Kwinana Final areas make switch to NBN

The Final areas in the wider South Coogee NBN rollout have been switched on.

The final areas cover more than 5,200 homes and businesses in Medina, Naval Base, Orelia, Wattleup, Hope Valley, Parmelia, Calista and the Kwinana City Centre.

They join more than 7,600 premises in Wellard, Bertrum, Casuarina, The Spectacles, Anketell, Leda and other sections of Parmelia and Orelia who can already connect.

With Rockingham IT Solutions being partnered with TPG as a Reseller in the City Of Kwinana its a great time to move over and experience both the great customer / service and support backed up with fast NBN speeds and our Guarantee that you will have no down time during the transition.

Want to learn more about our NBN & VOIP services……. Click Here

WannaCrypt Ransomware Attack and how to protect yourself

You may be aware of the ‘WannaCrypt’ ransomware hack that propagated out May 2017 that hit Windows operating systems on over 200,000 computers across 150 countries, including dozens of large companies and institutions such as the UK’s National Health Service and France’s Renault factories. There’s an expectation that another wave of attacks will happen this week around the rest of the World.

WannaCrypt targets older versions of Windows such as XP, Vista, Windows 8 and Server 2003, which no longer have mainstream support from Microsoft. WannaCrypt can reportedly be spread over local systems without user interaction, it encrypts the files on the computer making them inaccessible. Once infected there’s no fix, you can’t unlock the files, the choices are to pay the ransom in bitcoins (not recommended), do a full reinstall of all your files; or wait until a solution is developed to remove the infection. Rockingham IT Solutions customers probably can’t afford to wait, business must go on!

The first line of defence is good virus protection. However, virus protection solutions can be breached, so if you receive an email containing a file attachment or URL you aren’t sure about, DON’T OPEN IT! The secondary line of defence is a good backup solution that stores the backup on another system in an offsite location – having a backup on another drive on the same machine isn’t a good idea, a ransomware attack will also encrypt the backup. Another risk is that if for any reason the computer is badly damaged or destroyed you will lose both the original data and backup!

WannaCrypt RansomWare

WannaCrypt RansomWare





















A small number of Rockingham IT Solutions customers have suffered ransomware attacks in the past, for this reason we addressed the ransomware risk in past newsletters. Given the escalating number of ransomware attacks we now ask you our customers to check if you have an effective backup solution in place, or if you are unsure PLEASE CALL US.

As we are IT consultant we will typically be the first port of call if a customer suffers a ransomware attack, plus if our customer has to do a full reinstall it’s best that our techs reinstall from backups that we know how they are backed up.

Rockingham IT Solutions can offer an online 3rd party backup service, for details please contact our helpful Techs on 08 6102 2919 during Office Hours.


Jon Ellis

Director / COO

Rockingham IT Solutions

Have an Evening out in Rockingham watching Flames on us

Rockingham IT Solutions are again proud supporters of the RBRA / SBL Basketball “Rockingham Flames” at the Mike Barnett “Hot House” on Dixon Road, Rockingham.
As such we have a Corporate Box with six seats, which includes a food and beverages package which we would like to extend out to companies on our Monthly Managed Services.
You can either use this as a thankyou from us to you or perhaps you might want to reward your staff for outstanding customer service or just for being a fantastic Staff Member.
“I’m not on your Managed Services so how do I sign up”
Just give Jon a call on (08) 6102 2919 and he can pop along and have a coffee and a chat with you and the best thing is that pricing starts from just $110 per month and our six seater Corporate Box package valued at $500 per night comes with up to $150 per night of food and 12 drinks vouchers to use on the night.
Read more about our Managed Services along with our clear pricing structure.

Microsoft Windows 10 Creators upgrade but be careful ………….

W10 Creators Edition



Microsoft forcing this upgrade despite users clicking no !

Rockingham IT Solutions are seeing many systems Windows 10 upgrades being presented for repair for several weeks now, but we can see after the 11th April a huge spike in problems with Creators Edition.


For most the upgrade may work but for many it will causing a massive headache and downtime in lost hours, which in turn means lost revenue especially for small businesses.

What you need to do is ring us up now and get our service tech out to you to firstly check over your system and make sure that there is a backup system in place just incase the upgrade goes wrong.

