Skip to main content



The Age Of Digital Transformation Is Upon Us

By Commercial, Company, Latest News No Comments

Digital Transformation (DX) is not on the horizon. It’s here, and it’s already making an impact on a growing range of industries. Organizations that want to stay in business can no longer afford to pretend DX is a trend. It is fast becoming the norm for organizations of all sizes. Today’s customers are digitally savvy and require instant everything. Any organization that doesn’t offer digital solutions risks losing business to the competition.

According to a recent IDC report, “One-third of the top 20 firms in industry segments will be disrupted by new competitors within five years,” meaning it’s a case of “transform or perish.” The importance of DX initiatives for business success is clear, yet IDC predicts that, by 2018, “70 percent of siloed digital transformation initiatives will ultimately fail because of insufficient collaboration, integration, sourcing or project management.”

DX will transform the customer experience and, in the process, every company vying to serve those customers. Which is why organizations need to be proactive in every step of their DX strategy. But crucial to any successful DX initiative is ensuring every employee has the right tools at their fingertips to deliver a remarkable customer experience with every interaction.


  1. Enabling workers to be mobile and productive

…means putting flexible systems in place to enable every end user to work effectively and in a manner that suits their needs, whether they’re in a traditional office, a group-work social space, on the road, or working from home

  1. Streamlining internal operations

…leverages advanced technology solutions such as virtualization to provide better system uptime, allow more IT flexibility, and enable better hardware utilizatio

3. Ensuring seamless collaboration

…is a crucial component of DX, giving local and remote workers ready access to the tools and technologies they need in order to do their jobs from start to finish

To achieve these objectives, organisations must develop and execute the right DX strategy. They need to create an environment that empowers the entire workforce to better serve the customer at every opportunity. They then need to provision that workforce with the devices they need to improve the flexibility, capability, and productivity of each and every user across the organisation, and Solutions IT can help with such a strategy.

Has your business implemented a Dx strategy? Learn more and talk to one of our business consultants today

A Managed Service for Amity Health

By Case Study, Commercial, Company, Latest News No Comments

Amity Health is a not for profit organisation that has delivered a range of healthcare services to rural and remote areas of the Great Southern for over 20 years.

The organisation is a long-term partner of Solutions IT and has grown considerably since they first became a client. From a standalone practice in the heart of Albany, the organisation now has 6 locations and over 60 staff, 20 of which are based remotely.

Having a mix of onsite and remote support has allowed us to keep costs down. We don’t always need someone onsite and it’s great to get a quick fix to an issue remotely via the helpdesk when needed. However, due to our complex organisational needs, having a real person who knows our systems, someone who can also help us plan, is very valuable to us too. We get the best of both”, says Sian Bushell, Office Manager.

In 2015, the office in Albany moved premises to accommodate their growth. Being a trusted partner, Solutions IT was a critical part of the planning phase. Sian recalls,we were out of the old premises on the Friday, and fully operational, running clinics at the new building on the Monday morning. Our IT systems are critical to our operation so we were delighted with how smooth the transition was”.

In late 2017, now with 5 remote locations, Amity Health needed a better way to access and manage their email and shared files, “our account manager Stuart suggested we migrate our email to ‘the cloud’ to offer a better experience to our remote users”. The staff were using a remote connector to access their emails and were finding it clunky and slow.

Solutions IT migrated their accounts to Office365 which freed up their server and gave a faster and more enhanced experience to their remote users.

The next phase to this project is to use OneDrive to store all our shared documents. This will help with version control and enable our remote users to access documents when and where they need to. What is also appealing about Office365 is being a not-for- profit organisation, the license fees are heavily reduced and this means we will experience savings for years to come.”

We are very happy with our support package. Solutions IT knows our organisation, they are our own IT department. They keep our organisation protected and efficient. No matter the need, they will always try to find the solution!”




By Commercial, Company, General No Comments

Your how-to guide for protecting yourself against malware.

