Businesses Top 5 IT Security Problems

Security Problems

In today’s world, companies seem to be having security issues most weeks. These issues relate to 5 main problems. Is your company guilty of any of them?

1. No Backups

A shocking number of businesses do not back up their data properly. According to market research company Clutch, 60 percent of businesses who suffer a data loss shut down within six months.

Even with companies that think they are doing their backups correctly they never regularly test those backups. It is a step that businesses miss surprisingly often\ so don’t be that business that only finds out that their backup isn’t working when it is already too late.

2. Being Reactive and Not Proactive

Technology is changing on a daily basis. Attackers are always working on new ways to break into businesses, hardware is evolving faster than most of us can keep up and old systems fail due to wear and tear. A huge number of businesses wait until these issues impact them directly before they respond. This results in higher costs, longer downtime, and harder hitting impacts.

By responding to hardware warnings before it fails, fixing security holes before they’re exploited and upgrading systems before they are out of date: IT can be done right. Being proactive about your IT needs means systems do not have to break before they are fixed. This results in less downtime, fewer losses and lower IT costs for your business.

3. Poor Passwords

A surprising number of people will use weak passwords to secure their accounts. Even more will write down their passwords on a post-it note right next to the computer. In other cases many people have no passwords at all! Strong passwords act, not only as a barrier to prevent unwanted entry, but as a vital accountability tool too – when system changes are made it is essential to be able to trace back to the account that made that change.

With an weak or insecure password tracking the individual responsible for reports or accountability becomes impossible. This can result in both auditing disasters on top of technical ones.

4. Little or No Staff Training

People are commonly the weakest link when it comes to IT security. Implementing IT security can be a bit like having state-of-the-art locks on a door propped open with a milk crate when staff aren’t trained to use that lock.

Often businesses can justify spending big on security hardware and software but spend zero dollars on training staff to use them. In this instance, a little goes a long way. Security training can help staff to identify a threat, stop it at its entry point and avoid any issues that may have occurred if the staff member hadn’t had any training.

5. Weak Data Controls

Some companies take an ad-hoc, fast and loose approach to data storage. Often crucial  data is spread across many devices, copied needlessly and even left unsecured. Client data can be found regularly on employee laptops, mobile phones and tablet devices. These devices are prone to being misplaced or stolen along with any data they contain.

Most companies focus on the costs of devices and hardware purchased for the business. The reality is that the data held on those devices is always worth many times more than the device that holds it. For many firms, their approach to data hasn’t been changed since when the firm was first founded. Critical data is often held on single machines that hasn’t been updated because they hold that critical data. Such machines are clearly vulnerable, outdated and of course prone to failure.

Common problems with simple solutions

Each of these common issues have simple solutions to secure against IT failure. With a professional eye and expertise in the field, every business should be defended against IT issues that risk the firm.

If you are in South Australia and need help securing your IT system, give DP Computing a call on 08 8326 4364 or at support@dpcomputing.com.au.

Have You Been Hacked?

Being hacked is the single biggest fear for most computer users. Many people believe the first sign of strange behavior or errors on their PC is a sign of being hacked. But are hackers really inside your machine, roaming around madly and stealing your information? Or should we be on the lookout for other more subtle signs? What does being hacked really look like and what can I do to help prevent it happening?

There is an important distinction to make between being attacked by a hacker and being infected with a virus or malware. Virus software and malware are automated processes designed to damage your system and / or steal your data. There are of course ways that we can defeat these processes, but what if we are instead being hacked and what are some of the signs?

Passwords not working

One of the first steps a hacker might take is to change your computers login passwords. By doing so, not only do they ensure future access to the machine, they prevent you from accessing the system to stop them. For the hacker, this is a crucial step that keeps them in control. With this in mind, we always want to make sure to keep on top of our own login details and how often we change them.

Security notifications from online services

A lot of online services track which device and location you logged into your account from last. If your account is accessed from a new device or a different country it might trigger an automated email or SMS asking if this new login is from you.

If you have just logged into a service from a new computer, tablet, or phone; receiving an email that asks “hey, is this you?” need not be cause for alarm. If you haven’t, it may be time to investigate further. This feature is a very important part of information security and may be a key first step to identify someone else gaining access to your account.

