After Hours Service is Here!

After Hours Service is Here!

Emergency Support and Response

While we have always prided ourselves on having an excellent response time for any call during the business week we have never provided any official after hours service to our treasured clients. From now on we’ll provide an on-call technician 24/7 who can respond to your emergency call within an hour. We know that a lot of our clients run 24/7 and have business critical IT systems that need to stay running outside of our normal hours.

After hours service will run as follows:

  • Call our normal number (06) 370 8093 or 0800 878 878
  • Listen to the prompt and follow the instructions to continue
  • All after hours service will be charged at $150+GST per hour
  • There is a minimum of 1 hour call out fee for all calls.

We aim to provide this service to ensure a reasonable and timely response to any after hours emergency work, and give our team a well earned break from calls when they are not on-call.

Any questions or feedback please don’t hesitate to give us a call on 06 370 8093

The Power of Two

The Power of Two

A one-time password (OTP) is a password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs avoid a number of shortcomings that are associated with traditional (static) password based authentication; a number of implementations also incorporate two factor authentication by ensuring that the one-time password requires access to something a person has (such as a small keyring fob device with the OTP calculator built into it, or a smartcard or specific cellphone) as well as something a person knows.

The most important advantage that is addressed by OTPs is that, in contrast to static passwords, they are not vulnerable to replay attacks. This means that a potential intruder who manages to record an OTP that was already used to log into a service or to conduct a transaction will not be able to abuse it, since it will be no longer valid. A second major advantage is that a user who uses the same (or similar) password for multiple systems, is not made vulnerable on all of them, if the password for one of these is gained by an attacker. A number of OTP systems also aim to ensure that a session cannot easily be intercepted or impersonated without knowledge of unpredictable data created during the previous session, thus reducing the attack surface further.

OTPs have been discussed as a possible replacement for, as well as enhancer to, traditional passwords. On the downside, OTPs are difficult for human beings to memorize. Therefore they require additional technology to work.

An extra layer of security that is known as “multi factor authentication”

In today’s world of increasing digital crime and internet fraud many people will be highly familiar with the importance of online security, logins, usernames and passwords but if you ask them the question “What is Two Factor Authentication?” the likelihood is they will not know what it is or how it works, even though they may use it every single day.

With standard security procedures (especially online) only requiring a simple username and password it has become increasingly easy for criminals (either in organised gangs or working alone) to gain access to a user’s private data such as personal and financial details and then use that information to commit fraudulent acts, generally of a financial nature.

How does it work?

Two Factor Authentication, also known as 2FA, two step verification or TFA (as an acronym), is an extra layer of security that is known as “multi factor authentication” that requires not only a password and username but also something that only, and only, that user has on them, i.e. a piece of information only they should know or have immediately to hand – such as a physical token.

Using a username and password together with a piece of information that only the user knows makes it harder for potential intruders to gain access and steal that person’s personal data or identity.

Historically, two-factor authentication is not a new concept but its use has become far more prevalent with the digital age we now live in. As recently as February 2011 Google announced two factor authentication, online for their users, followed by MSN and Yahoo.

Many people probably do not know this type of security process is called Two-Factor Authentication and likely do not even think about it when using hardware tokens, issued by their bank to use with their card and a Personal Identification Number when looking to complete Internet Banking transactions. Simply they are utilising the benefits of this type of multi factor Authentication – i.e. “what they have” AND “what they know”.

Using a Two Factor Authentication process can help to lower the number of cases of identity theft on the Internet, as well as phishing via email, because the criminal would need more than just the users name and password details.

So if you’re in need of some help securing your system, or even just some free friendly advice, get in touch with us on 0800 878 878 or email office@techs.co.nz

Tablet VS. Laptop

Tablet VS. Laptop

Many people wonder if a laptop or a tablet will serve their needs. After all, tablets are easy to use, very portable, and internet-capable just like a laptop. However, not all tablets share the same functionality. Depending on your needs, a laptop may provide a better computing experience. If you’re trying to decide if you want a tablet vs. a laptop, this guide will help.

What Kind of Tablet?

Many tablets look the same but may perform differently depending on their operating system. Before you decide on a tablet vs. a laptop, you should know the functions and limitations of the devices available. Tablets like the Apple iPad and those running Android use mobile operating systems derived from the interfaces on smartphones. This type of tablet is designed for touch, prioritizing simplicity. Windows 8 tablets can run many of the same programs as full computers and are compatible with the same types of files. Windows RT is another option that is optimized for tablet use. The biggest difference between the two is that Windows RT tablets can only use apps made for that specific operating system.

When Are Laptops Better?

One of the main complaints people have about their current computers is usually that they’re not fast enough. The need for speed can be a big issue if you’re into high-end gaming or use high-performance video or photo editing software. In the laptop vs. desktop debate, the question of speed boils down to price. Some high-end laptops are very competitive when it comes to speed. But if you’re willing to pay the price, there isn’t a laptop out there that can keep up with a high-end desktop. It’s all about the specs mentioned above, as well as high-performance motherboards and cooling systems available in desktop systems. If you’re looking for top-of-the-line speed and have the cash to spend, a desktop is the way you’ll want to go.

What Will You Use it For?

In general, you’ll want to choose a laptop vs. a tablet if you need to do more than check email and social networks or watch videos and play games. Laptops are best for real work, even if that work only includes creating Office documents. Most laptops are more powerful than tablets and have larger internal storage. There’s far more software available for laptops vs. tablets (with the exception of Windows 8 tablet PCs) and greater file compatibility for documents, music, images, video, and more. The web browsing experience is arguably better on laptops vs. tablets, especially now that Adobe no longer supports Flash for tablets and other mobile devices. Though tablets are often lighter than laptops, there are many ultra-thin, light computers (such as ultrabooks or Apple’s MacBook Air line) that give you the portability you need without sacrificing performance or functionality. If you want the best of both worlds, consider a hybrid PC: a Windows tablet with a keyboard dock that turns it into a laptop when connected. Still, even hybrids may not always give you the power or storage space you need.

