As the nbn is rolled out many people are asking do I need to do anything? Do I need to switch to the nbn? Will I need to update my phone system etc. The fact is that as the rollout reaches your area every business needs to be ready to switch to the nbn.
Because it has been mandated that the following services will be terminated: Home/Landline services from Telstra and other providers, internet services that are ADSL, ADSL2, ADSL2+ and cable services from Bigpond and Optus.
How do you know and how long do you have to migrate?
From the moment your area is declared as nbn ready then you have 18 months to make the switch. You can check if your location is nbn ready here.
When your location is ready it is a great opportunity to assess new technology options such as VoIP. (Voice over the Internet Protocol). Some people are concerned with using internet-based phone systems due to the low sound quality and unreliability. Thanks to the NBN, that’s all changing.
In Australia, the internet is largely powered by a system of copper cables, which can result in slow downloading and uploading speeds, thus creating problems when making phone calls. Now, Australia is unleashing its NBN network, which will see the copper cables replaced with fibre-optic alternatives.
Fibre-optic cables can carry signals much faster than copper wires. As a result, internet-based phone systems will become more reliable, which is why now is a good time to consider switching to a VoIP phone solution. Essentially, thanks to VoIP, you can have clear conversations in real-time with anybody in the world, provided you both have an internet connection.
The Benefits of VoIP for Small to Medium-Sized Businesses?
From reducing your expenses to expanding your reach, here are the benefits of VoIP for small to medium-sized businesses in Australia.
Both the installation and running costs of a VoIP system tend to be lower than a traditional phone system. Because your VoIP is powered by your internet, you don’t need to install phone lines, meaning you’ll only have one bill for your internet usage and phone calls.
Distance is no obstacle when it comes to making phone calls with a VoIP system. If you have an internet connection, you can communicate in near real-time. You can use additional communication services like video conferencing.
As you grow you can scale your business with extra capacity as required. How? With VoIP, you simply need to extend your bandwidth. There’s no limit to the number of VoIP phone handsets you can use.
With a traditional phone system, you often pay an additional fee for features such as call forwarding, voicemail, call waiting, and caller ID. VoIP systems are flexible and cost effective when deploying extra services.
Learn More about Our VoIP Services
If you’re a small to medium-sized business that wants to cut costs, improve communications and be prepared to have a phone system that can easily be adapted to suit your unique requirements, you should learn more about VoIP for NBN. Call our experts today 1300 28 28 78 and we’ll gladly provide more information.
How to take the pain away by using Computer Troubleshooters?
Our network of offices has invested in becoming accredited nbn advisers. The benefits of using a nbn accredited adviser are:
Using a nbn business adviser will allow you to focus on your business with an adviser working through the challenges of your migration. They take the headaches on, as you remain productive in your business.
Minimise risk of disruption
Migration requires time and is complex, there are many pitfalls that can lead to delays and disruption to your ability to trade effectively. The adviser is across the technology and therefore can predict the issues and proactively avoid them ensuring your transition is completed in the quickest possible time.
Choices: choosing the right solution
The role of the adviser is to understand your business needs today and into the future. Those business needs should dictate the choice of the solution. The adviser can explain, simplify and help you understand how the solution meets your needs best. They provide the peace of mind that you are selecting the right solution.
Maximising the benefit of the nbn
The nbn will initially involve a change but it brings many more opportunities to digitise your business and transform it increasing your productivity and profits. Your local Computer Troubleshooters nbn adviser can help you identify and map the areas for digitalisation. Plan to benefit and transform.
The starting point is to call your local office on 1300 28 28 78 and follow the prompts to be transferred to your nearest Computer Troubleshooters office. Be proactive and act now and while at ask for a Security IT assessment for your business.
Whether you’re a start-up, a local, medium-sized business or a global corporation, you probably depend on applications such as Microsoft Word and Excel. Today’s work environment requires employees and businesses to be more collaborative and to be able to work on documents, files remotely, on multiple devices and at various times of the day.
The easiest solution to ensure your team can do what they need to do when they need to be ensuring you have deployed Office 365. If you haven’t migrated to Office 365, you might be using outdated and unsecure applications. Just as importantly, you’re missing out on the many business benefits that Office 365 has to offer.