Also when the upgrade has gone through, check all your settings and installed programs and check they are all functioning properly. If not then Call us on 0861022919 and we will get one of our service techs on to your problem.

Remember, “We Are Your Fourth Emergency Service.”

We are recruiting and we want you !


Computer Workshop Technician / Mobile Support Technician

covering Rockingham and surrounding areas.

  We are recruiting The modern world is immersed with computers, they are all around us. Whether they are part of our personal life or part of the commercial world, computers have become a main part of our society.

We seek a Support Technician to join our ever growing team to support our various client base ranging from the home user, SOHO user, to small businesses.
This role is a dual role where you will be based both in the workshop and as a secondary Mobile Tech attending sometimes at a moments notice to house calls.
Supporting OS from Windows 7 to Win 10 Based in Dixon Road, Rockingham
This role will be both challenging and rewarding for anyone who is passionate and driven about Microsoft computers.
To qualify for this position you will have to meet the following requirements:
Skills and experience
Excellent troubleshooting and repairing for Windows 7 through to Win10. Excellent troubleshooting skills regarding ADSL / Wireless / VPN / NAS / Networking Excellent knowledge of different computer anatomy and their capabilities and limitations. Be able to build and configure tower PC’s Good Knowledge of word, excel, email, various internet browsers programs Good knowledge of Microsoft applications such as copy, paste , cut etc Good General knowledge of installing software and updates Outstanding customer service skills and the ability to explain technical issues in basic “plain English” terms Highly organised, reliable and punctual. Attention to detail Experience in a previous PC Shop desirable but not essential Relevant IT qualifications/certifications a bonus but not.
Essential – Manual Driving Licence is essential for this position.
Great attention to detail.
Great Team player.
What we provide Great opportunities for career development Some Flexibility on your working day hours Great working conditions joining a fantastic growing team.   If this is you and you are looking to be part of a great team then we want to hear from you.
Apply now. ! To be considered for this position please send your Resume and Covering Letter as PDF’s not as word documents as attachments in an email to


World Back Up Day 31st March

World Backup Day

World Backup Day


Have you backed up your data recently? Every day people, businesses, even games lose huge amounts of valuable data because they fail to follow this one basic procedure. World Backup Day is set aside as a reminder to back up your files, even if it’s once a year! A backup is a reserve copy of all the files you’d be loathe to use. There’s nothing more traumatizing than having losing your phone, or having your hard drive crash, and having hundreds of valuable and irreplaceable documents or photos suddenly gone beyond retrieval.

No matter how secure or safe you feel your data and equipment is, it’s important to back up your files. 30% of people don’t have any way to save their important files in the event that tragedy strikes. In our electronic based world, there are hundreds of ways to suddenly have things go terribly awry. 29% of all disasters are caused by accidents, costing valuable time and money as the resources they affected are lost forever. You may feel your computer is safe, but 1 in 10 of all computers, including household and business computers, are infected with a virus that may suddenly cause all of your data to be gone beyond retrieval.

The worst Virus these days is the dreaded CryptoVirus  . Cryptolocker / CryptoVirus is a ransomware Trojan which has been running around since 2013 and is still doing the rounds these days ! If you or your business would like more information regarding Cyber Security, it would be a good idea to get one of Rockingham IT Solutions consultants in to do an audit of your establishment or attend one of our many Workshop Training Courses  to learn how to protect your systems.

“But my phone is always on me!” I hear you say! Wonderful! That’ll make it easier for you to be one of the 113 phones stolen every minute, each day. In this modern digital world, many of us live from our phones. Whether it’s for business, or just personal use, these electronic assistants often contain gigs of valuable documents, pictures, videos, and music. Do you really want to chance losing all of that when backup options are so easy and available?

“Easy? How do I backup my files and protect myself?” There ya go! Now we’re asking the right questions! There are a myriad of ways you can use to backup your files, most phones are connected to some form of backup system. iPhones are tied directly into iTunes, which can back up all of your valuable data, you just need to hook that thing up to your computer and update the files daily! You can even do it as part of charging, just plug it in to your computer, set it to backup, and it’ll go about the process automatically while it takes a charge.

Android phones are intrinsically tied to Google, and with the availability of Google Docs and the Google backup, it’ll tie all of your data in to your profile, uploading it to a secure location while allowing you to choose which ones to share! Google Docs can also be used to store all of your valuable files online! The bonus here is that from google docs you can access your files from any computer, saving you from having to wait for your system to be back up before you get those important files back!

