<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" >

<channel><title><![CDATA[Easy IT &bull; Managed IT &bull; Voice and Data &bull; Cloud - Latest News]]></title><link><![CDATA[http://www.easyit.com.au/latest-news]]></link><description><![CDATA[Latest News]]></description><pubDate>Thu, 20 Dec 2018 11:45:56 +1100</pubDate><generator>Weebly</generator><item><title><![CDATA[Warning over Christmas parcel delivery scam which targets festive shoppers.]]></title><link><![CDATA[http://www.easyit.com.au/latest-news/warning-over-christmas-parcel-delivery-scam-which-targets-festive-shoppers]]></link><comments><![CDATA[http://www.easyit.com.au/latest-news/warning-over-christmas-parcel-delivery-scam-which-targets-festive-shoppers#comments]]></comments><pubDate>Tue, 18 Dec 2018 22:56:48 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.easyit.com.au/latest-news/warning-over-christmas-parcel-delivery-scam-which-targets-festive-shoppers</guid><description><![CDATA[ A Christmas parcel delivery scam is heartlessly targeting consumers this festive season.Emails pretending to be from Australia Post or other parcel delivery firms fool people into clicking onto a link which then downloads a virus to their computer, leaving personal details vulnerable.It&rsquo;s one of many scams which resurface every Christmas, experts warn.Consumer boss&nbsp;Tim Falinski, from antivirus firm Trend Micro&nbsp;APAC said the number of scams tripled over the festive season - and w [...] ]]></description><content:encoded><![CDATA[<span class='imgPusher' style='float:left;height:0px'></span><span style='display: table;width:auto;position:relative;float:left;max-width:100%;;clear:left;margin-top:0px;*margin-top:0px'><a><img src="http://www.easyit.com.au/uploads/2/6/3/9/26393168/published/760988682.jpg?1545174118" style="margin-top: 5px; margin-bottom: 10px; margin-left: 0px; margin-right: 10px; border-width:1px;padding:3px; max-width:100%" alt="Picture" class="galleryImageBorder wsite-image" /></a><span style="display: table-caption; caption-side: bottom; font-size: 90%; margin-top: -10px; margin-bottom: 10px; text-align: center;" class="wsite-caption"></span></span> <div class="paragraph" style="display:block;"><br />A Christmas parcel delivery scam is heartlessly targeting consumers this festive season.<br />Emails pretending to be from Australia Post or other parcel delivery firms fool people into clicking onto a link which then downloads a virus to their computer, leaving personal details vulnerable.<br /><br />It&rsquo;s one of many scams which resurface every Christmas, experts warn.<br /><br />Consumer boss&nbsp;Tim Falinski, from antivirus firm Trend Micro&nbsp;APAC said the number of scams tripled over the festive season - and warned consumers to be careful what they click on.<br /><br />&ldquo;All they&rsquo;re trying to do is get you to click on an attachment so they can download a virus to your computer,&rdquo;.<br />&ldquo;We see an amazing rise in scams at Christmas time.&rdquo;<br /><br />An automated phone call of a man with an American accent - which appears to come from a Sydney number - asked the recipient to get back to them or &lsquo;we have to issue an arrest warrant under your name and get you arrested.&rsquo;<br />Another common scam sees callers pretend to be from the Australian Taxation office. They often demand payment in the form of Apple Gift Cards. It&rsquo;s unusual methods of payment like this which should flag that the caller isn&rsquo;t genuine.<br />&ldquo;They&rsquo;re generally automated voices, we are seeing a couple with some people, &nbsp;and asking you to you to call a number which will get routed overseas,&rdquo; Mr Falinski said. &ldquo;If you do get a call from the ATO, hang up and call the main number and ask to get put through to a case officer.<br /><br />&ldquo;You really need to think before you click at this time of the year. A lot comes by email."<br />&ldquo;Be very careful about what you&rsquo;re opening. If an email&rsquo;s got a link to click to or an attachment, that&lsquo;s where you&rsquo;ve gotta think twice.<br />&ldquo;The other thing to do is if you&rsquo;re not being asked to pay by normal means, Mastercard, Visa, something like that - like an Apple Gift Card, it&rsquo;s probably a scam and be very careful about what you do.<br />Other current scams to watch out for involve Christmas e-cards, online shopping, charities and dating and romance. Facebook is also a common place for scams.<br /><br />A Brisbane woman who had closed down her account was shocked to see it had been&nbsp;reactivated&nbsp;- with a scammer going on to gain access to her bank and Centrelink accounts.