Category: Guides

cover image for 2021 business technology buying guide

2021 Business Technology Buying Guide

When buying new computers for your business it is important to understand what features are actually important and should influence your decisions in 2021. How often should I replace my business hardware? Modern hardware is fairly robust and reliable. If you buy an adequately specced device that is correctly configured at initial deployment then you…
Read more

Keyboard shortcuts you should be using

Fun fact: Did you know that the word “Typewriter” is the longest word you can type using only one row of the keyboard? We made a fact-o-graph about it. Keyboard shortcuts will speed up everything Basic Windows keyboard shortcuts Ctrl + X, Ctrl + C and Ctrl + V: Cut, Copy and Paste Use these…
Read more

ransomware encrypted laptop with ransom note

Recovering Ransomware-Encrypted Files: Part 2

This is part two of a three part series on what to do if your files have been encrypted by ransomware.

image hsowing two laptops and one has a hacker using a fishing rod to collect data from the other as he is phishing and this is how ransomware gets on your computer

Learn To Spot Phishing Attacks

Phishing is such a big problem that it was responsible for the majority of hacks in 2020.

image showing ransom note after malware file encryption

Recovering Ransomware-Encrypted Files: Part 1

Ransomware is a type of malware that encrypts all of your data so that it can no longer be accessed by you, before demanding payment for the files to be decrypted. If it happens to you, what do you do?

Man frustrated with Telstra service not working properly and looking at computers while stressed by problems. slow internet

How to fix internet and landline dropouts on Telstra NBN

The implementation of the NBN has been a mixed bag of technologies. For many businesses in regional Australia however, the NBN has been a step backwards in performance – with constant drop-outs, crawling speeds and unusable landline phones.

neo from the matrix showing hackers and how to deal with ransomware

Recovering Ransomware-Encrypted Files: Part 3

Anyone can be a victim of a Ransomware attack. Learn what to do if your files are encrypted.