Roger Smith profile image

Roger Smith

CEO at

Member Since August 2013

Fyshwick, ACT, 2609

SHARE

175 FOLLOWERS

Amazon #1 Best Selling Author | Experienced Cybercrime and Cyber Security Expert | Speaker | Consultant | Trainer

You know how frustrating and frightening it is getting the right information about protecting yourself, your business and your client information from the digital world?
I solve this.
I put your business on a strict diet of good technology, the best management, meaningful adaptability and required compliance to make your business digital secure.

Qualified skills

Regulatory and Compliance
Business Consulting
Business Systems Consultants
Security Consultants
Information Technology

Why your business still doesn’t have a managed service provider—but it should

Managed services have been available in Australia for some time, but this service has been slow to catch on.  There are three main reasons this form of service isn’t as successful as it should be. 1. Bad marketing To most small and medium business and not for profit organisations, the ICT component of their business may as well be written in Swahili.   Getting the computers to talk to the...

Roger Smith answered this question

Neil Steggall
Neil Steggall, Partner at Wardour Capital Partners

Leadership

What is the number one skill required to build a successful SME?

It would have to be persistence.

I am a great believer in some of Rocky Balboa's sentiments - every time you get knocked down, you get back up and keep moving forward.   For an SME, you have to learn to roll with the punches, you are under constant pressure from every angle so you have to move forward.  

Think of better strategies, integrate new ideas, innovate and most important of all, market your products and service.  But always be persistant

Hardware and Software

"Stop the world I want to get off" - the digital revolution and some food for thought

"It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity, it was the season of Light, it was the season of Darkness, it was the spring of hope, it was the winter of despair, we had everything before us, we had nothing before us, we were all going direct to Heaven, we were all going d...

Hardware and Software

Why outdated hardware and software is bad for business!

A few months ago, I was visiting a business, in the process of possibly taking them on as a client.  We had just completed a full audit of their network and were discussing the results.  No sales talk, just a round-table discussion in which we presented our recommendations to the board of directors and C-level management. In most cases, when you point out problems and offer solutions to the t...

Server, Networking and Security

Managed service professionals: the better option for SMEs

A business of any size that fails to manage its ICT is a real threat to the data of individuals.  Small and medium businesses and not for profit organizations worldwide are being threatened with civil and criminal actions for decisions they make regarding protection of their ICT systems and the data contained within them.  You cannot pick up a newspaper without seeing a story about data breach...

Server, Networking and Security

The fukushima disaster and cybercrime: how criminals exploit your most generous impulses

It is a well-known fact that events of a global interest are exploited by cyber criminals for financial gain.  Natural disasters are a golden opportunity for cyber criminals and cyber vandals, whose main aim is to make profit, even if it means exploiting other people’s misery.   —Eugene Kaspersky You have got to love the bad guys. They come up with the most inventive ways of scamming nor...

Server, Networking and Security

How do we protect our children when we don’t understand cyber space ourselves

Technology has changed the world.  From cloud computing to GPS, from tablets to mobile apps, we are all in the grips of technology, and it is only going to get more entangled in our lives.  It is easier for us to talk to our relations on the other side of the world than it is to go and knock on our next door neighbors' door.  Well, unless our next door neighbor is on Facebook—then it's the ...

Information Technology

10 most common excuses heard from end users

In the business world, people seem to find the most bizarre reasons for calling the ICT department.  Here is a list of ten that always seem to pop up when least expected.  Some of the responses below are things I would never say aloud—but that doesn't mean I'm not thinking them.   That password is too hard to remember!   Few people realize that the passwords you use when accessing bank...

Server, Networking and Security

Here's a new one for you - Bring your Own Cloud (BYOC)

So, recently we were doing some work on a client’s site—small site, 20 users—and we were installing a new server with SBS.  And yes, we had specific reasons for going down the server-on-site path.  All relatively easy, although it can be a little time-consuming, especially when transferring data from an antiquated system. One of the things that came to light was that all of the users had ...

Server, Networking and Security

Individual Cyber Security Health Check- Get Yours Now!

Everyone uses the internet in some way.   At home we're Facebooking or looking up recipes; on the job we're working on the business CRM; when we're on the go, we're answering emails on a tablet or smartphone.  From toddlers to senior citizens, we all interact with this communication device called the Internet. In the course of that interaction, we have developed a blasé attitude to personal s...

Telecommunications, Mobile and Wireless

Cyber Security - Is Orwell’s Vision Coming True?

I recently watched the newest revelations about the NSA from the ABC Four Corners (www,abc.net.au/4corners).  Living and working in Australia has made me realise that at present we have a lot more freedom than most countries in the world, including the USA—or at least, we used to. The problem is that technology is eroding that freedom to a level where Orwell’s vision of the future is becomin...

