Why Regular Security Assessments Should Be Your New Normal

Security AssesmentsBy now you know that improving your cyber security is just as important as improving your cash flow – both are essential to your success. While most businesses keep an eye on the financials, they tend to think cyber security is something they can ignore or just set and forget. Unfortunately, cybercriminals are constantly coming up with new methods of attack and the security you had in place yesterday may not be sufficient today.

Instead of reacting to breaches and taking on the costs of downtime, lost files and destroyed trust, a periodic security assessment can identify blind spots that place you at risk. Once you know about these issues, you can setup adequate protection before cybercriminals strike. It is best to use independent IT experts who can audit your security from an outside perspective, often seeing risks that you would otherwise miss.

Regulations change – Are you affected?

Many businesses need to comply with strict government regulations around the way they store, process and protect data. Their operating license depends on staying as secure as possible. All regulations require regular security assessments but they vary in scope and timeframe. As regulations change, so do the security assessment requirements. You can imagine how much stricter they are now compared to just 5 years ago. Our team can ensure your business is meeting the relevant regulations, diving deep to be certain you are safe.

Security patches and updates are vital

It’s so easy to fall behind on your security patches (both for software and hardware), after all, it seems like there’s a new update every week and each one takes precious time to apply. What we are seeing though, is that cybercriminals are targeting any business running up=patched hardware or software. If you are unpatched, you are an easy target and are inviting the bad guys in. When we conduct your security assessment, we take a look at your history and see if your business has a robust patch plan in place and make sure you are up to date. If there’s an issue that is placing you at risk we will find it.

Viruses are always evolving

Just like the human variety, computer viruses are constantly evolving to skip past anti-virus scans and do damage in new and interesting ways. Cybercriminals know people are more aware of the traditional infection methods like downloading an attachment or inserting an infected USB, so they’re getting more and more creative. Your security assessment doesn’t just include ticking that you have the latest anti-virus, it includes identifying where where your biggest vulnerabilities are. This type of precise awareness has a lasting impact on reducing your risks.

Your business may have changed

As your business has grown over the years your entire setup has changed. More employees, expanded remote access, additional vendors, other locations etc. With each change has come a new risk, particularly if your security has been growing around you. It might be your password policies that haven’t been updated since you began, or that you still have the old voicemail system even though phones are within easy reach of customers. This is perhaps one of the most useful areas a security assessment can help with, as you and your employees are accustomed to the business working in a certain way, whether that way leads to risk or not. Our experts will be able to see things from a different perspective, particularly as we make sure to think the same way a cybercriminal would.

What to do with your assessment results

While many experts might present you with a long list of problems and leave you feeling overwhelmed, our team ensures you have a benchmark for progress. You will know exactly what you need to do, what takes priority and how we can help. You will also know exactly what you’ve done well and where your security strengths lie. Employees will see how much you value security, which in turn helps to create a stable culture, and you’ll be able to report your commitment to customers, confirming they’re making the right choice by staying with you.

Book your security assessment today. Call us at 08 8326 4364 or support@dpcomputing.com.au.

Why Your Business Needs a Firewall With Unified Threat Management

Unified Threat Management - FirewallUnified Threat Management (UTM) is a special kind of firewall solution focused on proactive protection. Consider it like a team of virtual bodyguards that stand at the door between your business and the internet, keeping trouble out while your legitimate traffic can come and go normally.

With the increasing number of connected devices in your business network and the different ways your employees can now connect, it is more important than ever to set up dedicated security systems that give integrated protection. UTM is a series of solutions that work together, simultaneously layering your protection across the board. We’ll cover the four main inclusions here and show exactly what they can do for your business.

Robust Firewall

Put simply, a firewall keeps an eye on all the data coming in and out of your network and looks for anything abnormal. While every home PC comes with a software firewall built in, those ones pale in comparison to what a UTM firewall can do. Remember the team of virtual bodyguards? Imagine the home firewall asking nicely if the data should be doing that, while the UTM slams the data to the ground and demands answers. Its job it to make sure the data entering your network is safe, that it is not part of a cyber-attack, and that in the rare event your network becomes infected, your servers aren’t being used to attack another business.

