<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT Support Archives - Over the Wire</title>
	<atom:link href="https://overthewire.com.au/tag/it-support/feed/" rel="self" type="application/rss+xml" />
	<link>https://overthewire.com.au/tag/it-support/</link>
	<description></description>
	<lastBuildDate>Wed, 28 Aug 2019 03:00:44 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://overthewire.com.au/wp-content/uploads/2019/04/cropped-OvertheWire-favicon-32x32.png</url>
	<title>IT Support Archives - Over the Wire</title>
	<link>https://overthewire.com.au/tag/it-support/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>5 ways your business can prevent email compromise</title>
		<link>https://overthewire.com.au/5-ways-your-business-can-prevent-email-compromise/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Tue, 10 Apr 2018 05:32:54 +0000</pubDate>
				<category><![CDATA[Security & IT Support Services]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=167</guid>

					<description><![CDATA[<p>The Federal Bureau of Investigation (FBI) has stated that between October 2013 and May 2016, cyber criminals scammed $3.1 &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/5-ways-your-business-can-prevent-email-compromise/" class="more-link">Read more <span class="sr-only">5 ways your business can prevent email compromise</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/5-ways-your-business-can-prevent-email-compromise/">5 ways your business can prevent email compromise</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Federal Bureau of Investigation (FBI) has stated that between 
October 2013 and May 2016, cyber criminals scammed $3.1 billion 
		from over 22,000 victims in at least 79 countries through business 
email compromise (BEC).
</p>



<p>
	At the core of business email compromise are spoofed emails &#8211; 
communications that have forged headers, addresses or signatures to make
 
	them look authoritative and trustworthy. They often request fund 
transfers or sensitive information that can result in large-scale data 
breaches.
</p>



<p>
	Business email compromise doesn&#8217;t discriminate by company size &#8211; the 
smallest organisation can be hit just as hard as a large corporation. 
	Here are five suggestions to help protect your business.
<br></p>



<h3 class="wp-block-heading">
	1. Use Sender Policy Framework (SPF)
</h3>



<p>
	SPF is a critical tool for differentiating authentic emails from 
spoofed ones. When you establish an SPF, you can create a safe list of 
	domains that your organisation approves for communication &#8211; for 
example, your own internal domain.
</p>



<p>
	It will then conduct a verification of every incoming email and will 
send a warning if the address does not match the approved list of 
domains. 
	You can then decide to analyse, quarantine or delete suspicious emails 
before they reach their intended destination. A variant of this system 
	is Microsoft Exchange&#8217;s Sender ID.
<br></p>



<h3 class="wp-block-heading">
	2. Register domains similar to your own
</h3>



<p>
	A common tactic used by cyber criminals is sending emails that look 
similar to your own &#8211; for example, replacing a lower-case L with the 
number 
	1. At a glance, this can fool many people into thinking they&#8217;re 
receiving official communications.
</p>



<p> 
	One way of preventing this tactic is simply to identify all potential 
imitations of your domain, and register them yourself. Make sure you 
update 
	these registrations on a regular basis, so they can’t be taken over by 
malicious entities upon expiry.
<br></p>



<h3 class="wp-block-heading">
	3. Add a &#8216;hard fail&#8217; record
</h3>



<p>
	The Australian Signals Directorate (ASD) states that a hard fail record
 is a core element of preventing spoofed emails. With an SPF, 
unauthorised 
	email domains can still reach the end user, but with a warning that the
 message comes from untrusted sources.
</p>



<p>
	By configuring DNS settings to add a &#8216;hard fail&#8217; record and setting 
this to a rigorous action, you can ensure communications from 
unauthorised 
	domains go straight to spam or trash folders. This could also apply to 
emails sent from company addresses, but not company servers &#8211; another 
red 
	flag to watch.
<br></p>



<h3 class="wp-block-heading">
	4. Educate your employees
</h3>



<p>
	Research from the Ponemon Institute and IBM shows that 27 per cent of data breaches are due to staff or contractor negligence <sup>[1]</sup>. By 
	educating your employees on the dangers of business email compromise, you take a critical step towards prevention.
</p>



<p>
	Train employees on their role in information security and educate them 
on email spoofing and spearphishing. Make sure they understand each and 
every 
	red flag to look out for. You can also implement processes that 
mitigate the risk of falling prey to spoofing, such as requiring a phone
 conversation 
	or face-to-face confirmation for any financial or informational 
transfer.
<br></p>