Roger Smith answered this question

Who knows how much do copywriters charge to write a web page?

Hi

I have 2 copywriters on my virtual marketing team.   I write a number of articles and content for 4 websites per week and send it off to them regularly.   They have a turn around of about 3 days depending on the size of the article and how bad my initial writing was (sometimes it can be bad).   In my area of expertise it is very easy to fall into slang and get way to complicated for the average person.   They keep me in check and deliver very good to outstanding articles.

They cost me $20 - 30 per hour.

A copywriter is only as good as two things - the content that you give them and how much you trust their interpretation of what you are trying to say.   With my team we came to a very quick understanding that 99.9% of what they delivered was going to be what I used on a page.

IT Support

Do you only need a computer tech when the computer breaks

In the technical support world, there has been everything from constant bickering to full-blown arguments over the different disciplines of computer support.   One of the two main schools of thought is the “break/fix” crowd—those who believe that if it breaks, someone will come out and look at the problem, charge you an appropriate fee for the visit, and leave when it is complete.  This ...

Server, Networking and Security

Busting some of those cyber security myths

How secure do you think you are when you are using the internet?  Even if the answer is “very,” you probably have some weak spots when it comes to protecting your personal information.  On the internet, most of us do things that we would never think to do in real life.  We talk to strangers, we leave critical personal information in insecure places, and we make the silliest mistakes when it...

Server, Networking and Security

Dabbling in Cyber Security: Not the Best Approach

Cyber security is a problem that small and medium businesses and not-for-profit organisations consider of little consequence.  The prevailing attitude of "it won’t happen to me" always comes to the fore when cyber security comes up in discussion.  I am not going to get on my high horse about that—not this time, anyway.   Dabbling in cyber security is another common response.  By dabbli...

Server, Networking and Security

Cybercrime: I Love Being Paranoid!

In today’s world, cybercrime and cyber-criminals are all around.  In most cases they are just a click of the mouse away.    The original geek that we associate with high-level computer skills has fast been replaced with cunning, aggressive and persistent criminal types.  Yes, the geeks are still out there, but in most cases there is a criminal mastermind employing them to do their geeky thin...

Server, Networking and Security

Since when has email been anything but a broadcast medium?

We all use email, and in most cases we have had an email address for many years.  My Hotmail (no longer called Hotmail) has been with me now since 1995, and my Google mail account has been around since 2000.  Email has developed into the medium of choice, and an email can now be considered a legal document.  We treat it as a vehicle for private correspondence.  But one thing is constantly forg...

IT Support

Preparing Businesses to Meet the Future

Let’s face it—today’s businesses are Busy with a Capital B.  You know the saying - over worked, under paid.  In many cases, small and medium business owners and managers of not for profit organisations are working 10 - 15 hour days.   The job of bringing in new and sustainable clients to ensure growth is all-consuming. So often today, the numerous daily requirements necessary just to ru...

Information Technology

Why your business still doesn’t have a managed service provider—but it should

Managed services have been available in Australia for some time, but this service has been slow to catch on.  There are three main reasons this form of service isn’t as successful as it should be. 1. Bad marketing To most small and medium business and not for profit organisations, the ICT component of their business may as well be written in Swahili.   Getting the computers to talk to the...

Hardware and Software

"Stop the world I want to get off" - the digital revolution and some food for thought

"It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity, it was the season of Light, it was the season of Darkness, it was the spring of hope, it was the winter of despair, we had everything before us, we had nothing before us, we were all going direct to Heaven, we were all going d...

Hardware and Software

Why outdated hardware and software is bad for business!

A few months ago, I was visiting a business, in the process of possibly taking them on as a client.  We had just completed a full audit of their network and were discussing the results.  No sales talk, just a round-table discussion in which we presented our recommendations to the board of directors and C-level management. In most cases, when you point out problems and offer solutions to the t...

Server, Networking and Security

Managed service professionals: the better option for SMEs

A business of any size that fails to manage its ICT is a real threat to the data of individuals.  Small and medium businesses and not for profit organizations worldwide are being threatened with civil and criminal actions for decisions they make regarding protection of their ICT systems and the data contained within them.  You cannot pick up a newspaper without seeing a story about data breach...

Server, Networking and Security

The fukushima disaster and cybercrime: how criminals exploit your most generous impulses

It is a well-known fact that events of a global interest are exploited by cyber criminals for financial gain.  Natural disasters are a golden opportunity for cyber criminals and cyber vandals, whose main aim is to make profit, even if it means exploiting other people’s misery.   —Eugene Kaspersky You have got to love the bad guys. They come up with the most inventive ways of scamming nor...