Anti-virus Where it Matters

With so much new malware being released daily, it’s easy to fall behind in updates and discover you’ve been infected. Your employees are likely doing their best, but manually scanning each file can be exhausting and time-consuming. Your UTM anti-virus is built into the firewall, ensuring known or suspicious malware is stopped at the door removing any risk. Clearly that is the best outcome possible and will allow your employees to work at maximum efficiency, while you can run your business with confidence.

Spam Blocking

Most cyber-attacks come via email these days, with either an attachment or a link. Once clicked, the malware wreaks havoc in your network. Obviously, your employees are smart enough not to open random attachments/links, so hackers use phishing emails. These are emails that look legitimate and may refer to vendors you use, financial services you have accounts with or even seem to be from other employees. Your UTM strips down each email and checks it against high-tech legitimacy markers. If it sees anything suspicious, the email is marked as spam and either held for review or bounced away.

As the phoney emails are blocked, your employees never see the emails so they can’t accidentally open up the network for attack. While the UTM is monitoring for phishing/fake emails, it’s also culling out the general spam that clogs up inboxes. Employees will no longer have to spend precious minutes each day wading through the junk, and the likelihood of missing an important customer email has greatly dropped.

Content Filtering

In a perfect world, your employees would only access work-related sites and do work-related things online. Content filtering can help you limit the risk they’re bringing into your business via their Internet browsing. Your UTM can be set to restrict sites that infect computers, such as adult content, gambling or illegal downloads. It can also be used to restrict access to social media sites like Facebook, Twitter or Pinterest, either during work hours or completely. It’s up to your policies how much you’d like to filter and whether to add any flexibility. Some businesses allow social media during lunch breaks or have special reward hours each week. Simple tweaks like this can increase productivity overnight and give you the security you’re looking for.

You can see how a layered security solution like UTM provides a space for your business to thrive, where systems are secure, employees are able to maintain efficiency, and cyber problems stay outside the doors. The way the layers work together is more effective than a patchwork of separate systems, and a UTM is much easier to configure and maintain.

We can find the right UTM solution for your business. Call us today at 08 8326 4364 or support@dpcomputing.com.au!

Should You Pay for a Ransomware Attack?

RansomwareGetting hit with a ransomware attack is not fun, cybercriminals encrypt your data and you are left having to decide: should we pay to get them back? It is a scene that’s played out across the world with 70% of businesses saying “yes” in 2016 alone. Here are six factors to consider if you are ever in this situation.

1) Do you trust them?

Remember that they are criminals holding your data hostage, how confident are you that they will send you the decryption key and that the key will decrypt all your data? The attackers demand you send the payment via untraceable Bitcoin, so you have no recourse if you never hear from them again. You are also equally trapped if they decide to come back with increasingly higher demands. If they do send the decryption key, be aware they still have access to your systems and can hit you again at any time until your network is fixed by experts. Businesses don’t exactly want their breach publicised, so many don’t admit to paying the ransom, whether it went to plan or otherwise.

2) Can you manage the impact?

The best case scenario is that you can wipe the affected drives and restore from a clean backup without paying the ransom. You may even decide that the encrypted files aren’t that important and simply let them go and just wipe the infected machine. On the other hand, if your data management comes under any special regulations, like health or legal, you may find that the attack has a much wider impact. The attacker will also motivate you to pay the ransom quickly with a countdown and a threat of total deletion when it hits zero. Remember that if the data isn’t that valuable, or you have confirmed backups, this urgency should have no effect on your plans. T

3) How much do they want?

Cybercriminals rarely send out attacks with set amounts, instead, they prefer to customize the ransom based on how much they think you can pay. Large corporations and hospitals are hit with very high demands, while small business demands are more modest. Different countries or regions are also charged differing amounts. They may be “bad guys”, but they are smart people who know your financial limits. They also consider how much similar businesses have paid previously and expect you to follow suit.

4) Are your backups any good?

Always check your backup to confirm that they are working, that the correct data is being backed up and that you can recover the data from them. Many businesses are discovering too late that their backup systems are not robust enough. Either the backup has become infected too, they weren’t up-to-date or they backed up the wrong data. It is imperative that you at least do some quick backup checks to ensure you can recover all your data in case the unfortunate happens.