What Is Office 365?
Office 365 is a suite of software applications by Microsoft Windows. They include Word, Excel, PowerPoint, Publisher and Outlook – most of which are used by many Australian businesses daily. Just a few years ago, you’d need to install each of these applications on every device you wished to use them, and the software would need to be replaced eventually with new versions meaning significant cost in upgrades and maintaining a licence register.
This is eliminated when you subscribe to Office 365, you pay for what you use on a per user basis per month. This give you capability to scale quickly and to remove people as required meaning you are in control of your cashflow.
Why Migrate to Office 365?
For businesses in Australia, Office 365 is beneficial for countless reasons. It improves data security, collaboration, productivity and more. Still wondering why move to O365? Here are the primary benefits in more detail:
Store documents in the cloud
Instead of saving essential documents on your hard drive, you can store them on OneDrive, Microsoft’s cloud storage solution. It is recommended that you still back up your files as part of your disaster recovery plan.
Access documents using any device with an internet connection
Because you can save your files in the cloud, you can access them using any device with an internet connection, regardless of your location. Microsoft has created its applications to be flexible so that you can work on documents using your computer, tablet or phone.
Ensure you always have the latest applications
Microsoft frequently releases software updates, security upgrades and patches for its Office applications. It is highly recommended that you discuss with your local Computer Troubleshooters location where for a small monthly fee they will ensure that all updates are installed on all devices your team are using. This means you’ll always be using the very latest version of your essential business applications.
Collaborate on documents in real-time
One of the best features of Office 365 is that it enables multiple users to work on the same document at the same time, boosting workplace productivity and communication while saving you time and money.
Learn ways to optimise core business processes
The powerful Office 365 suite has so many more elements than the traditional applications of Word, Excel and PowerPoint. There are extensive communication capabilities, there is the collaborative application of Microsoft Teams and even the capability of analysing data The result is that you can develop some invaluable insights regarding ways to streamline your business processes. If you want to learn more about the capabilities of Office 365, we encourage you to call us.
Learn More about Office 365
Office 365 comprises all the essential applications you need to run many of your core business processes, but it comes with the added benefits of improved security, communication, productivity and value. Instead of purchasing each application outright (which you’ll need to do periodically to remain on top of the latest developments), you can subscribe to the cloud-hosted suite of Office 365 applications and realise all the benefits detailed above. If you need help migrating or want to learn more about the advantages of Office 365, call us today on 1300 28 28 78.
Avoid hotspots when you are unsure if they are legitimate or not. Remember, one tactic commonly used by hackers is to create fake Wi-Fi hotspots. If you join such a fake hotspot then the hacker can gain access to your personal information and they can possibly access your files through file sharing.
Ensure once connected, that you turn off File sharing as this will limit access to your files. Remember tip #1 Public Wi-Fi – 6 Stay Safe Tips.
You’re at the airport, a coffee shop or in a hotel, and you need to meet a deadline. To achieve this deadline, you need to access Public Wi-Fi. It is convenient, but it comes with risk. This article provides some tips to reduce your risk.
Tip Number 1: Use Commonsense.
It seems logical, but a good starting point is to think about the type of data you are sending and receiving when connected to public Wi-Fi. Aim to avoid sending or receiving valuable or sensitive information when connected.
Checking your social media, reading articles are generally safe activities, but think twice about accessing bank accounts, using credit cards and downloading sensitive documents. Limit what you do.
Choose wisely when connecting to public Wi-Fi. Connect only in places where the organisation is known and established. For example, connect at the hotel in preference to the small café across the road.
Commonsense. Why would you share your files in a public space?
If you’re visiting sites, then make certain that they have encryption and are using the HTTPS// protocol. To do this check the hyperlink in the browser and be certain you can see the HTTPS.
Tip Number 3: Use a VPN (Virtual Private Network).
If you’re in business, then you should always be using a VPN solution. A VPN creates an encrypted tunnel that allows data to pass securely over Public Wi-Fi networks. This will protect you from outsiders attempting to spy on your online activity. This VPN makes it a lot more difficult for a hacker to track your movements and steal your information.
