<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Guides Archives - Small Space IT</title>
	<atom:link href="https://www.small-space.com.au/category/guides/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.small-space.com.au/category/guides/</link>
	<description></description>
	<lastBuildDate>Tue, 09 Dec 2025 15:10:58 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://www.small-space.com.au/wp-content/uploads/2025/06/cropped-Small-Space-Logo-2025-32x32.jpg</url>
	<title>Guides Archives - Small Space IT</title>
	<link>https://www.small-space.com.au/category/guides/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Protect Your Business During the Holiday Shutdown – IT Checklist for Forbes Businesses</title>
		<link>https://www.small-space.com.au/holiday-it-checklist-forbes-businesses/</link>
					<comments>https://www.small-space.com.au/holiday-it-checklist-forbes-businesses/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 09 Dec 2025 15:10:57 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Guides]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.small-space.com.au/?p=2710</guid>

					<description><![CDATA[<p>Introduction: Why the Holiday Break Is Risky for Your Tech When your business closes for Christmas, your computers, servers, and office equipment don’t take a holiday. They sit there—unattended, vulnerable, and exposed to risks like: The good news? With a simple checklist, you can lock down your business tech before you lock the front door. ... <a title="Protect Your Business During the Holiday Shutdown – IT Checklist for Forbes Businesses" class="read-more" href="https://www.small-space.com.au/holiday-it-checklist-forbes-businesses/" aria-label="Read more about Protect Your Business During the Holiday Shutdown – IT Checklist for Forbes Businesses">Read more</a></p>
<p>The post <a href="https://www.small-space.com.au/holiday-it-checklist-forbes-businesses/">Protect Your Business During the Holiday Shutdown – IT Checklist for Forbes Businesses</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">Introduction: Why the Holiday Break Is Risky for Your Tech</h3>



<p>When your business closes for Christmas, your computers, servers, and office equipment don’t take a holiday. They sit there—unattended, vulnerable, and exposed to risks like:</p>



<ul class="wp-block-list">
<li><strong>Unmonitored systems</strong> that can crash without anyone noticing</li>



<li><strong>Break‑ins or theft</strong> when offices are empty</li>



<li><strong>Summer storms and heat</strong> that can knock out power or cooling</li>
</ul>



<p>The good news? With a simple checklist, you can lock down your business tech before you lock the front door. Here’s how Forbes businesses can avoid January disasters.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">1. Data Backup – Don’t Risk Losing Everything</h3>



<p>Think of backups as insurance for your digital life. If your systems fail while you’re away, a backup means you don’t lose critical files.</p>



<ul class="wp-block-list">
<li><strong>Do a full backup before closing.</strong> Copy all important files, databases, and emails.</li>



<li><strong>Test your restore.</strong> A backup is useless if you can’t restore it. The best way to test is inside a <strong>virtual machine</strong> (using tools like <a href="https://reolink.com/">VirtualBox</a> or <a href="https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/get-started/install-hyper-v?tabs=gui&amp;pivots=windows">Hyper‑V</a>). That way, you can simulate a full system recovery without touching your live environment.</li>



<li><strong>Get help if needed.</strong> Small Space IT can assist with test restorations to make sure your backups actually work.</li>



<li><strong>Keep an offsite or cloud copy.</strong> If your office burns down or is broken into, a local backup won’t help. Cloud storage or an external drive kept offsite is safer.</li>
</ul>



<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <em>Beginner tip:</em> Try restoring a single file into a test environment. If that works, you’re on the right track.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">2. Security – Lock Down Digital and Physical Access</h3>



<p>Holiday shutdowns are prime time for hackers and thieves. Protect both your systems and your gear.</p>



<ul class="wp-block-list">
<li><strong>Update passwords.</strong> Use strong, unique passwords.</li>



<li><strong>Enable two‑factor authentication (2FA).</strong> This adds a second lock to your accounts—like a code sent to your phone.</li>



<li><strong>Check antivirus and updates.</strong> Make sure your antivirus software is current and your systems have installed the latest patches.</li>



<li><strong>Check CCTV cameras and recorders.</strong> Clean the lenses, confirm they record properly, and test that they work in low‑light/night conditions.</li>



<li><strong>Know your provider.</strong> Small Space IT holds a <strong>NSW Class 2BC security license and a master license</strong>, and we’re a reseller for <strong><a href="https://reolink.com/">Reolink cameras</a></strong>. That includes hard‑wired systems, solar‑powered wireless cameras, and even 4G cameras for farms and sheds. We can also troubleshoot <strong>Reolink, Hikvision, Micron, and most other systems</strong>.</li>



<li><strong>Secure equipment physically.</strong> Lock server rooms, secure laptops, and don’t leave devices visible through windows.</li>
</ul>



