The Best Way to Purchase New Computer Systems

Buying new computers

You have decided to buy a new computer for your business or perhaps even a whole set of new computers. You can almost taste the excitement as you think about those sleek new machines and how much more productive your employees will be. There is just one thing left to do: actually choose which ones you need. This is where it starts to gets tricky. Most people pop down to their local retail store and look at the display models and then get overwhelmed when the salesperson starts throwing around technical jargon. This scenario almost always ends up with your business having the wrong computer. Here’s why, and what you should do instead.

Most retail salespeople are minimally trained
Unsurprisingly, salespeople are trained to sell! They may have an interest in computers and they’re certainly great at reading the words on the box to you, but that maybe the limit of their knowledge. Their main goal is to make the sale, earn the commission and go home happy. You want a computer to suit your business needs, which isn’t particularly high on the salespersons priority list. They are not equipped to deeply understand the way your business works and nor do they have the time or desire to find out. You are also more likely to be upsold extras you don’t need but can rapidly drain your budget.

Compatibility can be a problem
There are so many moving parts to your business network, from printers to routers, laptops to desktops and a variety of software programs that anytime you throw a new computer into the mix you could end up with compatibility problems. Salespeople don’t know what your current setup is at your office but may still make recommendations based on assumptions and hopeful guesswork.

Even the number and types of ports available on retail computers may cause a problem once you’re setting up. The last thing you want to do is end up with a collection of wobbly adapter plugs as you attempt to make do until it is time for a do-over.

Most computers sold at retail stores only come with the home versions of the operating system and MS Office software. This then leads to another round of compatibility issues.

Yes you can may be able to create workarounds but this then leads to efficiency and performance hits. It is best to skip the drama and get the right computer first time around.

Support could get tricky
Your IT provider will often stick to a handful of vendors to ensure all parts are kept uniform. That way they know which parts will work together, and should something fail, they can usually get replacements quickly. IT support providers often have special relationships with suppliers and vendors and can get special pricing, extended support and upgrades that a salesperson can’t match. Your IT budget goes further with your consultant, and not just on the day of purchase.

When you buy computers through your IT provider, you know you are getting the exact computer your business needs. They know your business inside and out, including your long and short-term goals and if needed will do more research before making  recommendations.

IT providers will also provide business class systems with business class warranties. Remember, you will want your computers to last at least 3-4 years of heavy usage, so it’s a good idea to buy only business-grade computers and components. While the computers at the retail store are equally shiny, they are rarely as durable as the ones your consultant can supply.

As well as selling you the new systems your IT provider will also be able to set the new computers up, ready to go with the exact software you need. They can strip out all the bloatware (unnecessary programs and trials that come pre-installed) and configure your new computers to your needs. Your employees will then be able to enjoy the new systems and take full advantage of the productivity boosts you paid for from day one. That means internet working, internal network connected, your programs playing nice with each other, printing without problems and all your settings data and email transferred from the old computer!

If you are in South Australia we can help with your next purchase – ask us how by contacting us now on 08 8326 4364 or support@dpcomputing.com.au!

4 Ways to Avoid IT Downtime

Avoid computer downtime

Technology is a wonderful thing, but what happens when the IT stops working? In today’s world IT is a necessity. Unfortunately, this means when downtime inevitably hits, you have a BIG problem.

Maybe it’s from a malware or virus attack, a bug in the system, hardware failure or something else… Whatever the cause, the impact is real and measurable and you need it fixed ASAP. Research firm Gartner, reports that 43% of small businesses close their doors right after a major data loss, and only a tiny 6% survive long term. The financial cost of each hour can be in the thousands, and the damage to your brand could be irreparable. While downtime will occasionally strike every business, there are things you can do to minimize the duration, frequency and interruption to your business.

Taking a few simple actions now may result in your business staying open while your competitor gives up.

1. Use monitored antivirus and firewalls

While most businesses have these protections, not all have embraced the idea of monitored antivirus and firewalls. Instead most small business setups have more in common with a home network than a robust professional system. Given that SMB are a primary target for malware and cyber-attack, you should seriously consider moving to the monitored versions. Our experts set up custom protection to block all attacks, both known and emerging. All updates are taken care of and company-wide protections applied.

