2017 Christmas Specials: Ex-Lease Computers

Ex-lease desktop computers, laptops and monitors for sale

We can source some great deals on ex-lease desktops, laptops and monitors.
Why buy new when for half the price you can get ex-lease?
The machines are ex-business-lease being a maximum of 3 years old.

Perfect for school, home and business use!

HP Elite 8300 SFF Desktop PC, i5-3470 3.2GHz Processor, 8GB RAM, 320GB HDD, Windows 7 Pro COA (with Windows 10 Pro loaded) // Now only $350.00+GST

 

Dell Latitude E6430s Laptop Computer, i5 3rd Gen Processor, 14″ Screen, 8GB RAM, 320GB, WiFi, Webcam, Windows 7 Pro COA (with Windows 10 Pro loaded) // Now only $390.00+GST
Dell Latitude E7440 Laptop Computer, i5 4th Gen Processor, 14″ Screen, 8GB RAM, 500GB, WiFi, Webcam, Windows 7 Pro COA (with Windows 10 Pro loaded) // Now only $490.00+GST
Dell 23″ All-in-One Desktop PC, i7-3770s Processor, 8GB RAM, 500GB HDD, Webcam, Windows 7 Home COA (with Windows 10 Home loaded) // Now only $550.00+GST

Note: All ex-lease computers and hardware above come with 3 months RTB warranty. All the images above for the hardware are indicative only. Limited Stock.

Optional Upgrades:

  • Ex-lease 24″ LED Monitor // Now only $105.00+GST
  • SSD Upgrade: Corsair 240GB SSD // Now only $139.00+GST
  • Warranty Upgrade: upgrade to 12 months RTB Warranty // Now only $89.00+GST

The latest Security Flaw: Wifi KRACK

Sounds scary and technical, another vulnerability, another frightening acronym KRACK, makes one think what is the risk and how does one overcome this concern?

It’s been everywhere in the news, social media and blogs for the past week and this article will aim to try and simplify the technical side and answer some of the questions one has.

What does KRACK stand for?

Discovered and named by Marty Vanhoef a Belgian researcher, KRACK stands for Key Reinstallation Attack. This in effect is a security flaw which allows a hacker (attacker) to break the internet communications between a router and a device. For the weakness to be exploited though the hacker needs to be in close physical proximity of the access point of the communications.

What does this mean for an individual or a business?

It means there is a potential for a cyber security incident where the attacker can capture or interrupt the flow of information from your communications or they can use the weakness to potentially inject and manipulate data.  For example, this may mean an attacker injecting ransomware or other malware into websites.

What is at risk?

Like all vulnerabilities, the risk is the loss of sensitive information such as credit card numbers, passwords, emails, photos, and documents.

What is the most likely scenario for a KRACK attack?

This is difficult to say as there are potentially so many situations, however, one potential target is those organizations that provide wifi access without a lot of IT resources.  An example of this would be your local coffee shop.

Is changing passwords the best way to protect myself?

Changing passwords regularly is a basic security measure that is recommended, however, this will not prevent or mitigate an attack. In fact, the key element to protect yourself includes ensuring all devices are up to date with the latest updates. This includes ensuring the firmware on your router is updated.

A simple tip is to ensure you have automatic updates turned on which will help ensure you have the latest versions and protection installed.

Until you are sure that your device has been updated limit your usage of public networks especially with phones utilizing the Android operating system.

Only transact with websites that have an SSL certificate meaning that the sites URL will start with https instead of HTTP.  This in effect means the site is using encryption which therefore makes it difficult to see what data is being transferred.

Conclusion

Keep yourself informed and be sensible with your usage of public wifi if in doubt do not connect and turn the wifi option off on your device. If still uncertain contact us and ask for a KRACK risk assessment.

October 2017 Newsletter

Basic Cyber Security

Many customers we see during our daily work (and rescues) don’t even have the most basic cyber security measures in place. The author intends this article for the non-technical business owner or manager, to assist and educate the need to protect their business and computer users against ever-evolving cyber threats.