Tip Number 4: Disable Auto Connect.
To avoid automatically connecting to a Wi-Fi network and perhaps an unsecured one at that, disable the auto connect feature on your device. In addition, always when you have finished using the Public Wi-Fi network it is suggested that in settings you proactively select the option to “Forget this network”
Tip Number 5: Keep the Firewall Enabled.
Turning on a Firewall can prevent hackers from gaining unauthorised external access to your system. A firewall does not provide complete protection, but it is a setting that should always be turned on.
A Firewall actively monitors the data packets that come from network and checks whether they’re safe or not. If the firewall detects any malicious data packet the Firewall will block the delivery of that data packet thereby safeguarding your data from attacks
Tip Number 6: Take extra precautions to secure your devices.
No matter what device you are using (laptop, tablet or phone) ensure the device has a reputable anti-virus installed. Ask your local Computer Troubleshooter solutions expert about the latest options available.
Ensure your software has been patched with the latest updates and version of the software. Today we are living in a world that is facing multiple new threats daily. Consequently, software providers are always releasing patch updates to protect you and to avoid costly security incidents.
Consider the usage of two-factor or multi-factor authentication. This makes it very difficult for any hacker as they need access to your second levels of authentication devices such as your phone or your SMS inbox. This is gaining strong acceptance as more services are delivered through the cloud.
The above tips are the basis for ensuring that you reduce the risks of using public Wi-Fi and just may result in you not falling a victim of data theft. Most of these tips are simple, easy, relatively inexpensive and reduce the chances of cyber criminals gaining access to your valuable data.
The underlying aim is to make life very difficult for the Hackers, Crackers and Virus Attackers that lurk about looking for victims.
Washington-based tech giant, Microsoft, recently launched Office 2019 for Windows and Mac, the direct successor of Microsoft Office 2016. With this new on-premises suite comes new versions of Word, PowerPoint, Excel, Outlook, Publisher, Access, Project, and Visio. Determine whether or not it’s time for your organisation to upgrade by reviewing commonly asked questions about Office 2019.
About Office 2019 for Windows and Mac
Many Office users are apprehensive to make updates to their computers, and understandably so. From Office 2019 to Office 365, it can be difficult to stay up-to-date on Microsoft’s latest products. To help your organisation make a more informed decision on which version of Office to use, review the following FAQs.
Who should upgrade to Office 2019?
According to Microsoft, adopting the cloud is a journey that not every user is ready for. To accommodate those businesses and individuals who aren’t prepared to move to the cloud, Microsoft developed Office 2019.
Commercial volume license users can enjoy Office 2019 in September 2018, and all other users– both commercial and consumer– can upgrade in October 2018.
What will Office 2019 include?
Office 2019’s new features allow users to manage work more effectively and develop more impactful content. Some of the most notable Office 2019 features include updates to the following Microsoft programs:
Word:New text-to-speech and learning features, improved accessibility, enhanced inking capabilities, and black theme
Outlook:New focused inbox, updated contact cards, and @ mentions support
Excel: Enhancements to PowerPivot and PowerQuery, new functions, funnel charts, timelines and 2D maps
PowerPoint:Roaming pencil case capabilities, enhanced zoom, and 3D image management.
It is important to note that while Office 2019 is equipped with a subset of features available to Office 365 ProPlus users, it is not part of Office 365. Additionally, Office 2019 will not receive feature updates aside from security updates and bug fixes.
If you’re looking for a productivity suite that offers more features and delivers updates on a regular basis, consider upgrading to Office 365–a subscription service powered by the Microsoft cloud. Microsoft boasts that Office 365 is the most secure and productive option for users.
Does my organisation have to upgrade to Office 2019 for Windows and Mac?
Originally, Microsoft announced that as of October 13, 2020, all users would need Office 365 ProPlus or Office 2019 in order to connect to Office 365. The company has recently revised that policy and will continue supporting Office 2016 with Office 365 services through October of 2023. That being said, your organisation doesn’t have to upgrade immediately, but be sure to do so before the support deadline.
