VPNs: Why, What and How - Part three Welcome to the final instalment of VPNs WHY, WHAT AND HOW. In the coming weeks we will be releasing some instructional video blogs that will cover a few key areas around VPNs and PROXYs. Our recommended provider for both VPNs and PROXYs is TorGuard.
Read more
What Is A VPN?
VPNs: Why, What and How - Part Two If you read my previous article ‘VPNS why should I get one’ then you are no doubt reading this article because you are a concerned internet user and you are after a little more information. The subjects in this article are verging on the
Read more
Why You Should Get A VPN
VPNs: Why, What and How - Part One As time goes on we are wising up to the fact that the advancements of technology are not always for the betterment of the user. More and more we are becoming unknowing victims of analysis, spying and hacking. There are steps that every
Read moreWindows 10 upgrade no longer a choice
Windows 10 Upgrade No Longer a Choice Microsoft is trying something new and we’re not very confident it’s for your benefit. As of February 2016 Windows 10 will automatically download for millions of users. In July 2015 millions of people awoke to Microsoft’s ‘new approach’ to sales and software integration of their new
Read more
Remote IT Support
Computer Zen - Remote IT Support Don’t waste your precious time. Remote IT Support is the answer. “The title doesn't do the service justice. I have never felt closer to my clients than when I am just one click away from not only supporting them but really understanding their problems.” - Toby
Read moreDangerous New Cryptolocker Virus
Dangerous New Cryptolocker Virus This month we have had a few clients come to us with their machines infected with a malicious virus known as a Cryptovirus. In my 14 years as an IT professional have i ever seen such a damaging computer virus as this. What is a Cryptolocker virus? A Cryptolocker
Read moreHackers Alert – Ransomware Now Affecting More Queensland Computer Systems
Transcription Newsreader: Some Queensland businesses are being forced to pay ransoms to cyber criminals who break into their computer systems. The hackers use what's known as Ransomware to lock users out of their own systems. Jonathan Lee has been investigating how it works. Jonathan Lea: As our lives move online, we are becoming
Read moreBusiness Owners, Are you Backing up Your Sensitive Data?
Today, more and more businesses are switching to digital methods of communication and information storage. This means that your computers now contain most, if not all, of the information required to run your business successfully – your tax and accounting records, your client information and receipts, your business plans and
Read moreSecuring Your WIFI Connection At Home – Prevent Unwanted Access
In this age of multiple smart devices, a secure Wi-Fi connection is no longer a luxury, but the norm. As wireless signals cannot be contained within your home, your network must be well secured to prevent outsiders from using it. The danger: If you have a download limit, freeloaders can cause
Read moreHow to Safely Browse the Internet Without Security Concerns
The internet has dramatically changed our lives – from booking tickets, banking and shopping to chatting and sharing music videos with our friends, it seems the internet has made just about anything and everything possible. But viruses and other security threats also exist all over the internet. These can damage your
Read more