WannaCry Ransomware

A massive ransomware campaign, called ‘WannaCry’, appears to have infected a number of organisations around the world. Computers in thousands of locations, in more than 150 countries have been locked by a program that demands the equivalent of about $300 in Bitcoin to be unlocked.

The main difference between WannaCry and other ransomware is the ability to spread itself within corporate networks, without user interaction.

At least three Australian companies have been hit, possibly more, says the Government. Europol spokesman fears attack not over as “numbers are going up”.

Microsoft have released a new patch to further protect against this threat, it has been installing on Servers and Desktops during this weekend.

Royal IT is closely monitoring the deployment of the patch for all Managed Services Customers.

Customers using Webroot antivirus are protected and Windows 10 is not affected by the virus.

The threat has apparently stopped circulating the Internet but sources are warning a new version of the threat (different code) may be released soon.

Email is one of the main infection methods. Be wary of unexpected emails especially if they contain links and/or attachments.

Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content. Unless you are absolutely sure that this is a genuine email from a trusted source, do not enable macros and instead immediately delete the email.

The security of your assets is a layered approach, no one preventative measure will keep you 100% safe from threats, but by combining multiple strategies – you can minimise your risk to exposure and safeguard your assets going forward.

You can find more information about the outbreak on https://en.wikipedia.org/wiki/WannaCry_cyber_attack

Email Security
As spam is a normal, albeit potentially dangerous part of normal day to day IT – here are some tips to determine if an email you received is spam or not:

Check the senders email address by double clicking the contact on a received email within Outlook and verifying both email addresses. Note that just because the email addresses are the same, the email may still be spam;

Be very wary of emails coming from: The ATO, Australia Post, ANZ and ANY emails saying you have received money and you cannot verify the sender. Delete the email immediately if you receive emails from any of the mentioned senders with any attachment/s.

If you are unsure of the sender and the email contains attachments types: DOC, DOCX, ZIP, EXE. Delete the email immediately, do not open the attachment as these types of files can execute code to damage your machine and other machines on the network. We have seen a number of spam emails that advise of payment with a receipt or invoice attached. The attachment is of the DOC or DOCX type. This is the first sign that the email is potentially spam. Most companies will send receipts and invoices as PDF’s.

If you receive an email with a link and you are unsure of the sender, delete it! If you feel the need to check, hover your mouse over the link until the true hyperlink is shown. If this hyperlink is unknown or differs, do not click the link. In the below example, the email is spam and the hyperlink is changed only slightly to the original link text. The actual website and location are completely different to the original text, in IT talk this is called ‘phishing’

ADVANCED USERS; check the headers of a received email to check and verify the DNS address/IP address of the sender. You can generally tell a spam email by the domain name of the incoming mail server or checking the IP address geolocation on www.iplocation.net

Anti-Virus protection
Royal IT actively manage the anti-virus software of all Managed Services Customers which is called Webroot.

The Webroot application alerts Royal IT on any infections found and if the Webroot anti-virus is unable to update its virus/malware definitions. Webroot, along with all other anti-virus or anti-malware programs, will not detect all threats but is an essential tool in defending against all types of malicious code. If Webroot appears on your screen with ‘threats detected’ or the like, please shutdown your computer immediately to remove the risk of further damage and advise Royal IT via phone on 1300 249 643.

Securing your Windows user accounts and mailboxes

Password security remains an extremely important preventative measure for all types of threats, including Cryptolocker. Royal IT recommend implementing a password policy to require complex passwords with a minimum of 8 characters. We also recommend that passwords are changed at least every 90 days.

The Faces of Royal IT: Meet Sophie Noske, Executive Assistant

Employee Spotlight

Sophie Noske – Executive Assistant
Administration / Finance / HR

Meet Sophie Noske, Royal IT’s resident office giggler.

Sophie charmed her way into Royal IT over 3 years ago with her radiant positivity and supreme business administration skills, and it appears she loves being part of the Royal IT family as we do having her.