5) What are you policies?

Businesses are now adding ransomware to their disaster recovery plans and have predefined actions mapped out. Seemingly simple inclusions like who has final say over the payment decision can stop chaos in its tracks. Employees and management alike can then approach the situation calmly and make the best decisions for the business.

6) Stay safe in the first place

Ransomware is not slowing down and all factors say it will increase. As more businesses pay the ransom the cybercriminals are steadily launching new attacks and making it their full-time job. Most of the attacks come via phishing emails – those emails that trick employees into clicking a link – and they can be extremely convincing. While training staff helps, it’s no guarantee. We recommend using business-class spam filters to catch these types of emails before they land in your inboxes so that triggering a ransomware attack becomes something that happens to other businesses and not yours.

Secure your data systems and check your backups now. If you need help, contact us on 08 8326 4364 or support@dpcomputing.com.au.

What’s Best for Your Computer: Shut Down or Sleep?

Off or Sleep?Most offices and homes are trying to reduce power costs by turning off lights and appliances, but do the same rules apply to computers? After all, it requires more than flicking a switch on your way out the door. Some people believe you should shut down your computer after every use to save wear and tear, others believe you should never shut down your computer – ever. While others simply want to make sure the programs and documents they left open are still there waiting for them when they return. So, who is right and who is wrong?

Back when computers were huge behemoths that took a long time to start, you’d go nuts at the person who shut it down when it was your turn. If you have an older computer you may still do! Modern computers actually have two options for their downtime: Shut down or sleep.

When it shuts down, the system goes through and closes any open programs (often prompting you to save first), then gradually cuts power to all components. It is a  process that seems quite fast to us but is actually made of 1000+ intentionally ordered steps. If there’s a sudden blackout or you hold the power button until it turns off, these steps aren’t followed and damage may occur. The second option is to put your computer to sleep. This can be triggered by an automated timeout or a user click. Your system uses a special type of memory called RAM to hold all your running programs exactly as you left them but using minimal power. The hard drive stops spinning, the graphics card lets the screen go black, and even the system fan slows to become almost silent. When you wake it by moving the mouse or pressing a key, it ‘wakes’ again almost instantly.

Reasons to Shut Down

A switched off computer isn’t drawing power which is great for the environment. But shutting down is about more than saving power. It can sometimes give improved stability over a machine that’s been running for days/weeks. This is because every time you shut down, you give your computer a chance to clear out all temporary junk files it’s been carrying in memory. It also triggers various health checks on startup that may otherwise be missed, important routines like checking for updates or scanning for viruses. It’s certainly more convenient to spend an extra minute booting up than lose everything to a system failure or cyber-attack. For older computers or those under heavy strain like gaming or video editing, shutting down also provides a necessary chance for the components to cool down.

Reasons to Sleep

Speed is the big selling point here. You can literally sit down and start working where you left off without the delays of bootup, finding your program, opening your saved files, scrolling down… it’s all right there and ready. You can even tell it how long to wait before putting itself into sleep mode, just in case you get called away and forget.

The best method is….

Since the whole point of having a computer is that it’s ready to work when you are, we recommend shutting down at night when it’s definitely not in use but using sleep mode during the day. Updates will get all the rebooting they need, memory is refreshed for the new day, and you’ll get the best of both worlds – speed and stability.

 

We can help give your computer a service and improve your computers boot time, give us a call at 08 8326 4364 or support@dpcomputing.com.au.

How To Survive A Hard Disk Crash

How To Survive A Hard Disk CrashThere’s been a massive digitization within businesses but with that comes one gaping flaw – a hard drive crash could wipe out all your data in an instant. Nobody and no data is immune – accounts, quotes, documents, email etc. are ALL at risk.

If you’ve ever lost your data or had your computer stolen, you know the panic and rage that follows…turning your business upside down, hoping desperately to find that USB drive that might contain a backup of data…before collapsing onto the floor as it sinks in: it is all gone.

