Category: Uncategorized

What type of IT agreement is right for my company?

Levit8
What type of IT agreement is right for my company?

It’s important to understand that there are different options when it comes to employing a technical support team, whether internal or external to the company. Whilst there are industry commonalities between companies in the field, each company is unique in their technology stack, their processes, their goals, and the way they choose to engage with their staff and clients.

As a blanket rule, majority of companies with 5 to 10 staff, depending on the industry and company structure, could comfortably operate with 1 internal technical support officer. Generally, the tasks of this person would be setting up new staff hardware and software and resolving technical issues that arise. What you receive in whole for hiring an internal technical support officer is dependent on their current skill level, protentional extra utility, and if they are willing to continually upskill.

Levit8

Breaking IT down

If you allocate a budget of approximately $45,000 plus super and other entitlements per annum; this could land you with a level 1 technical support officer. However, if you’re located in a capital city, such as Brisbane or Sydney, this wage could be about $10,000 + higher.

If the company has 15 – 30 staff then it may require 2 technical support officers, in which the total wages would double.

Whilst level 1 technical support staff can handle most the day’s basic IT requirements, they may be unable to provide strategic advice for company-wide technology utilization or the overall technology footprint as they simply might not have had experience or exposure.

Your company needs technical people who provide you with recommendations on best-fit security practices and products custom to your company: how to manage and store company data, where there may be bottlenecks in the network that may be slowing your teams devices and systems down, how to remain compliant with technology, what best practices are for my company, where does it make sense to automate, how do I secure my remote staff, how do we protect ourselves from cyber hackers, etc.

Internal technical support staff will also not come with vendor to vendor partnerships. For example, Levit8 are vendor partners with the world’s largest cyber security anti-virus provider whose products comes with built-in artificial intelligence to detect malicious activity. This company has never been breached and has assisted in uncovering some of the world’s largest cyber-attacks, such as the Hilary Clinton email breach. This is one example, from a long list of expert vendors in the technology space, that Levit8 has extensively reviewed to provide our clients with the best security and operational software.

There will come a time to review your current technology setup and consider the future projection of your company. It is highly recommended at this point to consider contracting an external Managed IT Service Provider (MSP). MSPs come with experience, vendor partnerships, processes, security protocols, service level response times, strategic technology advice, and more. Moreover, the cost to contract an MSP is usually half the cost in comparison to hiring an internal IT department.

When you’re in the market to review IT proposals from several MSPs, we recommend downloading our E-Book, “How to Compare IT Proposals”, which will help you uncover what an IT provider is really offering for your company.

Our mission is to help Australian companies achieve their growth strategy with strategic technology advice tailored to their company requirements.

Levit8 sit alongside our clients’ executive teams to provide our professional advice and execute the projects that are given green lights.

We deliver Managed IT support and strategic IT solutions driven by passion, integrity, accountability, collaboration, and honesty.

 

Levit8 Business IT Solutions.

We Raise the Bar.

Technology for mental health

Levit8
LEVIT8

Technology for mental health

Levit8 is one of Australia’s leading managed IT services providers, which means we have been working closely with technology for many years. We have seen first-hand the negative side effects technology can have on mental health. However, we have also had the opportunity to see the amazing benefits and tools that technology can bring to mental health care.

There is no denying which direction the world is going in when it comes to the use and expansion of technology; therefore, it is important to change technology from being the reason we might suffer with poor mental health to the reason we solve it.

Technology can have negative effects, however it has at least, if not more, benefits when used to its full potential. Many major medical and scientific advances occur in association with technology, and there is no arguing that the computer and the internet are the greatest inventions of this era.

Unlike certain physical conditions a person might be afflicted by, people suffering with poor mental health do not necessarily need a physical intervention. Good psychological therapy does not need human interaction to be effective and can even relieve some people of the stigma around going to a therapist.