Another option is open that is the ‘all inclusive’ option. If you’d prefer to back up everything instead of just bits and pieces, there are tons of places online that will give you reviews of dozens of options for full backup services. Take some time to cruise through them and decide which one is right for you. Remember, if the only copy you have of your important files is all in one place, it only takes one accident, one small disaster for you to lose them all. So take the time to backup your files, and stop yourself from becoming one of this year’s April’s Fools.

Yahoo Hacked in Massive Security Breach stealing from one Billion people

Security Update


YAHOO has admitted that hackers breached its system to steal data from one billion user accounts in a massive cyber attack that was unreported for more than three years.

At Rockingham IT Solutions we always suggest to small businesses and even home owners not to use free email accounts but to have your own domain and email and let us administer them for better security.

“You will be surprised at just how competitively priced and convenient having your own domain and email hosting is” Jon Ellis our Owner / Director states.

In the past few months, Yahoo has owned up to being hit by the two of the biggest data breaches in history.

In September 2016, it announced it had been hit by what was then declared the world’s biggest hack — now it has revealed a new attack that involves twice as many people and sets a new record.

The news could not have come at a worst time for Yahoo, which is in the middle of securing a huge buyout deal.

Yahoo today has reported a experts analysing Yahoo’s records in the lead up to the buyout by Verizon had identified the mammoth attack which occurred in August 2013.

The hack reported today is separate to another hack reported in September which targeted 500 million Yahoo in 2014.


“I need to learn more of how to protect my Systems Data?”

Then Come along to our Cyber Security Seminar on Tuesday 7th March to learn how to protect your systems and more importantly your Data!


Cybercrime Prevention




Cyber Crime Prevention

Cyber Crime Prevention


Cybercrime prevention can be straight-forward – when armed with a little technical advice and common sense, many attacks can be avoided. In general, online criminals are trying to make their money as quickly and easily as possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an easier target. The tips below provide basic information on how you can prevent online fraud.

Keep your computer current with the latest patches and updates.

One of the best ways to keep attackers away from your computer is to apply patches and other software fixes when they become available. By regularly updating your computer, you block attackers from being able to take advantage of software flaws (vulnerabilities) that they could otherwise use to break into your system.

Make sure your computer’s Antivirus & Malware is up to date.

Keep in mind that a newly purchased computer may not have the right level of security for you. When you are installing your computer at home, pay attention not just to making your new system function, but also focus on making it work securely.

We recommend to install a commercial grade package such as Trend as it is not as resource hungry like Norton, Kaspersky or McAfee.

Choose strong passwords and keep them safe.

Passwords are a fact of life on the Internet today—we use them for everything from ordering flowers and online banking to logging into our favorite airline Web site to see how many miles we have accumulated. The following tips can help make your online experiences secure:

  • Selecting a password that cannot be easily guessed such as your date of birth, childrens or pets names, be at least 8 characters long and have a combination of upper and lower case, symbols and numbers.
  • Keep your passwords in a safe place and try not to use the same password for every service you use online.
  • Change passwords on a regular basis, at least every 90 days.

Protect your personal information.

Exercise caution when sharing personal information such as your name, home address, phone number, and email address online, the following list contains some advice for how to share personal information safely online:

  • Keep an eye out for phony email messages. Things that indicate a message may be fraudulent are misspellings, poor grammar, odd phrasings, Web site addresses with strange extensions, Web site addresses that are entirely numbers where there are normally words, and anything else out of the ordinary. Additionally, phishing messages will often tell you that you have to act quickly to keep your account open, update your security, or urge you to provide information immediately or else something bad will happen. Don’t take the bait.
  • Don’t respond to email messages that ask for personal information. Legitimate companies will not use email messages to ask for your personal information. When in doubt, contact the company by phone or by typing in the company Web address into your Web browser. Don’t click on the links in these messages as they make take you to a fraudulent, malicious Web sites.
  • Steer clear of fraudulent Web sites used to steal personal information. When visiting a Web site, type the address (URL) directly into the Web browser rather than following a link within an email or instant message. Fraudsters often forge these links to make them look convincing. A shopping, banking or any other Web site where sensitive information should have an “S” after the letters “http” (i.e. not The “s” stands for secure and should appear when you are in an area requesting you to login or provide other sensitive data. Another sign that you have a secure connection is the small lock icon in the bottom of your web browser (usually the right-hand corner).
  • Pay attention to privacy policies on Web sites and in software. It is important to understand how an organization might collect and use your personal information before you share it with them.
  • Guard your email address. Spammers and phishers sometimes send millions of messages to email addresses that may or may not exist in hopes of finding a potential victim. Responding to these messages or even downloading images ensures you will be added to their lists for more of the same messages in the future. Also be careful when posting your email address online in newsgroups, blogs or online communities.