2. Have backups you can count on

A backup can not only protect you from digital threats like viruses and ransomware, they also protect you against physical threats like robbery, fire or natural disasters. The last thing you want is for your business to be crippled by data loss. A robust backup system can be as simple as asking our team to take care of it, or if you have an on-site technician, using the rule of 3: one backup on the server, one unplugged from the server, and one off-site. If anything ever goes wrong, you’ll be able to pull up the most recent backup and continue as normal. Businesses without good backups tend to be down for days, if not weeks. You also need to regularly test your backups to confirm they are working and also backing up the correct data.

3. Planning

Nobody likes to think about their business flooding or being hit with ransomware, but do you and your employees know what to do if the worst happens? Having a comprehensive Disaster Recovery Plan helps you get up and running quicker and  minimises downtime. Everyone knows what their role is, what steps they need to take, who to tell and which systems take priority.

4. Monitor hardware for early signs of problems

Computer hardware is like any piece of equipment – when it’s getting old it will let you know! This could be anything from making noises, being louder or slower than normal or even system crashes. Each symptom is your early warning sign that allows you to take action before a crash that sends everything into downtime. We can even implement hardware monitoring to look for signs of impending issues. If the signs point to imminent failure, we can let you know and often repair or replace the affected hardware with little or no downtime.

Downtime is an unavoidable part of all modern businesses but your preparation can dictate whether it goes for one minute or one week and how often it happens. According to one study, most firms experience 43 hours average downtime per year, a number much too high for most peoples comfort. While scheduled downtime can sometimes be unavoidable, your business will appreciate being able to skip the panic of surprise downtime events. Reducing your risk is the best action you can take, making downtime a truly rare occasion. Even better, our Proactive or Managed Services can take care of this for you, stopping many downtime events before they occur.

Talk to us about ways to reduce your downtime. Contact us today on 08 8326 4364 or at support@dpcomputing.com.au.

Is It Time To Retire Those Old Legacy Applications? Here Is How To Tell For Sure

How to retire old programs

You have likely been using the same applications for some time in your business. While you have been replacing computers and devices regularly to maintain your competitive advantage, the standard software installation have largely remained the same. The programs do the job perfectly and everyone knows how to use them, so what is the point of upgrading?

In some cases, it is completely fine to keep that old legacy program. However, there are some aspects that you should consider:

 

Support Available

With some software the author has moved on from supporting the program. They may have closed the business, sold it or gone in a different direction completely. Either way, they are no longer interested in helping and supporting the program. Every time you come up against a problem you have nowhere to turn and productivity takes a hit as you try and come up with a workaround. You also run the risk that it could suddenly stop working after a Windows update, start clashing with other essential software or even create large holes in your network security. Even applications from bigger companies like Microsoft have stopped support for older versions. Having support available to both assist and protect your business is a huge advantage.

Hardware Compatibility

Due to the rapid advancement of computer hardware, you may find a simple component refresh leaves your legacy program completely incompatible. The latest CPU, graphics card or motherboard may suddenly brings your entire business to a standstill, purely because it is too advanced. Owners can work around this by keeping some older computers running for that program, but as the hardware fails, you may find yourself struggling to find replacement parts or technicians able to install them.

 

Security Vulnerabilities

The longer a program has been around, the longer hackers have had to discover its weaknesses and holes. It can be a flaw in the program itself or in the operating system that runs it. For example, the program may only run on Windows XP, but Windows XP is not being supported by Microsoft any more. This mean any new weaknesses in XP are not being fixed by Microsoft leaving you open for attack. This is how hospitals across the UK found themselves infected with ransomware last year – they were running programs with known weaknesses that were out of support.

Sometimes it is not always feasible to replace a program immediately and we can help you run it on a virtual machine. That is, getting the older operating system or program to run from within another program. With this setup you will have increased security, an element of support and a strong backup system while you work to find a replacement program. These solutions are very specialized and resource hungry though, so let us know if you need help.

The other option is to move to a new application that fulfills your requirements, is supported, compatible with new hardware and secure. If you have been running the old program for some time, this may feel quite daunting at first but we can help you out and assist with the migration.

