Are your Home technology devices performing optimally

Avatar On: July, 29th 2020 | Under: Backup, Security, support, Wi-Fi

Are your Home technology devices performing optimally?

Residential Support – that delivers.

Did you know that 600,000 hard disks crash every year in Australia? In addition to that, nearly a third of all Australian adults are affected by cybercrime, losing precious money to new viruses and security threats that emerge every day.

Everyone relies on technology to live their daily lives, and the home network consists of many elements. The average home has approximately 18 smart devices and within a few years this could grow to beyond 25 devices, all connecting wirelessly to a network with the capacity to transmit data.

The internet and COVID-19 are having a dramatic impact on consumer habits. People are stuck at home, working, streaming, shopping – all online. The internet and everything that comes with it continues to change the way we live, meaning that tech support at home is increasingly crucial.

Ask yourself – is your Internet & Wi-Fi connection and IT technology performing optimally? Imagine thinking no more technology interruptions, that’s the peace of mind you deserve. How? Outsource the management of your home IT.  Engaging with your local Computer Troubleshooters to provide dedicated tech support means you can rest easy knowing your technology and data is safe.  Your local Computer Troubleshooter expert can configure your home network, install security solutions, and perform regular maintenance ensuring your desktops, laptops are working properly and securely.

Now more than ever, remote working is on the rise. The impact of COVID-19 means that Australian businesses are allowing their employees to work from home. Our experts offer residential support services that include computer diagnostics (identifying problems, defining, and proposing solutions) computer & laptop repairs, tune ups, data backup, data transfer, new computer setup, home network configuration & NBN integration.

A Computer Troubleshooters solution for the residential client protects your networks and hardware from malware, spyware, Crypto locker & virus threats. Computer Troubleshooters provide a range of internet security services, including both proactive and prevention products. If your computer is already infected, our experts can remove viruses and spyware and patch and install the latest software.

The Computer Troubleshooters Protection Plan Solutions can be tailored to meet your support needs, for a small monthly fee. Talk to your local Computer Troubleshooter who will tailor a plan to suit your needs.

  • Worried about losing files and precious photos?
    We can assist with back up and cloud support.
  • Concerned about viruses & cybercrime?
    Let us take the worry away with monitoring that alerts your local Computer Troubleshooter to issues before they happen. Meaning it’s fixed before you have a disruption to your technology life.  You can be confident that you are doing everything to limit the opportunity for a phishing or ransomware attack.
  • Does your computer performance seem slow?
    Give our experts a call for a tune up of your computer.

Our on-demand services are available to residential customers without a service contract, for a computer technician at an hourly rate (or fixed-fee pricing where appropriate).

We offer quick and timely resolution, especially when you utilise our Remote Support Service.

If you have an internet connection, then we can aim to fix your issues without even coming to your home. This means we can diagnose your problem, present you with the remediation option and before you know it, we have rectified your problem.

No internet connection a solution is at hand. We offer onsite support, where the technician will travel to you and diagnose your situation. We can even complete a home audit of your technology environment and make recommendations that will make your life easier.

No problem is too big or too small, don’t lose your precious memories or jeopardise your home office, get a solid data backup, security, and tech support solution in place for your home today.

Visit our website at www.computertroubleshooters.com.au to view all our products and services or call 1300 28 28 78 to discuss your needs with your local Computer Troubleshooter.

Cyber Attacks on the rise

Avatar On: July, 1st 2020 | Under: Security

Cyber Attacks on the rise

Prime Minister Scott Morrison and his government are so concerned about the rise in the volume of Cyber-attacks that a specific press conference was held on Friday June 20th declaring Australia under attack. 

This is warning Australian businesses to be proactive in defending themselves against a potential attack.

The Australian Cyber Security Centre (www.cyber.gov.au) (ACSC) has identified that the threat actor is utilising various spearphishing techniques. These have taken the form of:

  • links to credential harvesting websites
  • emails with links to malicious files, or with the malicious file directly attached
  • links prompting users to grant Office 365 OAuth tokens to the actor
  • use of email tracking services to identify the email opening and lure click-through events.

Given the uptake of Office 365 by Australian businesses due to the majority of the workforce currently working from home, it is more important than ever to be talking with your local Computer Troubleshooter. This will  ensure you are doing everything within your power to minimise the risk of an attack and disruption to your business.