More and more mental online tools are being built to cultivate and restore healthy habits for mental health. For example, you can use your smartphone to test yourself for mental illness, engage with an online treatment program, or obtain real-time crisis counselling. Moreover, technology allows these mental health tools to be mobile and accessible 24/7. Sophisticated bio-sensing technologies and Bluetooth can collect data, information, and geographical location to provide a real-time view of behaviour and mood. These capabilities facilitate identification of ‘at-risk’ individuals and assist in referral and access to treatment, this is of particular use when preventing suicide.

Finally, the growth of self-help and the empowered patient movement has meant people are more likely to investigate their symptoms online. While we don’t advise people to use “Dr Google” when experiencing poor mental health, having access to a range of specialised medical knowledge and treatments, as well as the many personal stories available on blogs and social media, does increase mental health literacy, reduce stigma, and encourage help-seeking.

The most exciting thing for researchers and clinicians is seeing the influence of technological developments and waiting to see further impact in the future. In the meantime, we will continue to see new technologies that have the potential to extend, make more efficient, and add value to mental health care.

We, at Levit8 believe that together with IT we can help fight mental illness.

This is why we are very excited to be sponsoring the Gold Coast Hospital Foundation’s very first golf day – Mindful on the Green on Friday August 6th.

Mindful on the Green is raising much-needed funds for mental health services at Gold Coast University Hospital and Robina Hospital following a rise in hospital admissions and a greater need to support this critical area in healthcare.

Gold Coast Hospital Foundation has a fun day on the green planned with prizes, raffles and a series of mindful moments throughout the day to encourage good mental health.

Join us as we tee up for mental health and provide life-changing support to people struggling with mental health. Register at: https://gchfoundation.org.au/golfday/ 

 

 

If you or someone you care about is distressed, in crisis, suicidal or needs someone to talk to, help is available. You can find all the different services available from the government here. 

Our Mission

Levit8 is a managed IT services provider dedicated in supporting businesses across Australia re-take control of their IT.

Our mission is to help Australian companies achieve their goals through providing customised, superior, and strategic business IT solutions.

We achieve this by delivering premium technology combined with excellence in IT services standards. We collaborate with our clients to develop a relationship built on integrity, trust, transparency, and being accountable for risk mitigation, return on investment and exceptional value.

Levit8 Business IT Solutions

We Raise the Bar

10 reasons why you need Managed IT Services

Levit8
Managed IT services
LEVIT8

10 REASONS WHY YOU NEED MANAGED IT SERVICES

There are many reasons why companies across Australia choose to employ the services of a Managed IT Service Provider (MSP) rather than hiring out a single or full team of in-house IT technicians.

When you partner with the right MSP you gain a plethora of benefits to your team, your customers, and your overall business. An MSP is always more cost-effective, holds less risk, and offers far more value to businesses.

For those still not convinced we have come up with a list of 10 reasons why you need Managed IT Services.

10 REASONS WHY YOU NEED MANAGED IT SERVICES

With the right MSP, you will receive the following benefits to your company:

  1. Your company gains a full team of certified technical support staff and engineers who, as a team, have a wide scope of technical knowledge across multiple industries, processes, platforms, and products.
  2. Your company will have a direct line to the MSPs Technical Support Team.
  3. MSPs operate within a Service Level Agreement, which means your team will be provided quick resolution times and friendly support to uphold the Agreement expectations and strength the relationship.
  4. MSPs are responsible for the continual training of their technical staff to ensure they are up to date with the latest technology, cyber security practices, disaster recovery plans, artificial intelligence, major technology partner developments and products, etc.
  5. MSPs must thoroughly document your technology landscape in their support and documentation tools. This is crucial when it comes to providing efficient IT support, identifying security risks, and scaling the business to new technology heights.
  6. With a whole team of Support Technicians within the MSP, your support requests can be addressed and resolved even when certain support staff are on leave.
  7. MSPs regularly review their client’s technology setup and functionality in order to recommend suitable technology solutions which will protect and advance the company in step with the times.
  8. MSPs support a vast number of varied industries; from law firms, accounting firms, digital marketing, medical and health practices, e-commerce, hospitality, aviation, engineering, automotive, just to name a few. So, when it comes to understanding the platforms and vendors that suit your company, the MSP will either be well versed or able to quickly locate, integrate, and implement the information that is beneficial for your company.
  9. Majority of MSPs have a growth and compliance consulting department. These people are business and technically minded and will be the ones who sit alongside you in company strategy meetings.
  10.  Good MSPs are not just focused on advancing their own company but are also invested in seeing their client’s company advance through security and data protection, setting up automation and software to create company efficiency, and providing technology solutions to future-proof them. When your company thrives so does the MSPs, and this is a joyous motivator for service excellence at Levit8 Business IT Solutions.
Our Mission