Cyber security threats are continually evolving. Viruses, worms, Trojan horses, Spyware, Phishing, Adware and Scare-ware have all been around for a long time. Lately, one particular form of malware known as Ransomware has been creating havoc with businesses and organisations worldwide.

Ransomware, when detonated works by locking up your files using encryption. The cyber criminal then demands a ransom from the victim in bitcoins. In theory, this ransom gets a code that allows the unlocking of your vital files. However, some cyber criminals are not very honest in this respect. They just take your ransom and you don’t get a code.

Read more …

Pick-up and Drop off service

We are offering a Pick-up and Drop off service for all the customers in Christchurch as from the 4th of September 2017. Booking is required at this stage.

The Pick-up and Drop off dates would be as follow:

  • Monday and Tuesday from 8:00am to 9:30am
  • Thursday and Friday from 3:30pm to 5:00pm

This service will be free for all current and new HOST plan customers.

Christmas Specials

Ex-lease desktop computers, laptops and monitors for sale

We can source some great deals on ex-lease desktops, laptops and monitors.
Why buy new when for half the price you can get ex-lease?
The machines are ex-business-lease being a maximum of 3 years old.

Perfect for school, home and business use!


HP Elite 8300 SFF Desktop PC, i5-3470 3.2GHz Processor, 8GB RAM, 320GB HDD, Windows 7 Pro COA (with Windows 10 Pro loaded) // Now only $350.00+GST


Dell Latitude E6430s Laptop Computer, i5 3rd Gen Processor, 14″ Screen, 8GB RAM, 320GB, WiFi, Webcam, Windows 7 Pro COA (with Windows 10 Pro loaded) // Now only $390.00+GST

Dell 23″ All-in-One Desktop PC, i7-3770s Processor, 8GB RAM, 500GB HDD, Webcam, Windows 7 Home COA (with Windows 10 Home loaded) // Now only $550.00+GST

Note: All ex-lease computers and hardware above come with 3 months RTB warranty. All the images above for the hardware are indicative only. Limited Stock.

Optional Upgrades:

  • Ex-lease 24″ LED Monitor // Now only $105.00+GST
  • SSD Upgrade: Corsair 240GB SSD // Now only $139.00+GST
  • Warranty Upgrade: upgrade to 12 months RTB Warranty // Now only $89.00+GST

Brand New Computers for sale

Acer Veriton VX2640G SFF Desktop PC, i5-7400 Quad Core 3.0GHZ Processor, 8GB RAM, 256GB SSD, DVD-RW, Windows 10 Pro 64-BIT, 3 Years OnSite Warranty; plus FREE ACER K242HL 24″ WIDE LED MONITOR 3 Years RTB Warranty // Now only $1250.00+GST

ACER Aspire F5-573G-5919 NOTEBOOK 15.6″, i5-7200U Dual Core 2.5GHZ Processor, 8GB RAM, 1TB HDD, DVD-RW, GEFORCE 940MX 2GB, Wireless-AC, Bluetooth, Windows 10 Home, 1 Years RTB Warranty; plus FREE Wireless Mouse and Leather Laptop Bag // Now only $1190.00+GST

Note: All Brand New computers have Limited Stock. All the images above for the hardware are indicative only. Limited Stock.

Our Service Hours

CT Christchurch West is located at 252 Annex Road, Middleton, Christchurch . And the workshop operating hours has changed to Monday – Friday 8:00AM – 5:30PM, unless otherwise specially announced.

We continually offering On-Site / Call-Out services for customers in Christchurch area. For anyone outside of Christchurch or rural, we can also arrange the service.

Give us a call on 03 9282150 to solve any of your technology problems. Alternatively, you can Book a Service with us online or send your service request to us via email support@ctwest.nz .