&nbsp;Both the Police and Facebook were little help. According to scamwatch so far this year more than $94m has been lost to scams. More than 130,000 reports have been made to the organisation. The scams which have lost consumers the most money were investment scams followed by dating and romance.<br />Most scammers used phones to target victims, followed by email.<br /><br /><strong>Report a scam via Scamwatch at&nbsp;<a href="https://www.9news.com.au/2018/11/30/12/02/scamwatch.gov.au/report-a-scam">scamwatch.gov.au/report-a-scam</a></strong><br /><em><strong>Source:</strong></em><br /><em>https://www.9news.com.au/2018/11/30/12/02/scams-parcels-post-warning-ato-phone-call-appls-gift-cards-virus</em></div> <hr style="width:100%;clear:both;visibility:hidden;"></hr>]]></content:encoded></item><item><title><![CDATA[Windows Bloatware Removal Tools and Techniques]]></title><link><![CDATA[http://www.easyit.com.au/latest-news/windows-bloatware-removal-tools-and-techniques]]></link><comments><![CDATA[http://www.easyit.com.au/latest-news/windows-bloatware-removal-tools-and-techniques#comments]]></comments><pubDate>Fri, 21 Sep 2018 06:20:22 GMT</pubDate><category><![CDATA[Bloatware]]></category><category><![CDATA[Tips]]></category><category><![CDATA[Windows]]></category><guid isPermaLink="false">http://www.easyit.com.au/latest-news/windows-bloatware-removal-tools-and-techniques</guid><description><![CDATA[ 	 		 			 				 					 						  Most new desktop and notebook PCs come with annoying preinstalled toolbars, applications and utilities. They often distract users with unnecessary notifications. Some also slow down computers, reduce privacy, create security risks and waste hard disk space. &ldquo;Bloatware&rdquo; has become a popular nickname for these hard-to-remove programs.   					 								 					 						          					 							 		 	       As a Tripwire security analyst recently said, &ldquo;Bloatwa [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-multicol"><div class="wsite-multicol-table-wrap" style="margin:0 -15px;"> 	<table class="wsite-multicol-table"> 		<tbody class="wsite-multicol-tbody"> 			<tr class="wsite-multicol-tr"> 				<td class="wsite-multicol-col" style="width:50%; padding:0 15px;"> 					 						  <div class="paragraph">Most new desktop and notebook PCs come with annoying preinstalled toolbars, applications and utilities. <br /><br />They often distract users with unnecessary notifications. Some also slow down computers, reduce privacy, create security risks and waste hard disk space. &ldquo;Bloatware&rdquo; has become a popular nickname for these hard-to-remove programs.<br /></div>   					 				</td>				<td class="wsite-multicol-col" style="width:50%; padding:0 15px;"> 					 						  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="http://www.easyit.com.au/uploads/2/6/3/9/26393168/published/depositphotos-69202587-stock-photo-mans-hands-using-smart-phone.jpg?1537511048" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>   					 				</td>			</tr> 		</tbody> 	</table> </div></div></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph">As a Tripwire security analyst <a href="http://www.computerworld.com/article/2886978/security-experts-call-for-halt-to-pc-crapware-after-lenovo-debacle.html">recently said</a>, &ldquo;Bloatware needs to stop.&rdquo; Fortunately, you can use several different techniques to banish it.<br /><span>&nbsp;</span><ul><li>Browser add-ons</li><li>Security trialware</li><li>Media applications</li><li>Useless adware</li></ul> <span>&nbsp;</span><br />Microsoft has introduced a new anti-bloatware utility for Windows 10. Although some people find it ironic that a company responsible for so much inefficient software would offer such a tool, it proves quite effective. The program works by downloading a standard edition of the operating system and using it to replace the existing copy.<br /><br />As a result, all manufacturer-supplied software completely disappears from the machine. No registry entries, useless files or broken links stay behind. Microsoft introduced this tool during May and added it to the upcoming Windows 10 Anniversary Update. The only major downside is that you might need to reinstall some drivers after using it. You&rsquo;ll also need to back up and restore any files you&rsquo;ve already saved.<br /><br /><strong>Reinstallation</strong><br />If you don&rsquo;t use Windows 10, you can still reinstall the OS with a Microsoft installation disc. Don&rsquo;t use a disc supplied by the PC manufacturer; it probably contains the same bloatware that was on the computer when you bought it. Many machines have license stickers you can refer to when the setup program asks for a key.