Bank accounts missing money or strange transactions

The end goal for the majority of today’s hackers is typically to profit from their crimes by taking money from people online. As such, it pays to keep a regular eye on your financial transactions to make sure you know what money is coming and going from your account.

You may see a large sum missing where hackers have attempted to take as much as they can in a single transaction. On the other hand unknown or unusual small transactions may be attackers testing the login details they have, to confirm that they work.

Loss of mobile phone or land line connectivity

Phone interruption is a symptom that few people expect but can occur when hackers attack. Many banks and online services use a security feature known as two-factor or multi factor authentication (2FA or MFA). They do this by sending a code to your phone or app when you log in, you then have to enter this code to confirm who you are.

Hackers can try to work around this by calling your phone provider to report your phone as lost or stolen. During this call, they will request your phone number be transferred to a new sim card or redirected to another number that they control. When your bank sends its regular two-factor authentication code to the number registered, it goes instead to the hacker who then can log in. From your perspective the phone service will simply stop working, so if this happens contact your provider ASAP.

Social engineering

Another technique that may not even include a technical method is called social engineering. Social engineering is when hackers try to obtain confidential information by manipulating people to freely give them this information. This can be done in many different ways. Some examples are:

  • A strangers phones your office and may pretend to be a customer or supplier but asks for personal or confidential information.
  • A person claiming to be a supplier contacts you and asks you to change the bank account you send payments to.
  • Some one attends your premises for some reason but you have no prior knowledge of who they are or why they are they are requesting access.
  • Some one phones and claims to be from the technical department of your ISP or maybe even Microsoft and requests remote access to your computer.
  • You receive an email claiming to be from the boss or management asking you to do something which doesn’t seem right – like purchasing iTunes vouchers or asking to authorize payment to a new supplier.

Keeping vigilant and maintaining security

These are only some of the techniques that hackers can try to use to gain access to your systems and accounts. It pays to be extra vigilant and pay close attention to the signs and signals that indicate you may have been hacked. It may als

If you suspect that you might have been hacked, or would like help to prevent hackers in future and are located in South Australia, give us at 08 8326 4364 and we will improve your security.

How Losing a Mobile Device Can Put Your Business at Risk

Lost device

Losing a mobile phone, tablet or laptop is something that everyone dreads. The expense and inconvenience of buying a new device is unpleasant, but the replacement costs only represents a fraction of the damage done when a device is misplaced. The cost of the data contained within every device can add up to many times more than the total value of the device itself.

Along with any data on the device you may use automatic login to your email and other online services. Each of these services is vulnerable to an attacker having possession of your device.

Saved Usernames and Passwords – Users often click on the link to save the passwords in their browser for sites they regularly visit. While this makes things simpler for the user it also makes it very easy for someone else with access to your device to login to your online accounts.

The problem can multiply where a single password or a combination of similar passwords have been used across several accounts. In these situations an attacker need only gain access to a single one and reuse the same credentials across many sites and services.

Email – Email accounts are a key target for attackers looking for access to your business and / or personal information. It is a service that we all take for granted, setting up the device and using automatic login every time afterwards.

It is a service that also unlocks a great deal more than just the email messages as with email access a malicious user can gain access to many of the most commonly used web services online. Using the “forgot my password” button on many websites triggers an email with a password reset link to the email address registered on file. An attacker may use this feature to reset account passwords. Doing this both grants themselves access to your account and denies you access to it.

Contacts – One of the best features of SMS’s and instant messaging is that your contacts know the message is coming from you. When a message is sent from your device to someone you know it displays along with your name, details and maybe even a photograph.  With contact information already programmed into a device an attacker has an opportunity to impersonate you. Using your identity, an attacker may attempt to steal yet more details about you and your contacts.

Social Media – Your social media accounts can often be the face of your brand and are a primary way to reach out and contact customers. They are also extremely vulnerable to being hijacked from a stolen device. Fraudulent social media access allows attackers to harvest both client and business data. Even without profiting directly, posting information on a social media account can cause irreversible damage to a business.

Protecting your business – Services, accounts, and entire businesses can be put in great danger by something as simple as misplacing an unsecured mobile phone or laptop computer. Remember to always put passwords and security measures on all devices.

We can help you to stay secure and remain in control even when losing a device. Give us a call at 08 8326 4364 or support@dpcomputing.com.au and let us help secure your business.

Does Your Office Need Business-Grade WiFi?