Do you need to talk through your options? Give us a call at 08 8326 4364 or support@dpcomputing.com.au.

Outsourcing vs Proactive IT Support – What Is the Difference?

Outsourcing Vs Proactive Support

Outsourcing has become a dirty word. It implies that you are taking jobs and work offshore or giving up oversight over a key part of your business. Proactive It Support or Managed Services (or MSP – Managed Service Provider) is the complete opposite of that and is a local solution. Your business already looks for help in various places, hiring consultants, agencies and other contractors, all so that you can focus on running your business. Proactive IT is simply another of those specialized services, designed exclusively to help with your technology needs.

A True IT Partner

Our team act as partners dedicated to achieving your business success. We are able to analyze your strategic needs to tailor IT solutions specific to your business requirements. We work hand-in-hand with you to design, implement and maintain your IT and keep you involved at every step of the way. We will also be up to date on industry news and where relevant can apply it to your business so you don’t lose your edge. When new software versions are released, we can help you make informed decisions about whether to upgrade, stick with current version a little longer or switch to an alternative. You will have a true partner on your team that’s always looking out for you and your business.

Better Results

Since our team get to know your business so closely, we are able to ensure all your tech support and maintenance is handled quickly and without disruption to your daily running. You will be able to keep your employees on task while our experienced technicians work through the issue, often remotely so the response is quick and disruption is kept to a minimum.

Visible and Accountable

Unlike standard outsourcing where you lose control of certain elements and are left to hope for the best, Proactive IT Services are completely transparent. You can get reports on the status of your computers or networks, the number of support tickets we’ve answered and exactly what we’ve been doing to keep your technology up and running. This level of visibility also means you’re able to see IT trends across your business and make strategic decisions to improve productivity and efficiency.

It Is A Local Solution

All of us have called a support number and found ourselves stuck in a frustration loop with an overseas call center. It is almost the entire reason outsourcing has earned a bad name. Our Proactive IT support service is actually a local service, a real-life business near you who employs local people and supports the local economy. Keeping your IT support nearby means you can get the tech assistance you need, with local knowledge, and customer service standards that make the process easier.

You Stay Protected and Prepared

Part of any Proactive or Managed IT service is to ensure your computers, network and digital devices are secure against threats. This means updates, patches, scans, tweaks, backups and system maintenance are all done for you. Your employees no longer have to worry about making time for these tasks and you don’t have to worry that they are getting skipped and opening up your systems for possible attacks. This level of proactive support ensures problems are stopped before they can occur and your business is able to keep on functioning. If anything ever goes wrong, your IT provider will have prepared disaster recovery and continuity plans so that you are up and running asap.

It Is Cost Effective

With Proactive or Managed IT, you will be able to reduce infrastructure costs very quickly as your IT partners are able to recommend better, faster solutions such as cloud storage and mobile technology. Instead of replacing hardware and software when things break, your IT experts will present plans with multiple cost-saving options and strategies. These can often extend to licensing and training too. Productivity improves as the technology begins to work with your processes and employees, not against them. Predictable costs are important to every business, which is why Proactive or Managed IT is the right choice. You’ll know your monthly expenses are capped, and you’ll be able to avoid expensive surprises.

Considering Proactive or Managed IT? Then reach out to us today on 08 8326 4364 or support@dpcomputing.com.au.

5 Tech Travel Tips You Can Use

Travelling with technology

Are you off on a business or personal trip soon? This can also mean making sure your tech is packed and ready for the adventure. Smartphones, eBook readers, tablets, laptops and smart watches are now so light and portable that you’d never think of leaving them behind, plus they can value to your trip.

Here are a few things to consider before you head off.

1. Backup Your Data

While you are travelling your devices are always going to be exposed to a level of risk. This might range from accidentally dropping it, leaving your laptop at a cafe, or having it stolen or lost. If the unfortunate happens your device is gone along with all the data it contained. If you have backed up your devices to the cloud (eg OneDrive or Google Drive) you will be able to access your files easily and securely from anywhere.

