?>
Roger Smith profile image

Roger Smith
Top 10% Server, networking and security

Owner at R & I ICT Consulting Services Pty Ltd

Member Since August 2013

SHARE

145 FOLLOWERS

Amazon #1 Best Selling Author | Experienced Cybercrime and Cyber Security Expert | Speaker | Consultant | Trainer

You know how frustrating and frightening it is getting the right information about protecting yourself, your business and your client information from the digital world?
I solve this.
I put your business on a strict diet of good technology, the best management, meaningful adaptability and required compliance to make your business digital secure.

Reputation

Top 10%
Server, networking and security
Top 10%
IT support and consulting
Top 10%
Telecommunications, mobile and wireless

Why you’re business still doesn’t have a managed service provider—but It should

Managed services have been available in Australia for some time, but this service has been slow to catch on.  There are three main reasons this form of service isn’t as successful as it should be...

Read more

Roger Smith answered a question

Neil Steggall, Partner at Wardour Capital Partners

Asked this question - Leadership

What is the number one skill required to build a successful SME?

If you had to choose a single skill or trait you consider essential to SME success what would it...

"Stop the world I want to get off" - the digital revolution and some food for thought

"It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity, it was the season of Light...

Read more

Why outdated hardware and software is bad for business!

A few months ago, I was visiting a business, in the process of possibly taking them on as a client.  We had just completed a full audit of their network and were discussing the results.  No sales ...

Read more

Managed service professionals: the better option for SMEs

A business of any size that fails to manage its ICT is a real threat to the data of individuals.  Small and medium businesses and not for profit organizations worldwide are being threatened with ci...

Read more

The fukushima disaster and cybercrime: how criminals exploit your most generous impulses

It is a well-known fact that events of a global interest are exploited by cyber criminals for financial gain.  Natural disasters are a golden opportunity for cyber criminals and cyber vandals, whos...

Read more

How do we protect our children when we don’t understand cyber space ourselves

Technology has changed the world.  From cloud computing to GPS, from tablets to mobile apps, we are all in the grips of technology, and it is only going to get more entangled in our lives.  It is ...

Read more

10 most common excuses heard from end users

In the business world, people seem to find the most bizarre reasons for calling the ICT department.  Here is a list of ten that always seem to pop up when least expected.  Some of the responses be...

Read more

Here's a new one for you - Bring your Own Cloud (BYOC)

So, recently we were doing some work on a client’s site—small site, 20 users—and we were installing a new server with SBS.  And yes, we had specific reasons for going down the server-on-site pa...

Read more

Individual Cyber Security Health Check - Get yours now!

Everyone uses the internet in some way.   At home we're Facebooking or looking up recipes; on the job we're working on the business CRM; when we're on the go, we're answering emails on a tablet or s...

Read more

Why you’re business still doesn’t have a managed service provider—but It should

Managed services have been available in Australia for some time, but this service has been slow to catch on.  There are three main reasons this form of service isn’t as successful as it should be...

Read more

"Stop the world I want to get off" - the digital revolution and some food for thought

"It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity, it was the season of Light...

Read more

Why outdated hardware and software is bad for business!

A few months ago, I was visiting a business, in the process of possibly taking them on as a client.  We had just completed a full audit of their network and were discussing the results.  No sales ...

Read more

Managed service professionals: the better option for SMEs

A business of any size that fails to manage its ICT is a real threat to the data of individuals.  Small and medium businesses and not for profit organizations worldwide are being threatened with ci...

Read more

The fukushima disaster and cybercrime: how criminals exploit your most generous impulses

It is a well-known fact that events of a global interest are exploited by cyber criminals for financial gain.  Natural disasters are a golden opportunity for cyber criminals and cyber vandals, whos...

Read more

How do we protect our children when we don’t understand cyber space ourselves

Technology has changed the world.  From cloud computing to GPS, from tablets to mobile apps, we are all in the grips of technology, and it is only going to get more entangled in our lives.  It is ...

Read more

10 most common excuses heard from end users

In the business world, people seem to find the most bizarre reasons for calling the ICT department.  Here is a list of ten that always seem to pop up when least expected.  Some of the responses be...

Read more

Here's a new one for you - Bring your Own Cloud (BYOC)

So, recently we were doing some work on a client’s site—small site, 20 users—and we were installing a new server with SBS.  And yes, we had specific reasons for going down the server-on-site pa...

Read more

Individual Cyber Security Health Check - Get yours now!

