Skip to main content
Category

General

Recording: Creating engaging videos with PowerPoint

By Education, General, Latest News, Microsoft No Comments

In partnership with Standout Education, we are delighted to deliver this free PD to all WA schools.

Did you know PowerPoint allows you to make videos? You can record and narrate a PowerPoint slide show, but you can also record any other app, website or use your computer’s camera.

Standout Education have developed a wide range of videos and resources for schools and colleges. Please find Standout Education’s YouTube channel here

 

Remote support for your school, and for the parents & students

Windows 7 End Of Life

By Commercial, General, Latest News No Comments

What does end of support mean?

When Windows 7 reaches end of support on 14 January 2020, your computer will still function but Microsoft will no longer provide the following:

  • Technical support for any issues
  • Software updates
  • Security updates or fixes

While you could continue to use your PC running Windows 7, without continued software and security updates, it will be at greater risk for viruses and malware. Going forward, the best way for you to stay secure is on Windows 10. And the best way to experience Windows 10 is on a new PC. While it is possible to install Windows 10 on your older device, it is not recommended.

What can I do to prepare?

From backing up your files to finding a computer that fits your needs,  there are tools to help you transition with ease.

1. Check out the latest PCs

Not only are new modern PCs fast (thanks to solid state drives) and durable with batteries that last longer, the average price for a great PC is considerably less than it was 5-10 years ago.

2. Back up your files and photos

Save your personal files and photos to OneDrive or to an external hard drive. Follow this link to learn all the different ways to move your files.

3. Get tips on Windows 10

We think you’ll feel right at home on a new PC with Windows 10, but if you have any questions or want to learn more, we have lots of tips and tutorials available.

4. Book a Windows 7 Audit

If you want confidence to be  ready for the change over, it is highly recommended that you book an audit. We will audit your devices and systems and provide you with a plan for the chenge over.

LEARN MORE

Trent Ray

#WAES Presentations

By General, Latest News No Comments

Presentations for the WA Education Summit 2018 below. Click to download.

 

Trent Ray: Trends in Education

Trent Ray: Assessing for Future Skills

Chris McNamara (MGG) : Designing Schooling for Student Autonomy

Mary-Lou O’Brien (MGG):  Pushing Digital as a Core Company Value

Tamara Sullivan (Ormiston College): Leadership Action Matter – It Begins With You!

Melissa Marshall (Santa Maria): Gamification in Schools – with or without technology

Leigh Treacy (Fortinet): Notifiable Data Breach Scheme 

Ian Curlewis (Lavan): Privacy Act Breaches 

James Manson (Webroot): Webroot Threat Landscape

Michael Richards (Microsoft):  Securing a Microsoft Environment in the Cloud

Jason Byway (Microsoft): Managing Devices

Anthony Spiteri (Veeam): Intelligent Data Management for the Hyper-Available School

Should you have any issues in accessing these files, please contact us for help.

WAES Sponsor Special Offers

 

Lenovo

Minimum 10% off all Education RRP. Contact us for more information.

Microsoft

STEM OFFER. Offer ending Dec 31st

Fortinet

WAES delegates can access a Free Cyber Threat Assessment  for their schools- see an example report here

Veeam

3 month free licences for Veeam Backup for Microsoft Office 365 and Veeam Agents for Microsoft Windows and Linux: https://www.veeam.com/veeam-special-offers.html

Webroot

20% off new schools with a 250 seat minimum order. Offer ending in Dec 31st. Contact us for more information.

Vivi

Keen to try out the Vivi’s screen mirroring technology used at the WA Education Summit?  Contact us to discuss how you can take advantage of their free in-school trials.

ClassVR

FREE access to the ClassVR Teacher Portal until December 2018 (Valued up to $749) when purchasing a ClassVR Headset

Solutions IT – Zuludesk

FREE training session (valued at $450) per school when purchasing Zuludesk

ransomware

Ransomware

By Commercial, Company, General No Comments

Your how-to guide for protecting yourself against malware.

