ACCC WARNS OF FAKE NBN SCAMMERS – BEWARE OF FAKE PHONECALLS AND EMAILS

Australia Competition & consumer commission

Nearly $28,000 has been stolen from Australians this year by scammers pretending to be the NBN in order to steal money and personal information.
Scamwatch has already received 316 complaints this year related to scams impersonating the NBN, according to the ACCC.
“Scammers are increasingly using trusted government brands like NBN to trick people into falling for scams,” ACCC deputy chair Delia Rickard said. “Their goal is always to either get hold of your money or personal information.”

One of the most common scams involves scammers ringing victims to connect them to an NBN service and demanding payment with an iTunes gift card.
Rickard said that Australians over 65 are particularly vulnerable to cold calls from scammers, who often demand payment via iTunes gift cards. “Legitimate businesses, especially those like NBN, will never ask you to pay for anything in this way,” Rickard said.
“NBN will never phone you out of the blue to try to sign you up to a service over its network. NBN is a wholesaler, meaning they don’t sell direct to the public. If you get an unsolicited call like this, it’s a big red flag that you are dealing with a scammer,” Rickard said.
“NBN will also never call you to remotely ‘fix’ a problem with your computer, or to request personal information like your Medicare number or your bank account numbers. Do not listen to the reasons they give you for needing this information.”
Rickard advised Australians to hang up and contact their retail service provider if they were in doubt about a caller purporting to be from the NBN.

Protect Yourself

  • Know who you are talking to
  • Protect your personal information
  • If you think you’ve been scammed, report it immediately

WHY IS WINDOWS CRITICAL PATCHING IMPORTANT

managed new devicesbig

At Majestic, we perform windows critical and security patching on every server and workstation that are under MAjestic Service Level Agreement (SLA) during each maintenance cycle. Microsoft releases security patches for windows operating systems every month which are popularly known as “Patch Tuesday”. These updates patch security vulnerabilities that could allow a system to become compromised. Security updates are classified as critical, important and moderate.

Critical security patches are perhaps the most important updates to apply to your system. Ignoring these could leave your computer or server extremely vulnerable to hackers and malicious code.

  • Critical patches prevent problems. Not only do they fix known bugs in the operating system, but they also plug the critical security holes that could drastically affect your security
  • Potential causes of not installing critical updates are damaged software, loss of data or even identity theft.
  • Every year malware causes damage of millions of dollars worldwide with the main reason attributed to uninstalled critical security patches
  • Another main advantage of installing critical patches sometimes comes with new features while fixing known issues.
  • Consistent patching and maintenance services leads to higher level of security and compliance.
Majestic Computer Technology’s Service Level Agreement includes all the above work, giving you a sense of security and ensure that you are in safe hands.
If you would like to know more, please feel free to contact Majestic Computer Technology at any time. We are here to help.

MAJESTIC HOSTED ENTERPRISE SECURITY SOLUTION – TOP 5 REASONS WHY YOU NEED IT!

IT Security

Majestic gives prime importance to keep our clients ahead of an ever-evolving IT threat landscape.The growing use of cloud-based and virtualised computing drives dramatic efficiency and operational gains-but if security strategies are not evolved to fit these environments, those benefits are not realized and security gaps are created. So, it is very important to have an enterprise security solution in order to eliminate those security gaps.

Yesterday’s viruses and ransomware are still lurking out there, requiring vigilant updating of traditional defenses – but the current explosion of advanced targeted attacks demands new customised detection and response capabilities.

Here we present the top 5 reasons why you need a hosted enterprise security solution

  • Shields against the ransomware – Majestic hosted enterprise security solution shields you against the ransomwares that are breaching the security policies of the company.
  • Hosted email security – By blocking ransomware at the email gateway, enterprise security solution prevent it from ever reaching your users.
  • Data theft protection – This tool can protect sensitive personal information, including credit card numbers or passwords for online services. Upon detecting any attempt to send protect information to the internet, whether to a web page, by email or through an instant message, the transmission can be blocked automatically.
  • Web security – Web security combines threat protection, URL filtering and application visibility which defends you against today’s sophisticated internet threats by blocking targeted attacks, malicious links, compromised websites and more.
  • Network security – Protect your network from advanced targeted and zero-day attacks with a proactive process of real-time threat visibility and intelligence.

