call us 07 3333 2228

Tech Talk

Periodic Notes – we hope you will find useful

The familiar USB is to be replaced with a new type of USB Type C

At this point you just need to be aware it will effect available connections on new equipment.

For most users, the move to USB Type C will be a positive, because it will offer simpler peripheral connection while ultimately reducing costs. The process of migration may cause issues, but with a bit of forward planning you should be able to avoid the worst problems and sort your way through the hype to come.
USB Type C promises to further simplify the market by creating a single connection standard for peripheral devices, displays, and power connections.
The complication is that there are multiple device connections that use the same physical connector—and not all of them are compatible.
Here’s the secret: If you start buying equipment and peripherals now, make sure that you’re buying products with the most up-to-date version of USB Type C.
Issues occur when you try to incorporate older devices into newer systems without educating users and staff. Keep your systems up to date and educate your users on the necessity of having any legacy devices checked out by ITMasters staff before being connected to a NEW workstation and you won’t have any problems.

Newer laptops equipped with USB Type C will allow you to have:
•    External displays that can easily be re-deployed across every device you procure.
•    Printers, input devices, two-factor authentication scanners, and other peripherals that work across your  entire hardware structure.
•    Auxiliary batteries that can work for both laptops and mobile devices.

The days of having to keep separate peripheral inventories for each device type you use are coming to an end. Your transition to the new peripheral USB Type C connection will be as smooth and cost-effective, if you follow three simple steps:
•    Buy the right equipment.
•    Educate your users.
•    Make sure that legacy peripherals are kept to limited applications with careful use instructions.

Need advice on new IT projects? Want tips for speeding up your network?
Call IT Masters now on (07) 3333 2228  or email info@itmasters.net.au.

Back Ups

Data is the core of your business.  The effects of data loss can be catastrophic so it is crucial to ensure your critical data is protected.  Backups are the most important line of defence against data loss but as they are inconvenient and require time to manage, they are often overlooked or given a low priority.

By backing up files you are insuring against loss of data from accidental deletion, database corruption, hardware failures, viruses, hacking, ransom ware and even natural disasters.   A successful data backup and recovery plan consists of multiple steps and will ultimately depend on the type of data you are backing up and how convenient you want the recovery process to be.

The core issues driving your back up plan will include capacity, reliability, extensibility, speed and cost.   Here are the answers to some questions to assist in the developing the right back up strategy for your business:

How important is the data on your systems?

List all the applications and data that are fundamental to your business (for example, email, accounting systems, databases, documents etc) and then rank them in priority order.  For critical data you may want to setup several back up periods.  For less important data you won’t need such an elaborate plan.

How often does the data change?

How often the data changes will affect your back up frequency.  If your data is changed daily then it should be backed up daily.   The time between backups should be no more than the time you are willing to spend re-doing any lost work.

Do you have the equipment to perform data backups?

To perform backups you will often require dedicated backup hardware and specialised backup software such as Shadowprotect or CA Arcserve.  You may need several devices and sets of backup media depending on how critical your data is to your organisation.

How quickly do you need to recover the data?

To answer this question, you need to know how long can your business survive without access to your data. This will have a big influence on the backup technology you implement.

Who will be responsible for the backup and recovery of data?

A task as important as backups should not be left to chance.  Backups need to be checked regularly to see if they ran successfully and the files should be checked to ensure they were backed up successfully.  The integrity of the backup files should be tested on a regular basis by performing a test restore.  You cannot have confidence in the accuracy of your backups and that it will actually work when needed unless the validity of your processes are monitored and tested frequently.

How do you store your backups offsite?

Your backups will always be vulnerable unless you include secure offsite storage of a complete and up-to-date copy of your data.  Offsite backups give you additional protection when compared to local backups such as protection from theft, fire, flood, earthquakes, hurricanes and more.

Researching, implementing and managing a backup system that meets the requirements listed above can be a daunting task. IT Masters offer a range of monitored onsite & remote backup solutions to secure your data.