The best form of defence against cyber-attack is to use a layered approach which means more than just having endpoint protection on your devices. Even with just Endpoint protection, too many employees and businesses do not have the latest viruses’ definitions or the latest software patches issued by the vendor.

The Computer Troubleshooters protection/managed service plans are designed to enable a business to minimise the risk and to have the confidence that all the basic mitigation strategies are deployed in your business.

No single mitigation strategy can prevent cyber-attack incidents.  The Australian Cyber Security Centre located within the Australian Signals Directorate has developed eight mitigation strategies that are considered as the baseline -essential for all organisations to protect themselves against cyber incidents. Collectively this is known as the Essential Eight framework.

Given the current threat environment the following detection and mitigation strategies are highly recommended by the ACSC.

  • Prompt patching of internet-facing software, operating systems, and devices

This means all businesses should ensure that security patches or mitigations are applied to internet facing infrastructure immediately.  If you are not  sure what this means then talk to your local Computer Troubleshooter by calling 1300 28 28 78.

This includes ensuring all software and operating systems are using the latest versions.  A CT Business protection/managed services plan includes the automatic patching of all your systems.

  • Use of multi-factor authentication across all remote access services

Are you using web and cloud-based email applications (Office 365, Xero accounting), collaboration platforms (Teams) a virtual private network connection or Remote desktop services? Then you should have Multi-factor authentication implemented. This gives you a much higher degree of security against fraudulent access to your systems.

What other of the essential eight strategies need to be implemented?

  • Application control

Ensure that all executable files are restricted from being able to run. This includes ensuring this restriction applies to all servers and any workstation devices.

  • Configure Microsoft 365 macro settings

Ensuring that only Microsoft office macros are allowed to deploy after the user is prompted for approval,  that no security settings can be modified by a user, and that macros in documents sourced from the internet are blocked.

  • User application hardening

Ensuring that web browsers are set up to block or disable support for content that uses Flash. Ensuring that web browsers are configured to block java from the internet and also to block web advertisements.

  • Restrict administrative privileges

Ensuring that access to systems, applications and data repositories are validated when first requested by a privileged user. Broader Policy security controls are used to prevent privileged users from reading emails, browsing the web, and obtaining files via online services. This will include continued revalidation of users’ access at  regular intervals as set by a system policy.

  • Daily backups

Ensure that information, software, and configuration settings are backed up monthly at a minimum .. Make sure that that  all backups are stored for a nominated period of time between a month and three months, using multiple backups – both physical and cloud. Backups to be preserved in a non-rewritable and non-erasable manner, and restoration tested annually at the very least (though preferably on a more frequent basis). Tests to be conducted both in part and full.


Remove the stress!  Be confident you have it covered.

No matter what the size of your business is,  no business is safe from cyber-attack unless you are proactively  managing your risk in an ongoing manner. This is not something that you can ignore –  it is a moving beast and your business needs to manage the risk. If you don’t have a dedicated IT department or an ongoing support department then you need to find out more about how your local Computer Troubleshooter can help. A Computer Troubleshooter will assess your risk and develop  proactive managed plans of protection with you.  Sleep comfortably at night knowing your business is in safe hands. Call 1300 28 28 78 or visit our website at www.computertroublehsooters.com.au


Business Data Breach Laws – Australia

Avatar On: May, 25th 2020 | Under: Data Recovery, Security, support

Business  Data Breach Laws – Australia

What is the impact for Business?

Data is more valuable than oil, as data is the lifeblood of any business. Data by itself like oil, needs to be refined before it is transformed into a valuable commodity.

Data is collected everyday as part of normal business activities, assisting businesses to make important business decisions such as marketing and forecasting. Today’s greatest challenges though are hackers – cyber criminals who are focused on and love to get their hands on a business’s sensitive and valuable business data, a prime target being customer information.

In 2018, the Australian Government introduced new laws to protect consumers against data breaches. Essentially, any company with a turnover exceeding $3 million must alert its customers of a data breach as quickly as possible. Failing to report the breach, an organisation can be fined up to $1.8 million.

According to the Office of the Information Commissioner data breaches in Australia are still rising meaning many companies remain unprepared. The July-December 2019 Notifiable data breaches report reported that Malicious or criminal attacks (including Cyber incidents) account for 64% of all notifications, human error remains the second biggest cause at 32% of all reported breaches.

Causes of data breaches in Australia

So, what can you do to recover in the event of a data breach? More importantly, what can you do to prevent falling victim to hackers?