<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <em>Beginner tip:</em> If you’ve never set up 2FA, start with your email—it’s the most common target. Free apps like <strong><a href="https://www.microsoft.com/en-au/security/mobile-authenticator-app">Microsoft Authenticator</a></strong> and <strong><a href="https://support.google.com/accounts/answer/1066447">Google Authenticator</a></strong> make it simple to add that extra layer of protection.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">3. Power Protection – Guard Against Summer Storms</h3>



<p>In Central West NSW, summer storms and heat can knock out power or damage equipment.</p>



<ul class="wp-block-list">
<li><strong>Use surge protectors.</strong> Proper surge protection is essential.</li>



<li><strong>Install UPS systems (Uninterruptible Power Supplies).</strong> These keep <strong>servers, POS systems, networking gear, and other critical equipment</strong> running long enough to shut down safely.</li>



<li><strong>Shut down non‑essential systems.</strong> If you don’t need a server running over the break, power it down properly.</li>



<li><strong>Environmental monitoring.</strong> If you have servers cooled by air conditioning, cheap Wi‑Fi‑based monitors can alert you if the temperature rises unexpectedly.</li>
</ul>



<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <em>Beginner tip:</em> A UPS is like a battery backup. It doesn’t keep things running forever, but it gives you time to shut down safely.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">4. Remote Access – Plan for Emergencies</h3>



<p>What if something goes wrong while you’re away? Remote access lets you (or your IT support) jump in without driving back to the office.</p>



<ul class="wp-block-list">
<li><strong>Set up VPN access.</strong> A VPN (Virtual Private Network) is a secure way to connect to your office systems. It’s also a great tool for owners and key staff to check in remotely.</li>



<li><strong>Decide who has keys and passwords.</strong> Make sure only trusted staff or your IT provider can get in.</li>



<li><strong>Test remote connections before you leave.</strong> Don’t wait until Christmas Day to find out your VPN doesn’t work.</li>
</ul>



<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <em>Beginner tip:</em> Think of a VPN as a secure tunnel between your laptop and your office network.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">5. Emergency Contacts – Know Who to Call</h3>



<p>Not every problem is urgent, but some can’t wait until January. The key is to <strong>define what counts as an emergency and who to call</strong>.</p>



<ul class="wp-block-list">
<li><strong>System failures (servers, POS, networking outages):</strong> Call <strong>Small Space IT</strong>. We can diagnose and restore critical systems quickly.</li>



<li><strong>CCTV failures or suspicious activity:</strong> Call <strong>Small Space IT</strong>. We can troubleshoot <strong>Reolink, Hikvision, Micron, and most other systems</strong>, clean lenses, and confirm cameras record properly in low‑light/night conditions.</li>



<li><strong>Malware or suspected hacking:</strong> Call <strong>Small Space IT</strong> immediately. We can isolate infected systems, clean them, and secure your network.</li>



<li><strong>Refrigeration/aircon failures in server rooms:</strong> Call your <strong>refrigeration/aircon technician</strong>. Environmental monitoring can alert you, but cooling repairs need a licensed refrigeration specialist.</li>



<li><strong>Power failures:</strong> First check if it’s an <strong><a href="https://www.essentialenergy.com.au/outages-and-faults/power-outages">Essential Energy outage</a></strong>. If not, call your <strong>electrician</strong> to investigate and repair.</li>



<li><strong>Break‑ins or theft:</strong> Call the <strong>police first</strong>. Once the site is secure, call <strong>Small Space IT</strong> to check systems, reset passwords, and review CCTV footage.</li>



<li><strong>Printer problems:</strong> Depends on context.
<ul class="wp-block-list">
<li>Generic reports? Can wait until reopening.</li>



<li>Emergency paperwork like <strong>passport replacements, printed plane tickets, or government documents of any kind</strong>? Treat as urgent—call <strong>Small Space IT</strong> if you need immediate printing support. Worst case, you can print those documents on one of our many printers.</li>
</ul>
</li>
</ul>



<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <em>Beginner tip:</em> Write down both your <strong>IT support number</strong> and other critical contacts (police, electrician, refrigeration/aircon, landlord) on a single sheet near the office phone. Free apps like <strong><a href="https://www.microsoft.com/en-au/security/mobile-authenticator-app">Microsoft Authenticator</a></strong> and <strong><a href="https://support.google.com/accounts/answer/1066447">Google Authenticator</a></strong> are also worth installing before the break to lock down your accounts. <strong>If you use another IT support business, write down their number. If you don’t have IT support or you’re an existing client, write down our number.</strong></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Outro: Peace of Mind for Forbes Businesses</h3>



<p>Closing your doors for Christmas shouldn’t mean opening the door to IT disasters. With this checklist, you can enjoy your break knowing your business tech is safe, backed up, and protected.</p>