<br /><br /><strong>Direct Removal</strong><br />Another option is to remove bloatware applications individually. You may use the Windows uninstall function to accomplish this. However, it probably won&rsquo;t fully eliminate unwanted files and registry entries. Consider using a sophisticated third-party tool, such as Revo or Ashampoo Uninstaller. This approach allows you to get rid of needless applications without losing hardware drivers or desirable software.<br /><br /><strong>Buying Computers</strong><br />You can choose to completely avoid bloatware in the first place. Several high-end brands sell machines without it. They include Velocity Micro, Apple, Maingear and Puget. These companies charge more money for their computers, so they don&rsquo;t need to gain extra revenue by placing adware or trialware on PCs.<br /><br />Microsoft sells Signature Edition computers online and through MS stores. These machines come from a variety of top brands and contain little or no bloatware. Microsoft claims to optimize their performance as well. However, many models still include update utilities from manufacturers. These programs may have inefficient or insecure code.<br /><br />The Signature product line includes machines from Dell, Asus and Lenovo. They come with Windows Defender rather than anti-virus trialware. The options range from gaming PCs to conventional notebook computers, according to <a href="http://www.pcworld.com/article/2887213/microsofts-signature-edition-laptops-deliver-the-clean-pc-experience-you-really-want.html">PC World</a>. Many models don&rsquo;t cost much more than they do elsewhere. Compared to the Dell price, Microsoft charges $30 extra for an Inspiron laptop. It also supplies a lengthy warranty.<br /><br /><strong>Building PCs</strong><br />Yet another alternative is to buy Windows separately, order parts and assemble your own machines. They won&rsquo;t contain any bloatware and you may decide exactly how you want to configure them. Some large organizations buy components in bulk and put together most or all of their desktop computers. An advantage is that replacement parts for these PCs cost relatively little and you can obtain them from numerous sources.<br /><br />Basically, it&rsquo;s possible to eliminate bloatware by thoroughly erasing specific programs, installing a fresh copy of Windows or buying bloatware-free PCs. This will improve security and boost performance. A variety of businesses depend on Easy I.T. to keep them informed about the newest IT developments and tips. To learn more, please contact <a href="mailto:info@easyIT.com.au">info@easyIT.com.au</a> or dial <a href="tel:1300 327 948">1300 327 948</a> today.<br /></div>]]></content:encoded></item><item><title><![CDATA[3 Approaches to Office 365 Email Migration]]></title><link><![CDATA[http://www.easyit.com.au/latest-news/3-approaches-to-office-365-email-migration]]></link><comments><![CDATA[http://www.easyit.com.au/latest-news/3-approaches-to-office-365-email-migration#comments]]></comments><pubDate>Fri, 21 Sep 2018 06:12:55 GMT</pubDate><category><![CDATA[Email]]></category><category><![CDATA[Office 365]]></category><guid isPermaLink="false">http://www.easyit.com.au/latest-news/3-approaches-to-office-365-email-migration</guid><description><![CDATA[ 	 		 			 				 					 						  Thinking about an Office 365 email migration?Taking your office productivity applications to the cloud doesn&rsquo;t mean you have to leave all your organization mailboxes on your local Exchange Server or with another email system.   					 								 					 						          					 							 		 	       Making the migration moveWhether you are planning to abandon your Exchange Server altogether or to go the hybrid route, you&rsquo;ll need a game plan to ensure the best transi [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-multicol"><div class="wsite-multicol-table-wrap" style="margin:0 -15px;"> 	<table class="wsite-multicol-table"> 		<tbody class="wsite-multicol-tbody"> 			<tr class="wsite-multicol-tr"> 				<td class="wsite-multicol-col" style="width:50%; padding:0 15px;"> 					 						  <div class="paragraph">Thinking about an Office 365 email migration?<br /><br />Taking your office productivity applications to the cloud doesn&rsquo;t mean you have to leave all your organization mailboxes on your local Exchange Server or with another email system.