Everyone uses the internet in some way.   At home we're Facebooking or looking up recipes; on the job we're working on the business CRM; when we're on the go, we're answering emails on a tablet or s...

Read more

October is cyber security month - what are you doing to protect yourself?

Let’s do it differently this year.   Each October for the last 5 years has been cyber security month, but nothing changes and nothing seems to improve.   When it comes to protecting ourselves we...

Read more

Roger Smith answered a question

Neil Steggall, Partner at Wardour Capital Partners

Asked this question - Leadership

What is the number one skill required to build a successful SME?

If you had to choose a single skill or trait you consider essential to SME success what would it...

Roger Smith answered a question

Ananda Raj Pandey, Developer at SavvySME

Asked this question - Copywriting, content writing and blogging

How much do copywriter charge to rewrite a web page?

Want to know the cost of copywriting to rewrite a few web pages I am working on. I have basic idea...

Companies followed

Seo Melbourne McKinnon, VIC 3204

TOPICS FOLLOWED

Online businesses

Online businesses 8491 FOLLOWERS

Legal

Legal 5644 FOLLOWERS

Sales and marketing

Sales and marketing 8318 FOLLOWERS

Human resources

Human resources 5783 FOLLOWERS

Finance and accounting

Finance and accounting 6331 FOLLOWERS

Information technology

Information technology 6668 FOLLOWERS

Startup

Startup 6616 FOLLOWERS

Growth

Growth 8449 FOLLOWERS

Ecommerce strategy

Ecommerce strategy 7499 FOLLOWERS

Selling online

Selling online 7554 FOLLOWERS

Search engine marketing

Search engine marketing 7552 FOLLOWERS

Social media

Social media 7650 FOLLOWERS

Web design

Web design 7457 FOLLOWERS

Web development

Web development 7509 FOLLOWERS

Web hosting

Web hosting 7384 FOLLOWERS

Business structure

Business structure 5372 FOLLOWERS

Insolvency

Insolvency 5288 FOLLOWERS

Intellectual property

Intellectual property 5338 FOLLOWERS

Buying a business

Buying a business 5332 FOLLOWERS

Employment law

Employment law 5303 FOLLOWERS

Customer acquisition

Customer acquisition 6914 FOLLOWERS

Graphic design

Graphic design 6845 FOLLOWERS

Media production

Media production 6836 FOLLOWERS

Advertising

Advertising 6947 FOLLOWERS

Branding

Branding 6974 FOLLOWERS

Market research

Market research 6879 FOLLOWERS

Online marketing

Online marketing 7013 FOLLOWERS

Public relations

Public relations 6891 FOLLOWERS

Leadership

Leadership 5489 FOLLOWERS

Managing employees

Managing employees 5473 FOLLOWERS

Outsourcing

Outsourcing 5461 FOLLOWERS

Succession planning

Succession planning 5433 FOLLOWERS

Cashflow management

Cashflow management 5605 FOLLOWERS

Taxation

Taxation 5570 FOLLOWERS

Insurance

Insurance 5555 FOLLOWERS

Superannuation

Superannuation 5555 FOLLOWERS

Banking

Banking 5557 FOLLOWERS

Accounting

Accounting 5586 FOLLOWERS

Government grants

Government grants 5563 FOLLOWERS

Website

Website 6224 FOLLOWERS

Cloud computing

Cloud computing 6144 FOLLOWERS

Hardware and software

Hardware and software 6114 FOLLOWERS

Product development

Product development 6447 FOLLOWERS

Startup branding and PR

Startup branding and PR 6477 FOLLOWERS

First 100 days

First 100 days 6449 FOLLOWERS

Bootstrapping

Bootstrapping 6418 FOLLOWERS

Onwards and upwards

Onwards and upwards 6455 FOLLOWERS

Importing

Importing 7254 FOLLOWERS

Growing and scaling

Growing and scaling 7357 FOLLOWERS

Market trend

Market trend 7320 FOLLOWERS

Business partnership

Business partnership 7324 FOLLOWERS

Lifestyle and health

Lifestyle and health 7334 FOLLOWERS

Managing risks

Managing risks 7312 FOLLOWERS

Franchising

Franchising 7261 FOLLOWERS

Business coaching

Business coaching 7366 FOLLOWERS

Business planning

Business planning 7391 FOLLOWERS

Miscellaneous

Miscellaneous 7317 FOLLOWERS

View more