Currently your hard drive is probably still in a good shape but surprise failures do happen. The mechanics don’t last forever, and even brand-new drives can be blitzed by a power surge. Theft is always a risk, as is user error like deleting files accidentally, or even getting hit by a nasty virus that destroys or holds your files for ransom. Some businesses are using apps like Dropbox, iCloud or OneDrive as their backup, thinking if their hard drive crashes or gets stolen, they’ll just download the files from there. Unfortunately, those very handy apps are no help if you’ve been hit with ransomware. Almost instantly as the malware encrypts your local files, those sync apps upload the infected versions. Older, safe versions of the files no longer exist, as these apps are designed to give a constant mirror of your drive, not a proper backup.

Stop for a moment and think about what you’d lose right now if your hard drive failed. What’s on there? Accounts, orders, client details, financial records, tax info, photos, videos – your entire business. It’s not a feeling we would wish on anyone!

What You Can Do

Backing up at data used to be something only tech geeks did, but like everything cool, it has gone mainstream. We recommend at least a 3-2-1 approach: 3 copies of your data, with 2 local at your office and 1 offsite.

Typically, this means keeping your regular hard drive where your data is now, one copy of precious files on at least one (preferably 5 – one for each workday) backup USB drives, and one that automatically uploads to the secure cloud as you add new files. That way, the USB drives protects your data if your computer dies, and the cloud copy protects you if something happens to the computer and your USB drive, like fire, flood or theft. It’s a good idea to make sure you unplug that backup USB drive afterwards and lock it away in a fireproof safe or even better, taken offsite – as connected devices can easily become infected during an attack or stolen during a break-in.

Two of these methods require you to actually pay attention, which is where many businesses struggle. Not that it’s tricky, but unless you’re one of those cool geeks it’s pretty boring and not a high priority after a long day! That is why we recommend a cloud backup solution and also an automated local backup.

You’ll be able to retrieve files at will, without having to roll back your entire drive, and know your solution has caught even the smallest file change without you needing to flag or mark it in any way. Even better, because there is a copy in the cloud, you can access your secure backup from anywhere. So if the unfortunate happens (ie a fire or flood) and you can’t access your office at least you have your files safe backed up in the cloud.

We are able to get you set up with the perfect backup solution that meets your needs, both now and in case of emergency.

If you’re ready to protect your data before you lose it, give us a call at 08 8326 4364 or support@dpcomputing.com.au.

The True and Unexpected Costs of Being Hacked

Security BreechThere are the normal costs everyone associates with a computer breach, like employee downtime and the costs associated with getting your network and computers fixed. But really, most businesses that haven’t been hit with a security incident view it as more of an inconvenience than a bottom-line cost. For those businesses who have come out the other side though, it’s a very different story. They know from firsthand experience that the hidden and ongoing costs of a data breach can be crippling and that IT security exists to protect your business on multiple levels. All those surprise costs that spiral out of control are why most businesses close down after a cyber-attack. Here are a few of the hard, but common cold hard realities of life after a hack.

Raiding the budget to reduce downtime

From the moment a cyber-attack compromises your system, things can get expensive, and the longer the attack goes, the more it costs. Latest statistics reveal most breaches aren’t identified for around 191 days and then it can take on average another 66 days to fix and contain the damage – during this time you are cleaning PCs, mobile devices, laptops, servers and even entire networks. Add to this the fees for IT professionals to fix everything up, the costs for new hardware and software to help prevent future incidents  and all the hours/days/weeks when your business is struggling with downtime, businesses will quickly exhaust any emergency funds they have.

The long arm of the law

Depending on what data was stolen and how you handled the situation, you could be liable for fines into the millions. If medical data or legal files are leaked a particularly messy scenario may occur with fines coming from multiple sources.

New privacy laws also mean businesses are liable for large fines if they don’t disclose a data breach. Where this gets trickier is that the burden is on your business to know exactly what data has been stolen or illegally accessed, so that you can report it before the fines stack up. This means that even if you were able to fix up the systems yourself, you will still need to hire an expert who can identify exactly data what the hackers took or accessed.

Customer retention measures

In a double crush to your bottom line, not only does your business bear the cost of fixing the hack and your future income takes a hit as customers lose trust and leave. To offset this, many businesses need to spend more on advertising and public relations just to ensure they survive to fight another day.

The data breach disclosure may still come up in search results for many years to come. The more negative publicity your breach attracts, the more you’ll need to spend on customer retention.