We can Manage your Email

Are you having problems with your current email provider? Sick of not being in control? Wanting to have your emails and calendar on multiple devices seamlessly? Sick of having to change email addresses when changing internet providers?

We can help by hosting your email for you!

For a small monthly fee, you can have your email on your desktop, laptop, tablet and phone; all synchronised and showing exactly the same. If you do not currently have Outlook then this can be included.

You can select an email through us like yourname@ctmail.kiwi. Otherwise, you can choose your own domain name, meaning you can have your email address be anything you want – e.g. you@yourname.co.nz (as long as it’s not already in use)

Spread the Word and get Rewarded!

Did you know, if you refer someone to us and they use our service that we reward you with a $20 voucher? The coupon can be used on your next job with us, or you can give it to someone you love for their next job with us.

Don’t forget to ask your referrals to tell us your name as we don’t want to miss out on your voucher!

Basic Cyber Security

Many customers we see during our daily work (and rescues) don’t even have the most basic cyber security measures in place. The author intends this article for the non-technical business owner or manager, to assist and educate the need to protect their business and computer users against ever-evolving cyber threats.

Cyber security threats are continually evolving. Viruses, worms, Trojan horses, Spyware, Phishing, Adware and Scare-ware have all been around for a long time. Lately, one particular form of malware known as Ransomware has been creating havoc with businesses and organisations worldwide.

Ransomware, when detonated works by locking up your files using encryption. The cyber criminal then demands a ransom from the victim in bitcoins. In theory this ransom gets a code that allows the unlocking of your vital files. However some cyber criminals are not very honest in this respect. They just take your ransom and you don’t get a code.

Ransomware

In all cases we have seen, humans detonate the ransomware package at an endpoint in the network. Ransomware mostly arrives in email as either an attachment or as a link to a malicious or compromised website. Ransomware spreads also from software downloads, websites and advertising delivered over online ad networks.

What can you do?

Educating yourself and your employees are the #1 defense against cyber criminals.

  • Three years ago, in the olden days, we used to say don’t open an email or attachment from someone you don’t know. These days that rule still applies, however, we have seen cases of ransomware being “redistributed” to everybody in the victim’s email address book, so it’s not just people you don’t know that you can’t trust.
  • Think about that attachment or link you are about to open. Common sense applies. Were you really expecting an invoice from your mother? Were you really expecting that traffic ticket from the police? (Think – how did the Police ever get your email address?)
  • If in doubt about an email then phone the person up and ask if they just sent you that attachment. Better to be safe than sorry.

The most basic cyber security needed on your computers and network.

  • Every endpoint in your network (Cell-phones, Laptops, Desktops, Servers etc.) must have up to date and functional business grade Anti-Virus software.
  • Apply Operating System patches. Manufacturers like Apple, Microsoft and others regularly release patches and updates to fix vulnerabilities that have been discovered (mostly by cyber criminals) in their operating systems.
  • Apply application patches. Products like Office, Adobe, Chrome to name but a few, all have vulnerabilities and exploits. As these exploits get discovered patches are released by the manufacturers to remedy the situation.
  • Always use the latest version of the operating system available. Whilst Microsoft’s Windows 7 is still around and a good operating system, Windows 10 is inherently much more secure.
  • Restrict administrative privileges. Only log in as the administrator to perform administrative functions. Your regular login (and your employees) should only have standard user rights. Why? This makes it harder for malware to be installed, as installation usually requires administrative privileges.
  • Backup your data daily. This needs to be business grade and not to a shared drive on the network. Why? Most ransomware will spread to every “share” it can find – too bad if that is your backup. With regards to ransomware the phrase “Backup or Pay up” springs to mind.

Beyond basic – The next level of cyber security measures.

Once the basics are covered off, we can then talk topics like firewalls, VPN, cloud virus and spam pre-filtering of emails, changing settings in software, 2-factor authentication, and an application that detects and stops unauthorized encryption etc. These will give a much more comprehensive solution beyond basic, however “comprehensive” is probably beyond the scope of this document titled “Basic Cyber Security” and would make it rather long and too technical.