“Nothing beats it and nothing beats the fun we have together out of the office!”

With a Certificate IV in Business Administration Sophie’s worked in business administration and accounts for over 6 years in various industry types, with 3.5 of those years in IT.

Sophie is now in the midst of completing a Bachelor of Business at Edith Cowan University, so she can no doubt unleash more brilliance in her business operations support role for our Perth and NYC offices.

She’s passionate about delivering “World Class” service, so we know our clients get the very best.

“When the client hangs up the phone they should remember you because you’ve gone that extra mile for them.”  

Here’s 5 Fun Facts about Sophie:

  1. When Sophie isn’t supporting business operations for both Perth and NYC offices, you’ll spot her spending some quality time with her miniature dachshund Wilfred, the one thing she can’t live without. They take mutual pleasure in their coastal walks together – Wilfred gets outside for some fresh air and excitement, and Sophie gets to show off how cute he is. Ah, that’s love.
  2. While she’s not a big fan of public speaking (“I hate public speaking”), she’s been filling in for Caitriona at some of our Breakfast Networking events and it’s growing on her.
  3. If Sophie wasn’t at Royal IT helping save our client businesses from IT hell she’d be jetting around the world as a full-time traveller, “living the dream”.
  4. But… she wouldn’t repeat this crazy stunt in her travels: jumping off a 60 foot submarine cave in Croatia, her most adventurous act.
  5. Not quite so extreme, but a fact we think is just as crazy: Sophie actually likes doing the washing. “It gives me great satisfaction.”

Thanks for meeting Sophie.

Stay tuned for our next employee spotlight!

Calculate What an Hour of Downtime Costs Your Business

We’ve all experienced the dreaded IT failure at the office when all of a sudden work stops or is interrupted, typically because you can’t access something you need – a file, email, the internet, a software program, or otherwise.

Soon enough the same questions begin to filter through the office…

“Is your wifi down?”

“Can you access the server?”

“Is your Windows working?

“Can you open [insert your software program]?”

These incidents seem like part and parcel of office life, and often just frustrating inconveniences, but what are they costing your business?

When you consider most SMEs operate with an office of 10 – 100 employees who generally depend on work files or resources to undertake billable work, it’s not hard to see the how these can periods can stack up in costs for a business.

It’s these unplanned work stoppages we IT folk refer to as downtime, moments when employees can’t access a system entirely or the system is accessible but limited in functionality and performance.

Downtime is usually caused by human error when operating certain technology, poor internet connections, dated hardware, and network failures, but can also result from weather issues, bugs, and increasingly cybercrime and hacking. Essentially, it results in a full or partial halt in business productivity and functionality.

Average downtime has been reported to last an average of 90 minutes. When you consider the labour cost and loss of billable work over this period for a workplace of 20- 200 staff the cost warrants attention. 

How can you calculate the cost of downtime for your business?

Start by simply considering the technology your business relies on to operate on the day-to-day. For instance:

  1. Business applications used for daily operational processes
  2. Email platforms
  3. Internet
  4. Intranet tools
  5. Automated processes
  6. Key servers, LANs and WANs
  7. Technology hardware

How would 60 minutes of inactivity across one or more of these platforms for all your employees affect the operations in your business?

A simple estimate of the average cost of downtime for your business can be calculated using the following:

Estimated Average Cost of Hour of Downtime = Employee Costs per Hour x Fraction Employees Affected by Outage + Average Revenue per Hour x Fraction Revenue Affected by Outage

Minimising downtime through technology is something Royal IT are very passionate about, particularly for small businesses of up to around 200 staff (our speciality). We see firsthand the incredible effect intelligent and up-to-date IT systems can have on a business, not just around minimising downtime and enabling disaster recovery, but facilitating increased efficiency for staff across the board.