Business grade WiFi

In today’s business world, having great WiFi isn’t a luxury – it is a necessity. For some small businesses, consumer grade WiFi may be sufficient (especially if it is not widely used), but with the explosion is usage of mobile devices many find that business-grade WiFi is more appropriate. As companies grow, there becomes a tipping point where business-grade is necessary. So how do you know if your business is ready for business-grade WiFi? Ask yourself the following questions to find out.

How many devices use your Wireless Network?

It used to be that a few laptops connected to your WiFi network, but that is no longer the case. With the rise of portable devices such as smartphones, tablets and other devices  each person may be connected to your wireless network from several devices. Consumer-grade hardware is designed for just a few people (ie the small amount that typically live in a single household) but can not manage larger amounts of users and all of their devices. This is especially true for sustained concurrent usage. Remember that your employees aren’t the only people who expect to be able to connect to your WiFi. One of the first things visitors and customers typically do is look for a WiFi network to connect their smartphones to.

What is the size and area of your workspace?

The number of access points you will need for your business is dependent on the amount of physical space that needs to be covered, the shape of the area, wall material and the number of users / devices. In smaller spaces, consumer-grade WiFi may be good enough. Larger, oddly shaped spaces benefit from business-grade. If your building’s walls are made of brick, cinder blocks, or cement, you likely need more access points than buildings made of other materials. Make sure you have a strong connection from all locations. It is annoying to only be connected to wireless in certain areas of a building and find yourself in a deadzone one step later.

Access points for business-grade WiFi tend to be more powerful and flexible. For example, some business WiFi systems can move Wi-Fi devices from a crowded access point to one that is less busy. By doing this, everyones access remains consistent. If you foresee your range needing to increase, such as renting out more space, it is much easier to add more access points to a business-grade network than consumer-grade one. Businesses that anticipate scaling up soon are better off with business-grade WiFi.

Do you want guests to have the same quality Wi-Fi as workers?

In households, where consumer-grade WiFi hardware is used, all users share the wireless network equally. In a home environment, if children are slowing down the internet with Netflix or video games, it is not a big problem. However, a choked business WiFi can cause a lot of problems. Business-grade WiFi allows you proper network management. You can assign a designated amount of bandwidth to different users so they are unable to clog the entire connection. You can also allow visitors internet access without giving them unlimited access to your local network.

How much does the internet affect your employees’ productivity?

For some companies, workers only use WiFi for a few quick tasks. With these types of businesses, if the internet is slow, it won’t have a big impact on how much work your employees get done and consumer-grade wireless might be a good choice. For other companies where there isn’t much people can do if the WiFi isn’t working well then a business grade connection is essential. WiFi troubles can also lead to frustrated and unhappy workers.

Strong WiFi is a necessity for all businesses. This is especially true for larger businesses that connect a lot of devices (from both an employees and visitors perspective) and have a large work area. Also for those where employee productivity depends on a strong connection. The goal is to keep your business-critical technology running smoothly. Consider carefully whether consumer-grade Wi-Fi or business-grade Wi-Fi is the best choice for your business. When you ask yourself the questions above, the answer should become clear.

If you are in Adelaide, South Australia and your business’s wireless network is struggling then give us a call on (08) 8326 4364 or via email at support@dpcomputing.com.au to discuss a solution.

7 Ways To Keep Your Systems Secure

eBook - Business Security Guide - 7 Ways to Keep Your Systems SecureCyber-attacks on your business can be crippling, but there are easy ways to keep the bad guys out. We have written a great eBook listing 7 simple but effective ways to reduce your risk of malware or hacking.

Click here to subscribe to our monthly newsletter and access your copy of this book – don’t worry we won’t share your details and you can unsubscribe at anytime.

If you are already a subscriber and would like a copy please email david@dpcomputing.com.au.

You will also receive a free copy of our other great eBooks including the following so sign up now!

  • 5 Reasons Your Business Needs Office365 Today!
  • Is Your Old Tech Dragging You Down?
  • Spectre and Meltdown: How you’ll be affected.
  • 10 Tips to Stay Safe Online
  • Digital Transformation – What’s In It For You?

As always, if you want to talk about ways you can save on your IT, give us a call on 08 8326 4364 or support@dpcomputing.com.au.