<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4de.png" alt="📞" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong><a href="https://www.small-space.com.au/contact-us/">Call Small Space IT today to book your pre‑holiday IT audit</a>.</strong> We’ll make sure your systems are ready before the shutdown, so you can relax with peace of mind.</p>
<p>The post <a href="https://www.small-space.com.au/holiday-it-checklist-forbes-businesses/">Protect Your Business During the Holiday Shutdown – IT Checklist for Forbes Businesses</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.small-space.com.au/holiday-it-checklist-forbes-businesses/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Trust &#038; Ethics in Computer Repair</title>
		<link>https://www.small-space.com.au/trust-ethics-in-computer-repair/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 18 May 2021 01:39:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Guides]]></category>
		<guid isPermaLink="false">https://www.small-space.com.au/?p=1352</guid>

					<description><![CDATA[<p>Trust is an essential factor in selecting someone to repair your computer or mobile device. Anyone you choose will have access to your entire digital life on an expensive machine. Just like most people hire a motor mechanic to work on their car when it breaks down, most people don’t have the technical expertise to ... <a title="Trust &#038; Ethics in Computer Repair" class="read-more" href="https://www.small-space.com.au/trust-ethics-in-computer-repair/" aria-label="Read more about Trust &#038; Ethics in Computer Repair">Read more</a></p>
<p>The post <a href="https://www.small-space.com.au/trust-ethics-in-computer-repair/">Trust &#038; Ethics in Computer Repair</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Trust is an essential factor in selecting someone to repair your computer or mobile device. Anyone you choose will have access to your entire digital life on an expensive machine.</p>



<p>Just like most people hire a motor mechanic to work on their car when it breaks down, most people don’t have the technical expertise to fix their own computers.</p>



<p>There is no shame in not having the technical expertise to repair your own computer, just like you might not have the skills to repair your car.</p>



<p>Not all PC repair services are the same. Different businesses have different specialities and skillsets. Some are more trustworthy than others. Some spend a lot of money on marketing, while others purely rely on word of mouth. This blog post will give you some ideas on picking someone you can trust to work on your computer and mobile devices.</p>



<h2 class="wp-block-heading">Understanding Online Reviews</h2>



<p>Not all online reviews are the same. Some sites offer fake positive online reviews to businesses. They’ll try to fake it until they make it or worse still fake it to cover failings. Fortunately, if you know what to look for, you can quickly tell fake reviews apart from genuine reviews.</p>



<h3 class="wp-block-heading">Generic Names Or Imageless Profiles</h3>



<p>Some fake review services will use large numbers of fake profiles with names like John Smith or Alice Roberts. These services rarely go through the effort of uploading pictures to their fake profiles. If they do, often the photos don’t match the nationality or genders of the names.</p>



<h3 class="wp-block-heading">Check The Spelling &amp; Grammar</h3>



<p>Fake reviews are often outsourced to content farms in countries where English is not the native language. Such reviews are riddled with spelling mistakes or grammatical errors and tend to sound the same thanks to being based on the same script.</p>



<h3 class="wp-block-heading">Look For Reviews In The Middle</h3>



<p>Most people only go to the effort of posting a review if they have a really great experience or an abysmal experience. Even someone with excellent experience may post about some minor gripes. Someone with an abysmal experience could have some positive remarks.</p>



<h3 class="wp-block-heading">Lots of Reviews In A Short Time</h3>



<p>Fake Review services will often post their entire order of reviews in a short time. If you spot lots of positive or negative reviews that all sound the same with similar mistakes, you’ve found someone who has used a fake review service. Or is the victim of a rival using such a service in the case of negative reviews.</p>



<h3 class="wp-block-heading">Resources For Learning More About Fake Reviews</h3>



<p><a href="https://www.lifehacker.com.au/2019/10/how-to-tell-if-an-online-review-is-fake/">Lifehacker – How To Tell If An Online Review Is Fake</a></p>



<p><a href="https://www.accc.gov.au/business/advertising-promoting-your-business/managing-online-reviews">ACCC – Managing Online Reviews</a></p>



<h2 class="wp-block-heading">Word of mouth</h2>



<p>How often do you tell your friends about the latest café or restaurant you have enjoyed? Ask your friends for recommendations for a computer repair business that they trust. Ask them about places they have had bad experiences with and why.</p>



<p>Things to ask about include: Price, Warranty, Timeframe customer service, Did they come to you and speciality.</p>



<p>The best place to find a trustworthy computer technician is through friends and family’s experiences.</p>



<p>Some complaints can be a good thing. For example, people complaining about a technician refusing to reinstall their pirated version of Windows or Office.</p>



<p>It is illegal for a technician to install pirated software, and pirated software is a common vector for malware infection.</p>



<p>Another example is a legitimate technician will not help you hack your neighbour’s wifi for free internet.</p>



<h2 class="wp-block-heading">Costs</h2>



<p>Did the business discuss costs with you during the booking? Will you be paying per hour, or will it be a fixed price for the job? Did they mention the possibility of needing to replace parts or having to wait for long scans to finish?</p>