Server, Networking and Security

How do we protect our children when we don’t understand cyber space ourselves

Technology has changed the world.  From cloud computing to GPS, from tablets to mobile apps, we are all in the grips of technology, and it is only going to get more entangled in our lives.  It is easier for us to talk to our relations on the other side of the world than it is to go and knock on our next door neighbors' door.  Well, unless our next door neighbor is on Facebook—then it's the ...

Information Technology

10 most common excuses heard from end users

In the business world, people seem to find the most bizarre reasons for calling the ICT department.  Here is a list of ten that always seem to pop up when least expected.  Some of the responses below are things I would never say aloud—but that doesn't mean I'm not thinking them.   That password is too hard to remember!   Few people realize that the passwords you use when accessing bank...

Server, Networking and Security

Here's a new one for you - Bring your Own Cloud (BYOC)

So, recently we were doing some work on a client’s site—small site, 20 users—and we were installing a new server with SBS.  And yes, we had specific reasons for going down the server-on-site path.  All relatively easy, although it can be a little time-consuming, especially when transferring data from an antiquated system. One of the things that came to light was that all of the users had ...

Server, Networking and Security

Individual Cyber Security Health Check- Get Yours Now!

Everyone uses the internet in some way.   At home we're Facebooking or looking up recipes; on the job we're working on the business CRM; when we're on the go, we're answering emails on a tablet or smartphone.  From toddlers to senior citizens, we all interact with this communication device called the Internet. In the course of that interaction, we have developed a blasé attitude to personal s...

Telecommunications, Mobile and Wireless

Cyber Security - Is Orwell’s Vision Coming True?

I recently watched the newest revelations about the NSA from the ABC Four Corners (www,abc.net.au/4corners).  Living and working in Australia has made me realise that at present we have a lot more freedom than most countries in the world, including the USA—or at least, we used to. The problem is that technology is eroding that freedom to a level where Orwell’s vision of the future is becomin...

IT Support

Do you only need a computer tech when the computer breaks

In the technical support world, there has been everything from constant bickering to full-blown arguments over the different disciplines of computer support.   One of the two main schools of thought is the “break/fix” crowd—those who believe that if it breaks, someone will come out and look at the problem, charge you an appropriate fee for the visit, and leave when it is complete.  This ...

Server, Networking and Security

Busting some of those cyber security myths

How secure do you think you are when you are using the internet?  Even if the answer is “very,” you probably have some weak spots when it comes to protecting your personal information.  On the internet, most of us do things that we would never think to do in real life.  We talk to strangers, we leave critical personal information in insecure places, and we make the silliest mistakes when it...

Server, Networking and Security

Dabbling in Cyber Security: Not the Best Approach

Cyber security is a problem that small and medium businesses and not-for-profit organisations consider of little consequence.  The prevailing attitude of "it won’t happen to me" always comes to the fore when cyber security comes up in discussion.  I am not going to get on my high horse about that—not this time, anyway.   Dabbling in cyber security is another common response.  By dabbli...

Server, Networking and Security

Cybercrime: I Love Being Paranoid!

In today’s world, cybercrime and cyber-criminals are all around.  In most cases they are just a click of the mouse away.    The original geek that we associate with high-level computer skills has fast been replaced with cunning, aggressive and persistent criminal types.  Yes, the geeks are still out there, but in most cases there is a criminal mastermind employing them to do their geeky thin...

Server, Networking and Security

Since when has email been anything but a broadcast medium?

We all use email, and in most cases we have had an email address for many years.  My Hotmail (no longer called Hotmail) has been with me now since 1995, and my Google mail account has been around since 2000.  Email has developed into the medium of choice, and an email can now be considered a legal document.  We treat it as a vehicle for private correspondence.  But one thing is constantly forg...

IT Support

Preparing Businesses to Meet the Future

Let’s face it—today’s businesses are Busy with a Capital B.  You know the saying - over worked, under paid.  In many cases, small and medium business owners and managers of not for profit organisations are working 10 - 15 hour days.   The job of bringing in new and sustainable clients to ensure growth is all-consuming. So often today, the numerous daily requirements necessary just to ru...

Roger Smith answered this question

Neil Steggall
Neil Steggall, Partner at Wardour Capital Partners

Leadership

What is the number one skill required to build a successful SME?

It would have to be persistence.

I am a great believer in some of Rocky Balboa's sentiments - every time you get knocked down, you get back up and keep moving forward.   For an SME, you have to learn to roll with the punches, you are under constant pressure from every angle so you have to move forward.  

Think of better strategies, integrate new ideas, innovate and most important of all, market your products and service.  But always be persistant

Roger Smith answered this question

Who knows how much do copywriters charge to write a web page?