<br /></div>   					 				</td>				<td class="wsite-multicol-col" style="width:50%; padding:0 15px;"> 					 						  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="http://www.easyit.com.au/uploads/2/6/3/9/26393168/published/depositphotos-193000134-stock-photo-businessmen-meeting-office-man-showing.jpg?1537510718" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>   					 				</td>			</tr> 		</tbody> 	</table> </div></div></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><em><strong>Making the migration move<br /></strong></em><br />Whether you are planning to abandon your Exchange Server altogether or to go the hybrid route, you&rsquo;ll need a game plan to ensure the best transition. The following are three of the non-technical approaches recommended in an <a href="https://redmondmag.com/articles/2015/04/01/exchange-server-to-office-365.aspx">article</a> by <em>Redmond Magazine&rsquo;s</em> Brien Posey:<br /><br /><strong>1. Select the migration method that best suits your needs:</strong><br />Depending on the version of your Exchange Server, you have four methods available:<br /><br /><strong>i. <a href="https://support.office.com/en-us/article/Perform-a-cutover-migration-of-email-to-Office-365-9496e93c-1e59-41a8-9bb3-6e8df0cd81b4?ui=en-US&amp;rs=en-US&amp;ad=US">Cutover </a>&mdash; sends everything at once</strong><br />This option, known as <a href="https://support.office.com/en-us/article/What-you-need-to-know-about-a-cutover-email-migration-to-Office-365-961978ef-f434-472d-a811-1801733869da">cutover migration</a>, is for users running Exchange 2003, 2007, 2010, or 2013 with fewer than 2,000 mailboxes. Office 365 provides a <a href="https://support.office.com/en-us/article/Use-the-Office-365-Setup-wizard-to-perform-a-cutover-migration-f766254a-5688-44eb-86c8-026575839829">setup wizard</a>, or the migration can begin from the Exchange admin center. The setup wizard works when you have fewer than 151 mailboxes. Using the Exchange admin center for more than 150 mailboxes is a lengthy process and is not recommended.<br /><br /><strong>ii. Staged Migration &mdash; a gradual migration for Exchange Server 2003 and 2007 users</strong><br />Migrate your system in batches by means of a <a href="https://support.office.com/en-us/article/What-you-need-to-know-about-a-staged-email-migration-to-Office-365-7e2c82be-5f3d-4e36-bc6b-e5b4d411e207">staged migration</a>. This process occurs over time and requires on-premises synchronization and other technical tweaks to make the migration run smoothly. Users must create a new Outlook profile, whereupon Outlook automatically connects to the Office 365 email account.<br /><br /><strong>iii. Hybrid Migration &mdash; uses an integrated Exchange Server and the Office 365 environment</strong><br />The <a href="https://technet.microsoft.com/en-us/library/jj200581(v=exchg.150).aspx">hybrid migration</a> is for:<ul><li>Exchange 2010 users with more than 150 mailboxes</li><li>Exchange 2010 users wanting to migrate mailboxes in smaller batches over time</li><li>Exchange 2013 and 2016 users</li></ul> The hybrid deployment is just the thing for a seamless look, feel, and email experience with your on-premises Exchange on Office 365 Cloud.<br /><br /><strong>iv. IMAP Migration &mdash; for Exchange Server 2000 and other third-party email</strong><br /><a href="https://support.office.com/en-us/article/Migrate-other-types-of-IMAP-mailboxes-to-Office-365-58890ccd-ce5e-4d94-be75-560a3b70a706">IMAP migration</a> can be used to migrate Exchange 5.5 and 2000 legacy servers. IMAP is primarily for importing non-Exchange mail systems &mdash; Google Mail, for example &mdash; to Office 365. The IMAP migration will import nothing but email messages. The preparation takes longer than the execution, because users must:<ul><li>create Exchange mailboxes for each user</li><li>make a CSV file with email addresses, user names, and passwords</li><li>use the email migration option in the Outlook Web App to do the preliminary migration</li></ul> Contacts, calendars, and stored tasks, unfortunately are left behind.<br /><br /><strong>2. Estimate the time the migration will take:</strong><br />By far, the most time-consuming process in migrating to Office 365 is getting your email up and running. Average throughput &mdash; moving your email data to the Office 365 cloud &mdash; for a staged migration, for example, can be from 10 to 14 gigabytes per hour. There are also slowdowns caused by bandwidth and built-in regulators. The latter are user, service, and resource health-based automatic slowdowns, a process called throttling.<br /><br /><strong>3. Take your time:</strong><br />You don&rsquo;t need to perform the staged migration at a lightning pace and then immediately wipe out your local Exchange Server. Despite pressures to simplify and keep support costs under control, according to Posey, &ldquo;Hybrid Exchange Server deployments have been well tested.