The growth of data usage, a move towards an increasingly mobile workforce and the emergence of Bring Your Own Device (BYOD) can drive real business benefits. To enable your organisation to fully capitalise on the opportunities that these trends can bring, it is important that IT architecture is properly secured and the risks addressed.

To learn more about hosted enterprise security solution, please contact us.

WHAT IS NEW IN TREND MICRO SECURITY SERVER VERSION 9.5 – AN INSIGHT FOR OUR SLA CLIENTS

cybersecurity lock

Your Trend Micro security server has been upgraded to version 9.5 under the service level agreement (SLA). As always, Majestic leaves no stone unturned  in order to keep your data and systems safe. Trend Micro security server version 9.5 has new features which enhance your protection levels to a great extent.

The new features and functionality of Trend Micro security server version 9.5 are listed below
  • Log Inspection – Collects and analyzes operating system and application logs in over 100 log file formats, identifyimg suspicious behaviour, security events and administrative events.
  • Windows 10 Pro support – Trend Micro now supports security agent installation on endpoints running Windows 10 Pro.
  • Remote manager agent update enhancements – Installation of Trend Micro version 9.5 will automatically update the remote manager agent to the latest version through Trend Micro ActiveUpdate.
  • Update notifications – Trend Micro can inform users about updates, including new versions, service packs and patches. Users can receive notifications from security agent when new updates are available.
  • Document protection enhancements – Trend Micro has further enhanced their ransomware protection feature to effectively protect documents from unauthorised encryption or modification.
Your upgraded security server includes all the above features, giving you a sense of security and ensure that you are in safe hands.

MAJESTIC COMPUTER TECHNOLOGY’S SUCCESS AT CEBIT 2017

Screenshot of a article saying Majestic computer Technology took part in the CeBIT technology Fair in Sydney

As well known, Majestic has taken part in APAC’s largest technology event CeBIT 2017. We are very excited to share our experience at the event. This event has not only given us the opportunity to showcase our products and services, but also presented network opportunities beyond our exceptations. CeBIt has showcased the latest technological innovations from 350 exhibitors.

 

MAJESTIC COMPUTER TECHNOLOGY IS NOW A MICROSOFT SURFACE AUTHORISED RE-SELLER

laptops lining on a desk

We are happy to share that we are now an authorised re-seller of Microsoft Surface. Microsoft Surface is a device with versatility which will let you to work on your own terms. The Surface gives everything you need in terms of performance, mobility, security and reliability. A best-in-class laptop with the creative freedom of a studio, and the convenience of a tablet. All in one.

Home, office, conference room or a factory floor. Wherever you need to get work done, Surface can put productivity right at hand. Thin, light and powerful; Surface can process complex calculations and present 3D models. With laptop performance and tablet versatility, you no longer need to juggle separate devices – Surface is built to replace both. Here are some of the exciting features of  new Surface Pro.
  • There is up to 50% more battery life than Surface 4 – that’s up to 13.5 hours of video playback.
  • The latest Intel 7th Generation processors have contributed to improved performance of up to 20% over the Surface 4.
  • Redesigned venting allows for quieter device cooling. In fact the m3 and i5 configurations are totally fanless and completely silent.
  • You might think that adding performance and battery life would have increased the weight of the Surface Pro – but it’s actually 16 grams lighter than Surface 4.
  • The new Surface pen with four times the sensitivity of the previous pen, combined with the Surface’s high responsiveness, delivers the best in class performance.
With its exceptionally versatile design, Surface is a best-in-class Windows 10 laptop. It offers all the power and performance you need along with ultimate mobility.
To know more about Microsoft Surface and how it can deliver results for your business, please feel free to contact Majestic Computer Technology at any time. We are here to help.

WHAT IS NEW IN MAJESTIC MONITORING SOFTWARE – AN INSIGHT FOR OUR SLA CLIENTS

datanetwork

At Majestic, we constantly strive to provide the best service to our clients. We never look over any possibility to make the service even better. As a part of SLA improvement, we conduct regular workshops to our staff which emphasise about the services and betterment of them.

