Back to Blog

Technology & Tools Category

How to protect your family from cyber threats?

On: January, 5th 2017 | Under: Technology & Tools


Do you have young children who risk being exposed to pornographic or inappropriate websites?
Do you feel you should control the type of applications your children use and the amount of time they spend on the internet on websites such as social media?
Are you worried your children are using gaming, gambling, or in-app purchasing applications?

If you answered “yes” to any of these questions you are part of a growing movement of concerned family’s’ who are struggling to control their childrens’ exposure to the internet.

Why is access to internet content so hard to control?

There are 3 main reasons why internet consumption by children is hard to control:

  1. Multiple Access – The internet can now be accessed in a variety of different ways. Traditionally the home network was the only access method for most families. Now we have access by mobile data access via 3G & 4G networks, plus the increased availability of free Wi-Fi public access networks, then the additional opportunity of roaming as guests on other private Wi-Fi Networks. Internet access is now available everywhere so managing access through gatekeeping devices such as routers is increasingly ineffective.
  2. Multiple Devices – With internet access everywhere comes the proliferation of multi device access with many children now using a range of smartphones, tablets, laptops, and workstations. Internet access is now available almost anywhere on any device, so managing access of devices is increasingly difficult.
  3. Knowledge – Our children are developing skills and shared methodologies that can circumvent traditional control network mechanisms (such as routers) and device profile user management (such as Windows Parental Control).

With anywhere anytime internet access from multiple devices, is it still possible to regulate internet access to our children?

Thankfully development of cloud technologies has enabled user management to be lifted above the physical network layer and enables user profile management to be delivered across multiple access networks and devices. Effectively the cloud allows an additional layer of control above the traditional approach to user management and content control.

Here is what a cloud based portal can enable:

  1. Block porn and adult content
  2. Restrict access to social media
  3. Restrict access to YouTube and gaming content
  4. Limit access to mobile games and apps
  5. Limit app downloads and in-app purchases
  6. Disable device features including cameras
  7. Set restricted access periods and sleep times across devices
  8. Cover devices in and out of home.
  9. Managed from a single cloud based portal

Given all this is possible, how it is achievable?

As a business who has been help protect Australian families for over 20 years we have watched the evolution of different internet security software and hardware struggle to keep up with these changes. In our view, if families wish to take control of how internet is consumed they must consider using a cloud based portal to provide comprehensive protection.

To the best of our knowledge the most comprehensive and accessible product for family internet management is called Family Zone. Family Zone is a new generation cloud based product that allows for all these changes in technology from anywhere access from multiple devices.

Family Zone

Family Zone brings together the best Cyber Experts, organisations and technologies into one easy-to-use system. They developed it, tested it and now we want to share it so that everyone can enjoy the same peace of mind that their customers do. Family Zone was built on the belief that only through working together, as a community, can we build a cyber safe generation of kids.

What is unique about Family Zone?

  • Cloud based user & content management portal
  • Specific age profile restriction based management
  • Multi Network management
  • Remote device management (through VPN and MDM)
  • Individually configurable to each family member

If you are looking for the most comprehensive family content management system to protect your family we recommend you investigate Family Zone further.

2 months Free Trial Offer

We’ve have recently partnered with Family Zone to provide a full a cyber safety solution to keep the whole family safe while online; both at home and when they are out and about on their phones. While the service can be configured by parents, Computer Troubleshooters can help set up Family Zone at your house so that you’re confident when the kids are online their cyber safety is sorted.

Computer Troubleshooters on behalf of our clients have negotiated a 2 month free trial of Family Zone, plus we can offer a fixed installation of $139 should you require our help.

To find out more go to  http://www.computertroubleshooters.com.au/family-zone/

Give your local Computer Troubleshooters office a call and will be happy to discuss your particular situation and see if Family Zone is the right solution for you.

What is your computer doing during YOUR vacation?

On: May, 22nd 2014 | Under: Data Recovery, How To: Technology 101, Technology & Tools


Your computer provides you with a lot of assistance in planning vacations and other trips throughout the year. Remember the hours you spent on various websites looking for the perfect vacation destination? How about all of the online comparison shopping you did to find the ideal Hawaiian resort? Remember that awesome discount deal you scored on those air tickets? How could you have planned your summer trip without your computer?

Continue Reading

7 Reasons Your Small Business Must Have a Back Up Solution!

On: May, 16th 2014 | Under: Data Recovery, How To: Technology 101, Technology & Tools


It is 2014, and we all know that every business should have a backup (and a recovery plan) for their most critical data.  The reality is that over 40% of Small and Medium Sized Business do not back up their data at all, and that 60% of backups fail when tested!

Continue Reading

What is Business Technology Support?

On: April, 30th 2014 | Under: How To: Technology 101, Industry News: This Week in IT, Managed Services, Technology & Tools


Business technology support can generally be described as a range of services that deliver assistance to users of technology products such as computers, software and mobile devices within an office setting.

Continue Reading

Your guide to understand the Heartbleed Bug

On: April, 10th 2014 | Under: Computer Repair, Global Newsletter, Industry News: This Week in IT, Technology & Tools


Monday a massive vulnerability was found in OpenSSL, the open-source software package broadly used to encrypt Web communications. They named this vulnerability the Heartbleed Bug. Many are confused about what this bug is, if they are impacted, and how they can protect themselves. This post will help educate you about the Heartbleed Bug and how you can protect yourself online.

Continue Reading

How Outsourced IT Support can Enhance Your Business

On: March, 25th 2014 | Under: How To: Technology 101, Managed Services, Technology & Tools


Do you have an IT professional handling the technology in your business, or are you thinking about moving into an outsourced IT services model as so many small businesses owners are?  According to a survey completed by CompTIA 62% of the organizations surveyed planned to make greater investments in Outsourced IT Services (managed services) over the next two years.

Continue Reading

Is Your IT Professional Also a Trusted Business Advisor? They Should Be!

On: March, 17th 2014 | Under: Computer Networking, Global Newsletter, Industry News: This Week in IT, Managed Services, Technology & Tools


As a business owner, one of the best moves you can make is to outsource your IT services to a professional provider. When it comes to outsourcing your IT service needs, there are a wide range of service options that involve varying levels of management responsibilities and costs. An IT professional can provide service for a single specific task such as help desk support or managing network security.

Continue Reading

Keep Your Business Data Safe on Mobile Devices

On: March, 5th 2014 | Under: Computer Networking, Managed Services, Technology & Tools


According to CompTIA’s Second Annual Trends in Enterprise Mobility study for 2013, 64 percent of businesses support a BYOD policy. The trend continues as employees demand to use their personal mobile devices for their job. Businesses take on a higher risk of data exposure to malware and theft in a BYOD environment. Knowing how to protect your company data on these devices reduces the risk of a costly event that compromises your data, and damages your business.

Continue Reading

Things to look for when finding Small Business IT Support Provider

On: February, 21st 2014 | Under: How To: Technology 101, Managed Services, Technology & Tools


As technology expands most small business owners are unable to keep up with the ever growing and changing needs of the technology within their business.  Many are beginning to outsource their technology support needs and are looking for Small Business IT Support Provider.

Continue Reading

The Final Countdown to Microsoft’s April 8th Deadline

On: February, 20th 2014 | Under: Computer Networking, Industry News: This Week in IT, Technology & Tools


In 2002, Microsoft presented its official Support Lifecycle Policy that was based on detailed customer feedback. The predictability of support services was cited as a very important issue for Microsoft’s customers. Microsoft responded accordingly by alerting customers years in advance that the XP operating system and Windows 2003 have an “end of life” date scheduled for April 8, 2014.

Continue Reading