Levit8 is a managed IT services provider dedicated in supporting businesses across Australia re-take control of their IT.

Our mission is to help Australian companies achieve their goals through providing customised, superior, and strategic business IT solutions.

We achieve this by delivering premium technology combined with excellence in IT services standards. We collaborate with our clients to develop a relationship built on integrity, trust, transparency, and being accountable for risk mitigation, return on investment and exceptional value.

Levit8 Business IT Solutions

We Raise the Bar

Is your password putting your company at risk?

Levit8
Levit8
How poor password habits put your company at risk

Stolen credentials are the simplest and most undetected way to tap into someone’s account; think about it, how often do you question if your passwords are safe enough?

Cybercriminals use many key tactics in attempt to breach a company’s internal systems. There are many poor password habits that majority of people fall into; a common habit is using the same password for a personal account, a business account. Another is signing up to a platform outside of your company with your business credentials (email and password). Not to mention the vast amount of people who still write their passwords on sticky notes, then lose the sticky note or have a third party discover the sticky note and record the password (this even happened inside NASA!). These practices put your company data, your employees’ data, and your clients’ data at high risk of being taken and used maliciously

Weak password examples

Many people still create weak and simple passwords that fail guidelines; the passwords generally entail their name, birthdate, significant other, pet, favourite colour, street name, children’s name, or favourite sports team. Combine that with reusing the same password to all accounts and you have multiplied your problem from one to many.

Let’s elaborate; say you sign up to LinkedIn and use your personal email and the password is BluEd0GwITh@WhaCKYT@!L. You use that same password to login to your work email account which has admin access. Now, LinkedIn becomes breached, the hackers now have your personal email, password, full name, date of birth, and the company you work for. They google the company and find the email account that belongs to you, then proceed to log in with ease. This is one of many examples that happen every single day, moreover, chances of you knowing that someone else is sitting in your email account is unlikely.

What you can do to help prevent poor passwords affecting your company

Single Sign On VS Multifactor Authenticator
A single sign on solution is helpful for authenticating access to cloud-based applications quickly, however, it fails to provide the necessary flexibility and security for native applications and metadata. This is where a comprehensive password security and management platform becomes critical; Multifactor Authenticator (MFA) apps are a great and well used way of to add a layer of protection to the sign-in process.

Password Management Platform
These platforms automatically generate unique, randomised, and high-strength passwords for all your sites and applications. The passwords are stored in a personal and encrypted digital vault that you can access from any device. {The best products here integrate with single sign on to provide a comprehensive solution for the enterprise across cloud and native applications.} I would take out this sentence to not promote single sign on.

Dark Web Monitoring
In addition to the above, a Dark Web Monitoring service should also be utilised. Billions of usernames and passwords have been stolen from public data breached and placed on the Dark Web for sale. It is important to know if any employee credentials are being traded by cybercriminals on the Dark Web

and subsequently used to target the company’s online accounts and assets. A Dark Web Monitoring program will alert you to these stolen credentials by simply imputing your domain.