<p>I’ll give an example of my own pricing here. If I am doing an onsite job, I charge by the hour, but I will quote a fixed price for the job if I am doing the job back in my workshop.</p>



<p>The difference is that at my workshop, I can work on multiple machines at once. I can examine system logs on one device, looking for crashes while running long scans on another machine.</p>



<p>If I was at your site, I could only work on your devices. I must charge for the time I am at your location, even if I am sitting around waiting for automated scans to complete.</p>



<p>If I discover that a long scan is required through my diagnosis, I will suggest that the machine be brought back to my workshop and quote a fixed price for the rest of the job.</p>



<p>Another thing to consider is that do you actually need the parts? A good technician will provide you with the diagnostics or a proper explanation of how they concluded that a part needs replacement.</p>



<p>Are they trying to sell a whole new computer when all you need is a RAM upgrade or a solid-state disk upgrade? Modern computers tend to last a lot longer than previous generations of hardware. The most common upgrades in modern times are RAM and solid-state disks.</p>



<p>Sometimes, even if your system could use an upgrade, do you even need one if you only use the machine once a week and are happy to wait for things to load?</p>



<p>A good technician will work with you and take their time to adequately explain why things need to be done and work with you to create the solution that best suits your needs and budget.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>The goal is to find someone you can trust to repair your machine without ripping you off or stealing your data.</p>



<p>I hope these few tools that I have given you will help you find the right person to best fit your needs, even if it isn’t myself here at Small Space IT. I recommend that once you find someone, you trust you should stick with them.</p>



<p>If you want to use Small Space IT&#8217;s services to repair your computer please don&#8217;t hesitate to <a href="https://www.small-space.com.au/contact-us/">contact us today</a>.</p>
<p>The post <a href="https://www.small-space.com.au/trust-ethics-in-computer-repair/">Trust &#038; Ethics in Computer Repair</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to use an iPhone as a mobile hotspot</title>
		<link>https://www.small-space.com.au/how-to-use-an-iphone-as-a-mobile-hotspot/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 30 Jul 2020 05:07:23 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Guides]]></category>
		<guid isPermaLink="false">https://www.small-space.com.au/?p=1116</guid>

					<description><![CDATA[<p>Have you ever been in a situation where you need an internet connection for an iPad or laptop, but there is no Wi-Fi available? If you have an iPhone with a mobile plan that has a large data allowance, then you have a solution to your problem at hand. There are a couple of problems ... <a title="How to use an iPhone as a mobile hotspot" class="read-more" href="https://www.small-space.com.au/how-to-use-an-iphone-as-a-mobile-hotspot/" aria-label="Read more about How to use an iPhone as a mobile hotspot">Read more</a></p>
<p>The post <a href="https://www.small-space.com.au/how-to-use-an-iphone-as-a-mobile-hotspot/">How to use an iPhone as a mobile hotspot</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Have you ever been in a situation where you need an internet connection for an iPad or laptop, but there is no Wi-Fi available? If you have an iPhone with a mobile plan that has a large data allowance, then you have a solution to your problem at hand.</p>



<p>There are a couple of problems to keep in mind when using your iPhone as a portable hotspot but are solvable with some prior planning. Firstly, using your phone as a hotspot will eat through your battery life, so make sure to have a charger handy. Battery life is not a problem if you are at home or work and have an internet outage. If you are out in the field, you can easily pick up a car charger or power bank at many service stations.</p>



<p>Another problem is that many mobile plans come with low data limits. If you only need email or light browsing, then you should not need to worry too much about data. If you need a large volume of data, you should either upgrade your mobile service in advance or obtain a mobile plan with a large data volume.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="576" height="1024" src="https://small-space.com.au/wp-content/uploads/2020/07/Personal-Hotspot-576x1024.jpg" alt="" class="wp-image-1117" srcset="https://www.small-space.com.au/wp-content/uploads/2020/07/Personal-Hotspot-576x1024.jpg 576w, https://www.small-space.com.au/wp-content/uploads/2020/07/Personal-Hotspot-169x300.jpg 169w, https://www.small-space.com.au/wp-content/uploads/2020/07/Personal-Hotspot.jpg 750w" sizes="(max-width: 576px) 100vw, 576px" /><figcaption>This menu will allow you to enable personal hotspot and to get the network password.</figcaption></figure>



<p>To enable the hotspot feature on your iPhone, you need to enter Settings then navigate to Personal Hotspot. By default, anything sharing the same Apple iCloud account can connect to an iPhone’s mobile hotspot, but access for other devices must be manually enabled. To do this, select Allow others to join, and below is the password required to connect.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="576" height="1024" src="https://small-space.com.au/wp-content/uploads/2020/07/Allow-Password-576x1024.jpg" alt="" class="wp-image-1118" srcset="https://www.small-space.com.au/wp-content/uploads/2020/07/Allow-Password-576x1024.jpg 576w, https://www.small-space.com.au/wp-content/uploads/2020/07/Allow-Password-169x300.jpg 169w, https://www.small-space.com.au/wp-content/uploads/2020/07/Allow-Password.jpg 750w" sizes="(max-width: 576px) 100vw, 576px" /><figcaption>Allowing others to join will allow either non apple or apple devices not sharing an iCloud account to connect using a network password.</figcaption></figure>