“We engaged Royal IT a year ago to provide us with IT support. They started by solving a number of long-standing “unsolvable” network problems. They also suggested and implemented improved backup systems. These backups were later put to the test and successfully restored, in record time, when we had a major hardware failure.”


Managed IT services with 24/7 tech support is one way small businesses can ultimately save money by keeping employees productive through investing in technology strategically.

Curious what downtime is costing your business, or how modern technology can transform your business?

Book a free consult with Royal IT and we’ll help you calculate the potential cost of downtime to your business.

From this session you’ll get:

  1. An understanding of the potential cost of downtime to your business over a year, factoring in lost labour costs and/or sales.
  2. An evaluation of all your technology components – physical servers, networks, communications platforms, cloud applications, software, etc – to identify areas of risk and improvement for your business.
  3. Recommendations on the technology worth investing in for your business to maximise uptime and productivity and a suitable disaster recovery solution.

Contact us now to arrange a meeting.

Protecting Your Weakest Security Link – Your End Users

Protecting Your Weakest Security Link – Your End Users

I know we have all heard the term ‘Cyber security’ so much lately it’s almost become so overused that many of us want to bury our heads in the sand and wave it past.   Well, you might end up suffocating if you do that because this issue is here to stay for some time!  In fact it’s hitting critical momentum and becoming more and more of a business risk each day as we integrate technology on almost every level of our operations.   Cyber security is about People, Process and Technology and without a specific prevention strategy, the implications of a cyber-attack can cost a business thousands and thousands of dollars… as a minimum.

A very interesting fact from Microsoft is that 95% of breaches were caused by some form of human error.  This can be anything from misconfigured equipment to a staff member clicking on something they shouldn’t.  It is expected that IT departments (whether in-house or outsourced) are proactive in their approach and use up to date technology prevention to prevent security attacks.  Although not 100% guaranteed to keep out the nasties – IT generally gets the job done if your business has appropriately skilled IT engineers and consultants on hand

But that is only part of it.  Another equally important part of cyber security is – Social Engineering.   This is where people are being manipulated as a way to elicit information.  People are often tricked to provide personal information or click on something that looks like it’s from an authority such as government notice or a postal service.  This type of cyber-attack is becoming more and more common and is very difficult to control because it involves people.

Prevention starts with each individual, they need to be aware of how they can be taken advantage of and have a healthy level of suspicion.   It is much easier and cheaper for an attacker to come through the human side rather than trying to get around technical barriers that have been specially constructed to keep them out.

So the question is – how do business leaders help educate their end users to avoid an attack?

Social Engineering Awareness Training

Training can’t be once off! It needs to be ongoing, engaging to keep the risk front of mind.  Training can be structured to be an experience that shows staff how a technology can be used as a threat.  It should also engage with people’s emotions by telling human stories that they can relate too.  It should include case studies of what has happened to businesses that have been affected and provide a snapshot of the financial impact of a breech.  Include demonstrations on willing participants and show them how they could be attacked.

In summary,  business leaders need to be aware of the seriousness of cyber security from people, a process and technology.  Social engineering  is a serious part of cyber security because it involves the unpredictable nature of human behavior.   This risk is increasing more and more as we navigate through the technology complicities of the business environment today.  

To find out more and how Royal IT can help mitigate the Cyber Security risk in your business please contact one of our IT Consultants.

The Key to Business Productivity and Happier Staff for the Modern Business

It could be argued that one of the most significant evolutions of the modern workplace in the last 5-10 years is our increasing tendency towards mobility. There’s no doubt technology is responsible for this developing shift towards a mobile workplace mindset and structure.

But, what exactly does a modern mobile workforce setup entail?

At minimum, a modern workplace should have:

  1. Online Central Management of Core Data (policies, procedures, documents, inventory, etc) that is accessible to all relevant staff.
  2. Cross Device Compatibility (from Mac/PC to tablet to phone)
  3. Built-in Security Protection (full-time monitoring of activity)

These days high performing employees not only appreciate flexible working conditions, they expect and demand them. And, with the access and mobility that technology now provides, there’s no reason why you can’t offer more flexible working conditions that allow employees to work remotely or connect when outside the office.