Preventing and Recovering from Data Breaches

If you suspect somebody has accessed your data without authorisation, you should comply with government guidelines and notify the authorities immediately.  Report a data breach here.

The last thing you need is a financial penalty that could put your business under. That’s why it’s best to maximise your IT security so that hackers can’t penetrate your system. Here are some tips:

If you lose your data, you’ll need to get it back – quickly. That’s why you should always securely back up your data to the cloud, where you can recover it within seconds.

  • Create a cybersecurity framework

Recent surveys suggest that the majority of Australian business owners plan to implement a cybersecurity framework within the next 12 months. But with data breaches on the rise, you might want to consider moving the task towards the top of your to-do list. There are plenty of ways in which you can secure your network and ensure only people with authorisation can access sensitive data. If you’re unsure of what’s available, give us a call. We’ll detail the types of systems trusted by global corporations and even governments.

  • Make sure remote workers follow protocols

It’s highly likely that, increasingly, you’ll have employees working from home, which isn’t necessarily a bad thing for plenty of reasons. Nevertheless, remote working does increase the risk of a data breach, so make sure you have rules in place for your at-home employees. You need to tell people to stick to using your corporate network for work tasks and to avoid transmitting work files using personal email addresses.

Let Our Experts Protect Your Data

The national network of Computer Troubleshooters Franchise locations continues to be at the forefront of supporting small to medium businesses with a range of services aimed at prevention of a data breach. To discuss your options, contact your nearest local expert to discuss your concerns either visit our website or call 1300 28 28 78

Your local  Computer Troubleshooters expert understands that both hacking and the recent changes to data breach laws can wreak havoc on your business, which is why we only install the most advanced cybersecurity solutions on the market and use leading suppliers products.

If you have any questions about data breach laws, the effect they can have on your business or the innovative solutions available to prevent hacking, don’t hesitate to talk with us on 1300 28 28 78.

8 Reasons to Engage IT Support

Avatar On: April, 30th 2020 | Under: Computer Equipment, How To: Technology 101, Office 365

8 Reasons to Engage IT Support

Speeding up Your Laptops and Desktops

Do you find that you frequently run into problems with your IT equipment that prevent your employees from getting on with work? Are your laptops and desktops running so slowly that people need to spend hours completing tasks that should take minutes?

Low workplace productivity harms your bottom line. But there’s no reason to let your IT infrastructure be a problem if you engage Computer Troubleshooters support services.

Here’s some things we can do for you:

Update Your Systems Automatically

It’s easy to neglect those software update requests when you’re juggling a multitude of tasks. However, those updates are often purposed to improve the efficiency of your systems. If you don’t have time to handle updates, you can outsource the task to us, and we’ll handle it remotely.

Install Patch Fixes and Security Enhancements Remotely

Updating your software is just as important as upgrading your IT security, especially with the rise in data breaches in Australia. If hackers can penetrate your system, you can feel confident that more than just workplace productivity will be affected. Again, engage our IT support services, and security updates will be handled automatically.

Store Your Data in the Cloud

Why clog up your hard drives and servers with data that could be stored in the cloud? By securely storing data in the cloud, you can access it from wherever you like while ensuring it remains out of the hands of hackers. Moreover, should you lose any data, you can recover it in seconds, minimising disruption to your business.

Get Software Repairs Quickly

There’s nothing more frustrating than software glitches preventing you from getting on with your job, especially if you have no idea how to fix them. Fortunately, our team of IT specialists can get to the root of any problem.

Have Constant Access to the Most Advanced Equipment

The equipment you use has a dramatic impact on how efficiently your computers can run. When was the last time you replaced your onsite servers? Nowadays, you don’t need to purchase, replace or maintain servers because you can team up with a cloud solutions provider like us instead.

Find out Whether You Could Improve Your Network Speed

Do you understand the ins and outs of all the different networks you can set up in your work environment? Choose the wrong network, and your productivity might suffer as a result. Call us, and we can examine your network and suggest improvements that could have a dramatic impact on business efficiency.

Integrate Business Systems to Improve Communication

If you’re currently operating your business using a variety of standalone IT systems, you might be wasting a lot of time transferring data back and forth as well as facilitating communication between different departments. At Computer Troubleshooters, we can integrate your systems to make the flow of data and communication seamless.

Ensure Support Is Always Available When You Need It

If you ever have any questions regarding how to get the most from your system, or if you run into a problem you don’t know how to resolve, you can feel confident that an expert is waiting to take your call.