<p>If you need to know the name of the network to connect to, you can find it under Settings > General > About. This menu can also tell you how many songs, videos, photos, and apps are stored on your phone, total storage, and free storage.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="576" height="1024" src="https://small-space.com.au/wp-content/uploads/2020/07/Network-Name-576x1024.jpg" alt="" class="wp-image-1119" srcset="https://www.small-space.com.au/wp-content/uploads/2020/07/Network-Name-576x1024.jpg 576w, https://www.small-space.com.au/wp-content/uploads/2020/07/Network-Name-169x300.jpg 169w, https://www.small-space.com.au/wp-content/uploads/2020/07/Network-Name.jpg 750w" sizes="(max-width: 576px) 100vw, 576px" /><figcaption>This menu will tell you how much space you have left on an iPhone.</figcaption></figure>



<p>Your internet speeds will be determined by how many other mobile users are in the area and what sort of signal strength your phone receives. To get the best speeds using your phone as a hotspot, you need to place it in an area that receives a good signal. You can buy dedicated hotspot units that work with an external antenna if you are in a spot with inadequate coverage, for example, are on a farm or in a forest.</p>



<p>In a future article, I will talk about using a dedicated hotspot and external antenna to get coverage in more challenging or remote areas.</p>
<p>The post <a href="https://www.small-space.com.au/how-to-use-an-iphone-as-a-mobile-hotspot/">How to use an iPhone as a mobile hotspot</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Free Antimalware Programs in 2019</title>
		<link>https://www.small-space.com.au/5-free-antimalware-programs-in-2019/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 09 Nov 2019 12:13:43 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Guides]]></category>
		<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Guide]]></category>
		<category><![CDATA[Malware]]></category>
		<guid isPermaLink="false">https://www.small-space.com.au/?p=1026</guid>

					<description><![CDATA[<p>In 2019 cybersecurity is more important than ever before; last year cybercrime cost the Australian economy approximately 1 billion dollars. Locking the doors is an option to keep the crooks out but, a digital bouncer in the form of antimalware software will allow legitimate access while keeping the crooks away from your files. Some of ... <a title="5 Free Antimalware Programs in 2019" class="read-more" href="https://www.small-space.com.au/5-free-antimalware-programs-in-2019/" aria-label="Read more about 5 Free Antimalware Programs in 2019">Read more</a></p>
<p>The post <a href="https://www.small-space.com.au/5-free-antimalware-programs-in-2019/">5 Free Antimalware Programs in 2019</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In 2019 cybersecurity is more important than ever before;
last year cybercrime cost the Australian economy approximately 1 billion
dollars. Locking the doors is an option to keep the crooks out but, a digital
bouncer in the form of antimalware software will allow legitimate access while
keeping the crooks away from your files. Some of the software I talk about will
detect an infection the moment it begins and stops it in its tracks while other
software will only pick up infections afterward during a scan. </p>



<p>No software will protect you from all threats, particularly
newly discovered threats, and while some antimalware programs can detect and
stop ransomware early in the process, having up to date backups is still
required for proper protection from ransomware attacks.</p>



<p>Antimalware programs with plugins for your browser of choice
can even protect you from malicious links that try to phish your passwords or
redirect you to malware downloads.</p>



<p>Below I will talk about five different antimalware programs
in no order.</p>



<ol class="wp-block-list"><li>Windows Defender – Windows Defender is a free
antimalware program that comes bundled with Windows. It won’t beat a paid
antimalware suite but, it will hold its own against some of the free offerings.
It can have a small to moderate impact on performance, protect all web browsers
and has basic parental controls. If you don’t think you have any antimalware
software installed and are running a recent version of Windows, then you are
probably already using Windows Defender.</li><li>AVG Free Edition – Excellent scores in tests but
slower scanning times. AVG and Avast share the same parent company, but AVG lacks
in features like browser plugins compared to its sister product Avast
Antivirus.</li><li>Bit Defender Antivirus Free Edition – Uses the
same engine as the paid version but lacks some of the advanced scanning
features. The free edition of Bit Defender does include browser plugins to
block known phishing and malicious web links.</li><li>Avast Free Antivirus – Developed by the same
company as AVG Anti-Virus but includes more features at the expense of
performance and is better for more powerful systems. Some of the extra features
include a Password manager and a network security scanner to perform basic
audits on your network devices.</li><li>Avira Antivirus – Great scores in testing but
has fallen by the wayside over the years since it was the best. Avira is heavy
on system resources and does not always detect the latest malware. It does have
many features, but often they are just trials for the paid version.</li></ol>