Will Microsoft release on-premises versions of Office after Office 2019?
Although Microsoft is focusing on cloud-based innovation, it acknowledges that customers are at different stages of the cloud adoption process. In order to support all customers until their move to the cloud, Microsoft will continue to release on-premises versions of Office.
For more information on Office 2019 for Windows and Mac, please review Office 2019 FAQs or contact your local Computer Troubleshooters office for consultation services.
Your local technology experts can help you or your business make a decision that best fits your needs and budget. Plus, we can help you plan and execute an upgrade strategy to ensure your data is backed up and secure.
This article has been sourced from the Computer Troubleshooters.com website and is written by Kim Weinberger National Director Business Development -Computer Services for Computer Troubleshooters Global.
As from the 22nd February 2018, all organisations in Australia that are regulated by the Privacy act 1988 are subject to the requirements of the act covering a data breach. An organisation is required to notify any individuals likely to be at risk of ‘serious harm” because of a data breach, together with the Privacy Commissioner.
In understanding an organisations requirement it is highly recommended that an organisation seeks legal advice and guidance from the Australian Government Office of the Australian Information Commissioner website
Which data breaches require notification?
The criteria is based around the term “likely to cause serious harm.” A breach occurs when personal information is held by an organisation is lost or subjected to unauthorised access or disclosure.
A device that is lost or stolen and contains customers personal information
The hacking of your databases that contain personal information
Where personal information is supplied mistakenly provide to the wrong person
If your organisation turns over 3 million then you have obligations under this act. This threshold applies to all types of organisations including Not for profit.
Note there are exceptions to the 3 million criteria and an organisation needs to seek advice as to whether they are coved by the act. If you do not turn over 3 million it does not mean you’re exempt as The Office of the Australian Information Commissioner website highlights some of the following exceptions to the 3 million threshold:
Entities that provide health services
Entities that trade in personal information
Credit reporting bodies
Employee associations registered under fair work
The above list is not exhaustive.
Assessing a data breach
If an entity has reasonable grounds to believe that it hasexperienced an eligible data breach, it must promptly notify individuals and the Commissioner about the breach, unless an exception applies
In contrast, if an entity suspects that it mayhave experienced an eligible data breach, it must quickly assess the situation to decide whether or not there has been an eligible data breach
An assessment must be reasonable and expeditious, and entities may develop their own procedures for assessing a suspected data breach.
Contain the data breach to prevent any further compromise of personal information
Assess gather the facts and evaluating the risks including potential harm to affected individuals and where possible taking remediate any risk of harm
Notify the individuals and the commissioner as required by the act.
Review the incident identify and consider the actions that can be taken to prevent future breaches.
Do you need a response plan?
In short it is good business practice for an organisation to have a response plan. The plan is a framework that sets out the roles and responsibilities involved in managing a data breach. It also outlines in a descriptive format of the steps an entity will take if a data breach occurs.
Your data breach response plan should be in writing to ensure that your staff clearly understand what needs to happen in the event of a data breach. It is also important for staff to be aware of where they can access the data breach response plan on short notice.
You will need to regularly review and test your plan to make sure it is up to date and that your staff know what actions they are expected to take. You can test your plan by, for example, responding to a hypothetical data breach and reviewing how your response could be made more effective.
Use this list to check whether your response plan addresses relevant issues.
This is a complex and confusing area of the law and all businesses should read widely and seek advice from the appropriate qualified personnel your legal representative.
Where does Compute Troubleshooters help you? We offer a range of services that are aimed at minimizing the risk associated with your organisation being impacted by a data breach. For more information contact your local Computer Troubleshooter on 1300 28 28 78.
Today’s business environment continues to move to the cloud and the associated cloud applications which entail a monthly subscription fee. Included in this trend is the continuing evolution of products and services with an increase in vendors and providers using a bundled approach that adds increased applications.
What happens in this situation is that often product and service names feed off each other. In the case of Microsoft 365, it is basically an extension and an increased bundle offering on the baseline product of Office 365.
I already thought I was using Microsoft 365?