<h3 class="wp-block-heading">
	5. Use application whitelisting
</h3>



<p> This addresses a symptom of email compromise rather than the cause, but  is nonetheless important. Application whitelisting is part of the ASD&#8217;s  Essential  Eight, and entails limiting the applications that can be opened on your <a href="https://overthewire.com.au/solutions/data-networks/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">data network</a>.   It prevents the possibility of malicious programs from opening, and can  further alert people to potential compromise when they try to open an  attachment from  a spoofed email. <br></p>



<h3 class="wp-block-heading">
	Get the best for your business
</h3>



<p>

	Business email compromise is all too common in Australia, but there are
 tangible steps you can take to mitigate the risks. Of course, this can 
be a complex 
	process for businesses that are not well-versed in cyber security &#8211; 
this is where Over the Wire can help.
</p>



<div class="wp-block-image"><figure class="alignleft"><a href="https://overthewire.com.au/resources/security-ebook/"><img fetchpriority="high" decoding="async" width="300" height="300" src="http://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-300x300.jpg" alt="" class="wp-image-127" srcset="https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-300x300.jpg 300w, https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-150x150.jpg 150w, https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover.jpg 350w" sizes="(max-width: 300px) 100vw, 300px" /></a></figure></div>



<p> Our <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://overthewire.com.au/solutions/security-it-support/data-security/" target="_blank">managed security</a> services take over the administrative responsibility for your day-to-day  protection and give you 24/7 cover from all manner of cyber threats. <a href="https://overthewire.com.au/contact/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">Contact our team</a> to find  out what we can do for you. </p>



<p> Learn more about the primary areas of cyber risk in our <strong>24 page eBook</strong>, <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://overthewire.com.au/resources/security-ebook/" target="_blank">IT Managers: Set your Network Defences to Stunning</a>, you can <strong><a href="https://overthewire.com.au/resources/security-ebook/">download it here</a></strong>.  <br><br></p>



<p>
	<em><sup>[1]</sup> 2017 Cost of Data Breach Study: Australia (IBM/Ponemon Institute, June 2017)</em>
</p>
<p>The post <a href="https://overthewire.com.au/5-ways-your-business-can-prevent-email-compromise/">5 ways your business can prevent email compromise</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How does point in time recovery work?</title>
		<link>https://overthewire.com.au/how-does-point-in-time-recovery-work/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Fri, 26 Sep 2014 05:50:08 +0000</pubDate>
				<category><![CDATA[Hosting Solutions]]></category>
		<category><![CDATA[Security & IT Support Services]]></category>
		<category><![CDATA[Backend as a Service (BaaS)]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[IT Services]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Platform as a Service (PaaS)]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=208</guid>

					<description><![CDATA[<p>Point in time recovery is a system for recovering from a catastrophic failure. It is not as many people &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/how-does-point-in-time-recovery-work/" class="more-link">Read more <span class="sr-only">How does point in time recovery work?</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/how-does-point-in-time-recovery-work/">How does point in time recovery work?</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Point in time recovery is a system for recovering from a catastrophic failure. It is not as many people think, a day-to-day backup solution. To help businesses understand how this process works and avoid the pitfalls of over-reliance on point in time recovery, we&#8217;ve prepared the following infographic.</p>



<figure class="wp-block-image"><img decoding="async" width="1029" height="6055" src="http://overthewire.com.au/wp-content/uploads/2018/12/how-does-point-in-time-recovery-work.png" alt="" class="wp-image-212" srcset="https://overthewire.com.au/wp-content/uploads/2018/12/how-does-point-in-time-recovery-work.png 1029w, https://overthewire.com.au/wp-content/uploads/2018/12/how-does-point-in-time-recovery-work-51x300.png 51w, https://overthewire.com.au/wp-content/uploads/2018/12/how-does-point-in-time-recovery-work-768x4519.png 768w, https://overthewire.com.au/wp-content/uploads/2018/12/how-does-point-in-time-recovery-work-174x1024.png 174w" sizes="(max-width: 1029px) 100vw, 1029px" /></figure>
<p>The post <a href="https://overthewire.com.au/how-does-point-in-time-recovery-work/">How does point in time recovery work?</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Don&#8217;t Get Caught Out By Your SLA&#8217;s</title>
		<link>https://overthewire.com.au/dont-get-caught-out-by-your-slas/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Wed, 25 Jun 2014 05:47:41 +0000</pubDate>
				<category><![CDATA[Data Network Solutions]]></category>
		<category><![CDATA[Security & IT Support Services]]></category>
		<category><![CDATA[Hosted PBX]]></category>
		<category><![CDATA[Infrastructure as a Service (IaaS)]]></category>
		<category><![CDATA[IT Services]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Managed Data Networks]]></category>
		<category><![CDATA[Platform as a Service (PaaS)]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[VoIP]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=198</guid>