With the advent of information technology and the internet, came an almost limitless potential for technological advancement and improvements in efficiency in business. Unfortunately, there are two sides to every story. Rapid advancements in technology and how we use the internet have also been accompanied by a host of dangers any internet user would do well to be wary of. This includes malware such as ransomware. Read on to find out some useful tips on how to protect yourself against this malware and limit the risk of losing access to your data.

 

 

What is ransomware?

Malware is a type of software that is specifically designed to get access to or damage your data without your knowledge. Ransomware, in particular, is a type of malware that prevents users from accessing data, by either locking the system’s screen or files. In order to regain access, a ransom has to be paid.

 

More modern versions of ransomware, collectively classified as crypto-ransomware, encrypt certain files, forcing users to make online payments in order to get a decrypt key and restore access to their system.

 

The consequences of becoming a victim of crypto-ransomware and not having the necessary safeguards and mitigation strategies in place are significant. Where small businesses are concerned, such an attack could mean the end of your business.

 

 

Protecting yourself

All is not lost and there are precautions every user can take to limit their exposure to this malware.

 

  • Use and implement proven multi-vector endpoint security

Your first line of defence is the security system you have in place. It is critical that it offers multidimensional protection and prevention against malware, quickly recognising external threats and any suspicious behaviour. A next-generation endpoint security solution is recommended, offering protection beyond file-based threats.

 

  • Prepare for the worst case scenario with robust backup

While next-generation endpoint security is important for your system’s security regime, it is not completely fail-proof and can still fall prey to crypto-ransomware infections. Ensuring you have comprehensive backup together with a business continuity plan that will allow you restore data and minimise business downtime. This entails more than just your standard backing up to an external drive. It should include back up that is located in at least three different locations:

 

  • Main storage area (file server)
  • Local disk backup
  • Mirrors in a cloud business continuity service

 

  • Keep Windows updated

While occasionally tedious, keeping Windows up to date will ensure that a number of infections are instantly ruled out. In addition, you can reduce workload by putting in place a patching routine – a security fundamental.

 

  • Keep all plug-ins up to date

Keeping all third party plug-ins updated to their latest build lessens the likelihood of being exploited by ransomware.

 

  • Use a modern browser with an ad blocking plugin

Modern browsers like Chrome and Firefox are constantly being updated to offer more robust protection. They also give the option to add plug-ins that will make you more secure. Even simply having a pop-up blocker running can offer some protection.

 

  • Disable autorun

Autorun is convenient, however, it is helps malware spread across a corporate environment. Disabling autorun as a policy will bolster your system’s security.

 

  • Disable Windows Scripting Host

VBS are Microsoft scripts used by malware authors to either disrupt an environment or run a process that will download more advanced malware. Disable them completely by disabling the Windows Scripting Host engine.

 

  • Have users run as limited users and NOT admins

This is critical because some current ransomware threats are capable of browsing and encrypting data on any mapped drives that an end user has access to. Therefore restricting the user permissions for the share or the underlying file system of a mapped drive will limit ransomware’s scope for encryption.

 

  • Show hidden file extensions

One way ransomware like CryptoLocker and others frequently arrive is in a file named with the extension ‘.PDF.EXE’ or something similar. If full file extensions are visible such files will be easier to spot and remove accordingly.

 

Coping with infections

Don’t worry if your organisation has unfortunately already been infected. Take the following steps to limit the damage done to your systems:

 

  1. Isolate the PC(s) immediately to stop further infection.
  2. Do not begin re-imaging process until the infection is categorised.
  3. Contact the endpoint security vendor’s support staff to assist you with completely removing the infection.
  4. Check if user data was encrypted as soon as possible.
  5. Alert other employees if this was a targeted attack, or about the threat vector, if appropriate.

 

We hope you have found this brief guide useful and will adopt some of these precautions and general tips to protect yourself and your business from online extortion.

 

Solutions I.T. has been providing Western Australian organisations with a comprehensive range IT solutions since 1999. Our strict adherence to industry best practice, ensures our clients are granted access to the most effective solutions available. For premium IT services, the best-fit technology and excellent customer support, contact our friendly team today.