&rdquo; If your organization adheres to Microsoft recommended best practices, the hybrid coexisting approach will run smoothly.<br /><br /><em><strong>Finally, look out for the &ldquo;gotchas.&rdquo;</strong></em><br />In an <em>InfoWorld</em> online <a href="http://www.infoworld.com/article/2604770/office-software/top-10-office-365-migration-gotchas-to-avoid.html">piece</a>, Peter Bruzzese lists 10 major Office 365 migration gotchas. His Office 365 &ldquo;gotcha No. 5&rdquo; has warnings about archived email and slow data extract speed. Exporting Outlook PST files and potential database corruption issues need to be attended to before you press the &ldquo;execute&rdquo; button.<br />Then there is &ldquo;gotcha No. 7&rdquo; and its advice to know the online limitations of Exchange. The default 14-day message retrieval limit (maximum 30 days) could be one incentive for maintaining a local archiving capability, or go the <a href="https://support.microsoft.com/en-us/kb/2714467">Litigation Hold</a> route for indefinite retention.<br /><br /><em><strong>Need some help in migrating to Office 365?</strong></em><br />Easy I.T. is the trusted choice when it comes to Office 365 deployment. We&rsquo;re also at the vanguard of information technology, staying ahead with the latest tips, tricks, and news. Contact us at <a href="tel:1300 327 948">1300 327 948</a> or send us an email at <a href="mailto:info@easyIT.com.au">info@easyIT.com.au</a> for more information.<br /></div>]]></content:encoded></item><item><title><![CDATA[10 Tips for Windows 10]]></title><link><![CDATA[http://www.easyit.com.au/latest-news/10-tips-for-windows-10]]></link><comments><![CDATA[http://www.easyit.com.au/latest-news/10-tips-for-windows-10#comments]]></comments><pubDate>Fri, 21 Sep 2018 06:07:26 GMT</pubDate><category><![CDATA[Tips]]></category><category><![CDATA[Windows 10]]></category><guid isPermaLink="false">http://www.easyit.com.au/latest-news/10-tips-for-windows-10</guid><description><![CDATA[ 	 		 			 				 					 						  Windows 10 is truly the marriage of the best of Windows 7 and 8 &ndash; you get the incredibly fast start time and improved security of Windows 8 with the Windows 7 ease of use over the UI.Whether you are a professional Windows tweaker or a new user, here are 10 tips that will definitely improve your experience with Windows 10.   					 								 					 						          					 							 		 	       GodModeOn your root drive, create a new folder. Rename it into the string &ld [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-multicol"><div class="wsite-multicol-table-wrap" style="margin:0 -15px;"> 	<table class="wsite-multicol-table"> 		<tbody class="wsite-multicol-tbody"> 			<tr class="wsite-multicol-tr"> 				<td class="wsite-multicol-col" style="width:50%; padding:0 15px;"> 					 						  <div class="paragraph">Windows 10 is truly the marriage of the best of Windows 7 and 8 &ndash; you get the incredibly fast start time and improved security of Windows 8 with the Windows 7 ease of use over the UI.<br /><br />Whether you are a professional Windows tweaker or a new user, here are 10 tips that will definitely improve your experience with Windows 10.<br /></div>   					 				</td>				<td class="wsite-multicol-col" style="width:50%; padding:0 15px;"> 					 						  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="http://www.easyit.com.au/uploads/2/6/3/9/26393168/published/depositphotos-203273266-stock-photo-paris-france-jan-2015-windows.jpg?1537510182" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>   					 				</td>			</tr> 		</tbody> 	</table> </div></div></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><strong>GodMode</strong><br /><br />On your root drive, create a new folder. Rename it into the string &ldquo;GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}.&rdquo; You will get a new icon on your desktop. Click it and experience a new control panel that gives you incredible reach and power in one place.<br /><br /><strong>Privacy Settings</strong><br /><br />Custom install Windows 10 so that you can fully modify all of your privacy settings. You will not be able to do this with an Express install.<br /><br /><strong>Handling Virtual Desktops<br /></strong><br />Windows 10 gives users the ability to handle virtual desktops without the need for additional setup. Get started by clicking the Task View icon, and dragging your new apps into the virtual desktop with the +New Desktop option in the lower right corner of the screen.