Why Multi-Factor Authentication is Important

2FA and MFAYou hear about hacks all the time in the news. Major websites have had data leaks and lost their users personal information. Computers get infected and malware saves your login details for bank accounts and credit cards. In the worst cases, identity theft occurs because it is an easy crime to commit and has a high reward.

In the past, passwords could be used to keep the bad guys out of your accounts but a single form of authentication is not enough anymore. Cyber hackers have a variety of methods including phishing, pharming and keylogging to steal your password. Also togdays computers have the power to test billions of password combinations.

To make things worse the majority of people use the same password for several websites. That means anybody who has figured out that password has access to multiple accounts that you own. In a time when it is extremely easy to look up what a persons pet is called or their maiden name is, security questions aren’t much help.

Consider how a bank operates. They don’t simply keep their valuables locked away with one key. There are alarms ready to be triggered, motion detectors and even bars on the windows. Your data is valuable and you need more than one line of defense to protect it.

In the computer world, your second line of defense (after your username and password combination) is called “2-factor authentication” (2FA). Sometimes it is referred to as multiple-step or multi-factor verification (MFA). 2-factor authentication is a way to double check a person’s identity. This can be enabled every time a person logs in or just under certain circumstances. For example, signing in from a new device or different country might trigger 2-factor authentication.

Many of the services you may already use, such as Facebook, Gmail, Office365, Xero Accounting, and more, have 2-factor authentication options. If your bank has ever sent you a special code through text or email to enter before logging in, you have already used a type of 2-factor authentication. They can also be in the form of a app on your phone or a small electronic dongle.

MFA is absolutely crucial for online banking, email, and online shopping such as Amazon or PayPal. It’s also a must-have for cloud storage accounts (like Dropbox or Sync), password managers, communications apps, and productivity apps. This is especially true if you frequently use the same passwords for different websites and apps.

Some may consider MFA unnecessary for social networks accounts, but these are actually very important to keep safe. For ease, a lot of websites and apps allow you to sign up through your Facebook or Twitter account. You need to keep these networks safe so that somebody with your password can not suddenly get into every account you have linked.

The point of using MFA is to make hackers’ lives harder and prevent them from easily getting into your accounts. If they have captured your login username and password, they still need a second method to get in, especially when the computer or phone they are using has never logged into your account before. This makes it much harder for anybody to breach your account.

Plus, if you receive a notification with a special code to enter for logging in (and you weren’t trying to log into that account), you have a good signal that somebody else was trying to get in. That means it’s time to change that password and be grateful you had MFA configured.

It is unfortunate that there is currently an abundance of skilled hackers ready to take advantage of those unprepared. Luckily, you can still stop them – even if they have your login information at hand. MFA is one of the easiest methods to keep your accounts safe.

Give us a call at (08) 8326 4364 or via email on support@dpcomputing.com.au to help secure your business and accounts.

It’s Official: Your Website NEEDS to Use HTTPS

HTTPSYou may have noticed many business websites now have a green padlock in the address bar next to the letters ‘https’. Until recently, you would have only see that on shopping or banking sites, but it is now become the expected norm for all business websites – even if you don’t need users to log in or enter credit cards. Simply put, the ‘s’ in https stands for secure and means any data sent and / or received by the visitor is encrypted.

Clearly, this is an essential feature for e-commerce sites, but why have all the info-only websites started using https too?

The New Google Rule

As of July 2018, Google will mark your website as insecure unless you use https. It is a movement they started a few years ago to make the internet a more secure place by default. Since Google pretty much rule the internet search and increasing security is always a good idea, business websites have been gradually switching over. Without https protection, someone with access to your internet connection, whether from digital eavesdropping or hacking, could intercept the information. They could also place malware onto otherwise legitimate sites and infect innocent visitors. That is why eighty-one of the top 100 sites online have already switched to https and a very large majority of others are following suit.

The Browser Bar Says It All

In the same way a green padlock in the browser bar indicates a trustworthy site, you can expect that non-https sites will be marked with a “not secure” warning. Previously, users had to click an information symbol to actively investigate the security status of sites. This shift to plain sight markers will be most noticeable on Chrome, however it is expected that other browsers will follow suit. Future visitors to your site may then be alarmed by seeing that the connection isn’t secure.

