had a higher percentage of the </div><div>networks using the later security standards, that said a higher percentage of networks were </div><div>using WPS potentially leaving them vulnerable to other vectors of attack as outlined below. </div><div>Password cracking WPA2 is notably harder than earlier implementations, but it can still be </div><div>performed at high speed with the right attack tools. Cracking the password requires a capture </div><div>of the ‘handshake’ (or watching a device logon) after which various breaking attempts can be </div><div>performed. A graphics card can be used to significantly accelerate the attack and there are </div><div>readily available tools that do this. </div><div>If your password is based on a dictionary word, or a simple variation, it could be recovered and </div><div>your traffic decrypted. It should be noted that other enterprise authentication mechanisms </div><div>were also included in this category for simplicity, though they were not a statistically significant </div><div>number.</div><div>WPS</div><div>Last, but certainly not least, WPS (Wi-Fi Protected Setup) is a convenience technology designed </div><div>to enable quick connections without having to type long and complex passphrases (though </div><div>long passphrases tend to be much rarer than we would all hope). It works be allowing a PIN </div><div>to be entered which then authorizes the connection and allows them to connect (think of it as </div><div>automatic configuration of the long passphrase based on a short, easy to type PIN). </div><div>WPS seems like a great idea but actually opens up an opportunity for attack – amongst other </div><div>things, most access points do not ‘throttle’ the speed of PIN guesses. WPS is therefore open </div><div>to an attack called ‘Reaver’ in which a brute force is used to recover the PIN and then the </div><div>passphrase. Generally an attacker can break in to a network using this method in 4-10 hours, </div><div>and by using various enhancements (such as predictions based on analysis of common WPS </div><div>PIN codes) this time can be reduced significantly. Luck can also prevail, allowing an attacker to </div><div>recover a PIN very quickly.</div><div>WPS is extremely common and can allow an attacker to get in to a network even when a strong </div><div>password is set. Unfortunately, rate throttling and Reaver attack prevention is infrequently </div><div>implemented in access points even today, making WPS potentially a very nasty backdoor in to </div><div>29% of the networks we saw in the City by the Bay and 34% in London.</div><div>The points above give you a brief understanding of what each security acronym stands for and there short comings, the next part of this is what does this have to do with Cyber Security. Simply ask yourself how does your device, Beit your tablet, phone, laptop etc. connect to the internet when you are at the office or home? The majority of the time it is through a Wireless network. If you use a banking app on your smart device through your Wireless network that is protected by WEP you are leaving yourself wide open to the possibility of someone taking advantage of this poor security and potentially stealing your credentials that you use to access your online bank facilities.</div><div>So in essence your Wireless network can be the first point of failure in your security setup, in conjunction with your Wireless network you also need to reconsider the following</div><div>Anti-VirusAnti Malware<div>Passwords <div>Password Strengths Not using the same password for more than one serviceManaging your different passwordsChanging your passwords</div></div>Operating System updatesSocial Media</div><div>There’s a lot to consider with your security, but with the potential for major data breaches it is something that needs your full attention to ensure you are always following the best practises and being protected as much as possible</div><div>In part two we will go deeper on how to protect yourself in the digital world</div></div>]]></content:encoded></item><item><title>5 Reasons to use a finisher on an MFD</title><description><![CDATA[Fuji Xerox Australia recently published an article on 5 reasons to use a finisher for post-production, first of all let’s explain what a finisher is. A finisher is a device that attaches to your MFD and allows automation of certain post production. There are different types of finishers to perform 1 or all of the following tasks. Stapling This is pretty self-describing, it allows you to staple your pages together. The basic stapling positions are in the corner, down the spine or top and bottom<img src="http://static.wixstatic.com/media/161f3e_5ec0b99d17e648daaebf55493b38a677.png"/>]]></description><link>https://www.widebayit.com.au/single-post/2014/08/04/5-Reasons-to-use-a-finisher-on-an-MFD</link><guid>https://www.widebayit.com.au/single-post/2014/08/04/5-Reasons-to-use-a-finisher-on-an-MFD</guid><pubDate>Mon, 04 Aug 2014 05:22:55 +0000</pubDate><content:encoded><![CDATA[<div><div>Fuji Xerox Australia recently published an article on 5 reasons to use a finisher for post-production, first of all let’s explain what a finisher is.