					<description><![CDATA[<p>One of the most important components to consider in a business grade telecommunications service is the Service Level Agreements &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/dont-get-caught-out-by-your-slas/" class="more-link">Read more <span class="sr-only">Don&#8217;t Get Caught Out By Your SLA&#8217;s</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/dont-get-caught-out-by-your-slas/">Don&#8217;t Get Caught Out By Your SLA&#8217;s</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>One of the most important components to consider in a business grade 
telecommunications service is the Service Level Agreements (SLAs) that 
accompany the terms and conditions of the contract. However, it is also 
one of the most commonly misunderstood aspects of a service, and as such
 it can lead to a great deal of unexpected and unnecessary problems. 
Here’s why:
</p>



<p>&#8220;A 
Service Level Agreement is not a guarantee that your infrastructure will
 remain active for the specified uptime. Rather it is the minimum period
 of outage after which the business will receive a financial rebate, 
where this has been stated in the contract.&#8221;</p>



<p>For instance, a 99.95% uptime SLA (which is typical for the majority 
of business grade Ethernet services) has a maximum target downtime of 21
 minutes and 55 seconds per month. Many IT Managers make the costly 
mistake of thinking this means that the service is guaranteed to be 
active for the remaining time period. It isn’t. The SLA simply means 
that come 21 minutes and 56 seconds, the customer will be able to claim 
some remuneration for any additional downtime experienced.</p>



<h2 class="wp-block-heading">
	Why are the SLA’s not guarantees?</h2>



<p>Using the example of a 99.95% SLA, 21 minutes and 55 seconds is more 
than enough time for a provider to fix the majority of network faults. 
However, infrastructure faults, which often rely on third parties to be 
resolved, can take much longer. For instance fibre cuts, ULL faults, and
 NTU failures are normally beyond the scope of the service providers 
control and as such require third party technicians to be physically 
present at the point of failure to be resolved. Depending on the fault, 
the remoteness of the area, number of services affected and the 
availability of qualified technicians, infrastructure failures may take 
several days to resolve.</p>



<h2 class="wp-block-heading">
	Why does this matter if the provider has to compensate me?</h2>



<p>Whilst an SLA may provide remuneration in the event of a service 
outage, the rate of remuneration is determined by the provider and is 
not linked to the actual loss incurred by the business. This means that 
the risk of a failure still needs to be weighed against the potential 
costs of one occurring. If the impact on the business is deemed to be 
unacceptably high it is strongly recommended that organisations consider
 utilising a redundancy package to mitigate the risk of an outage 
occurring.</p>



<h2 class="wp-block-heading">
	What redundancy options are available?</h2>



<p>Typical considerations for redundancy should include the following; 
however, it is recommend that all organisations consider backup links on
 a per-site basis so that the appropriate technology can be balanced 
against the cost.</p>



<ul class="wp-block-list"><li>Due to their low cost and geographic availability, ADSL links are often recommended for the majority of sites.</li><li>However if the site is in a remote location or there is a high risk  of a large scale problem (e.g. flooding, bush fires, etc.), 3G and 4G  backup links can be used. 3/4G is also recommended as a method of  providing redundancy against terrestrial problems. For instance if a  fibre cable, or other form of cable infrastructure is cut, it is likely  that an ADSL connection will be affected as well, making 3/4G the most  viable alternative. Microwave transmission can also be used to the same  effect, however it comes with its own advantages and disadvantages. You  can read more about the differences in connectivity options in <a href="https://overthewire.com.au/a-very-brief-introduction-to-connectivity/">this article on connectivity</a>.</li><li>The deployment of a second router to provide additional device  redundancy can protect against hardware failure and get you back to work  almost instantly.</li><li>Due to a slow reduction in costs, protected fibre (fibre that takes  diverse routes to the exchange) is becoming increasingly common as a  backup option. Protected fibre comes with the advantage of being able to  offer the same speed as the primary connectivity option.</li></ul>



<p>Considerations should also be made as to whether there is a 
requirement for automatic or manual failover, as each of these options 
has the potential to affect the speed at which your service can be 
restored.</p>



<p>The next time your organisation is considering <a href="https://overthewire.com.au/solutions/data-networks/business-internet/">setting up a link to a new office</a>, or <a href="https://overthewire.com.au/solutions/data-networks/">upgrading an existing network</a>,  make sure you keep in mind that an SLA is not a silver bullet, and that  the risk of an outage needs to be balanced against the potential costs  of one occurring. </p>
<p>The post <a href="https://overthewire.com.au/dont-get-caught-out-by-your-slas/">Don&#8217;t Get Caught Out By Your SLA&#8217;s</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Access Expertise via Managed Services</title>
		<link>https://overthewire.com.au/access-expertise-via-managed-services/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Tue, 18 Feb 2014 09:11:49 +0000</pubDate>
				<category><![CDATA[Security & IT Support Services]]></category>
		<category><![CDATA[IT Support]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=78</guid>