<p>I feel that Windows Defender is enough for most users, but
everyone has different requirements. Ultimately it is up to you to research and
determine which product, either free or paid, suits your needs the best so,
here are some websites that you can use to find a product that best suits your
individual needs.</p>



<p><a href="https://www.avg.com/en/signal/best-free-antivirus-software">https://www.avg.com/en/signal/best-free-antivirus-software</a>
Please note this company owns AVG and Avast Antivirus. I have included them
because they talk about rival products.</p>



<p><a href="https://www.tomsguide.com/us/best-free-antivirus,review-6003.html">https://www.tomsguide.com/us/best-free-antivirus,review-6003.html</a></p>



<p><a href="https://au.pcmag.com/antivirus/44373/the-best-free-antivirus-protection">https://au.pcmag.com/antivirus/44373/the-best-free-antivirus-protection</a></p>
<p>The post <a href="https://www.small-space.com.au/5-free-antimalware-programs-in-2019/">5 Free Antimalware Programs in 2019</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The basics of spam filtering</title>
		<link>https://www.small-space.com.au/the-basics-of-spam-filtering/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 09 Apr 2019 06:24:54 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Guides]]></category>
		<guid isPermaLink="false">https://www.small-space.com.au/?p=1003</guid>

					<description><![CDATA[<p>Unsolicited marketing and scam emails are called spam, and it is a big business with around 45% to 50% of emails sent being spam. Experts estimate that the top 100 cybercrime groups involved in spam are responsible for 80% of the total volume. Different groups have different motives for sending out such emails. Some groups ... <a title="The basics of spam filtering" class="read-more" href="https://www.small-space.com.au/the-basics-of-spam-filtering/" aria-label="Read more about The basics of spam filtering">Read more</a></p>
<p>The post <a href="https://www.small-space.com.au/the-basics-of-spam-filtering/">The basics of spam filtering</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Unsolicited marketing and scam emails are called spam, and it
is a big business with around 45% to 50% of emails sent being spam. Experts
estimate that the top 100 cybercrime groups involved in spam are responsible for
80% of the total volume.</p>



<p>Different groups have different motives for sending out such
emails. Some groups are trying to sell fake products or drugs; other groups are
trying to find targets for larger financial scams or phishing attacks to
harvest details for future cybercrime.</p>



<p>There are many different methods to protect yourself from
spam, and they can be client side in your email client or server side on your
domain’s email server.</p>



<p>Client-side filtering is the most flexible and can be
trained based on a user’s requirements. Email clients such as Microsoft Outlook
or Mozilla Thunderbird include a spam filter which can send suspected spam to a
quarantine folder for inspection. If you know a sender is good, you can
whitelist them, or if you don’t want email from someone, you can blacklist
them.</p>



<p>Server-side filtering is a bit different as the filters live
on the mail server you connect to for email. They are less flexible as you will
need to contact your administrator if you want to whitelist or blacklist
anyone. Filters on a mail server are often tuned to try, and best fit the needs
for an entire domain or organization rather than individual users and as such
can filter out the bulk but not the entirety of spam email.</p>



<p>Email services such as Google’s Gmail and Microsoft’s
Outlook.com include spam filtering which you can train per an account basis,
but the downside is you get a generic email address rather than something like johnsmith@companyname.com
which can better stand out to clients.</p>



<p>Email headers are easy to forge as security was not in mind
when Email was created back in the 1980s. Since then new extensions to the
standards have been created so that spammers can’t send email while pretending
to be someone else.&nbsp; These technologies
are called Sender Policy Framework and Domain Keys Identified Mail.</p>



<p>These two additions ensure that only the email servers
specified in a Doman’s DNS records can send email from that domain, an imposter
pretending to be from that domain will have their messages dropped by the
receiving server or automatically flagged as spam depending on how the
administrator configured the filters.</p>



<p>If a spam email is sent from a server in Australia or is
representing an Australian company, you can report it to the Australian
Communications And Media Authority using this web link: <a href="https://www.acma.gov.au/theACMA/make-a-spam-enquiry-or-provide-information-to-the-acma">https://www.acma.gov.au/theACMA/make-a-spam-enquiry-or-provide-information-to-the-acma</a></p>



<p>While you may receive only a small number of spam emails per
day, experts estimate that email spam costs the global economy over 20 billion
dollars per year in lost time and fraud.</p>



<p>A properly configured and trained spam filter may save you
five minutes per day but that time adds up over a year especially if you have
multiple email addresses or employees.</p>
<p>The post <a href="https://www.small-space.com.au/the-basics-of-spam-filtering/">The basics of spam filtering</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Three Reasons Your Small Business Needs A Website</title>
		<link>https://www.small-space.com.au/three-reasons-your-small-business-needs-a-website/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 13 Mar 2019 12:14:15 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Guides]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[Website]]></category>
		<guid isPermaLink="false">https://www.small-space.com.au/?p=990</guid>