<br /><br /><strong>Upgrading Your Desktop Style<br /></strong><br />You can personalize your desktop with more features than ever before in Windows 10. Find everything you need from the Start Menu under Settings. Click on Personalization and then Colors, and pick &ldquo;show color.&rdquo; You will be able to take away the natural translucence of the Start Menu if you like,and you can also apply your new color under all of your open app icons.<br /><br /><strong>Automatic PDF Documents<br /></strong><br />Finally, Windows 10 gives you the ability to print straight to PDF without the need for a third party app! When you print any document, look for this new feature under the Print menu.<br /><br /><strong>Your WiFi Network<br /></strong><br />Windows 10 automatically comes with the ability to sense your WiFi network. If this makes you feel a bit awkward, because Windows can access the network without your password &ndash; you can turn it off. However, you should know that this is the default behavior of the Windows 10 system.<br /><br /><strong>Running Windows 10 in a Virtual Machine<br /></strong><br />You can install Windows 10 into a virtual machine if you do not want to upgrade your main hardware. The difference between a virtual install is that you are basically creating an entire virtual OS over the OS you already have running, instead of installing a completely new system.<br /><br /><strong>Scheduling Your Automatic Updates<br /></strong><br />If you are tired of the pop ups and automatic resets that previous Windows systems made you undergo, you can schedule your own updates on your schedule. Click on the Start Menu and go to Settings. From here, the Update and Recovery menu will have an option called Windows Update. Set the timing that you feel most comfortable with, and take control back from automatic updates.<br /><br /><strong>Saving Your Battery<br /></strong><br />Windows 10 automatically begins to bottleneck your less important services if your battery is running low on a laptop. This allows you to get the most out of each charge of your battery. To turn on the Battery Saver, go to the Start Menu, click on Settings, go to System and look for Battery Saver.<br /><br /><strong>You Can Background Scroll<br /></strong><br />In previous versions of Windows, you would not be able to scroll over a window with your mouse if that window was not the active one. Windows 10 fixes this. Turn on the option in the Settings menu under Devices. Look for the Mouse and Touchpad option, and you can easily change your mouse options to scroll over background items without having to select them specifically.<br /></div>]]></content:encoded></item><item><title><![CDATA[Why Did My Email Bounce?]]></title><link><![CDATA[http://www.easyit.com.au/latest-news/why-did-my-email-bounce]]></link><comments><![CDATA[http://www.easyit.com.au/latest-news/why-did-my-email-bounce#comments]]></comments><pubDate>Fri, 21 Sep 2018 05:57:41 GMT</pubDate><category><![CDATA[Email]]></category><guid isPermaLink="false">http://www.easyit.com.au/latest-news/why-did-my-email-bounce</guid><description><![CDATA[ 	 		 			 				 					 						  Email is still the most common way businesses communicate and the majority of people simply click send and assume their email is delivered, but when email messages bounce, there are a few things you should know.   					 								 					 						          					 							 		 	       How Emails WorkThe two most common protocols used to deliver your emails are Simple Mail Transfer Protocol (SMTP) and Extended SMTP (ESMTP). Each one has a set of codes it uses to identify what h [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-multicol"><div class="wsite-multicol-table-wrap" style="margin:0 -15px;"> 	<table class="wsite-multicol-table"> 		<tbody class="wsite-multicol-tbody"> 			<tr class="wsite-multicol-tr"> 				<td class="wsite-multicol-col" style="width:50%; padding:0 15px;"> 					 						  <div class="paragraph">Email is still the most common way businesses communicate and the majority of people simply click send and assume their email is delivered, but when email messages bounce, there are a few things you should know.<br /></div>   					 				</td>				<td class="wsite-multicol-col" style="width:50%; padding:0 15px;"> 					 						  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="http://www.easyit.com.au/uploads/2/6/3/9/26393168/published/depositphotos-5439676-stock-photo-email-inbox.jpg?1537509731" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>   					 				</td>			</tr> 		</tbody> 	</table> </div></div></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><strong>How Emails Work</strong><br /><br />The two most common protocols used to deliver your emails are Simple Mail Transfer Protocol (SMTP) and Extended SMTP (ESMTP). Each one has a set of codes it uses to identify what happens during the delivery, and you never see these.