IMPORTANT: If you do inadvertently get hit by Ransomware, do not attempt to clean it as the decryption key required to retrieve the files, is part of the offending software.
If you do not have a viable backup to retrieve your files from, it is the only way to retrieve your files from the cybercrook.
You should shutdown the system, unplug it from the network
(or turn off your wireless) and contact IT support immediately, the longer you wait,
the more files it will potentially encrypt and the higher the ransom amount. (the ransom usually depends on the number of files and the amount of time it resides on your system).
Please note that the Ransomware and Malware usually come in emails and masquerade as items from
These files are in the form of ZIP or EXE files – and extreme caution should be taken when handling them (if you are not sure about the email or the attachment – DO NOT OPEN IT)
We still recommend that everyone be vigilant in regards to opening emails, attachments and browsing websites. Downloading and opening files WILL bypass most security measures, even if you have an antivirus on your PC – essentially the user can override the security software. In the case of ransomware there is currently no security software capable of stopping the software from running once the file has been opened.
To highlight the importance of making sure before opening files and the server backups please see the link below.
In some cases, the ransom amount may be unfeasible as noted in the article below –
If you are unsure of require more information please do not hesitate to contact us on 9488 3313.
Subject: ISIS attacks in Sydney
The email includes an attachment which contains malicious code and also includes a news.com.au link.
If you receive said email, please delete it.
If you have inadvertently opened the attachment, your computer could be infected and you should refer to your IT technician for cleaning or removal of the infection, or contact Precise for the appropriate IT Solutions.
If you haven't yet found a reason to choose iPhone 6 as an option, this video may help your decision.
This footage of the Perth IGA Royal Show was shot entirely using the iPhone 6 without any editing.
The raw footage shows how the camera held up under low light conditions.
Camera enthusiasts will recognize that this a feat that virtually no smartphone camera (or even some conventional cameras) can stand up to.
More information is held on the YouTube site that this video is posted on. Best viewed in HD format. It also has a nice accompanying music mix as well :)
Power has been restored to our facilities. Thank you for your kind patience.
Dear Valued Clients.
Due to a Western Power issue, the Myaree grid (where our offices are located) are without power.
We are currently running on backup generators for our primary servers and backup services but our service centre is closed until power is restored.
Western Power estimate power to be back on by 4 pm today (14th July 2014).
We apologise for any inconvenience caused.The Precise IT Team
Microsoft will be officially ending support for mainstream Windows 7 in January 2015.
For more information please see the following article
Another cloud provider has experienced a failure causing end users of their services to be without data for 2 days. For more details please read the related link below.Cloud outages can costs millions of dollars in productivity as your users and workers sit idle while the cloud provider struggles to bring services back online.
Sydney Cloud Provider Dimension Data fails - no service for 2 days
It was recently found that Microsoft modifies files that a synced to their OneCloud system, and places a Universally Unique Identifier (UUID) code into files that are synced to their cloud system… to read more, click the link below…
Please be aware that this can happen and may have negative repercussions, especially when considering the new privacy law and legal repercussions of using files that have unknowingly been modified by a third party (as per excerpt…)
"... let’s say a file is used as evidence in a court case. How do you prove that the company did not intentionally modify it?" he said.
This has only been discovered on the Microsoft Cloud system a few days ago, and being so, I am sure more IT security experts will be researching the filing methods of other cloud providers to see if any other code is injected into the files as they get synced.
To expand on the finding, as Microsoft relies on technology to do the code injection – it is not unforeseeable that other cloud companies are doing the same, and that any files placed in the cloud for backup purposes or otherwise, may potentially be affected or even get corrupted if additional code is injected into the files e.g. what would happen if an accounting file such as MYOB, Quicken, Attaché, etc., is backed up to the cloud, and some code is injected into the file. This could potentially make said file corrupted and/or unusable due to the additional lines of code which could have been placed in the file.
It also brings to light that if Microsoft can inject code into the files, the same technology is potentially able to extract code or information from said files during the syncing process as well, if used by unsavoury characters.
Food for thought and awareness.
As of the January 21, 2014, Logmein removed the availability of the Logmein Free service. This means that users will have to now purchase the PRO version of their software if they wish to continue using the Logmein software as a service (SAAS).
For personal users, there are some free alternatives to the Logmein Free. Here are our top 5 alternatives to Logmein Free.
4. Dell Wyse PocketCloud
Precise iT will be closing for the Christmas and New Year period from the 20th of December 2013, till the 6th of January 2014.
In case of emergency, we are contactable on 0412 388 866.
We would like to take this opportunity to wish all our friends and valued clients a very Merry Christmas and a Happy New Year.
We look forward to being of continued service to you in 2014.