Hot Tip: Scan and then save important documents like your itineraries and passports to the cloud and also leave a copy with someone you trust back home.

2. Pack the right cables

It is not fun begging random strangers for a loan of their cable, so remember to bring the exact cables and chargers that you need. Most smartphones and tablets use universal plugs like Micro USB, USB C or Apple Lightning, so you can get away with only packing one cable but we suggest taking at least two in case one is lost or fails to work. If you are travelling overseas remeber to check the socket types and pack a plug converter. Depending on your destination, you might even find the voltage is different. so you may also need a voltage converter before you try and charge your device.

3. Download Online Data

Global roaming and data charges can give nasty bill shocks. While travelling, you might find yourself in a region or location where data costs a fortune, is extremely slow or is not available at all. Download any critical files you might need so that you can access them even without a connection.

4. Update and scan

Just like you’d make sure you have got the right vaccinations and travel gear, make sure your tech is ready to travel too! Set aside a few minutes or get your technician to run updates for all your operating systems and apps (remember your anti-virus). Also run a manual anti-virus scan too as the last thing you want to deal with is a malware issue on your trip!

Turn off auto Windows updates as you don’t want to be stuck downloading and installing an update as you are about to board a plane.

While you are updating your devices, turn on password protection for all devices so that only you can unlock them.

Hot tip: Use a complex password that is hard for hackers and thieves to guess. Also tell someone you trust the password so that you don’t get locked out of your devices if you forget it!

5. Label Your Devices

Label your devices so let everyone know this tech belongs to you. Write your cell number or email on portable devices in case you get separated so that whoever finds it can give you a quick call and save the day. If you don’t want to use permanent marker on your devices grab some sticky labels you can peel off when you return home.

You can also purchase little Bluetooth tracking tags to stick to your equipment, so that if you ever lose something you can quickly chase it down. Similarly, you might like to consider enabling the ‘find my devices’ option available on many devices. Having this feature switched on also means you can find or disable your device remotely, an excellent security option if it’s been stolen.

Need help preparing your tech for travel? Contact us at 08 8326 4364 or support@dpcomputing.com.au.

How to Get the Right Tech for Your New Business

getting the right tech

Congratulations on starting your new business! Costs can easily escalate and tech is often one of the bigger expenses. Just the sheer number of technologies available can overwhelm and confuse you. The latest tech has amazing features you didn’t know you needed, and suddenly your budget has gone skywards!

So how do you get the tech right for your business, without all the headaches and drama?

Do You Actually Need It?

Using a cloud application may mean you can skip the big server purchase and the ongoing maintenance costs of a server. Many line of business applications will have a cloud option that allows you to get all the benefits without the big upfront expense. So before you make the hardware purchase, look at what applications you require and whether a cloud version will suit your needs. You may be able to start with a basic package and expand to new versions as your business grows.Things to consider include: do you require remote access, will you need collaboration, do multiple users require access. This level of detail can be overlooked and causes expenses to spiral.

Get Professional Advice

It is easy and cheaper to ask friends and family what their recommendations are, but there are many more factors to consider than just their personal preference. Of course you can trust their input but they may be speaking from a consumer perspective, basing their recommendation on brand loyalty or on how another business does things (which may not be the best business model). As every business is different and matching the correct technology with the business can save you a lot of money and time in the long run.

Buy Business Grade

The majority of computers and laptops you see in the big department stores are not up to business standard. They are designed for home users to perform quick tasks and not run a full 8 – 12 hour (or more) a day workload. Business grade systems have additional features that your business needs, plus longer warranties and better support. Even attached peripherals like network switches and printers are built to a higher standard, to last longer and perform better.

Prioritize Flexibility

Businesses grow and evolve during their first few years and the last thing you want to do is go out and buy new tech, playing catch-up and cobbling together an assorted mismatch of devices. Your new technology should be as flexible as your business, which means making purchasing decisions based on business strategy and not just on price. Perhaps this means instead of workstations for employees, they may only need tablets or rather than having a fixed point of sale system, you might choose mobile checkout devices so your staff can assist customers on the go. These two examples highlight how easy it is to commit to certain tech because it is ‘what you do’ but later discover you’re locked into a certain way of doing business. Trying to change business processes down the line impacts productivity, efficiency and culture in a big way, so we recommend buying with your future success in mind.