The fact that you may not be asking them to log in, enter personal details or payment is irrelevant as perceptions matter. Eventually that warning will be changed to an alarming red as Google declares war on insecure sites. As the common understanding is that a warning is bad, you may get more visitors bouncing straight away or even contacting you to report that your site has a problem.

Boosts for Secure Sites

Google is also taking its commitment to safe web browsing further by favouring https websites. This means that Google’s search algorithm is taking your site security into account, preferring https results. Since https status get preference in search results, you may find yourself climbing in the ranking while other businesses drop. It really is a win-win situation for you to implement https..

How to proceed?

It is a little more complicated than just changing a setting within your web hosting environment. You have to order an install a SSL (Secure Sockets Layer) certificate and then install it within your hosting environment. The easiest way to do this is to contact your IT technician or web developer, as they will be able to make sure that it is all done correctly and thus will keep Google happy.

We can help secure your website by migrating it to https – contact us today at 08 83264 364 or support@dpcomputing.com.au.

4 Ways to Avoid IT Downtime

Avoid computer downtime

Technology is a wonderful thing, but what happens when the IT stops working? In today’s world IT is a necessity. Unfortunately, this means when downtime inevitably hits, you have a BIG problem.

Maybe it’s from a malware or virus attack, a bug in the system, hardware failure or something else… Whatever the cause, the impact is real and measurable and you need it fixed ASAP. Research firm Gartner, reports that 43% of small businesses close their doors right after a major data loss, and only a tiny 6% survive long term. The financial cost of each hour can be in the thousands, and the damage to your brand could be irreparable. While downtime will occasionally strike every business, there are things you can do to minimize the duration, frequency and interruption to your business.

Taking a few simple actions now may result in your business staying open while your competitor gives up.

1. Use monitored antivirus and firewalls

While most businesses have these protections, not all have embraced the idea of monitored antivirus and firewalls. Instead most small business setups have more in common with a home network than a robust professional system. Given that SMB are a primary target for malware and cyber-attack, you should seriously consider moving to the monitored versions. Our experts set up custom protection to block all attacks, both known and emerging. All updates are taken care of and company-wide protections applied.

2. Have backups you can count on

A backup can not only protect you from digital threats like viruses and ransomware, they also protect you against physical threats like robbery, fire or natural disasters. The last thing you want is for your business to be crippled by data loss. A robust backup system can be as simple as asking our team to take care of it, or if you have an on-site technician, using the rule of 3: one backup on the server, one unplugged from the server, and one off-site. If anything ever goes wrong, you’ll be able to pull up the most recent backup and continue as normal. Businesses without good backups tend to be down for days, if not weeks. You also need to regularly test your backups to confirm they are working and also backing up the correct data.

3. Planning

Nobody likes to think about their business flooding or being hit with ransomware, but do you and your employees know what to do if the worst happens? Having a comprehensive Disaster Recovery Plan helps you get up and running quicker and  minimises downtime. Everyone knows what their role is, what steps they need to take, who to tell and which systems take priority.

4. Monitor hardware for early signs of problems

Computer hardware is like any piece of equipment – when it’s getting old it will let you know! This could be anything from making noises, being louder or slower than normal or even system crashes. Each symptom is your early warning sign that allows you to take action before a crash that sends everything into downtime. We can even implement hardware monitoring to look for signs of impending issues. If the signs point to imminent failure, we can let you know and often repair or replace the affected hardware with little or no downtime.

Downtime is an unavoidable part of all modern businesses but your preparation can dictate whether it goes for one minute or one week and how often it happens. According to one study, most firms experience 43 hours average downtime per year, a number much too high for most peoples comfort. While scheduled downtime can sometimes be unavoidable, your business will appreciate being able to skip the panic of surprise downtime events. Reducing your risk is the best action you can take, making downtime a truly rare occasion. Even better, our Proactive or Managed Services can take care of this for you, stopping many downtime events before they occur.

Talk to us about ways to reduce your downtime. Contact us today on 08 8326 4364 or at support@dpcomputing.com.au.

How to Securely Dispose of Your Old Computers

Securely dispose of old computers

Getting new computers for your business is exciting, but what do you do with the old ones? Sometimes they may get handed down to another staff member, re-purposed for another function, sold or even thrown out.

The problem is that there is sensitive data on them. There are passwords, emails, account numbers, license keys, client details, financial information, browser history…. the works! Every computer contains a treasure trove of sensitive information that cyber criminals would love to get their hands on!