At Computer Troubleshooters, we aim to forge lasting relationships with our clients. Outsource your IT requirements to us, and you can feel confident that your IT network will maximise workplace productivity. Call your local Computer Troubleshooters technician 1300 28 28 78 for more information.


Remote Working – Technology Perspective

Avatar On: March, 29th 2020 | Under: Cloud, Cloud Computing, communications, General, support, Technology & Tools

COVID-19 has changed the way we work now and into the future, remote working is here to stay. What does this mean for businesses from a technology viewpoint?

The key question for a business is how to use technology effectively to ensure that their business has a productive workforce with minimal disruption from technology blips.

Strategically it means a business needs to focus on deploying the right technologies to support the worker and the functions they undertake.

3 Key Elements

What are the 3 key elements to ensuring your workforce can continue working remotely?  The starting issue is ensuring Connectivity. Without connectivity you cannot work remotely. The second element Communication is about ensuring everybody stays in contact and has capacity to engage with each other and clients. The final element of Collaboration is the ability to work together on the same documents, having access to files etc. in a secure environment

Office 365 – enables Collaboration

To enable collaboration across the team requires having the right software platform.

Software options such as Microsoft Office 365 or Googles G Suite are cloud solutions at the core of enabling businesses to communicate, access documents, collaborate with co- workers by sharing files, storing files, combined with an integrated email.

These technologies have a high adoption but there are many businesses yet to understand the benefits of adopting these cloud-based programs. A workforce working remotely from home is distributed far and wide, one benefit of Office 365 is the comfort that everybody will be using the same version of the software.

A secondary advantage is that the fee is monthly, charged by number of users which means you only pay for what you are using. This allows businesses to scale up and down as required. This provides businesses greater flexibility and control over cash flow. You are not paying for something that is not being used.

Microsoft Teams, Zoom, GoTo meeting – enable Communication

Many choices are available for conducting virtual meetings each has its own specific benefits. The key goal is to select and deploy the platform and then provide people with the guidance on how to run effective virtual meetings.

This technology also enables your team members to conduct informal meetings more of a social interaction. Alternatively, they can use their normal social media tools such as What’s app, Facebook Messenger etc. to create a sense of social connection.

The communication solution needs to cover voice and email solutions. Having a virtual PABX solution hosted in the Cloud can ensure that phone calls can be directed to the right people inside the business. The email solution is part of Office 365 which includes capacity to share and store files using OneDrive and SharePoint.

Just putting the technology in place does not necessarily guarantee success there is a need to build culture and create understanding between team members. A suggestion is to create some tasks/projects that need completing by a team using the above tools within a common framework.

Connectivity – Remote Connections, Security, Support

The last element connectivity means having an internet connection for the worker to access the software and tools, so they can perform their work. It is as basic as that. However, the internet connection needs to be stable and quick enough for workers to complete tasks.

This means considerations such as bandwidth and upload/download speeds. It may mean a business upgrading/switching the internet plans of their workers to ensure they can operate effectively.  Wi-Fi is so predominant today there may be a need to check the configuration, make changes such as adding Wi-Fi boosters to ensure stable and reliable performance across a home environment.

With connectivity comes some clear concerns for a business owner, such as how secure is it in terms of being hacked, backing up data and email security. These questions raise the question to the level of support required by a remote worker?

With home workers it is very important that a business ensures they have proactive management of their equipment and networks. What does this mean? Simply put don’t run the risk of anything breaking by ensuring you have your IT person/provider constantly monitoring and maintaining each workers environment.

This means ensuring all devices are regularly updated with the latest versions of the software (patch management) ensuring that all security elements are operating, and functional, ensuing data is backed up correctly in accordance with your policies. That passwords are managed and updated regularly, that user access is managed correctly as people come and go from the business and the list goes on. This is called Managed Services

In addition to Managed Services It is essential that employees can call someone if something unexpected happens (like a disc failure, network connection failure, etc.)  The first step for your provider in the current environment will be to complete the diagnosis remotely using a tool such as TeamViewer or LogMeIn.

These tools give your IT support person secure, full control and access to your employee’s equipment. Its efficient and fast and means minimal disruption. If the problem cannot be fixed remotely then an onsite visit will take place. Note the IT provider must adhere to all COVID-19 social distancing and sanitisation requirements.