					<description><![CDATA[<p>Introduction Having a website for your business is essential to showcase your business to new customers while building credibility. You may think that your business is too small to have a website, but the truth is that no business is too small to have a website. A website can be affordable, is easy to set ... <a title="Three Reasons Your Small Business Needs A Website" class="read-more" href="https://www.small-space.com.au/three-reasons-your-small-business-needs-a-website/" aria-label="Read more about Three Reasons Your Small Business Needs A Website">Read more</a></p>
<p>The post <a href="https://www.small-space.com.au/three-reasons-your-small-business-needs-a-website/">Three Reasons Your Small Business Needs A Website</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Introduction</h2>



<p>Having a website for your business is essential to showcase
your business to new customers while building credibility. You may think that your
business is too small to have a website, but the truth is that no business is
too small to have a website. A website can be affordable, is easy to set up and
build yourself and will improve your business.</p>



<h2 class="wp-block-heading">Availability</h2>



<p>Today’s world has moved past shopping between the hours of 9
to 5 on weekdays and many customers like being able to shop for items at a time
that suits them. A website is available 24/7/365 and is with modern smartphones
is available to the 9 to 5 office worker or the night shift worker.</p>



<p>An E-Commerce website can take orders from your customers 24
hours a day for a convenient shopping experience no matter if they are at work
or the beach then ship the product directly to their door.</p>



<h2 class="wp-block-heading">Professionalism</h2>



<p>Having a good-looking website can go a long way in making
your business look professional. Trades and craftspeople can show a portfolio
of previous work and shops can show off their range of products. </p>



<p>Another advantage of having a website is having your domain
name be a part of your email addresses. There are other benefits such as not
having to update marketing material and customers if you change ISPs or deal
with being blocked by spam filters if you use a free email service.</p>



<h2 class="wp-block-heading">Sales &amp; Marketing</h2>



<p>Being able to take orders online opens your business to a
potentially worldwide audience. With an E-Commerce site, you can sell directly
to customers online without them even being in the same region as your physical
store. Even if you decide not to sell online having a showcase of your products
can give potential customers a taste for what you sell and give them enough
information to save your staff time in answering customer inquiries.</p>



<p>Other advantages of having a website are that you can add it
to your social media presence, use tools like Google Analytics or the Facebook
Pixel to see demographic information such as customer’s interests, where they
are from or how they found your website to determine where to focus your
marketing budget.</p>



<h2 class="wp-block-heading">Overall</h2>



<p>We at Small Space IT can sit down with you and discuss any
questions you have about an online presence for your business. We can help you
with creating a website, setting up an E-Commerce store, product photography
and all your other business and personal IT and computer needs.</p>
<p>The post <a href="https://www.small-space.com.au/three-reasons-your-small-business-needs-a-website/">Three Reasons Your Small Business Needs A Website</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Some Password Tips</title>
		<link>https://www.small-space.com.au/some-password-tips/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 15 Jul 2018 06:41:53 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Guides]]></category>
		<guid isPermaLink="false">https://www.small-space.com.au/?p=984</guid>

					<description><![CDATA[<p>Security is an important consideration as a password could be the difference between staying safe and having your savings plundered or identity stolen. &#160; Never use just a single password for everything. – If that one password gets stolen, cracked or phished the attacker will have access to everywhere that you have used that password ... <a title="Some Password Tips" class="read-more" href="https://www.small-space.com.au/some-password-tips/" aria-label="Read more about Some Password Tips">Read more</a></p>
<p>The post <a href="https://www.small-space.com.au/some-password-tips/">Some Password Tips</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Security is an important consideration as a password could be the difference between staying safe and having your savings plundered or identity stolen.</p>
<p>&nbsp;</p>
<ul>
<li>Never use just a single password for everything. – If that one password gets stolen, cracked or phished the attacker will have access to everywhere that you have used that password from social media to online banking to even workplace logins.</li>
<li>Ensure Your Devices Are Secure – Having up to date antimalware protection and keeping your operating system and other important programs updated will help protect your devices from keyloggers and other malware that can steal saved passwords and other data such as pictures from your devices.</li>
<li>Longer Passwords are better – Each extra character for a theif to have to brute force ads exponentially more time to the cracking process. I suggest a minimum of 12 characters these days but longer is better.</li>
<li>Use Passphrases – Passphrases are several words strung together with a mixture of upper and lower chase characters, numbers and special characters added, it’s easier to remember passphrases. An example of a passphrase is: laUghing&amp;l0bster&lt;wheel</li>
<li>Use a Password Manager – A password manager such as Lastpass can store your passwords safely on your computer in a way where they are encrypted using a master password. A password manager allows you to use a separate strong password for each site that you can unlock with a strong password or passphrase that you can remember. You should treat it like a digital post-it note though and keep the master password secure.</li>
<li>Keep it out of plain site. You should keep your password out of view. If you must write it down don’t stick it on a post-it note on your monitor. Keep it somewhere safe like in a wallet, lock box or safe where only you have access to it.</li>
<li>Use multifactor authentication – These days many services offer the ability to verify your identity using a second factor such as SMS message, email, hardware token or mobile app to provide a code which you must enter to be able to log in. Once a device is known you may not have to use a second code to login again from that device but if someone does get your password they will not be able to log in without the multifactor code sent to you which can also let you know that someone is trying to hack your account.</li>
</ul>
<p>There are online passphrase and password generators that can help generate secure passwords such as <a href="http://www.dinopass.com/">http://www.dinopass.com/</a> and <a href="https://xkpasswd.net/s/">https://xkpasswd.net/s/</a> if you want to use random characters in passwords another site you can use is <a href="https://www.grc.com/passwords.htm">https://www.grc.com/passwords.htm</a></p>
<p>The post <a href="https://www.small-space.com.au/some-password-tips/">Some Password Tips</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is Ransomware and How to avoid it?</title>
		<link>https://www.small-space.com.au/what-is-ransomware-and-how-to-avoid-it/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 13 Aug 2015 03:31:38 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Guides]]></category>
		<category><![CDATA[Backup]]></category>
		<category><![CDATA[Guide]]></category>
		<category><![CDATA[Tutorial]]></category>
		<guid isPermaLink="false">https://www.small-space.com.au/?p=858</guid>