In fact, modern tools that employees have come to rely on like smart devices, Outlook, Word, Excel, Skype for Business, and Yammer can be accessed throughout the day from any location, enabling workflow, communication, collaboration and sharing between individuals and teams around the world.

Nevertheless, when the topic comes up among employers, there are many common misconceptions that prevent business owners from adopting mobile workstyles and putting the right infrastructure in place to support it.

The reality is, change is typically marked with some resistance. Here are the common concerns business owners have around embracing a mobile workforce….and why they are wrong!

Here are the common concerns business owners have around embracing a mobile workforce….and why they are wrong!

“Staff will slack off…”

There’s a fear that giving employees more freedom, like working from home, will result in them sleeping in or getting distracted watching sitcom reruns. The truth is, mobility actually promotes productively and makes staff more effective at their jobs, whilst increasing job satisfaction and happiness.

In fact, research has uncovered that 77% of staff reported being more productive working offsite, and 23% are willing to work longer hours if given the opportunity to work offsite. What’s more, almost a third of staff assert that they “accomplish more in less time”.

With the right IT setup, individuals can view and update their work, from documents to software in real-time no matter where they are. Because all activity is tracked, organisations have visibility over employee work habits.

For field employees, having access to real-time data enables quicker decision-making, saving time and money. And, of course, for employees who travel often or attend a lot of meetings, work mobility allows them to handles some tasks whilst commuting or in between meetings. In fact, if you really want to blow your mind about where meaningful work really gets done, check out this TED Talk on “why work doesn’t happen at work“.

By all accounts, productivity and efficiency actually improve in a business when it enables mobility or remote work.

“What about security?”

It’s a legitimate concern that stops a lot of companies from taking that next IT step. But, with the highly sophisticated security features and systems available today and the right employee training, these concerns can be put at ease. Today’s commercial systems are highly secure, with strong encryption protecting the data flowing between employees’ mobile devices and company servers.

Today there are many effective solutions to protect a business against cyber threats and data leakage. For instance, a Virtual Data Room can be used for sharing highly sensitive information and documents. If company devices are lost or stolen, cloud-based security features allow data to be wiped remotely. Software and tools like Office 365 Mobile Device Management have built-in data protection.

With the right IT measures and staff training, businesses can protect against potential security breaches.

“But, it’s expensive…”

Another common objection from employers is the cost of setting up a mobile workplace. However, the short-term investment will invariably set a business up for numerous future cost savings and modern workplace operations. When a business’s IT allows staff to work from anywhere, they can expect these wins:

  1. Lower overheads and operating costs: When staff work from home, a business requires less office space and physical infrastructure.
  2. Increased efficiency & profits: Better management of company data and documents results in greater team efficiency, as well as increased profitability per individual remote worker (estimated to bring in an additional $5,114 per year per worker).
  3. Access to a global talent pool: When a business open’s itself up to remote workers, they can tap into a global workforce and make long-distance collaboration possible. Lowered recruiting costs are often a result.

It seems employees derive as much benefit from going mobile, as employees do.

The truth is, the trend towards mobility isn’t going anywhere (67% of CIOs and IT professionals believe mobility will impact business as much as—or more than—the Internet did in the 1990s). Business owners can choose to embrace it now and be on the front foot or lag behind.


Download our PDF which contains more statistics and useful information.

Reach Out To Us

Discover how managed services can enable a mobile workforce in your business.

Reach out to Royal IT today by dropping us a line or giving us a call for a no obligations chat and download our guide to mobile productivity.