<br /><br />Unless there&rsquo;s a problem. Then you will see a string of information that tells you very little, unless you know the code. Since most organizations use a managed IT service to decipher and correct problems like these, they don&rsquo;t need to learn every configuration and the descriptions, but it is helpful to know the general issues that are causing your emails to bounce.<br /><br /><strong>Simple Fixes</strong><br /><br />First, you want to eliminate the obvious. A misplaced period, missing letter, or misspelling is the easiest to correct. Double-check that you have accurate information.<br /><br />If you have the information right, the problem could be on the recipient&rsquo;s end. Their mailbox could be full, or their server might not be locatable.<br /><br />Perhaps the recipient is on vacation, in which case you could get an auto notification. This is not a bounce. It simply means they are not able to respond, but the email address is valid.<br /><br />If the email address is listed as blocked, you may have to contact the person to have them either add you to their whitelist, which is their safe list, or get a different email address from them you can use to contact them.<br /><br /><strong>Deciphering the Codes</strong><br /><br />When an email can&rsquo;t be delivered you&rsquo;ll see the SMTP codes. Those that begin with the number 4 indicate a temporary problem, and your server will keep trying to deliver. If you don&rsquo;t see another bounce, the delivery was likely successful. If your server continues to try and still can&rsquo;t get through, it will finally stop and let you know that it gave up.<br /><br />If the code begins with a 5, this means it&rsquo;s a permanent error, and your server will not try to deliver it again. A 550 tells you this is because the mailbox was unavailable, due to an incorrect email address or related issue.<br /><br />A 552 error code will tell you the mailbox is full, or the message is too long or too big, based on the parameters set by the recipient&rsquo;s mailbox.<br /><br />The ESMTP codes use the three digits, but with periods between each digit. Those beginning with 4&rsquo;s are still temporary, and 5&rsquo;s are still permanent, but there are more details. For example, a 5.1.1 means the address part, left of the @, does not exist. If it&rsquo;s the address section on the right of the @ that&rsquo;s non-existent, then the code is 5.1.2. A code of 5.3.2 means the recipient&rsquo;s email system won&rsquo;t accept the message, possibly because it&rsquo;s undergoing repair or maintenance.<br /><br />After you review all the information, if you still find your emails are bouncing, it&rsquo;s time to consult the experts. Your managed services IT company will be able to get the situation resolved and your connections restored.<br /><br />Easy I.T. is the trusted choice when it comes to resolving email and other technical issues, staying ahead of the latest information technology with valuable tips, tricks, and news. Contact us at <a href="tel:1300 327 948">1300 327 948</a> or send us an email at <a href="mailto:info@easyIT.com.au">info@easyIT.com.au</a> for more information.<br /></div>]]></content:encoded></item><item><title><![CDATA[The Cost of Cybercrime]]></title><link><![CDATA[http://www.easyit.com.au/latest-news/the-cost-of-cybercrime]]></link><comments><![CDATA[http://www.easyit.com.au/latest-news/the-cost-of-cybercrime#comments]]></comments><pubDate>Fri, 21 Sep 2018 05:32:32 GMT</pubDate><category><![CDATA[Cybercrime]]></category><category><![CDATA[Security]]></category><guid isPermaLink="false">http://www.easyit.com.au/latest-news/the-cost-of-cybercrime</guid><description><![CDATA[ 	 		 			 				 					 						  We think of cybercrime as something that happens to someone else. Data thieves go after big companies; don&rsquo;t they?The fact is, though, that anyone can be a target. If you&rsquo;re on the Internet, hostile people regularly use machines to probe your servers for weaknesses. If they find one, it can cost you seriously.   					 								 					 						          					 							 		 	       A white paper by Hamilton Place Strategies estimates that cybercrime had a worldwid [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-multicol"><div class="wsite-multicol-table-wrap" style="margin:0 -15px;"> 	<table class="wsite-multicol-table"> 		<tbody class="wsite-multicol-tbody"> 			<tr class="wsite-multicol-tr"> 				<td class="wsite-multicol-col" style="width:50%; padding:0 15px;"> 					 						  <div class="paragraph">We think of cybercrime as something that happens to someone else. Data thieves go after big companies; don&rsquo;t they?