It is important to know that cyber-hackers are becoming craftier every day and find more ways of by-passing security systems; that is why we always recommend multiple layers of protection, updating your modes of protection, and to seek professional advice.

Our Mission

Our mission is to help Australian companies achieve their mission. Whatever the reason is that you decided to start your company is our purpose. When it comes to the growth strategy, competitive edge plan, compliance with the governance in their industry, maintaining best practices with technology, planning for disasters, or even world domination as we call it at Levit8; We are there to sit alongside our clients and provide our professional advice. We are very different to other IT service providers across Australia; We deliver managed IT Support through strategic IT solutions.

Levit8 Business IT Solutions

We Raise the Bar

When and how to report a data breach

Levit8
When and how to report a data breach

Let’s understand the Notifiable Data Breaches (NDB) scheme at its very basic layer!

Under the NDB scheme, any organisation or agency the Privacy Act (Rights and responsibilities — OAIC) covers must notify affected individuals and the Office of the Australian Information Commissioner (OAIC) when a data breach is likely to result in serious harm to an individual whose personal information is involved.

A data breach occurs when personal information an organisation or agency holds is lost or subjected to unauthorised access or disclosure. Personal information is any information on a person that can be used with malicious intention. This can be someone’s name, date of birth, and home address or even something as simple as someone’s photograph. It is not just bank details that classifies as a breach. For more information on what is classified as Personal Information according to the Australian Government, go to: What is personal information? — OAIC

Data breach examples
  • A device with a customer’s personal information is lost or stolen.
  • A database with personal information is compromised.
  • Personal information is mistakenly given to the wrong person.

The notification to individuals must include recommendations about the steps they should take in response to the data breach that has occurred. If an individual is made aware of a data breach, they should notify the OAIC using their online Notifiable Data Breach: Notifiable Data Breach Form (business.gov.au). For more information, see Report a data breach — OAIC

Data breaches can occur through various circumstances, some being:
  • There is unauthorised access to or unauthorised disclosure of personal information.
  • Loss of personal information, that an organisation or agency holds.
  • The organisation or agency hasn’t been able to prevent the likely risk of serious harm or provide remedial action.

An organisation or agency that suspects an eligible data breach may have occurred must quickly assess the incident to determine if it is likely to result in serious harm to any individual.

A data breach that occurred before 22 February 2018 is unable to qualify as an eligible data breach for the purposes of the NDB scheme. However, certain data breaches can span over a long period of time. While a system may have been compromised before 22 February 2018, data may have been accessed after that date and while the circumstances will need to be assessed, we suggest that an organisation or agency in this situation should assume the data breach is subject to the NDB scheme.

Experiencing a data breach or cyber-attack is a grave loss of time and money and can somewhat bring a company to a halt. Furthermore, reporting the incident is very time consuming (see link to see what is involved: Notifiable Data Breach Form (business.gov.au)).

The best course of pro-active defence for your company, staff, and clients, is to ensure that you have established systems, protection, and security procedures to help prevent a data breach or cyber-attack from occurring in the first place. If you would like to know how we can help you get more protected, please contact us and we will be happy to assist.

Our Mission

Our mission is to help Australian companies achieve their mission. Whatever the reason is that you decided to start your company is our purpose. When it comes to the growth strategy, competitive edge plan, compliance with the governance in their industry, maintaining best practices with technology, planning for disasters, or even world domination as we call it at Levit8; We are there to sit alongside our clients and provide our professional advice. We are very different to other IT service providers across Australia; We deliver managed IT Support through strategic IT solutions.

Levit8 Business IT Solutions
We Raise the Bar

How cyber-criminals hack your company

Levit8
How cyber-criminals hack your company

There are many ways that a cyber criminal can hack your company, however there is one main way that we as an IT company see over and over again.

Too many companies remain blind to the fact that their greatest threats are within their own walls. Whether ASX-listed, SME, or a start up, they all face the same major gap that can only be filled with time, training, and tools. The gap is you. It’s every person in the business and sometimes that even includes the technical people. 