How can Computer Troubleshooters help?

  • Businesses without their own IT resource will often need assistance in implementing these basic cyber security measures. As an IT department for the small and medium-sized businesses, Computer Troubleshooters can be your IT resource.
  • We are able to deploy a management system to your computer(s) and network that keeps a track of your Anti-Virus, Patching, and Backups etc. This system reports to our service desk when things are going away.
  • We are able to assist with your staff training, with a presentation and booklets etc.

Technical Stuff/Further Reading

NZ Government Communications Security Bureau – NZ Information Security Manual Download Page

 

BackUp or Business Continuity

The facts according to the Boston Computing Network’s Data Loss Statistics, are that 60% of companies that lose their data, will shut down within 6 months of the disaster. This is something that every business wants to avoid.

The following article provides a high-level understanding of how, as a business owner the question for you is one of Business Continuity of which Backup is a key component.

What is Business Continuity?

Business continuity involves a mindset of being proactive and putting plans, processes and systems in place, so that when the unexpected occurs you can return to normal operations with minimal delay thereby reducing the level of disruption and cost to your business.

The aim is to ensure that all essential functions can be up and running or be returned to operational status quickly during various unexpected events such as a natural disaster (Flood, Fire), cyberattacks, theft, or major IT system failure.

What is involved?

The key aspect is to develop a plan that then is well communicated and understood by your staff so they know what to do when the disaster occurs. Like all plans, if it is not communicated and shared then it’s not worth the paper that it is written on.

The process of writing the plan involves identifying the key risks, identifying the ways you can prevent those risks occurring for instance:

  • risk is data loss
  • prevention is designing and implementing a multilevel backup solution.

Then the last element of the plan is documenting the steps in responding and recovery if an incident occurs that does bring down your systems.

Businesses today are more reliant than ever on IT, one of the biggest threats these days being a cybersecurity breach. A fair portion of the plan will need to focus on recovery from an IT disaster.

The plan will need to be reviewed regularly as a business grows and circumstances change and the recovery processes should be thoroughly tested to ensure it will work.

What are your backup options?

There are many options available to businesses these days for backup. With today’s modern technologies and cloud storage services, a hybrid combination of traditional on-site backup plus off-site backup to the cloud, has become the popular choice amongst businesses wanting to ensure high levels of continuity.

The key questions in making a choice is determining the level of risk and the importance of the system and the data that is being backed up. Answering these questions will impact on the choice that you make. You can see I have not mentioned cost or price. One might ask Why? Well because you need to remember this is about having a solution that will minimise the cost of failure which will far outweigh the cost of the solution you choose.

If you are not certain about this statement ask somebody who has experienced the loss of data due to a failed system backup.

What are the traditional onsite backup options?

Onsite with machines all backing up either to tape or disc and then being stored onsite. Usually scheduled to occur daily, every couple of days, or weekly. The greatest weakness is that if something happens to the premises the backups can become corrupted and lost and an external service provider such as Kroll Ontrack may need to be used to try and recover the data.

To overcome the above weakness some business’s will transport the discs/ tapes to an offsite location where they are stored.

What is happening today?

The cost of online storage has reduced with the introduction of data centre services and the continued adoption of cloud storage services. Today most businesses will have a recovery strategy based around using cloud storage, with onsite backup devices that then replicate to a data centre.

The drivers behind this are many but one can put it down to speed of recovery, ability to quickly monitor and ensure backup has occurred, hence no unpleasant surprises if a data loss breach or cyberattack occurs.

 What next?      

The first step is to make sure you have a plan and an understanding of your options. This is where you should have a chat with your local computer troubleshooter to understand how they can help you to minimise the disruption to your business from a data loss/breach. Contact us now for free consultation.