Because the names are so similar and the fact that Office 365 is included in Microsoft 365, it is easy to see why businesses may think they have Microsoft 365 when in fact they only have Office 365.
Office 365 is a cloud-based suite of productivity tools including Outlook, Word, Excel, PowerPoint and other applications based on whether you have purchased the Essentials, Business or Enterprise packages.
Microsoft 365 is Office 365 plus Windows 10 Enterprise, Enterprise Mobility and Security. Microsoft 365 includes a simplified device deployment and user set up console.
How is Microsoft 365 paid for?
Both Microsoft 365 and Office are paid for by a monthly subscription fee. The fee payable depends on the number of users and the package level purchased.
If you are not certain which package you should buy, it is recommended that you seek assistance from your local Computer Troubleshooter who can, when talking to you, assess your needs and be able to determine which package you need to meet your specific circumstances.
Why Microsoft 365 over Office 365?
The key difference is that Microsoft 365 delivers an integrated platform that incorporates the office 365 productivity applications with the security of Windows 10. No more managing separate licenses and ensuring all your hardware has the latest versions.
Microsoft 365 has been built with small business in mind and the subscription-based model is very cost effective. A business owner can focus on their business while having the peace of mind that their data is protected, employees can collaborate, and communicate effectively anywhere on any device. This enables the business to grow without technology roadblocks.
Key benefits are:
If you are already using all the separate pieces then switching is an easy yes as it will be more cost effective, less time consuming and less expensive to manage.
Enhanced productivity of your team. By implementing Microsoft 365 they can more effectively collaborate with each other. Users can work on a variety of devices and they can be anywhere when working. The inclusion of Skype for Business can also mean you can still have meetings no matter where people are. This delivers enormous cost savings to a business in both physical costs and in minimizing the downtime of employees through travel.
What is the best way to implement a switch?
Nothing is as simple as flicking a switch, all products and services have a variety of setup and implementation requirements. It is highly recommended that to ensure the quickest and most effective change over that you look at working with an established Microsoft partner such as your local Computer Troubleshooter who backs their work with a 100% guarantee.
It is highly recommended that you look at incorporating ongoing support from your local Computer Troubleshooter through one of the many support plans provided. Remember that with continual issues around security you need to ensure that all your policies related to passwords, user access, and email access are current and being proactively looked after.
50% of the global workforce will no longer be linked to a physical desk by 2020. Employees will work from various places and require the ability to communicate, collaborate and access vital information from a range of devices with maximum security.
59% of employees expect that their employers will provide them with the state of the art technology and tools of the trade when looking to move to a new role. Small to medium Businesses can lead the way by ensuring they are providing their employees with tools such as Microsoft 365 or Office 365.
To make certain you are taking advantage of these local technologies call your local Computer Troubleshooter on 1300 28 28 78 for a chat about your challenges and needs.
According to the Australian Cybercrime Online Reporting Network, a snapshot for the period ending 31 March 2018, showed that the top three cybercrimes reported have not changed in the past 12 months. The three top cybercrimes are Scams 51%, Purchase scams, 22% and 7% cyberbullying.
The biggest age bracket that falls victim to cyber-crime has also not changed in the last 12 months. The age bracket most susceptible being, the 20-40-year-old age bracket with email, social networking and website advertising, as the three top targets of cybercriminals.
For the residential non-business person, it is important to continue to think of Mobile devices as mini computers. Mobile device users must use a password, be aware when using Wi-Fi networks and ensure that they log out at the end of a session. Spam filters and a reputable Anti-virus solution needs to be deployed across all devices.
Other factors to consider are ensuring that you do not open unknown links or attachments that arrive in an email, protect your passwords and do not give them out under any circumstances. Remember there are a lot of people who have false identities on the internet. They are not necessarily who they say they are.
Is it any different for Small to Medium Business?
The small to medium business environment continues to face the threat of cyber-security daily. The Stay Smart Small Business guide highlights that 59% of Australian organizations have their business interrupted by a cyber breach every month. Cybercrime reports indicate that 43% of all cyber-crime targets small to medium businesses and that 80% of hacking-related data breaches involve weak or stolen passwords.