All your secrets exposed

While you may not have high level secrets to protect, your business does have data that you would like to keep to yourself. Hackers love going after those juicy tidbits, and the more closely you guard them, the more attractive they are. While large corporations would be big enough to keep their competitive edge after the breach, your business success relies on at least some information staying secret (databases, client info, financial records etc).

But simply avoiding a breach doesn’t cost much at all…

The thing is, it’s not expensive to stay on top of it all and keep your business protected. For a low monthly fee, we can reverse the entire scenario and secure your systems against the unknown. That means no need to raid other department budgets in a panic, pay crippling fines and make embarrassing public announcements.

DP Computing can help with making sure your systems have the latest security patches and your anti-virus knows the latest tricks to watch for. Our technicians implemented a firewall or UTM device to build a virtual fortress around your business that keeps the bad guys out while letting you thrive. Whatever your needs are, both now and moving ahead, we’re here to help keep you safe.

Ready to secure your business against breaches? Give us a call on 08 8326 4364 or via email at support@dpcomputing.com.au.

Fake Invoice Attacks Are on the Rise – Here’s How to Spot Them

False Invoice Scam

Businesses around the world are being targeted with a cyber-attack that sends victims a fake invoice that looks real enough to fool to most people. It is based on an old scam that used to see invoices faxed or mailed to the victims and now it has made its way into the digital world and instances are on the rise.

You may have already seen some of the less effective attempts – an email advising your domain is expiring (except it’s not from your host and your domain is nowhere near expiration) or others that describe a product or service you would never have purchased.

The new attacks though are much more advanced as they look completely legitimate and are often from contractors and suppliers you actually use. The logos are correct, spelling and grammar are spot on and they might even refer to actual work or products you regularly use. The senders name may also be the normal contact you deal with at that business as cyber criminals are able to ‘spoof’ real accounts and real people. While it is worrying that they know enough about your business to wear that disguise so well, a successful attack relies on you not knowing what to look for.

Here are two types of invoice attacks you may receive:

1) The Payment Redirect

This style of fake invoice either explicitly states that the payment should be made to a certain account (perhaps with a friendly note listing the new details) or includes a payment link direct to a new account. Your accounts payable person believes they are doing the right thing by resolving the invoice without bothering you and unwittingly sends money to a third party. The problem may not be discovered until an invoice from the real supplier comes in or the transaction is flagged in an audit. Due to the nature of international cyber crime, it’s unlikely you’ll be able to recover the funds even if you catch it quickly.

2) The Malware Link

Rather than an immediate cash grab, this style of attack asks your employee to click a link to download the invoice. The email may even look exactly like the ones normally generated by popular accounting tools like Quickbooks, Xero or MYOB. Once your employee has clicked the link, malware is downloaded to your systems that can trigger ransomware or data breaches. While an up-to-date anti-virus should block the attack at that stage, it’s not always guaranteed (especially with new and undiscovered malware). If it does get through, the malware quickly embeds itself deep into your systems and often remains silent until detected or activated.

How to Stay Safe

Awareness is key to ensuring these types of attacks have no impact on your business. As always, keep your anti-virus, firewalls and spam filters up to date to minimize the risk of the emails getting through in the first place.

Secondly, consider implementing a simple set of procedures regarding payments. These could include verifying account changes with a phone call (to the number you have on record, not the one in the email), double checking the invoices against purchase orders, appointing a single administrator to restrict access to accounts or even two-factor authorization for payments. Simple preemptive checks like hovering the mouse over any links before clicking and quickly making sure it looks correct can also help. If anything looks off, hold back on payment / clicking until it has been reviewed. Fake invoices attacks may be increasing, but that doesn’t mean your business will become a statistic, especially now that you know what’s going on and how you can stop them.

We can help increase your security, talk to us today. Call us at 08 8326 4364 or on support@dpcomputing.com.au

3 Internet Habits To Keep Kids Smart and Safe

How can you make the internet a safer place for your children? It is a common concern for all parents as they want their kids to be protected and happy whenever they go online. It’s relatively easy to supervise and monitor the very young ones but the risks increase greatly as the kids get older and more independent.