Finally, consider the option of a VPN (Virtual Private Network) which ensures your communication is encrypted and protected from prying eyes.

This article is not exhaustive, but it explains why it is essential to work with an experienced IT group such as Computer Troubleshooters.

With a national network of location’s, across Australia no matter where your team is located, we can support them to ensure they maintain their productivity while working from home.

Call 1300 28 28 78 and locate your nearest local technician or visit: www.computertroubleshooters.com.au/locations

NBN and VoIP Be Ready

Avatar On: March, 2nd 2020 | Under: Office 365

NBN and VoIP Be Ready

As the nbn is rolled out many people are asking do I need to do anything? Do I need to switch to the nbn? Will I need to update my phone system etc. The fact is that as the rollout reaches your area every business needs to be ready to switch to the nbn.


Because it has been mandated that the following services will be terminated: Home/Landline services from Telstra and other providers, internet services that are ADSL, ADSL2, ADSL2+ and cable services from Bigpond and Optus.

How do you know and how long do you have to migrate?

From the moment your area is declared as nbn ready then you have 18 months to make the switch.  You can check if your location is nbn ready here.

When your location is ready it is a great opportunity to assess new technology options such as VoIP. (Voice over the Internet Protocol). Some people are concerned with using internet-based phone systems due to the low sound quality and unreliability. Thanks to the NBN, that’s all changing.

VoIP Explained

In Australia, the internet is largely powered by a system of copper cables, which can result in slow downloading and uploading speeds, thus creating problems when making phone calls. Now, Australia is unleashing its NBN network, which will see the copper cables replaced with fibre-optic alternatives.

Fibre-optic cables can carry signals much faster than copper wires. As a result, internet-based phone systems will become more reliable, which is why now is a good time to consider switching to a VoIP phone solution. Essentially, thanks to VoIP, you can have clear conversations in real-time with anybody in the world, provided you both have an internet connection.

The Benefits of VoIP for Small to Medium-Sized Businesses?

From reducing your expenses to expanding your reach, here are the benefits of VoIP for small to medium-sized businesses in Australia.

  • Cost

Both the installation and running costs of a VoIP system tend to be lower than a traditional phone system. Because your VoIP is powered by your internet, you don’t need to install phone lines, meaning you’ll only have one bill for your internet usage and phone calls.

  • Accessibility

Distance is no obstacle when it comes to making phone calls with a VoIP system. If you have an internet connection, you can communicate in near real-time. You can use additional communication services like video conferencing.

  • Flexibility

As you grow you can scale your business with extra capacity as required.  How? With VoIP, you simply need to extend your bandwidth. There’s no limit to the number of VoIP phone handsets you can use.

  • Additional features

With a traditional phone system, you often pay an additional fee for features such as call forwarding, voicemail, call waiting, and caller ID. VoIP systems are flexible and cost effective when deploying extra services.

Learn More about Our VoIP Services

If you’re a small to medium-sized business that wants to cut costs, improve communications and be prepared to have a phone system that can easily be adapted to suit your unique requirements, you should learn more about VoIP for NBN. Call our experts today 1300 28 28 78 and we’ll gladly provide more information.

How to take the pain away by using Computer Troubleshooters?

Our network of offices has invested in becoming accredited nbn advisers. The benefits of using a nbn accredited adviser are:

  • Smooth transition

Using a nbn business adviser will allow you to focus on your business with an adviser working through the challenges of your migration. They take the headaches on, as you remain productive in your business.

  • Minimise risk of disruption

Migration requires time and is complex, there are many pitfalls that can lead to delays and disruption to your ability to trade effectively. The adviser is across the technology and therefore can predict the issues and proactively avoid them ensuring your transition is completed in the quickest possible time.

  • Choices: choosing the right solution

The role of the adviser is to understand your business needs today and into the future. Those business needs should dictate the choice of the solution. The adviser can explain, simplify and help you understand how the solution meets your needs best. They provide the peace of mind that you are selecting the right solution.

  • Maximising the benefit of the nbn

The nbn will initially involve a change but it brings many more opportunities to digitise your business and transform it increasing your productivity and profits.  Your local Computer Troubleshooters nbn adviser can help you identify and map the areas for digitalisation. Plan to benefit and transform.

The starting point is to call your local office on 1300 28 28 78 and follow the prompts to be transferred to your nearest Computer Troubleshooters office. Be proactive and act now and while at ask for a Security IT assessment for your business.

Websites Sources: