Back to Blog

Security Category

Are your Home technology devices performing optimally

Avatar On: July, 29th 2020 | Under: Backup, Security, support, Wi-Fi

Are your Home technology devices performing optimally?

Residential Support – that delivers.

Did you know that 600,000 hard disks crash every year in Australia? In addition to that, nearly a third of all Australian adults are affected by cybercrime, losing precious money to new viruses and security threats that emerge every day.

Everyone relies on technology to live their daily lives, and the home network consists of many elements. The average home has approximately 18 smart devices and within a few years this could grow to beyond 25 devices, all connecting wirelessly to a network with the capacity to transmit data.

The internet and COVID-19 are having a dramatic impact on consumer habits. People are stuck at home, working, streaming, shopping – all online. The internet and everything that comes with it continues to change the way we live, meaning that tech support at home is increasingly crucial.

Ask yourself – is your Internet & Wi-Fi connection and IT technology performing optimally? Imagine thinking no more technology interruptions, that’s the peace of mind you deserve. How? Outsource the management of your home IT.  Engaging with your local Computer Troubleshooters to provide dedicated tech support means you can rest easy knowing your technology and data is safe.  Your local Computer Troubleshooter expert can configure your home network, install security solutions, and perform regular maintenance ensuring your desktops, laptops are working properly and securely.

Now more than ever, remote working is on the rise. The impact of COVID-19 means that Australian businesses are allowing their employees to work from home. Our experts offer residential support services that include computer diagnostics (identifying problems, defining, and proposing solutions) computer & laptop repairs, tune ups, data backup, data transfer, new computer setup, home network configuration & NBN integration.

A Computer Troubleshooters solution for the residential client protects your networks and hardware from malware, spyware, Crypto locker & virus threats. Computer Troubleshooters provide a range of internet security services, including both proactive and prevention products. If your computer is already infected, our experts can remove viruses and spyware and patch and install the latest software.

The Computer Troubleshooters Protection Plan Solutions can be tailored to meet your support needs, for a small monthly fee. Talk to your local Computer Troubleshooter who will tailor a plan to suit your needs.

  • Worried about losing files and precious photos?
    We can assist with back up and cloud support.
  • Concerned about viruses & cybercrime?
    Let us take the worry away with monitoring that alerts your local Computer Troubleshooter to issues before they happen. Meaning it’s fixed before you have a disruption to your technology life.  You can be confident that you are doing everything to limit the opportunity for a phishing or ransomware attack.
  • Does your computer performance seem slow?
    Give our experts a call for a tune up of your computer.

Our on-demand services are available to residential customers without a service contract, for a computer technician at an hourly rate (or fixed-fee pricing where appropriate).

We offer quick and timely resolution, especially when you utilise our Remote Support Service.

If you have an internet connection, then we can aim to fix your issues without even coming to your home. This means we can diagnose your problem, present you with the remediation option and before you know it, we have rectified your problem.

No internet connection a solution is at hand. We offer onsite support, where the technician will travel to you and diagnose your situation. We can even complete a home audit of your technology environment and make recommendations that will make your life easier.

No problem is too big or too small, don’t lose your precious memories or jeopardise your home office, get a solid data backup, security, and tech support solution in place for your home today.

Visit our website at to view all our products and services or call 1300 28 28 78 to discuss your needs with your local Computer Troubleshooter.

Cyber Attacks on the rise

Avatar On: July, 1st 2020 | Under: Security

Cyber Attacks on the rise

Prime Minister Scott Morrison and his government are so concerned about the rise in the volume of Cyber-attacks that a specific press conference was held on Friday June 20th declaring Australia under attack. 

This is warning Australian businesses to be proactive in defending themselves against a potential attack.

The Australian Cyber Security Centre ( (ACSC) has identified that the threat actor is utilising various spearphishing techniques. These have taken the form of:

  • links to credential harvesting websites
  • emails with links to malicious files, or with the malicious file directly attached
  • links prompting users to grant Office 365 OAuth tokens to the actor
  • use of email tracking services to identify the email opening and lure click-through events.

Given the uptake of Office 365 by Australian businesses due to the majority of the workforce currently working from home, it is more important than ever to be talking with your local Computer Troubleshooter. This will  ensure you are doing everything within your power to minimise the risk of an attack and disruption to your business.

The best form of defence against cyber-attack is to use a layered approach which means more than just having endpoint protection on your devices. Even with just Endpoint protection, too many employees and businesses do not have the latest viruses’ definitions or the latest software patches issued by the vendor.

The Computer Troubleshooters protection/managed service plans are designed to enable a business to minimise the risk and to have the confidence that all the basic mitigation strategies are deployed in your business.

No single mitigation strategy can prevent cyber-attack incidents.  The Australian Cyber Security Centre located within the Australian Signals Directorate has developed eight mitigation strategies that are considered as the baseline -essential for all organisations to protect themselves against cyber incidents. Collectively this is known as the Essential Eight framework.

Given the current threat environment the following detection and mitigation strategies are highly recommended by the ACSC.

  • Prompt patching of internet-facing software, operating systems, and devices

This means all businesses should ensure that security patches or mitigations are applied to internet facing infrastructure immediately.  If you are not  sure what this means then talk to your local Computer Troubleshooter by calling 1300 28 28 78.