Data Loss Prevention: A Step-by-Step Guide to Blocking Leaks

Data Loss Prevention: A Step-by-Step Guide to Blocking Leaks

Industry reports show that 90% of all active Data Loss prevention (DLP) installations are running in ‘monitoring mode.’ Although they notify an organization at the time of the leak, they do not stop it.  Raising the question, why are these DLP solutions not being employed to actively prevent data leakage? A function they were supposedly intended for. The reason behind this is the abundance of false positive rates, impacting an organization’s daily functionality.  If the solution appears to be active, a ‘false positive’ prevents an employee from doing their work. Missed data leakages can be a result of raising false negatives. In order to effectively produce positive results, DLP solutions must be carefully prepared, here are the key steps to ensure a successfully implemented DLP solutions strategy.

Step 1: Do You Need a DLP Solution at the Moment?

Ask yourself if your organization at immediate risk of data loss? Technology is constantly updating and improving DLP solutions all the time.  Therefore, the longer you can delay the solution the better the software.

Step 2: What Type of Solution Do You Require?

The industry offers a wide range of products promising to solve DLP, for example, hard drive encryption or end point port control solutions. These kinds of software aid in preventing data loss, however will not address the issue in the same manner a content-aware DLP solution does.

Types of Content Aware Solutions:
1. Single Channel solutions

  • Targets one data loss channel eg. e-mail or web

2. Enterprise DLP solutions

  • Time consuming
  • Costly
  • Can lead to organizational disruption
  • Achieves superior coverage

Although you may be an enterprise, you mustn’t assume your business needs an Enterprise DLP solution. There are multiple vendors widely available for email or web that will provide coverage.

Step 3: Protection

Identifying what you need to protect your business is a fundamental step in this process. If this is difficult to decipher, data discovery solutions will aid in your decision. Ensure you have control over the content saved, as this will help you in the future.

Step 4: Why does your content need protecting?

Protection can take many forms, whether it is due to Intellectual property (IP) or for compliance reasons, identification at this stage can shape how it is reported on.


  • Meeting data coverage e.g. credit card number and personal information as required for PCI and DSS.

IP Control:

  • The Solution may need to recognize source code or CAD files
  • Ensure the solution provides appropriate coverage (don’t take the vendors word for it)
  • Testing is crucial here

Step 5:  How is your Data Currently Lost?

This will allow you to determine the type of product to use, does it involve, email, web? Or, the use of USB sticks? Here, you must ensure you don’t attempt to solve all possibilities for data loss. Instead you’re aiming to break the cycle of accidental data loss. Ceasing deliberate data loss is more difficult and can negatively impact your business. It is also imperative to take into account remote users and their off-site devices.

Step 6: Creating a Policy

Once the above has been established, it is important to implement a policy that recognizes the content, and how it will be controlled. The previous steps outlines what should be included in the policy to prohibit internal information from being leaked.

Step 7: Testing

It all comes down to testing. While your fine tuning controls, it pays to run the testing in monitoring only mode. This will aid in identifying policy details and how it is enforced in the future.

Step 8: Policy Communication

Communicating your policy to your employees is an imperative component for the success of the project. Your employees must understand why these controls have been implemented, as they will affect them everyday. Gather their feedback concerning the controls and how you can minimizes its impact on their workload.

Step 9: Policy Enforcement

At this point you have successfully constructed, tested and communicated the policy. It’s at this point where you can move away from monitoring and initiate the policy. Schedule and release them, prioritize them in importance and don’t activate them all at once. This stage needs copious coverage, to amend any complications. This will impact your employees, make sure you support them during this stage.

Step 10: Future Proof Your Organization

Keep a close eye on DLP solution improvements, keeping up to date will ensure you have the best controls in place. Be on the hunt for improved ways to classify content or different types of content saved. As you continue to implement new applications, consider how you can simplify the DLP controls required. Following these steps will put your organization at the forefront, blocking leaks, allowing your business to focus on the important stuff.

Partner with Royal IT to Find the Best Solution

Royal IT can help you develop and implement a data loss prevention solution that suits your business and your needs.  To discuss a suitable data loss prevention strategy or if you have any questions, feel free to contact us.