With the advent of information technology and the internet, came an almost limitless potential for technological advancement and improvements in efficiency in business. Unfortunately, there are two sides to every story. Rapid advancements in technology and how we use the internet have also been accompanied by a host of dangers any internet user would do well to be wary of. This includes malware such as ransomware. Read on to find out some useful tips on how to protect yourself against this malware and limit the risk of losing access to your data.



What is ransomware?

Malware is a type of software that is specifically designed to get access to or damage your data without your knowledge. Ransomware, in particular, is a type of malware that prevents users from accessing data, by either locking the system’s screen or files. In order to regain access, a ransom has to be paid.


More modern versions of ransomware, collectively classified as crypto-ransomware, encrypt certain files, forcing users to make online payments in order to get a decrypt key and restore access to their system.


The consequences of becoming a victim of crypto-ransomware and not having the necessary safeguards and mitigation strategies in place are significant. Where small businesses are concerned, such an attack could mean the end of your business.



Protecting yourself

All is not lost and there are precautions every user can take to limit their exposure to this malware.


  • Use and implement proven multi-vector endpoint security

Your first line of defence is the security system you have in place. It is critical that it offers multidimensional protection and prevention against malware, quickly recognising external threats and any suspicious behaviour. A next-generation endpoint security solution is recommended, offering protection beyond file-based threats.


  • Prepare for the worst case scenario with robust backup

While next-generation endpoint security is important for your system’s security regime, it is not completely fail-proof and can still fall prey to crypto-ransomware infections. Ensuring you have comprehensive backup together with a business continuity plan that will allow you restore data and minimise business downtime. This entails more than just your standard backing up to an external drive. It should include back up that is located in at least three different locations:


  • Main storage area (file server)
  • Local disk backup
  • Mirrors in a cloud business continuity service


  • Keep Windows updated

While occasionally tedious, keeping Windows up to date will ensure that a number of infections are instantly ruled out. In addition, you can reduce workload by putting in place a patching routine – a security fundamental.


  • Keep all plug-ins up to date

Keeping all third party plug-ins updated to their latest build lessens the likelihood of being exploited by ransomware.


  • Use a modern browser with an ad blocking plugin

Modern browsers like Chrome and Firefox are constantly being updated to offer more robust protection. They also give the option to add plug-ins that will make you more secure. Even simply having a pop-up blocker running can offer some protection.


  • Disable autorun

Autorun is convenient, however, it is helps malware spread across a corporate environment. Disabling autorun as a policy will bolster your system’s security.


  • Disable Windows Scripting Host

VBS are Microsoft scripts used by malware authors to either disrupt an environment or run a process that will download more advanced malware. Disable them completely by disabling the Windows Scripting Host engine.


  • Have users run as limited users and NOT admins

This is critical because some current ransomware threats are capable of browsing and encrypting data on any mapped drives that an end user has access to. Therefore restricting the user permissions for the share or the underlying file system of a mapped drive will limit ransomware’s scope for encryption.


  • Show hidden file extensions

One way ransomware like CryptoLocker and others frequently arrive is in a file named with the extension ‘.PDF.EXE’ or something similar. If full file extensions are visible such files will be easier to spot and remove accordingly.


Coping with infections

Don’t worry if your organisation has unfortunately already been infected. Take the following steps to limit the damage done to your systems:


  1. Isolate the PC(s) immediately to stop further infection.
  2. Do not begin re-imaging process until the infection is categorised.
  3. Contact the endpoint security vendor’s support staff to assist you with completely removing the infection.
  4. Check if user data was encrypted as soon as possible.
  5. Alert other employees if this was a targeted attack, or about the threat vector, if appropriate.


We hope you have found this brief guide useful and will adopt some of these precautions and general tips to protect yourself and your business from online extortion.


Solutions I.T. has been providing Western Australian organisations with a comprehensive range IT solutions since 1999. Our strict adherence to industry best practice, ensures our clients are granted access to the most effective solutions available. For premium IT services, the best-fit technology and excellent customer support, contact our friendly team today.