					<description><![CDATA[<p>Many of you have probably heard of something called Ransomware on the news and are wondering what it is and how it can affect you. Ransomware is a type of malicious software or malware as it is known that after infecting your computer will search for many kinds of files including documents, videos, game saves ... <a title="What is Ransomware and How to avoid it?" class="read-more" href="https://www.small-space.com.au/what-is-ransomware-and-how-to-avoid-it/" aria-label="Read more about What is Ransomware and How to avoid it?">Read more</a></p>
<p>The post <a href="https://www.small-space.com.au/what-is-ransomware-and-how-to-avoid-it/">What is Ransomware and How to avoid it?</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many of you have probably heard of something called Ransomware on the news and are wondering what it is and how it can affect you. Ransomware is a type of malicious software or malware as it is known that after infecting your computer will search for many kinds of files including documents, videos, game saves amongst many other types of file and encrypts them with a key known only to the creators of the malware then attempts to get you to pay the creators to get your files unlocked.</p>
<p>
You can get ransomware from infected emails, compromised websites, dodgy internet advertisements and even potentially from infected USB drives. Most decent antivirus software will pick up most variants of ransomware but not all variants. New malware is created as fast as the antivirus companies can detect and block it in an everlasting arms race between security professionals and criminals. In another guide I will be providing reviews of various antivirus software with the pros and cons for each but for now I will be just helping you deal with the risk of ransomware.<br />
The best way to avoid having to pay up after getting your files locked is to keep regular backups. Regular backups will also protect your data from other problems. The most common form of backups is to just copy your files onto a USB drive. If you have Windows 8, 8.1 or Windows 10 then you are in luck as Microsoft have a backup application called File History which is able to automatically backup your files to an external USB flash or hard drive. File History can also backup to a Network Attached Storage also known as a NAS box. Apple computers are also at risk of ransomware but not as much as windows computers. Apple includes a backup program called Time Machine which can back up to an external drive or a NAS.</p>
<p>
USB flash drives are cheap and easily obtainable even many supermarkets stock them in this day and age. USB hard drives cost more but are able to store far more then USB. USB drives also have the advantage of being able to be easily disconnected when you are not actually using them which helps a lot in protecting the backup from also being compromised by ransomware. Network Attached storage has the advantage of being able to backup multiple computers at once, always on for constant backups and able to easily share your media with all your devices but has the disadvantage of being vulnerable to malware able to scan the network for files to lock.</p>
<p>
If you are infected with ransomware and your files are locked your options are either to start from scratch, restore from a backup if you have one or pay the criminals for your files to be unlocked. If you are in the unfortunate situation where you have to pay for precious family photos or important business documents to be released you will likely have to pay the criminals in what is known as bitcoin, a semi anonymous internet equivalent to cash making the criminals hard to track down and often they are in countries that place them out of reach of the Australian authorities. It is still a good idea to report them to the police though because something may be able to be done in the future. You may get lucky and be able to negotiate down the fee to get your money back as to the criminals some money is better than none at all but it is not guaranteed.</p>
<p>
In conclusion the best defence against ransomware is to mitigate your risk using good antivirus software and have regular backups so that if you happen to get infected not much is at risk of being lost. Small Space IT can help you pick what backup strategy best suits your needs.</p>
<p>
<p>The post <a href="https://www.small-space.com.au/what-is-ransomware-and-how-to-avoid-it/">What is Ransomware and How to avoid it?</a> appeared first on <a href="https://www.small-space.com.au">Small Space IT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