We are all vulnerable

We are all vulnerable to cyber-criminal activities, and no, they don’t always go after your bank details, there is a raft of other information they could take that offers them far greater value. They also don’t solely send you emails with sneaky links, there are many other tricks and ‘hacks’ they use to lure you into their control. 


Often the most damaging attacks happen from internal staff. Now we aren’t saying that you shouldn’t trust your team, what we’re saying is that you should safeguard your company from the potential of malicious activities. Even something as simple as leaving your server cabinet door unlocked poses major risk for those with on-premise servers. A well protected kingdom has a moat and drawbridge, high walls, guards on watch and security detail protecting within – your ‘kingdom’ should be set up in a way that it has multiple safeguards to prevent attacks from the outside, and to swiftly sort out internal misconduct. 

How to prevent it

When it comes to technology, we as IT Solutions providers need to help companies understand best practices to follow, such as, what steps and safeguards are needed when transferring information to one another and to external parties. A great example is how to safely share a file over an email that contains sensitive information. Industries that deal with highly confidential information, like law firms, financial firms, and health organisations, should deem their cyber security with critical importance. 

 

Understand that you will never be 100% safe from all types of malicious activities, whether they come from outside of your network (someone not employed by your company) or inside of your network (a staff member). Professional IT Services companies can help you locate where the threat vectors reside for your business, as the attacks can be tailored for every company, even those in the same industry.  

 

Levit8 can help you understand and plan for these events so that, even if the worst possible scenario occurred, you could rest assured knowing you have put up safeguards, installed backups, and reduced or prevented the damaging impact of a cyber-attack. After all, you worked so hard to build your company to where it stands today, we work hard to help you protect it.

Levit8’s core values and how they have driven our success

Levit8
Our core values are the reason Levit8 is successful

Building a successful IT Company that operates from multiple locations across Australia from the ground up is not an easy task. It requires resilience, bravery, risk, drive, and many other qualities to continue pushing forward even during the tough times. However, there was one value that stuck with us during the entire journey, it is the core factor to all our decisions right down to the team that we employ, and that’s passion. Everything we do whole heartily in life is because we care or are passionate about doing it.

Passion

Passion is the reason we wake up every morning and walk into our Head Office in 50 Cavil Avenue with immense pride. It is humbling to know our entire team are passionate about the reason Levit8 exists and our mission. When we stride into our office everyone is vibrant and happy, which is generally uncommon in our industry, given we are the people you call when your tools are not working, and you are in distress. This tells us we have done an exceptional job at instilling a positive culture.

Transparency

Transparency from beginning to end, we practice open and honest communication with our clients as well as within our team. It is important that we employ a team who share our values and it is even more important that we provide them a safe and comfortable working environment with full transparency in what they can expect from us as well as us from them.

Accountability

Accountability with everything we do, we hold ourselves accountable taking complete ownership of our role in your business. We strive to be reliable, available, and responsive to the best of our abilities at all times – no matter what.

Excellence

Excellence is something our clients can expect from our us, our products, and our IT services. We will always provide you and your business with excellent IT solutions tailored specifically to you.

Collaboration

Collaboration with our clients and with our Team: we believe that we work better together. That is why collaboration is one of our core values. We guarantee that every interaction we have – both internally and externally with our clients – will be professional. Only then, can we come together to form something far more effective than we could have on our own.

Our mission

Our mission is to help Australian companies achieve their goals through efficient use of technology. When it comes to the growth strategy, competitive edge plan, compliance with the governance in their industry, maintaining best practices with technology, planning for disasters, or even world domination as we call it at Levit8; We are here to sit alongside our clients and provide our professional advice. We are different to other IT service providers across Australia; We deliver managed IT Support through strategic IT solutions and true partnerships.

Levit8 Business IT Solutions.
We Raise The Bar.