Choose A Trusted IT Partner

During your initial set up and growth, you will need an IT partner who can not only help with your purchase strategy but support you through any problems as they occur. That is the difference between a partner and a supplier, a partner is committed to driving long-term business success for you.

You can call on your partner and know they are immediately up to speed with your business, they know how IT can help leverage your competitive advantage and which critical systems they should focus on.

Getting good technology in place shouldn’t be seen as just an expense. It improves your productivity and allows you to serve your clients and customers better while enjoying consistent growth.

If you need an IT partner to help your business grow, give us a call at 08 8326 4364 or support@dpcomputing.com.au.

What Is That Weird Noise Coming From The Computer?

Weird Computer NoisesNew computers are generally quiet, but after a while computers can start making some  weird noises. These noises may be simple clicks or clunks but your computer may also sound like a jet aircraft about to take off. But when should you worry? Your computer has a number of moving and non moving parts that can make noises and these noises can tell you a lot about its current health.

Clicking Noises

Soft ticks can be normal as the mechanical hard drives work a bit like a record player with a needle and platter. Depending upon the brand of the drive you might simply be hearing it spin up and move the needle around. When it starts sounding like a loud click though you should backup your data ASAP and bring it the machine in as soon as you can. If you ignore it all your data may become lost and your computer may fail to boot.

If you take action before its too late our technicians can copy your data onto a new drive and save you heart ache. It is much easier and a lot cheaper to replace the hard drive at the first sign of failure.

Clunking Noises

Unsurprisingly, this one causes certain alarm as computers aren’t meant to go clunk! It may be as simple as a cable having moved into the path of a spinning fan. If that is the case, our technicians will quickly secure the cable back where it belongs or check to see what else could be causing the clunk!

Jet Engine Noises

The majority of computers and laptops have fans to keep them cool by moving the air around. The hotter your computer gets the faster the fans spin and thus the more noisier they get. Consistent jet engine noises indicate that your computer is struggling to cool itself as perhaps the fan vents are clogged with dust, your computer is in a poorly ventilated space, or the fan itself is worn out. Each fan has ball bearings inside that wear out over time causing extra noise while it does the best it can. Our technicians can clean out your computer, unclog vents, replace individual fans if needed and give your system a check to make sure nothing else has been affected.

Beep Beep

No I’m not referring to the road runner from the cartoons of old but the beep as you switch on your computer. These beeps actually has multiple meanings. The single beep you normally hear indicates that it has run a self-test and everything is fine. When your computer is unwell, you may hear more beeps than usual. This is because each beep combination relates to a diagnostic code that lets us know what has gone wrong. If your computer is beeping differently, let us know so we can decode it and repair the problem for you.

Some noises your computer makes will be normal while others are a sign of deeper issues. Even if your computer looks to be working ok, a sudden change in noise could mean failure is just around the corner. Taking early action will ensure problems do not escalate, costs are kept low, and your files remain accessible.

Are weird noises coming from your computer? Give us a call today at 08 8326 4364 or support@dpcomputing.com.au.

Why Regular Security Assessments Should Be Your New Normal

Security AssesmentsBy now you know that improving your cyber security is just as important as improving your cash flow – both are essential to your success. While most businesses keep an eye on the financials, they tend to think cyber security is something they can ignore or just set and forget. Unfortunately, cybercriminals are constantly coming up with new methods of attack and the security you had in place yesterday may not be sufficient today.

Instead of reacting to breaches and taking on the costs of downtime, lost files and destroyed trust, a periodic security assessment can identify blind spots that place you at risk. Once you know about these issues, you can setup adequate protection before cybercriminals strike. It is best to use independent IT experts who can audit your security from an outside perspective, often seeing risks that you would otherwise miss.

Regulations change – Are you affected?

Many businesses need to comply with strict government regulations around the way they store, process and protect data. Their operating license depends on staying as secure as possible. All regulations require regular security assessments but they vary in scope and timeframe. As regulations change, so do the security assessment requirements. You can imagine how much stricter they are now compared to just 5 years ago. Our team can ensure your business is meeting the relevant regulations, diving deep to be certain you are safe.