This is no comfortable environment for small to medium businesses to operate in. Reports and statistics continually show that a small to medium business needs to have the right support in place, so they can have confidence that they can minimize and mitigate the risk of cyber-crime. This is where Computer Troubleshooters are well placed to provide this assistance and guidance to a small to medium business. Computer Troubleshooters have a range of proactive subscription-based plans on network security that target the needs of Australia’s small to medium businesses.
What’s the impact of a security breach?
A recent Telstra Security Report 2018 identified that the loss of productivity is the major impact followed by corrupted business data, loss of intellectual property, loss of reputation, loss of customers, loss of trust from customers and partners and increased stress to workers.
This is not new, but it highlights the need for businesses to adopt the approach of being alert, prepared and responsive.
What does alert, prepared and responsive mean?
Alert means that the business is aware of the importance of having a strategic and an action plan to ensure that it is minimizing and mitigating the risks to its business. It’s a constant discussion topic between the employees of the business and the owners, sharing of experiences take place. Policies are developed to minimize risk.
Prepared means undertaking steps such as developing an action plan, investing in a program of education for staff, conducting regular security audits so you’re aware of the risks, investing in software across the endpoints and network structures to minimise risks, implementation of a back-up solution, and engagement of a trusted technician to effectively support the organisation.
Responsive means that the organization has in place a proactive support plan that is provided by their trusted technology partner such as Computer Troubleshooters. Some elements that are being undertaken proactively are such things as patch management across all applications and operating systems, application whitelisting, management of administrative rights and network access, proactive policy implementation around password management, monitoring that the backup solution is working, implementation of the latest technologies and processes such as two-factor authentications.
How can Computer Troubleshooters assist you with Cybersecurity?
Start with a security audit and discussion about your business security needs. Seek information from a local expert who can guide you through the key questions you need to address for the size of your business.
Review the plan options around the Total Protection Plan, incorporated with a Microsoft Office 365 discussion, understand the backup options and finally ensure you have monitoring and at least patch management included in your plan to minimize the risk of a cybersecurity breach.
The Office Australia Information Commissioner Quarterly report identified that the biggest source of reported data breaches was caused by Human error, closely followed by malicious or criminal activities. The message is, do not forget to educate your staff.
Voice communications over the Internet Protocol (VOIP) delivers a range of benefits to businesses when looking at the challenge of Business communications. The key benefits that have driven the growth of VOIP are cost-savings, efficiency flexibility, and scalability.
Francisco Soliano JR Managing Director of Computer Troubleshooters East Perth sees “the biggest factor for clients in deciding to implement a VOIP system is cost-effectiveness and the speed with which a system can be deployed minimizing disruption to the business.”
A solution for communication needs to cover smartphones, landline communications and video conferencing, hence the term Unified Communications is often used when discussing a solution.
What are some of the trends impacting communications?
The introduction of modern technologies continually changes the way society acts, expectations and behavior. Think how the introduction of email has disrupted traditional mail, the introduction of the mobile phone and wireless technologies have all impacted on the way we communicate and act.
Some of these changes are:
The need to be constantly and immediately available, when we call somebody we expect an immediate response. Expectations are you can be reached anytime, anyplace from anywhere.
Technology is constantly developing and becoming increasingly available at a value that most businesses can afford. What this means is that more and more functionality and sophistication is available to smaller and medium-sized businesses.
The cloud enables people to be able to access their data (work-related files) and applications wherever they are. This increases productivity and flexibility within organizations it also allows organizations to unify all their hardware and software.
The usage of chat and messaging tools is becoming more prominent in businesses. These tools are underpinning how organizations think of the customer experience with the aim to be more customer focused. What is important though that these tools become integrated as part of the communication systems and the data is kept for reference. Quicker and easier than email means less time spent on communications equals an increase in productivity
Voicemail is not quick enough and often you repeat yourself when the person calls you back. In a lot of cases, they have not even listened to the message. Repeating yourself. Often this is where messaging somebody can be more effective.
Communication capabilities can be integrated rather than having disparate solutions. If it’s integrated using a simple package, then you can move seamlessly from application to another without loss of time.