You have probably heard the term ‘cyber safety’ before, but safe internet usage goes beyond reminding children to not to talk to strangers. With the evolution of the internet and the way it is now woven seamlessly into all aspects of our lives, the focus needs to be on ingrained habits. This means ensuring that your children have the tools and predefined responses to online events so that no matter what happens, they are not placing themselves (or your family) at risk. Setting up these habits is straight forward and begins with three basic understandings:

Downloads are a no-go

Most kids can not tell the difference between a legitimate download and a scam or malicious link. It is not their fault, the online world is full of things that even trick the most savvy adult. The difference is that children tend not to take that extra moment to check exactly where that link is pointing, question whether it’s too good to be true, or even read what they’re agreeing to. They just want to get back to what they were doing, and if something pops up, their first instinct is to click ‘yes’ – so it goes away. Unfortunately, that single click may have just opened the doors to malware and viruses that will ruin their computer and your network. Start a family rule that everyone needs to ask permission for all downloads (and an adult will check it first), and to never ever click on a popup. When you are called over to give download permission or check a popup, talk through with them exactly what and why you are checking. As your child matures, get them involved in this process so their safe habits can extend outside the home.

Critical thinking is a must

Most youngsters think the internet is a must have and can not imagine life without it. With that thinking, comes unwavering trust that the internet would never lie, trick or hurt them. While we adults know better, it’s only because we already view the internet with a certain level of distrust. The best way to keep kids safe is to teach them to approach every aspect of the internet with critical thinking. That includes teaching them to question the motives of other people online. Is that person really a kid? What do they really want? Unfortunately, all kids do need to be aware that predators use the internet to target and lure children. Ensure your children tell you immediately if a stranger makes contact. Along with this stranger danger, teach them to identify what marks something as suspicious, and what they should avoid. If they come across anything inappropriate, they should shut down the computer and immediately come and see you.

The internet is forever

Kids don’t think twice about recording a video, jumping into a chat room or onto social media. The internet really is their playground! But what they don’t understand is that anything they upload, write or say, stays on the internet forever. Even if they delete it or use a platform where content self-erases, someone can still screenshot, send it right back out or save it for some future occasion. Many cyber-bullying cases are based around this exact type of event. Once your kids know that everything they post is permanent, they’ll be more likely to pause and think.

If you need further help – give us a call at 08 8326 4634.

3 Essential Steps Before You Fire an Employee

Before you fire an employeeYour employees need access to your IT resources and accounts so that they can do their job, but what happens to that access and those passwords when you fire them? Nobody likes to think of firing their employees, or why you’d need to, but nonetheless, it is a responsibility of every business owner and they will face it at some point in time. While your book keeper or accounts team will stop their paychecks it is important to take the same proactive stance to stop their system access.

Most of the time, former employees leaves under good terms and you’ll wish them well. If you are lucky they may even manage the hand-over to their replacement (so your productivity losses are minimal). Other employees may leave your business reluctantly and / or angrily. While you will have very different feelings about the two scenarios, the risk to your business remains high until action is taken. Here are 3 steps you can take to protect your business from an angry ex employee:

Step 1: Limit access to a need-to-know basis

You might be surprised how often a new employee is presented with access to every ones account and has access to all the company data. Accounts, staff & customer details, strategy, marketing etc etc…all those sensitive parts of your business that have made it a success are exposed. A better policy is to limit access to only what the employee needs for their job. Rather than view it as a lack of trust, your employees will appreciate the care you’ve taken to protect your business (and their job). It also helps keeps them from becoming overwhelmed, confused or tempted if the situation ever turns sour. Likewise, take a few moments to delete old or temporary accounts that are no longer required – you never know when a hacker or disgruntled employee will squeeze through those gaps.

Step 2: Quickly change passwords

On average, it will take at least a week before passwords are changed after an employee is fired – if at all! Unfortunately, this type of delay is one your business can’t afford. In 2017, an ex-employee from the American College of Education held their entire email system to ransom for $200,000 after an unhappy exit. Stories of others stealing client databases are also common – especially if they leave to start their own business or work for a competitor. It is not just full-time employees either, contract and part-time employees such as social media managers and customer support email specialists often have access to more of your business than you might imagine. Yes you may be able to get the person involved prosecuted but it only takes seconds to login and wreak absolute havoc on your network. Knowing you can force those bad eggs into a lengthy court case is poor comfort considering the extent of damage you’ll likely endure. The best option is to change their access credentials fast – even before your employee knows they are fired. This lessens the chance of revenge attacks and opportunistic access.