Choose Based on What You Need

Before deciding between a tablet vs. a laptop, think about what you need to do with it.

Get a tablet if:

You already have a laptop or desktop computer and want a companion device. Your needs are very basic: checking email, posting to social networks. You want something purely for entertainment: movies, TV, music, eBooks. You’re looking for a device that’s very simple and easy to use.

Get a laptop if:

You’re shopping for a primary computer and want something portable. You need a device for work, school, designing, creating content, or anything that requires high performance. We hope these guidelines help you solve your tablet vs. laptop conundrum, and be sure to check out our full laptop and tablet buying guides for further information on each form factor. Article Content from http://www.amazon.com/gp/feature.html?ie=UTF8&docId=1001068291

Create an email signature onto your iPhone

Create an email signature onto your iPhone

Today’s email signatures contain a lot more than just your name and contact details. Links to websites, Facebook, Twitter account and the ubiquitous legal disclaimers along with your company’s branding give clients the information they need.

Many of you have this on your main computer email system but when it comes to your mobile devices “sent from my IPhone” is as flash as it gets…

Not only can you have the same email signature on your iPhone/iPad but you can create multiple email signatures for each account that you access (business/personal/rental etc.).

Either send yourself an email message from your computer or device that already has the desired signature set up on it or check you’re sent items for one.

  • Open the email in the Mail app on your iPhone/iPad.
  • Tap and hold down on the signature in order to bring up the blue selection tool. Move the anchors so you have the entire signature highlighted.
  • Tap on Copy.
  • Press the Home button to return to your Home screen.
  • Launch the Settings app.
  • Tap on Mail, Contacts, Calendars.
  • Scroll down to Signature under the Mail section.
  • Tap on the account you’d like to add the signature to if you have multiple signatures set up Per Account.
  • Delete the contents.
  • Tap and hold in the signature field to bring up the selection tool again.
  • Tap Paste in the popup menu.
  • You may see a strangely formatted version of your signature but here’s the magic…
  • Shake your iPhone briefly and tap Undo in order to remove the automatic formatting Apple may have done.
  • This will bring back any colors or other HTML content that may not have shown up in the original paste. Et Voila.

If you want to know more call us on 0800 878 878 or email stephen@techs.co.nz.

Viruses are getting smarter

Viruses are getting smarter

Ransomware Example

What would your first thought be seeing the above on your computer, laptop or cellphone? Would you start to wonder “What has my family been looking at?” or “What have I come across browsing the internet by mistake?”

Within the last year we have been seeing an increasing trend in viruses called Ransomware.

‘Ransomware’ is a type of malware/virus that attempts to extort money from a computer user by infecting and taking control of the victim’s computer, cell-phone, or the files or documents stored on it. Typically, the Ransomware will either ‘lock’ the computer to prevent normal usage, or encrypt the documents and files on it to prevent access to the saved data.

The ransom demand will then be displayed, usually either via a text file or as a webpage in the web browser. This type of malware leverages the victim’s surprise, embarrassment and/or fear to push them into paying the ransom demanded. Ransomware may arrive as part of another malware’s payload, or may be delivered by an exploit kit such as Blackhole, which exploits vulnerabilities on the affected computer, device to silently install and execute the malware.

In almost all cases, payment of the ransom still does not restore the computer to normal use. As such, we strongly recommend that no payment be made and give us a call straight away. You may have never heard of this type of virus or even been affected. Prevention is simple, make sure to have up-to-date antivirus (Eset nod antivirus for example). Stay away from unsafe websites (Adult content, kids free game downloads or pirated music, movies or tv shows). Good idea if you have kids is to take interest in what they do online so they and your computers are safe.

Backups are also highly recommended; there was a case in America recently when a police station themselves was hit with another type of randomware that encrypted all computers and network drives, files. Due to this police station having no backup, the police had to pay the ransom (At least the criminals were honest enough to send the police the de-crypt code to unlock the police station pcs !).

Remember we are here to help you regarding any Information Technology issues like viruses or malware. We are but a phone call away.

So if you’re in need of some help with Viruses, or even just some free friendly advice, get in touch with us, 6-370 8093.

To discuss how Tech Solutions can help call us on 0800 878 878 or email office@techs.co.nz.

Tracking a Lost or Stolen Mobile Device

Tracking a Lost or Stolen Mobile Device

You have misplaced your mobile device; your phone or iPad or tablet is gone! Stolen! Lost! TIME TO PANIC! Yes? No, it is not time to panic (yet) as there are several ways to locate your device. If you locate the device and it has been stolen, not lost, ensure you contact the police rather than going to get it yourself.

Do the simple things first. Call your phone, can you find it that way? Someone else can possibly answer the call. Sending your phone a text, especially with a reward offer, can help too. Always apply common sense around meeting people to get your device back. If neither of these work then it’s time to get technical!

Can Android, Windows or Apple help?

Yes they can, by default, Windows, Android and Apple devices have limited capabilities to find your device. If you have not set your device up the standard way these may not work. Also unless your device has a keypad lock enabled anyone who can access your settings can turn these settings off. Apple and Android offer these services more of a way to protect your data on the device than stop/discourage theft, however see ‘Prevention is better than cure’ below. They also work only if the phone is both on and online.

Apple: Apple uses a cloud based service call