Hi

I have 2 copywriters on my virtual marketing team.   I write a number of articles and content for 4 websites per week and send it off to them regularly.   They have a turn around of about 3 days depending on the size of the article and how bad my initial writing was (sometimes it can be bad).   In my area of expertise it is very easy to fall into slang and get way to complicated for the average person.   They keep me in check and deliver very good to outstanding articles.

They cost me $20 - 30 per hour.

A copywriter is only as good as two things - the content that you give them and how much you trust their interpretation of what you are trying to say.   With my team we came to a very quick understanding that 99.9% of what they delivered was going to be what I used on a page.

Companies followed

The Marketing Mentor McKinnon, VIC 3204

View more

TOPICS FOLLOWED

Online Business

Online Business 9343 FOLLOWERS

Legal

Legal 5937 FOLLOWERS

Sales and Marketing

Sales and Marketing 8733 FOLLOWERS

Human Resources

Human Resources 6738 FOLLOWERS

Finance and Accounting

Finance and Accounting 8225 FOLLOWERS

Information Technology

Information Technology 7691 FOLLOWERS

Startup

Startup 6868 FOLLOWERS

Business Management

Business Management 11137 FOLLOWERS

Ecommerce

Ecommerce 7547 FOLLOWERS

Selling Online

Selling Online 7610 FOLLOWERS

Social Media

Social Media 7694 FOLLOWERS

Web Design

Web Design 7528 FOLLOWERS

Web Development

Web Development 7574 FOLLOWERS

Web Hosting

Web Hosting 7426 FOLLOWERS

Business Structure

Business Structure 5409 FOLLOWERS

Insolvency

Insolvency 5289 FOLLOWERS

Intellectual Property

Intellectual Property 5351 FOLLOWERS

Buying a Business

Buying a Business 5355 FOLLOWERS

Employment Law

Employment Law 5321 FOLLOWERS

Customer Acquisition

Customer Acquisition 6946 FOLLOWERS

Graphic Design

Graphic Design 6875 FOLLOWERS

Video Production

Video Production 6856 FOLLOWERS

Advertising

Advertising 7012 FOLLOWERS

Branding

Branding 7023 FOLLOWERS

Market Research

Market Research 6912 FOLLOWERS

Digital Marketing

Digital Marketing 7072 FOLLOWERS

Public Relations (PR)

Public Relations (PR) 6910 FOLLOWERS

Recruitment

Recruitment 5449 FOLLOWERS

Leadership

Leadership 5509 FOLLOWERS

Team Management

Team Management 5486 FOLLOWERS

Outsourcing

Outsourcing 5484 FOLLOWERS

Succession Planning

Succession Planning 5443 FOLLOWERS

Career Planning

Career Planning 5430 FOLLOWERS

Cashflow Management

Cashflow Management 5626 FOLLOWERS

Taxation

Taxation 5583 FOLLOWERS

Insurance

Insurance 5564 FOLLOWERS

Superannuation

Superannuation 5563 FOLLOWERS

Banking

Banking 5583 FOLLOWERS

Accounting

Accounting 5621 FOLLOWERS

Government Grants

Government Grants 5582 FOLLOWERS

Website

Website 6258 FOLLOWERS

Cloud Computing

Cloud Computing 6166 FOLLOWERS

App Development

App Development 6153 FOLLOWERS

Hardware and Software

Hardware and Software 6131 FOLLOWERS

IT Support

IT Support 6139 FOLLOWERS

Product Development

Product Development 6460 FOLLOWERS

Startup Branding and PR

Startup Branding and PR 6493 FOLLOWERS

First 100 Days

First 100 Days 6460 FOLLOWERS

Bootstrapping

Bootstrapping 6422 FOLLOWERS

Research and Innovation

Research and Innovation 6465 FOLLOWERS

Customer Retention

Customer Retention 7373 FOLLOWERS

Importing

Importing 7264 FOLLOWERS

Business Growth

Business Growth 7390 FOLLOWERS

Market Trend

Market Trend 7339 FOLLOWERS

Business Partnership

Business Partnership 7346 FOLLOWERS

Lifestyle and Health

Lifestyle and Health 7357 FOLLOWERS

Risk Management

Risk Management 7322 FOLLOWERS

Franchising

Franchising 7270 FOLLOWERS

Business Coaching

Business Coaching 7389 FOLLOWERS

Business Planning

Business Planning 7416 FOLLOWERS

New Business Ideas

New Business Ideas 6525 FOLLOWERS

View more

people with similar expertise

Apurv Bhalla CPA 27 FOLLOWERS

Brad Lyons 196 FOLLOWERS

Jef Lippiatt 4.88K FOLLOWERS

Steve Osborne 4.91K FOLLOWERS

Kirsty Fox 29 FOLLOWERS