					<description><![CDATA[<p>Managed Services is a term used in the IT industry to refer to the support of IT and Networking &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/access-expertise-via-managed-services/" class="more-link">Read more <span class="sr-only">Access Expertise via Managed Services</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/access-expertise-via-managed-services/">Access Expertise via Managed Services</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Managed Services is a term used in the IT industry to refer to the 
support of IT and Networking infrastructure; including anything from 
server support, through to complete ownership of an environment down to 
the device level.</p>



<p>In Australia, there has been a definite trend towards this kind of 
‘outsourced IT’ over time, with the realisation that it is often 
unrealistic to expect an internal IT resource to be an expert and have 
time to stay up to date with an increasingly broad range of systems, 
particularly at a price point suitable for the business.</p>



<p>Hence the primary benefit organisations seek to derive for managed 
services providers is the ability to leverage the expertise of 
professionals with an esoteric skill set in order to gain more efficient
 utilisation of their existing infrastructure. This may occur as the 
result of consultation during infrastructure deployments, but can also 
result from day to day support and management programs which augment the
 skills and availability of in house IT teams.</p>



<p>To ensure that your IT is built and performing to enable your 
business to achieve its goals, rather than hinder them, the right 
amalgamation of different fields of expertise is required. So that we 
can offer the most appropriate solutions, and support a wide range of 
deployment styles, Over the Wire works with an extensive network of 
corporate partners, each of which are experts in their relevant fields, 
as well as maintaining our own in house teams of engineers.</p>



<p>This enables us to join your team as a trusted adviser, assisting 
your business goals through the ownership of your whole environment, 
parts of it, or simply on an ad-hoc basis. When used in conjunction with
 the wide range of other network, infrastructure, and voice services 
also offered by Over the Wire, a complete, end-to-end solution can be 
achieved; with a single point of call, backed by extensive experience in
 each area.</p>



<p>In the video below Over the Wire’s General Manager of Services Simon Wren, talks about some of the benefits of an Over the Wire Managed Services agreement.</p>



<figure class="wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Over the Wire&#039;s Simon Wren Discusses IT Support Services" width="775" height="436" src="https://www.youtube.com/embed/typ4mbcNF4Y?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
</div></figure>



<p>For more information about our IT Support Services, &nbsp;<a href="https://overthewire.com.au/products/it-support-services/">visit our IT Support Services Webpage</a>, or call us to create a tailor made support solution for your business.</p>
<p>The post <a href="https://overthewire.com.au/access-expertise-via-managed-services/">Access Expertise via Managed Services</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Managed Services Provider Celentia Purchased</title>
		<link>https://overthewire.com.au/managed-services-provider-celentia-purchased/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Sun, 01 Jul 2012 05:27:49 +0000</pubDate>
				<category><![CDATA[Awards & Company News]]></category>
		<category><![CDATA[Acquisition]]></category>
		<category><![CDATA[Company News]]></category>
		<category><![CDATA[Investors]]></category>
		<category><![CDATA[IT Support]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=18</guid>

					<description><![CDATA[<p>Over the Wire is pleased to announce that it has acquired Brisbane based Managed Service Provider Celentia. Celentia has &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/managed-services-provider-celentia-purchased/" class="more-link">Read more <span class="sr-only">Managed Services Provider Celentia Purchased</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/managed-services-provider-celentia-purchased/">Managed Services Provider Celentia Purchased</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Over the Wire is pleased to announce that it has acquired Brisbane based Managed Service Provider Celentia.</p>



<p>Celentia has a long history of providing IT support services to 
businesses in Brisbane and we welcome them as a valuable addition to our
 team. This acquisition will help Over the Wire strengthen it’s end to 
end service value proposition, by allowing our clients to deal with a 
single provider for all of their IT and Telecommunications requirements.</p>



<p>More information about Over the Wire’s IT support services can be found on our <a href="https://overthewire.com.au/products/it-support-services">IT Support Services webpage</a>.</p>



<p>For additional details about the aquisition please contact <a href="mailto:media@overthewire.com.au" target="_blank" rel="noreferrer noopener">media@overthewire.com.au</a></p>
<p>The post <a href="https://overthewire.com.au/managed-services-provider-celentia-purchased/">Managed Services Provider Celentia Purchased</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