Security patches and updates are vital

It’s so easy to fall behind on your security patches (both for software and hardware), after all, it seems like there’s a new update every week and each one takes precious time to apply. What we are seeing though, is that cybercriminals are targeting any business running up=patched hardware or software. If you are unpatched, you are an easy target and are inviting the bad guys in. When we conduct your security assessment, we take a look at your history and see if your business has a robust patch plan in place and make sure you are up to date. If there’s an issue that is placing you at risk we will find it.

Viruses are always evolving

Just like the human variety, computer viruses are constantly evolving to skip past anti-virus scans and do damage in new and interesting ways. Cybercriminals know people are more aware of the traditional infection methods like downloading an attachment or inserting an infected USB, so they’re getting more and more creative. Your security assessment doesn’t just include ticking that you have the latest anti-virus, it includes identifying where where your biggest vulnerabilities are. This type of precise awareness has a lasting impact on reducing your risks.

Your business may have changed

As your business has grown over the years your entire setup has changed. More employees, expanded remote access, additional vendors, other locations etc. With each change has come a new risk, particularly if your security has been growing around you. It might be your password policies that haven’t been updated since you began, or that you still have the old voicemail system even though phones are within easy reach of customers. This is perhaps one of the most useful areas a security assessment can help with, as you and your employees are accustomed to the business working in a certain way, whether that way leads to risk or not. Our experts will be able to see things from a different perspective, particularly as we make sure to think the same way a cybercriminal would.

What to do with your assessment results

While many experts might present you with a long list of problems and leave you feeling overwhelmed, our team ensures you have a benchmark for progress. You will know exactly what you need to do, what takes priority and how we can help. You will also know exactly what you’ve done well and where your security strengths lie. Employees will see how much you value security, which in turn helps to create a stable culture, and you’ll be able to report your commitment to customers, confirming they’re making the right choice by staying with you.

Book your security assessment today. Call us at 08 8326 4364 or support@dpcomputing.com.au.

Why Your Business Needs a Firewall With Unified Threat Management

Unified Threat Management - FirewallUnified Threat Management (UTM) is a special kind of firewall solution focused on proactive protection. Consider it like a team of virtual bodyguards that stand at the door between your business and the internet, keeping trouble out while your legitimate traffic can come and go normally.

With the increasing number of connected devices in your business network and the different ways your employees can now connect, it is more important than ever to set up dedicated security systems that give integrated protection. UTM is a series of solutions that work together, simultaneously layering your protection across the board. We’ll cover the four main inclusions here and show exactly what they can do for your business.

Robust Firewall

Put simply, a firewall keeps an eye on all the data coming in and out of your network and looks for anything abnormal. While every home PC comes with a software firewall built in, those ones pale in comparison to what a UTM firewall can do. Remember the team of virtual bodyguards? Imagine the home firewall asking nicely if the data should be doing that, while the UTM slams the data to the ground and demands answers. Its job it to make sure the data entering your network is safe, that it is not part of a cyber-attack, and that in the rare event your network becomes infected, your servers aren’t being used to attack another business.

Anti-virus Where it Matters

With so much new malware being released daily, it’s easy to fall behind in updates and discover you’ve been infected. Your employees are likely doing their best, but manually scanning each file can be exhausting and time-consuming. Your UTM anti-virus is built into the firewall, ensuring known or suspicious malware is stopped at the door removing any risk. Clearly that is the best outcome possible and will allow your employees to work at maximum efficiency, while you can run your business with confidence.

Spam Blocking

Most cyber-attacks come via email these days, with either an attachment or a link. Once clicked, the malware wreaks havoc in your network. Obviously, your employees are smart enough not to open random attachments/links, so hackers use phishing emails. These are emails that look legitimate and may refer to vendors you use, financial services you have accounts with or even seem to be from other employees. Your UTM strips down each email and checks it against high-tech legitimacy markers. If it sees anything suspicious, the email is marked as spam and either held for review or bounced away.