</div><div>A finisher is a device that attaches to your MFD and allows automation of certain post production. There are different types of finishers to perform 1 or all of the following tasks.</div><div>Stapling</div><div>This is pretty self-describing, it allows you to staple your pages together. The basic stapling positions are in the corner, down the spine or top and bottom of your document, depending on the type of finisher you can typically staple up to 50 sheets, which if you double side (duplex) your document is 100 pages.</div><div>Punching</div><div>Punching allows you to hole punch in a configuration of 2 or 4 holes and again can performed on both the long and short edge of your document. The 2 or 4 hole configuration is standard in Australia as it is designed for use with the common office lever arch folders that come with either 2 or 4 rings. If you are using a 3 ring lever arch folder which the standard in the US you can switch out the die set, this means you can either the 2/4 hole or 3 hole config not both together.</div><div>Booklet Finishing</div><div>Booklet finishing allows two finishing options, the first is folding. The finisher will fold A3 paper into an A4 booklet, or A4 paper into an A5 booklet this is known as Bi-Folding. The finisher can also Booklet Staple which is also known as saddle stapling or saddle stitch, so before performing the fold it places two staples into the centre of the paper and then folds it, so if your document has more than 4 pages it will keep it all together for you! The typical capacity is 16 sheets, giving your booklet a total of 64 pages. </div><div>Folding</div><div>Folding comes in three features, as mentioned in the Booklet Finishing you can Bi-Fold, but you can also perform a Z-Fold and Tri-Fold. I have included a picture to show you the Z-Fold and Tri-Fold.</div><div>All of the features above are great, but how do you know if you need them. The easiest way is to ask yourself these questions and if you say yes to any of them than the chances are you have a need.</div><div>1. Do you print documents and grab the stapler near your MFD and staple that document?</div><div>2. Do you print documents and grab the hole punch near your MFD and punch the document?</div><div>3. Do you create documents such as News Letters and Brochures that you than fold?</div><div>4. Do you create marketing documents, or menus that have a Z-Fold and Tri-Fold finish?</div><div>The 5 reasons that Fuji Xerox Australia listed as to why you may need a finisher as well as help you become more productive are </div><div>1. Time is money</div><div>If staff are doing the manual work in–house, it’s taking up valuable work hours that could be spent on something more else. If you are outsourcing post–production, your staff have to spend time managing the service provider, your tasks have to fit in with the outsourcers schedule, and you have to pay for it. Time is money: boost your productivity with a finisher.</div><div>2. Business today is fast–paced</div><div>There’s rarely enough hours in the day. If you’ve got a deadline looming, you need every second to get your work done. If the time to print and post–process can be reduced, you can spend more time on critical preparation. Deadline looming: an integrated finisher can give you more time to get your work done.</div><div>3. Expectations are higher than ever</div><div>Misaligned pages, multiple staples, uneven folds, pages missing, duplicated or out of order. If your documents look like a last–minute job, it’s just not going to cut it. A Finisher doesn’t just improve productivity; it improves the quality and consistency of your presented documents. Look professional: consistent, quality documents are a matter of course with a finisher.</div><div>4. Documents are not just A4</div><div>Don’t be stuck inside the confines of A4. Finishers can handle paper sizes up to A3 and weights up to 220gsm. They can also combine paper in booklets – for example 90gsm pages with a 200gsm cover. And they can do both C and Z folds. Better presentation: Advanced Finisher features provide creative options.</div><div>5. Small runs, high value</div><div>Custom publications with small runs are not economical to outsource for post–processing. A finisher can provide high quality results for even just a single document. Small jobs made easy: A finisher can make small print–process runs cost effective.</div><div>Via: http://www.fujixerox.com.au/company/media/articles/746/#ixzz39OqZbW9X</div><div>Aside from the features of what a finisher can do, what this article really highlights is leveraging technology to where possible automate and increase productivity. In the case of finishers it is relatively simple technology that could have a big impact on your business.</div></div>]]></content:encoded></item><item><title>Queensland Mining Expo (QME!)