Here are updates we have made to our monitoring software in order to provide even better service.
  • Filter Editor – This Filter editor allows us to manipulate different filtering criteria to help you single out specific patch jobs.
  • New Device Commands – We have updated our device section by introducing new commands such as wake device and refresh device.
  • Backup manager – With a simple interface and powerful filters to quickly isolate servers and workstations, backup manager can help identify potential issues quickly.
  • Remote monitoring – Remote monitors run on every agent enabled computers and report on the operating conditions of both hardware and software components.
  • More Resistant – We continuously provide information on how to recognise and avoid common forms of cybercrime and offer advice to those who have fallen victim.
Majestic Computer Technology’s Service Level Agreement includes all the above features, giving you a sense of security and ensure that you are in safe hands.

MAJESTIC CLOUD BACKUP SERVICES – TOP 5 REASONS WHY YOU NEED CLOUD BACKUP

cloudsolutions

Majestic’s Cloud Backup provides granular protection of your hosted data. Once set up, backups happen automatically in few seconds, You can recover the version of a file or folder that you need, in its original format, through an easy-to-use web interface.

Do you know that Microsoft will only guarantee 90% of your data for 30 days?

The top 5 ways data is lost in the cloud:

  1. User error (registered users accidentally delete or overwrite data)
  2. Hackers (outsiders get into the business systems)
  3. Closing accounts (cloud app a/c are closed without regard for the data left behind)
  4. Malicious delete (users purposely delete critical data belonging to a company)
  5. Third-party software (data is overwritten by third-party software)

With Majestic Cloud Backup for Office 365, customers have a total peace of mind that their data is safe and secure.

AUSTRALIAN BUSINESSES ARE AT STAKE DUE TO THE ILLEGAL USE OF SOFTWARE

auditandcompliance

In the year 2016, Australian businesses have been hit with $589,000 in damages over the use of unlicensed software. “By using unlicensed software, businesses are compromising their cybersecurity policies and putting their customers data at risk. It can also result in financial losses for the business, as information can be intercepted and repurposed for others financial gain. Not to mention the impact to the reputation of the organisation, business and its employees during any legal proceedings.” BSA director of compliance programs, Gary Gan  said.

During 2016, the global software industry advocate organisation which is widely known as BSA settled 14 cases Australia wide. Each business caught using unlicensed software was forced to purchase genuine software licenses for its ongoing use, in addition to paying the copyright infringement damages.

“Our 2016 results reflect the increased public awareness of the security and business challenges that unlicensed software poses to Australian businesses. We strongly encourage all businesses, across all sectors to implement an effective Software Asset Management (SAM) practice. This, combined with regular checks of software licenses and deployments, will ensure their business is secure and avoids legal risks,” Gan added.

Other than the risk of paying copyright infringement damages, other benefits of using licensed software are –

  • Pirated software often contains malware which can lead to the theft of company’s confidential information.
  • With licensed software, regular software updates are available to mitigate any risks associated with vulnerabilities discovered since the software was first released.
  • Pirated software can cause severe damage to your computer hardware which requires hardware replacement.
  • Having genuine and licensed software speaks volumes about your company’s reputation and governance.
  • Avoid all unnecessary IT and cyber security risks.

Whatever IT compliance requirements your business has, Majestic can assist in ensuring that you are always on top of the requirements. Utilising the industry standard tools and best practices, technology experts at Majestic can help your organisation to review your compliance requirements, current setup and help you fill in the missing pieces. Any work related to IT audit and compliance completed by Majestic are documented using standard documentation processes.

BEWARE OF THE FAKE ASIC NOTICE

security locks image

Australian business owners have been warned to avoid clicking a malicious email claiming to be from the Australian Securities & Investments Commission (ASIC), with the high-risk message containing hidden ransomware. The email was distributed to tens of thousands of addresses just as people arrived at work this morning, and has been labeled as one of the largest-scale fraud email inundations seen in recent times.

This is the second large-scale fraud email purporting to be from ASIC in recent times, with MailGuard identifying a similar scam in late January.As outlined via the ASIC website, scammers have been contacting registry customers asking them to pay fees and give personal information to renew their business or company name.
Dos and don’ts
  • Do not respond to any message claiming to be from Australia Securities & Investment Commissions (ASIC).
  • Do keep anti-virus software up to date.
  • Do not click any links on a suspicious email.
  • Do not give any sensitive information through email