Use a password manager

If you have good password manager like KeePass or LastPass, reducing your risk becomes mostly automated. You will be able to keep your passwords in a central vault and only share passwords to those who need that access – plus you can section off the passwords to different sections or job roles. If an employee leaves or moves to a new internal position you can change or revoke access.

We can help you secure your network and use a password management tool. Contact us at support@dpcomputing.com.au or 08 8326 4364.

4 Smart Reasons You Shouldn’t Have In-House IT

In house IT.It can be tempting to hire an in-house IT technician to take care of your network and set them up with a cozy office just down the hall, but is it the right decision for your business? If you are like most businesses, you’re always on the lookout for ways to save money while improving results. Sometimes this means expanding your staff to include a team of tech specialists to be at your beck and call, but this can often be an unnecessary expense that leaves you with highly paid employees twiddling their thumbs when not needed. For SMEs who are looking for the best of both worlds, we recommend Managed IT services.

Put simply, Managed IT is our solution which gives you that team of specialist technicians and network experts, without the ‘quick, look busy’ element – and at a fraction of the cost. Naturally, you’d rather see your IT budget working to support your growth and be kept as low as possible. That is our focus too, and why we don’t simply maintain and repair your systems, we proactively monitor to avoid downtime and work with you to ensure your IT increases productivity and efficiency. Whether you already have in-house IT staff and are auditing the value or are curious about what having external IT support might be like for you, we have put together a few factors to consider before making your choice:

Availability: Most employees work 9-5, but what happens if something goes wrong with your systems outside these hours? Your in-house technician won’t appreciate being woken at 1AM and being called in for an emergency. It is more likely that they simply won’t answer the call (or “hear” it), or if they do, expect some hefty contract renegotiation come the next business day. Managed IT is very different as we are ready for after hours issues and have support technicians ready. We know that every minute of downtime is affecting your revenue, plus your business reputation, so we prioritize getting your systems up and running ASAP. As a bonus, with our Managed IT these types of disasters are rare as we are constantly monitoring and correct and problems before they become an issue.

Total cost: One of the things that may have attracted you to having an in-house technician is the cost. Yes, you may be able to pay them a lower hourly rate but there are extra costs like hiring, training, sick leave, holidays, ongoing training and superannuation. Once you start adding up the cost of an in-house technician, you may find it is eating up your IT budget and leaving you scrambling to fill gaps you didn’t expect. Upgrades get delayed, opportunities missed, and IT expenses become a sore point. In comparison, Managed IT is one fixed monthly rate delivering enormous value, including access to specialists with a wide range of knowledge and experience.

Ongoing Training: Putting aside the fact your technician will often spend entire weeks away upgrading their skills and leaving you scrambling for support while they’re gone, those training costs quickly add up. With a salaried technician, you will have to pay all their ongoing training and certification costs (including travel and accommodation costs for industry conferences). We know how important it is to remain current, certified and skilled in new technologies, so we spend the money to invest in our technicians so that we can serve you better. We are also part of industry related associations and attend multiple conferences each year, all at our own expense (saving the end clients money).

Different goals: For most employees, a higher wage is the goal and many move jobs to achieve that. You may spend time and money training a salaried tech only to see him move on to a better paying job. In these modern times, switching jobs regularly is expected, with an average of only 3 years in each position. Considering how much it cost your business to acquire, train and upskill your technician, 3 years is an unreasonable ROI. Unlike an internal staff member our goals couldn’t be more different – we only aim to keep you a happy customer for as long as we can!

In the end, your business needs to find the right balance between profit and expertise. When you partner with our Managed IT, you’re securing availability, ever-increasing expertise and a commitment to your success. We work closely with you to provide the very best support and protect you against costly disasters by taking preemptive action to keep you safe and operational. There’s no doubt Managed IT is a better decision than hiring an in-house technician, and we’d be delighted to prove it to you.

Talk to us about Managed IT for your business. Contact us at support@dpcomputing.com.au or at 08 8326 4364.