</title><description><![CDATA[For the past three days, we have been exhibiting at the Queensland Mining Expo. The expo is designed to show case the latest and greatest innovations that help the mining sector be more efficient, safer and increase productivity. Having walked around the stands there are some amazing technologies on display from tools, conveyors and right through to heavy machinery. You might be asking what an integrated IT company is doing showcasing its wears at such an event? Whilst our equipment and<img src="http://static.wixstatic.com/media/161f3e_b415da00c9814e00a0ddd1b60f9b8114.jpg"/>]]></description><link>https://www.widebayit.com.au/single-post/2014/07/24/Queensland-Mining-Expo-QME</link><guid>https://www.widebayit.com.au/single-post/2014/07/24/Queensland-Mining-Expo-QME</guid><pubDate>Thu, 24 Jul 2014 02:00:00 +0000</pubDate><content:encoded><![CDATA[<div><div>For the past three days, we have been exhibiting at the Queensland Mining Expo. The expo is designed to show case the latest and greatest innovations that help the mining sector be more efficient, safer and increase productivity. Having walked around the stands there are some amazing technologies on display from tools, conveyors and right through to heavy machinery. </div><div>You might be asking what an integrated IT company is doing showcasing its wears at such an event? Whilst our equipment and solutions may not be pulling resources such as coal out of the ground it plays an integral part in allowing both humans and machinery to perform their functions.</div><div>Throughout the Bowen Basin and now down into the Hunter Valley and across to Western Australia, We have worked with Australia's largest resource companies to deliver cost effective and sustainable solutions such has print &amp; scan workflows and telephony rollouts. Our equipment can be found from the Administration offices, to the Train Load Outs, Prep Plants and in the remotest Geo locations. Some of these areas as you can imagine can be quite a harsh environment from exposed rooms full of coal dust through to areas that experience shock waves from blast operations.</div><div>And it is for this reason we are proud to be demonstrating and talking about our products at this year’s Queensland Mining Expo!</div><img src="http://static.wixstatic.com/media/161f3e_e12c54e0c33343caa44368a1b60b73e3.jpg"/><img src="http://static.wixstatic.com/media/161f3e_4674a449fb9c4a6f9bb0c5b0f13ea6f9.jpg"/></div>]]></content:encoded></item><item><title>The End Of Windows XP</title><description><![CDATA[In April this year Microsoft officially stopped supporting Windows XP & Office 2003. Both of these products are still in use on many 100,000's PC's across the globe. What does this mean for you? In reality you could opt to keep using Windows XP and it may function the same way it always has, however there are a couple of factors that you need consider if you are contemplating continuing to use. First up is the fact that Microsoft are no longer providing support, this includes not releasing any<img src="http://img.youtube.com/vi/Iste2V3qXvM/0.jpg"/>]]></description><link>https://www.widebayit.com.au/single-post/2014/06/13/The-End-Of-Windows-XP</link><guid>https://www.widebayit.com.au/single-post/2014/06/13/The-End-Of-Windows-XP</guid><pubDate>Fri, 13 Jun 2014 02:00:00 +0000</pubDate><content:encoded><![CDATA[<div><div>In April this year Microsoft officially stopped supporting Windows XP &amp; Office 2003. Both of these products are still in use on many 100,000's PC's across the globe.</div><div>What does this mean for you? In reality you could opt to keep using Windows XP and it may function the same way it always has, however there are a couple of factors that you need consider if you are contemplating continuing to use.</div><div>First up is the fact that Microsoft are no longer providing support, this includes not releasing any further Windows patches or security updates, now that Microsoft has stopped this it won't be long before other major software vendors also decide to pull the plug on supporting their products on Windows XP. This of particular concern for your personal and digital security. Having a supported operating system along with good security measures such as antivirus and anti-malware software will put you in the best position to be safe online.</div><div>The other consideration that we touched on above is that other software vendors will eventually stop there support as well. Add to this that since Windows XP launched all those years ago there have been major advancements in hardware technology. The chances of the latest mainboards, video cards etc that would support Windows XP is pretty limited, this means that if you intend to upgrade any of your components be it because you want to or due to a failure you will be hard pressed to find hardware that is compatible.</div><div>The latest operating system from Microsoft is Windows 8. Watch the short video from this Blog that gives you a taste of what you can expect from Windows 8.</div><iframe src="https://www.youtube.com/embed/Iste2V3qXvM"/></div>]]></content:encoded></item></channel></rss>