CryptoLocker is a ransomware trojan. CryptoLocker propagates mainly via infected email attachments, when activated, the malware encrypts certain types of files stored on local and mounted network drives, with the private key stored only on the malware’s control servers. The malware then displays a message which offers to decrypt the data if a payment is made however it is recommended NOT to pay the ransom as it only encourages more infections.

Although CryptoLocker itself is readily removed, files remained encrypted in a way which researchers considered unfeasible to break.


iPhone users urged to update to IOS 9.3.5 after hack threat




Apple iPhone users are being urged to update their handsets after a private cyberarms dealer found a way to hack the iPhone with sophisticated malware.

The Isreal-based NSO group developed the ‘world first’ malware, which exploited three previously unknown iOS vulnerabilities.

NSO Group’s software effectively transforms the phone into a surveillance device, tracking its movements, logging messages and downloading personal data.

It also allowed hackers access to their passwords and could record sounds.


Protect from Malware through our Courses

Protect from Malware through our Courses

Apple quickly moved to patch the insecurities, and is advising all users to update their iPhones.

We were made aware of this vulnerability and immediately fixed it with iOS 9.3.5, through an Apple spokesperson.

Rockingham IT Solutions are advising all of our customers to always download the latest version of iOS to protect themselves against potential security exploits.

The majority of iPhone users are currently using iOS 9, though anyone who has updated to the iOS 10 beta is safe, Apple says. All users should update their iPhones to at least 9.3.5

To update your iPhone, plug your device into power and connect to the internet with Wi-Fi. Then tap Settings, General, then Software Update.

The malware was detailed in a report from Citizen Lab and Lookout security, and Lookout vice president of research Mike Murray said the NSO software, called Pegasus, is “the most professional piece of spyware that I’ve ever seen.”

He told The Wall Street Journal the software operates stealthily, ensuring that it doesn’t quickly drain the battery and speeding up its data transfer when it is on Wi-Fi networks so that it doesn’t get noticed.

NSO has billed itself as a leader in the field of cyberwarfare, offering tools for governments to keep tabs on criminals and terrorists who use encrypted communications. The company has been thought to be capable of installing unauthorised software on Android, BlackBerry and iPhone devices, but Thursday’s report provides the first in-depth look at its capabilities.

“We’re a complete ghost,” NSO co-founder Omri Lavie told Defense News in a 2013 interview. “We’re totally transparent to the target, and we leave no traces.”

Researchers highlighted the unusual way that Pegasus is installed on a phone, taking advantage of the three flaws in iOS to silently “jailbreak” the phone and circumvent the requirement that only Apple-approved software runs on the device.

This type of one-click iPhone attack previously has been described by researchers but never been seen in a real-world attack, Lookout’s Mr Murray said.

Apple Stops Patching QuickTime Due to Security Threat

The cSecurity Updateyber readiness team that’s part of the U.S. Department of Homeland Security has advised Windows users to uninstall Apple’s QuickTime media player from their PCs.

Users with Computers running the Apple for QuickTime on Windows have been dropped from support, meaning no future security updates will be issued and development has been halted.

The last wasn’t new: Apple hasn’t significantly upgraded QuickTime for Windows since 2009, when it launched QuickTime X for OS X but didn’t port the new player to Windows. The most recent security update for QuickTime on Windows was issued three months ago.

Apple used to rely on QuickTime to stream its live events to Windows PCs, but recently switched to HLS (HTTP Live Streaming), an Apple-implemented protocol. Because Windows 10’s Edge browser supports HLS, Apple has listed that version of Microsoft’s operating system and browser as the sole choice for Windows users who want to view its webcasts.