The price and capability of the technology continue to come down meaning it is a viable option no matter what your business size is.
Improved quality of picture and audio when undertaking virtual conferencing means that more and more meetings across all areas of a business operation are being held. This delivers real and significant savings to an organization in today’s competitive landscape.
What does this mean for a business today?
It means that if you have not at least assessed the area of VOIP and Unified communications then you may be limiting the capacity and viability of your business to compete against your competitors.
The starting point is to have a discussion with your IT provider about Unified communications and understand what your options are. One consideration in the discussion is the whole issue of security of your networks. Why? Because if using a VoIP then the solution sends the calls through the same path your network used for internet and other traffic. This naturally increases risk hence the conversation needs to cover security.
How can Computer Troubleshooters assist?
The local computer troubleshooter can consult with you about your requirements and then assist you in selecting a provider and then assist in the changeover. Computer Troubleshooters East Perth Managing Director Francisco Soliano Jr recommends the Fonality solution because of the ease and speed of deploying the Fonality system. Effectively the handsets are pre-configured and in effect, it’s a plug and play system. The costs are clear and the flat fee model of Fonality makes it easy to understand the costs and the returns.
Call 1300 28 28 78 to locate your nearest Computer Troubleshooter for a discussion on your needs.
Virtually every day, Computer Troubleshooter’s engineers receive an inquiry from small business clients and residential customers asking for assistance with recovering data files. By the time they call, panic has set in as they fear that they have lost their valuable information. The client is often willing to do anything to recover the file and the valuable information contained in the file.
In today’s environment clients are constantly storing data in digital format using a variety of devices. The risk of human error is ever increasing, and it is a known fact that over a quarter of data recovery requests are a result of human error.
Customers are often relieved when they hear that accidentally deleted files have the greatest chance of being successfully recovered. It is still a complicated process and often involves using data recovery software to achieve the recovery. Data recovery software is required to examine the storage of the computer to find the remnants of the deleted data files and then extract them back into a recognizable form.
Computer Troubleshooters recommend that if the information is valuable then you should have a data backup solution in place. This applies to residential clients as much as business clients. Key elements of this solution today are to include a cloud storage element enabling you to recover files quickly and efficiently. Computer Troubleshooters also recommend that the solution needs to include regular maintenance checks confirming that your data has indeed been backed up. Look at our affordable monthly subscription plans.
What to do if you accidentally delete a file?
Don’t Panic – we recommend that you keep the computer turned on, and all applications open while you investigate the simple solutions below:
Deleted Items– if an email, check the deleted items folder (it is generally near your inbox) this holds all deleted emails until you close your email application. If you can see your deleted file in the deleted items folder just click & drag across back into your inbox. File restored.
Recycle Bin– if the file deleted was a document or image file, check the recycle bin, which has an icon that is generally found on your desktop, click on the icon, it will show you deleted files that are awaiting permanent deletion (generally these are deleted when the computer powers off), just click and drag back to your desktop.
AutoSave–applications such as word and excel have an Autosave function that can sometimes save an automated version copy. Within the application click on the top left Office button which will show a menu that includes an item such as Word Options & Save Options, this will generally show the autosave settings and the file location of the autosave directory. You can then go to the indicated location and recover the deleted file (this may vary depending on which version of Office is installed).
File Search– Use the Microsoft Search function located in the Start Button (on the bottom left) to try to find your file as you may have saved into the wrong directory or you may find an older version.
If you tried these simple solutions with no luck, then it may be time to get serious,
Restore Backup Files– if you have a backup in place you should be able to restore the file back on to your main computer hard drive. Of course, it will only be a version available from the last time you backed up. It will depend on where and what software you are using for your backup as to how this needs to be done.
Software Retrieval – this will mean you need to consult a professional to use data recovery software to interrogate your drive, find, & restore your deleted files. Do not run any disk cleanup or defragmentation tools in the interim as these will overwrite drives which may contain your deleted files. Call your local Computer Troubleshooters for this professional service.
No file found – of course, we do find times when even we can’t retrieve an accidentally deleted file, that’s when we call in our data recovery partners. Our data recovery partners have specialist equipment, software and use dedicated data recovery technicians to extract hidden data.