Deleting all the files on the computer doesn’t actually make them disappear, nor does waving a strong magnet over the drive. These mistakes have cost businesses millions of dollars over the years.

Most businesses and users are unaware that specialized data deletion and cleanup is necessary. A 2016 experiment proved just how dangerous the situation can be. Researchers bought 200 used hard drives and found that 67% held unwiped, unencrypted sensitive data, including sales projection spreadsheets, CRM records, and product inventories. Even more frighteningly is that they didn’t need any special hacking skills to get this data – it was all right there on the hard drives, easily readable and helpfully labelled. It is also not surprising that with simple data recovery tools, people have also been able to access medical records, financial info and even defence related  data, all waiting patiently on a discarded hard drives.

Why deleting files doesn’t help

Data on a hard drive is stored like a book with an index. Every time data is written, a quick entry is written into the index so when you need it again, it knows where to look on the hard drive. The index is used for files you create as well as system files you can’t even see. If you delete a file it is more like changing the index to say nothing is on page 10 and you can write something else there when you are ready. But if you manually go to page 10, you will find the information is still there. The file still exists until it’s been written over – it is just the index reference that is deleted when you “delete” a file.

Wiping data before disposal

There are specialised software tools you can get to properly wipe the hard drives  yourself, as well as dedicated security firms, but your best option is to choose an IT business you know and trust. With that in mind, a methodical approach is required to ensure not a single drive is left untreated. You don’t want to leave data behind, or even clues that a motivated person could extrapolate any information from. The approach might include using checklists to maintain security, or dedicated processes to guide each step in decommissioning. Records should also be kept, including who signs off on completion of the retirement and where the computers are sent afterwards. A proper inventory and auditing process may slow the roll-out of your new computers, but it is always better than having your old data coming back to haunt you.

If you are located in Adelaide or the surrounding area we can migrate any needed data to your new systems and then securely destroy your old hard drives for you. We can then dispose of the computer for you via a recycling centre.

Upgrading your business computers should be an exciting time for you and your employees, so with a little forward planning, you’ll be able to keep everyone smiling and all your data secure.

Need help with your old hardware? Contact us today on 08 8326 4364 or at support@dpcomputing.com.au so that we can securely dispose of your old equipment.

Think Before Clicking – 5 Red Flags of Phishing Emails

Just one click can be the difference between maintaining computer security and suffering massive financial losses. All it takes is just one employee to click on a link in an email for your business to be vulnerable.

Here are a list of 5 red flags that point out a potential phishing email:

1. Poor spelling and grammar

The occasional typo happens to even the best of us, an email filled with errors (both in grammar and spelling) is a clear warning sign of a phishing attempt. Most companies push their email campaigns through multiple reviews where errors are fixed and the language is refined. Errors throughout the entire message indicate that the same level of care was not taken and therefore the message is more than likely fraudulent.

2. An offer too good to be true

Free items or a lottery win sound great, but does the offer comes out of nowhere and with no catch? Then there is definitely cause for concern. Take care not to get carried away with the message and don’t click without investigating further.

3. Random sender who knows too much

Spear phishing is when an email or offer is designed and crafted especially for your business. Culprits take personal details from your public channels (Facebook, Twitter, Linkedin and even offline documents such as annual company reports etc) and then use it against you. The only clues? The sender is unknown – they weren’t at the event or involved in any way. Take a moment to see if their story checks out. Even check the email address of the sender to confirm that it is correct and not just a similar sounding or looking address (see #4 below).

4. The URL or email address is not quite right

One of the most effective techniques used in phishing emails is to use domains which sound almost right. For example, [microsoft.info.com] or [pay-pal.com] Hover over the link with your mouse and review where it will take you. If it doesn’t look right, or is completely different from the link text then delete the email.

5. It asks for personal, financial or business details

Alarms should ring when a message contains a request for personal, business or financial information. If you believe there may be a genuine issue, you can initiate a check using established, trusted channels (ie phone the person on their known number not one contained within the email).

While education is the best way to ensure phishing emails are unsuccessful, a robust spam filter and solid anti-virus system provide peace of mind that your business has the best protection available.

DP Computing can help secure your business and can even organise a fake phishing attack to see if further staff training is required. Give us a call to discuss how we can help you on 08 8326 4364 or support@dpcomputing.com.au.