Our systems include both onsite backup for quick recovery of files and remote backup for disaster recovery. All your backups are monitored on a daily basis and test restoration of data can be completed on a routine schedule, so you can get on with running your business.

To develop a comprehensive back up policy for your business call IT Masters now on (07) 3333 2228  or email info@itmasters.net.au. 

All about Passwords

Why are passwords so important?

Quite simply, passwords are important because they protect our personal and professional information. We may find them annoying but they are often the frontline of protection against hackers and a critical part of our computer security. If you use a computer that is connected to the internet then password security is essential and should not be ignored. Here are some tips for creating strong passwords. Please review them and think about reinforcing some of your passwords if they fall short.

 In general, a strong password has the following attributes:

  • a minimum length of eight (8) characters; and
  • a mix of upper and lower case letters ; and
  • at least one numeral; and
  • at least one non-alphanumeric character such as such as ! $ * % @ # & -;

A weak password increases your vulnerability to hackers so avoid passwords that are easy to guess or crack.

Here are a few tips on what to avoid:

  • DON’T use dictionary words (mackerel, dandelion, millionaire)
  • DON’T use foreign words (octobre, gesundheit, sayonara)
  • DON’T use simple transformations of words (tiny8, 7eleven, dude!)
  • DON’T use names, doubled names, first name and last initial (mabell, kittykitty, marissab)
  • DON’T use Uppercase or lowercase words (MAGAZINE, licorice)
  • DON’T use an alphabet sequence (lmnop) or a keyboard sequence (ghjkl;)
  • DON’T use words that have the vowels removed (sbtrctn, cntrlntllgnc)
  • DON’T use passwords that increment (Password1, passsword2, password3…) are not strong.

Never give out your password or any personal details to anyone. A password should be known only to you as it provides access to your personal and professional information.

The advice from Apply and Microsoft these days is to use the initials of a song or phrase that you can easily remember but others are unlike to guess. For example…I like Paris in the Springtime could be iLp!t5@*… Or Somewhere over the rainbow can be 5w0Tr8oW. Please do not use these examples.

 

Of course, while a strong password is an important security tool, your password could still fall into the wrong hands. Hackers can still get your password or evade it completely by using sophisticated software tools or by tricking you into disclosing your passwords with email confirmations and requests (phishing).

In addition to maintaining a strong password you should always employ good security systems. Your work and home computers should be protected with good antivirus and antimalware programs and always stay away from bad sites. If you go to a website where you can download illegal software , use torrents or visit dirty sites etc. you are much more likely to be hacked. Also, be wary of using passwords on public computers or when you are connected to a public wifi account. Public computers may not be secure(airports, internet cafes etc.) – they could have key-logging software installed and may be recording your password as you type it. Also, with public wifi, others who are connected to the same wifi have the potential to watch your activity so be careful what you do.

If you think any of your online passwords have been compromised, change them immediately. If you think your computer has a virus or malware, immediately change your online passwords on a different uninfected computer. Do not enter any passwords on your infected computer until it has been cleaned.

Every organisation should have an Internet Acceptable Use Policy or Password Security Policy for users of their computer systems. If you would like a copy of IT Masters Internet Acceptable Use Policy to adapt to your organisation please email Cath at cathb@itmasters.net.au . We would be happy to share this with our customers.

 

References

Microsoft Safety and Security Centre – Creating strong passwords
http://www.microsoft.com/security/online-privacy/passwords-create.aspx

The Simplest Security: A Guide To Better Password Practices
http://www.symantec.com/connect/articles/simplest-security-guide-better-password-practices

Factsheet 15 – Understanding password security – Stay Smart Online
http://www.staysmartonline.gov.au/__data/assets/pdf_file/0020/19523/F15_password_security.pdf

Montana State University – Good Password Practices FAQ
http://www.montana.edu/itcenter/computing/desktop/password.php