<br /><br />The fact is, though, that anyone can be a target. If you&rsquo;re on the Internet, hostile people regularly use machines to probe your servers for weaknesses. If they find one, it can cost you seriously.<br /></div>   					 				</td>				<td class="wsite-multicol-col" style="width:50%; padding:0 15px;"> 					 						  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="http://www.easyit.com.au/uploads/2/6/3/9/26393168/published/depositphotos-61533555-stock-photo-computer-crime-concept-macro-photo.jpg?1537509289" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>   					 				</td>			</tr> 		</tbody> 	</table> </div></div></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph">A <a href="http://www.hamiltonplacestrategies.com/sites/default/files/newsfiles/HPS%20Cybercrime2_0.pdf">white paper by Hamilton Place Strategies</a> estimates that cybercrime had a worldwide cost of $445 million in 2014, a bigger number than Microsoft&rsquo;s or Exxon Mobil&rsquo;s market capitalization. The median cost of a cybercrime nearly tripled between 2010 and 2015.<br /><br />The cost doesn&rsquo;t come just in direct harm, such as downtime, loss of data and recovery costs, but also in loss of reputation and legal liability. When an attacker grabs people&rsquo;s credit card numbers &mdash; or even when there&rsquo;s a reasonable chance it might have happened &mdash; customers are reluctant to do business with the same company again. You might have to mollify them with some kind of compensation.<br /><br />Organizations might be legally liable for not being careful enough. If you handle personal health records, and they&rsquo;re breached, the federal government might hit you with a fine under HIPAA, which can be as high as $50,000 per incident. If you&rsquo;re managing a publicly traded business and fail to protect against financially related breaches, the business might have to pay a fine under federal law.<br /><br /><strong>Types of attacks<br /></strong><br />The biggest single danger is <strong>social engineering attacks</strong>, which play on people&rsquo;s trust. The usual form is a &ldquo;phishing&rdquo; email, which tries to trick you into divulging information. It may pretend to be a legal notice or a document from a colleague or customer. If you&rsquo;re fooled, you might give them an important password or let them install malicious software on your computer.<br /><br />The fastest growing threat is <strong>ransomware</strong>, which carries a very direct and painful cost. If this hits your computer, it encrypts your documents, and you have to pay an extortion fee through an anonymous channel to get them restored. <a href="http://www.latimes.com/business/technology/la-me-ln-hollywood-hospital-bitcoin-20160217-story.html">One hospital had to pay $17,000</a> to get its systems running again.<br /><br />Other channels of attack besides email include easily guessed passwords, insecure form processing and defects in server software. Attackers are constantly discovering new ways to exploit security holes and prey on people&rsquo;s trust. It&rsquo;s very hard to keep track of them all.<br /><br /><strong>How to protect yourself<br /></strong><br />Guarding against cybercrime requires having at least one person on board who really understands computer security issues. A managed services company is often the best way to do this, especially for a small business. You&rsquo;ll get recommendations and services that will keep you much safer. Backup, keeping software up to date and implementing employee policies may seem annoying at first, but they&rsquo;ll become part of standard procedure.<br /><br />Training is important. I realize it&rsquo;s difficult for managers to make the time, but managers need to learn about security risks and understand how to set a policy that will keep employees from making expensive mistakes.<br /><br />Everyone is vulnerable to online criminals, and there&rsquo;s no such thing as 100 percent safety on the Internet. By taking the right precautions, though, you can eliminate the large majority of the threats to your business.<br /><br />Easy I.T. is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at <a href="tel:1300 327 948">1300 327 948</a> or send us an email at <a href="mailto:info@easyIT.com.au">info@easyIT.com.au</a> for more information.<br /></div>]]></content:encoded></item></channel></rss>