After completing the above procedures you may have recovered your deleted files. Of course, being proactive about protecting your data is always the best protection. Back up regularly whether it’s for your business or your personal data. Denial is not a river in Egypt.
Even with a tested and reliable backup system, sometimes unexpected accidents can still happen. 74% of data recovery involves physical damage or corruption which can happen to all data storage devices including hard drives, cell phones, and memory sticks.
For the more sophisticated problems we can use our Data Recovery Partner for the following specialized data recovery services:
Hard Drive Recovery: Hard drives are becoming increasingly less common in laptops. External storage devices are in greater use but are at greater risk of being dropped, damaged and compromising your data.
SmartPhone and Flash Drives: Flash drives are no moving drives problems such as deleted files, corrupted partitions, file system damage and physically damaged devices can be remedied by their recovery experts.
Notebooks, Tablets, Digital Cameras and MP3 Players: recovery services for Notebook PCs and Tablets. Damaged image or audio files can also be recovered.
Computer Troubleshooters is Here to Protect You and Your Data
If you have accidentally deleted files; don’t panic, if approached logically the deleted files can generally be retrieved.
If you need for help recovering a deleted file, or more serious data recovery services, or assistance in establishing solution call Computer Troubleshooters and one of our technology professionals can help you.
Ho Ho Ho – Have a virus-free Christmas and a malware free New Year. It’s only a few days and holiday season will be with us. At this time of year, we often see an increase in malware activity and clients concerned about shopping online. This article is intended to help our clients and prospective clients stay virus free. Christmas has always been a virus author’s paradise, and a computer user’s nemesis.
The short-history of Christmas malware.
“Christmas Tree” (AKA Christma Exec) was spread in December 1987 and was an email-aware worm.
In 1990 the same worm resurfaced and forced IBM to shut down its network of 350,000 terminals.
Christmas 1999 saw the Melissa virus spread via email. It infected computers and Microsoft word documents, as well as attempting to reformat the C: drive.
At the same time, a game was being widely spread by email. “Elf Bowling” where Santa tried to knock down a pack of elves with a bowling ball. This game, of course, was infected with a virus.
At Christmas 2000 the Navidad virus spread via email masquerading as an electronic Christmas card.
Christmas 2001 saw a similar methodology to spread the Maldal virus.
The Zafi virus spread in 2004. Spreading fear rather than cheer.
Christmas 2007 saw the Dorf or Storm worm posing as a sexy striptease by Mrs. Claus.
Christmas 2009 saw the Koobface worm, which targeted users of Social networks like FaceBook.
To skip a few years for the sake of brevity and the risk of boring our readers, we can see that these threats have not gone away. In fact, with Ransomware being the cyber criminal’s weapon of choice these days has seen significant growth creating more headaches than before.
2017 saw the merry Christmas ransomware distribution. After detonation on a user’s system, the Ransom note would be presented with a picture of Santa standing next to a bomb saying that all your computer data is encrypted and unless you pay within a defined time that all your files would be deleted. This was way more serious than a relatively harmless card we saw some 30 years prior.
Hints for Staying Safe and Virus free.
Don’t let your guard down just because it’s the festive season – Hackers, Crackers and Virus attackers prey on those that do.
When you start back at work, most people just want to open their email and deal with the deluge. Because malware is often spread by email, it’s a better idea to ensure your Antivirus and Operating System patches have updated first.
Similarly, If you wake up to a new computer under the Christmas tree, don’t forget to put it through a security update and to install anti-virus software before you get busy online. (Even if the update takes several hours, it’ll spoil your fun a lot less than being owned by a hacker before lunchtime.)
Social media users love to spread hoaxes, especially during the festive season. Before you press that share button think. If in doubt go to the Hoax-Slayer website (hoax-slayer.com) and check it out first. Nobody gives away free Range Rovers just for a like and your private email address and phone number. Many think a hoax competition does no harm other than wasting everybody’s time. Maybe you should think about it carefully as now some low-life cybercriminal has your personal contact details with which to direct further attacks.