As the phoney emails are blocked, your employees never see the emails so they can’t accidentally open up the network for attack. While the UTM is monitoring for phishing/fake emails, it’s also culling out the general spam that clogs up inboxes. Employees will no longer have to spend precious minutes each day wading through the junk, and the likelihood of missing an important customer email has greatly dropped.

Content Filtering

In a perfect world, your employees would only access work-related sites and do work-related things online. Content filtering can help you limit the risk they’re bringing into your business via their Internet browsing. Your UTM can be set to restrict sites that infect computers, such as adult content, gambling or illegal downloads. It can also be used to restrict access to social media sites like Facebook, Twitter or Pinterest, either during work hours or completely. It’s up to your policies how much you’d like to filter and whether to add any flexibility. Some businesses allow social media during lunch breaks or have special reward hours each week. Simple tweaks like this can increase productivity overnight and give you the security you’re looking for.

You can see how a layered security solution like UTM provides a space for your business to thrive, where systems are secure, employees are able to maintain efficiency, and cyber problems stay outside the doors. The way the layers work together is more effective than a patchwork of separate systems, and a UTM is much easier to configure and maintain.

We can find the right UTM solution for your business. Call us today at 08 8326 4364 or support@dpcomputing.com.au!

Why You Shouldn’t Let an Amateur Loose on Your Network?

Amateur Computer TechnicianMost of us know a fair amount about computers, even kids are soldering electronic circuits and doing programming courses in schools – but does that make everyone an IT guru? Most workplaces have an employee they can turn to for basic computer troubleshooting. Yes they have skills, but they often know just enough to be dangerous if let loose on your business network.

Casual IT skills are learned on home computers which are very different to a professional business setup. When something goes wrong on a home computer, there is no drastic impact if parts need to be replaced, data is lost or it stays down for a week or two. In a business setting, every problem costs time and money and can create a domino effect throughout the entire network. Would you gamble the success of your business with a non-professional who did a quick Google search? You wouldn’t let someone be your lawyer purely on the fact that they can deliver a good argument, nor would you let someone perform surgery just because they saw it in a video on YouTube! Businesses have unique, specialist IT needs that to go beyond amateur computer skills and there is always a lot more money and time at stake.

Designing a custom backup solution for your business is a particularly interesting area. While most home users skip this part entirely, an IT professional has seen (and recovered) all manner of situations and will use that knowledge to ensure that if the worst happens to your business, you are safe and the data can be recovered. This could mean anything from having a complete copy of your drive stored securely in the cloud or drilling down to backup only the most important data. An IT expert is equipped to help you identify the value in each piece of data and implement a plan so robust that if your business is ever hit by disaster or breach, downtime and any losses are kept to a minimum.

If a disaster ever does occur, like fire, flood or theft, would an amateur know what to do? Who to call? These situations are so charged with tension and panic and making a wrong moves can lead to more damage. A professional helps design continuity / disaster plans, which show exactly what should happen, who should do it and in what order. It takes out the guesswork during the mayhem when issues occur and minimizes downtime. Perhaps more importantly, the expertly written disaster plan will include a complete risk analysis so that you know in advance in what areas to strengthen your protection. It also includes a business analysis so you know which systems are dependent so you can stop the domino effect, plus know the legal / contractual & financial impacts and so on.

Your IT professional will also help ensure your business is meeting any regulatory requirements. Many businesses are subject to strict data rules set by the government. These regulations change often and demand increasingly more attention to data security, with hefty penalties for businesses that fall behind. Professionals are constantly in the loop around upcoming revisions and how to best comply with little to no disruption to your daily business. Part of ensuring your business is safe means staying on top of security, software updates and patching multiple computers at the same time.

The best option is to run the updates before employees arrive for the day, and since the process can take a few hours and be quite fiddly, it is generally not something amateurs will prioritize and thus they can tend to forget them. Unfortunately, as we’ve seen with recent cyber-attacks, delaying a security update can lead to disaster. Engaging an IT professional is a cost-effective solution that keeps your business running, growing and earning.

Let the professionals manage your tech the right way by calling us at 08 8326 4364 or at support@dpcomputing.com.au.