This includes ensuring all software and operating systems are using the latest versions.  A CT Business protection/managed services plan includes the automatic patching of all your systems.

  • Use of multi-factor authentication across all remote access services

Are you using web and cloud-based email applications (Office 365, Xero accounting), collaboration platforms (Teams) a virtual private network connection or Remote desktop services? Then you should have Multi-factor authentication implemented. This gives you a much higher degree of security against fraudulent access to your systems.

What other of the essential eight strategies need to be implemented?

  • Application control

Ensure that all executable files are restricted from being able to run. This includes ensuring this restriction applies to all servers and any workstation devices.

  • Configure Microsoft 365 macro settings

Ensuring that only Microsoft office macros are allowed to deploy after the user is prompted for approval,  that no security settings can be modified by a user, and that macros in documents sourced from the internet are blocked.

  • User application hardening

Ensuring that web browsers are set up to block or disable support for content that uses Flash. Ensuring that web browsers are configured to block java from the internet and also to block web advertisements.

  • Restrict administrative privileges

Ensuring that access to systems, applications and data repositories are validated when first requested by a privileged user. Broader Policy security controls are used to prevent privileged users from reading emails, browsing the web, and obtaining files via online services. This will include continued revalidation of users’ access at  regular intervals as set by a system policy.

  • Daily backups

Ensure that information, software, and configuration settings are backed up monthly at a minimum .. Make sure that that  all backups are stored for a nominated period of time between a month and three months, using multiple backups – both physical and cloud. Backups to be preserved in a non-rewritable and non-erasable manner, and restoration tested annually at the very least (though preferably on a more frequent basis). Tests to be conducted both in part and full.


Remove the stress!  Be confident you have it covered.

No matter what the size of your business is,  no business is safe from cyber-attack unless you are proactively  managing your risk in an ongoing manner. This is not something that you can ignore –  it is a moving beast and your business needs to manage the risk. If you don’t have a dedicated IT department or an ongoing support department then you need to find out more about how your local Computer Troubleshooter can help. A Computer Troubleshooter will assess your risk and develop  proactive managed plans of protection with you.  Sleep comfortably at night knowing your business is in safe hands. Call 1300 28 28 78 or visit our website at


Business Data Breach Laws – Australia

Avatar On: May, 25th 2020 | Under: Data Recovery, Security, support

Business  Data Breach Laws – Australia

What is the impact for Business?

Data is more valuable than oil, as data is the lifeblood of any business. Data by itself like oil, needs to be refined before it is transformed into a valuable commodity.

Data is collected everyday as part of normal business activities, assisting businesses to make important business decisions such as marketing and forecasting. Today’s greatest challenges though are hackers – cyber criminals who are focused on and love to get their hands on a business’s sensitive and valuable business data, a prime target being customer information.

In 2018, the Australian Government introduced new laws to protect consumers against data breaches. Essentially, any company with a turnover exceeding $3 million must alert its customers of a data breach as quickly as possible. Failing to report the breach, an organisation can be fined up to $1.8 million.

According to the Office of the Information Commissioner data breaches in Australia are still rising meaning many companies remain unprepared. The July-December 2019 Notifiable data breaches report reported that Malicious or criminal attacks (including Cyber incidents) account for 64% of all notifications, human error remains the second biggest cause at 32% of all reported breaches.

Causes of data breaches in Australia

So, what can you do to recover in the event of a data breach? More importantly, what can you do to prevent falling victim to hackers?

Preventing and Recovering from Data Breaches

If you suspect somebody has accessed your data without authorisation, you should comply with government guidelines and notify the authorities immediately.  Report a data breach here.

The last thing you need is a financial penalty that could put your business under. That’s why it’s best to maximise your IT security so that hackers can’t penetrate your system. Here are some tips:

If you lose your data, you’ll need to get it back – quickly. That’s why you should always securely back up your data to the cloud, where you can recover it within seconds.

  • Create a cybersecurity framework

Recent surveys suggest that the majority of Australian business owners plan to implement a cybersecurity framework within the next 12 months. But with data breaches on the rise, you might want to consider moving the task towards the top of your to-do list. There are plenty of ways in which you can secure your network and ensure only people with authorisation can access sensitive data. If you’re unsure of what’s available, give us a call. We’ll detail the types of systems trusted by global corporations and even governments.

  • Make sure remote workers follow protocols

It’s highly likely that, increasingly, you’ll have employees working from home, which isn’t necessarily a bad thing for plenty of reasons. Nevertheless, remote working does increase the risk of a data breach, so make sure you have rules in place for your at-home employees. You need to tell people to stick to using your corporate network for work tasks and to avoid transmitting work files using personal email addresses.

Let Our Experts Protect Your Data

The national network of Computer Troubleshooters Franchise locations continues to be at the forefront of supporting small to medium businesses with a range of services aimed at prevention of a data breach. To discuss your options, contact your nearest local expert to discuss your concerns either visit our website or call 1300 28 28 78

Your local  Computer Troubleshooters expert understands that both hacking and the recent changes to data breach laws can wreak havoc on your business, which is why we only install the most advanced cybersecurity solutions on the market and use leading suppliers products.

If you have any questions about data breach laws, the effect they can have on your business or the innovative solutions available to prevent hacking, don’t hesitate to talk with us on 1300 28 28 78.