How Employee IT Habits Can Threaten Cyber Security in Your Workplace

Companies have come a long way in their ability to ward off internal and external cyber-security threats. However, as the pace of technology innovation speeds up, the threat that companies face also increases in complexity. Guarding devices and online data is an ongoing (and always fluctuating) effort.

Poor Cyber Security Awareness

Over the last decade, cybersecurity evolved from a niche concept monitored primarily by governments and corporate IT managers into a mainstream issue commanding above-the-fold headlines and consumer attention.

The 2016 elections were rife with stories of insecure servers, poor online security measures and overwhelming cyber security breaches, which may have derailed a candidate’s campaign. As expected, the average American and others around the world decried the use of a private server by a high-ranking government official.

And while many tried to ‘remove the speck in Hilary’s eye, most working class individuals forgot about the log in their eyes’. Statistics from the Identity Theft Resource Center puts the number of tracked data breaches in the US at 1,093, which led to an estimated $ 1 billion loss.

Both small scale businesses and big corporations like Yahoo, fell victim to this scourge thereby magnifying the losses. Final counts by IBM showed that there was a 29% increase in data breaches compared to the numbers of 2013.

This leads us to question: who on earth is responsible?

In order to provide an answer to this question, CompTIA conducted an online survey of 1,200 full-time employees in the US about their use of technology, cyber security awareness, and security consciousness level.

The survey showed un-earthed some mind-boggling statistics:

  • 63% of employees use their work mobile device for personal activities
  • 94% of employees connect their laptop/mobile to public Wi-Fi networks
  • 49% of employees have at least 10 logins, but only 34% have at least 10 unique logins
  • 45% of employees receive no cyber-security training from their employers.

These statistics answer the responsibility question to a high degree. It clearly shows that employers and their corresponding employees are culpable to a high degree for data breaches that occur within the system.

Employee use of storage infrastructure is also a source of concern and the 2015.

The ‘Stuxnet’ attack on Iran still remains fresh in our collective memory. The attack, which rendered the centrifuges in Iran’s nuclear program defective were caused by already installed malware in the USB sticks Iran purchased. Due to a lack of training and only a basic understanding of cyber threats, 17% of the program’s employees either clicked the contaminated link or in some cases even sent mail to the address provided on the disc. This utter lack of cyber security awareness was not limited only to Iran, as enterprises in the United States were also victims to Stuxnet.

cybersecurity_v1Despite this growing visibility, most employees still demonstrate a lower level of cyber security understanding and behaviour, both in regards to protecting their devices and their personal information. The above case studies should serve as an eye-opener to employers worldwide on the importance of in-depth cyber-security training.


Integrating a Security Conscious in Corporate Culture

Generally, employees are more likely to associate cyber security threat with identity theft while overlooking threats from malware and other phishing attacks. With anti-virus software, firewall protection, and other IT protocols installed, employees may feel that anything they do online is safe, or that if something were to happen, the technology would protect them. Not all breaches or identity theft incidents make the headlines, which may also lead some to underestimate their own vulnerability.

Therefore, the first step to combating security breaches is educating the workforce. This includes training with employees by IT professionals about the basics such as mitigating risk and securing both personal and work related data. Another important step to fighting security is integrating the use of real-time data analytics infrastructure such as Aerospike to counter or detect fraudulent activities.

Cyber threats are here to stay and with each passing year, the threats become varied and more sophisticated. Therefore, it is recommended that enterprises continuously update security measures as well as develop a cyber security-aware culture.

Get Cyber Security-Aware

Every business owner needs to understand cybersecurity risks. Download our free guide outlining the risks that your staff need to be trained on to avoid cybersecurity breaches.


Download our PDF which contains more statistics and useful information.

Reach Out To Us

Want to know how RoyalIT can help you with cyber security?

Reach out to Royal IT today by dropping us a line or giving us a call.

Office 365 Updates – 5 Key Features to Look out for in 2017

As expected, Microsoft took advantage of its much-anticipated event—Microsoft Ignite—to announce key changes, along with their road map for 2017.

The September event focused on how Microsoft intends to build its enterprise solutions department with a view to upstage its competitors. While announcements on Azure, Sharepoint and office 365 were made, today we will be focusing on some key features to look out for in 2017.

Delve Analysis Receives an Upgrade

Developing a work plan that dictates the habits of employees has always been the responsibility of Delve Analytics. In keeping with its plan to enhance workplace habits through office 365, Delve Analytics has been upgraded to MyAnalytics with new features to boot. Features are geared at helping office teams and groups track their working habits, hours and collaborative efforts using exact details. Now, with My Analytics, team leaders receive insights into their colleagues’ working habits, collaborative patterns, and most productive hours, allowing them to take advantage of it.

Yammer’s Integration Adds Social Networking to Office 365

With a view to adding an official social networking tool in the Office ecosystem, Yammer has finally been integrated into Office 365 groups. This is big news because Yammer will provide a more socialized community for teams and groups working via Office 365. This move makes collaboration more streamlined as Yammer users can now turn ideas into action due to unlimited access to Sharepoint sites and document repositories.

Added Protection Through Threat Intelligence

2016 was notoriously known in cyber security circles as the year of enterprise breaches. To tackle the millions of attacks enterprise data will continue to face in the coming year, Microsoft has integrated a ‘Threat Intelligence’ feature in Office 365.

According to Microsoft,

‘Threat Intelligence will help you proactively uncover and protect against advanced threats by analyzing billions of data signals across Office consumer and commercial services. Threat Intelligence also provides deep insights from cyber threat hunters to create a comprehensive view of malware trends around the world. In addition, we’re integrating signals from Windows and Azure to help customers realize the full benefit of the Microsoft Cloud.”

The feature comes with its own enhanced dashboard that provides security administrators with insight into perceived/real threats, their origin and the necessary tools to manage threats.

Bitcoin Currency Support Gets a Boost

The integration of Bitcoin calculation tools in Excel is definitely a win for both parties involved. Bitcoin gains by being unofficially recognized by Microsoft, while Bitcoin users may now consider working officially via Office 365. The support means that Excel will now be able to recognize, format, and calculate numbers expressed in Bitcoin currency. The roll-out of this feature is expected to cover both desktop and mobile Excel or Microsoft Word applications.

Real-time Transcription and Translation of Skype Meetings

The next generation of Skype meeting rooms will include a real-time translation of online meetings for a diverse audience. This innovative feature will allow team members or collaborators worldwide to communicate through their language of choice. With this feature, individuals from the 400 cities Skype currently supports can select their native language option when listening in. The supported languages are English, Spanish, German, and Mandarin. And if Microsoft’s past growth pattern is anything to go by, languages as remote as Swahili will also be added with time.

Microsoft intends to make 2017 an exciting year for enterprise and business software solutions for everyone.

We encourage you to stay tuned to Royal IT for updates on Office 365 and how it could help your business both locally and internationally.

Your Smile Matters To Us…

Did you know smiles are addictive?

Just imagine a cute little toddler or puppy looking up at you with a cheeky open grin on their face and you’ll see what we mean.

Royal IT hope to give you a reason to smile with every service, and your feedback over the last year tells us we’re doing a pretty good job so far…

Group of Chihuahuas dressed, wearing glasses and bow ties

But, we’re not one to rest on our laurels…

So, we have an important favour to ask you…

Next time your support ticket is closed, please let us know how we did.

All you need to do is click on the face that best represents your experience with Royal IT and leave an optional comment.


We rely on your feedback to know that we satisfied your requirements.
And, if we didn’t, we want to know so that we can do something about it!
So, next time that little feedback request rolls in, please don’t ignore it.

Thanks in advance, your friends at Royal IT

Close-up of Mixed-Breed monkey between Chimpanzee and Bonobo smiling, 8 years old