0800 FIX NOW 
(0800 349 669) 
160b Selwyn St, Christchurch

0800 FIX NOW 
(0800 349 669) 
160b Selwyn St, Christchurch

How to Handle Suspicious Emails

How to Handle Suspicious Emails

Recognizing and Defending Against Scams and Phishing

In today's digital age, email has become an integral part of our lives, facilitating communication, collaboration, and information sharing. However, this convenience comes with risks, as cybercriminals constantly devise new ways to exploit email for malicious purposes. One of the most common and concerning threats is email scams and phishing attacks.

In this fairly comprehensive guide, we will delve deep into the world of suspicious emails, offering you insights, tips, and strategies on how to recognize and defend against scams and phishing attempts on you and your computer. By the end of this article, you will be well-equipped to safeguard your personal information, finances, and online computer security.

email security computer

Read more …

Asus Laptops - Zenbook vs Expertbook

Asus Laptops

ASUS, a well-regarded manufacturer of computers, is renowned for its extensive and diverse selection of computing solutions. The range of ASUS laptops encompasses a variety of options, each with its own unique qualities. These options include the ProArt, Zephyrus, Vivobook series, and more, offering a wide array of features, styles, and purposes. Among these choices, the ASUS Zenbook and ExpertBook series emerge as strong contenders suitable for personal, home, office and professional use. Choosing between them can be a complex decision. Read on to explore the significant differences and determine which aligns best with your specific computing needs.

asus laptop computer

 

Read more …

Hackers Listen to Your Passwords!

Hackers Listen to Your Passwords!

A group of researchers hailing from British universities has undertaken a pioneering project in the realm of cybersecurity: a way hackers can LISTEN to your passwords. This involves the development of a sophisticated deep learning model with the capability to extract sound data from keyboard keystrokes recorded utilizing a microphone, achieving an astonishing accuracy rate of 95%. The significance of this achievement stems from its potential to compromise computer data security on an unprecedented scale.

hackers listen computer passwords

Read more …

Computer Phishing?

What is phishing?

Phishing is a cunning cybercrime tactic where malicious actors try to deceive individuals into divulging sensitive information under false pretences. Imagine the classic movie "Home Alone," where a crafty 'police officer' paid a visit to the McCallister family. Despite being a burglar, his convincing impersonation of a real law enforcement officer led the unsuspecting family to willingly share details about their whereabouts and travel plans. Similarly, cybercriminals, commonly referred to as 'phishers,' employ various online channels like email, messenger platforms, or phone calls to dupe unsuspecting victims into sharing their confidential data.

computer phishing security

Read more …
The Importance of Backup

The Importance of Backup

Data Backup: Exploring Veeam Home as the Ultimate Solution

In our increasingly digital world, data has become the lifeblood of both individuals and businesses. We store an abundance of valuable information on our laptops, desktops and All-in-Ones, from cherished memories to critical computer documents. However, the risk of data loss is ever-present, whether due to hardware failure, cyberattacks, or accidental deletion. This makes having a reliable backup solution indispensable. One such solution that stands out is Veeam Home, a powerful data protection software designed to safeguard your data and provide peace of mind. In this blog, we will explore the significance of data backup and delve into the features and benefits of Veeam Home.

Read more …
Computer Backup FREE Check

Computer Backup FREE Check

Computer Backup 

If something goes wrong with your computer tomorrow and all your files and photos are suddenly gone - are you prepared? Do you have a backup system in place, so you can get them back? Is it working? When is the last time you checked?

We’re offering a FREE check of your backup system to make sure it’s working. No obligation. Just a simple report from us letting you know if what you have is reliable and working well, and what you could do if it’s not.

Read more …
AMD Overheating Trouble

AMD Overheating Trouble

The AMD Radeon 7000 series of computer graphics cards was released in 2012 and was intended to provide a high-performance solution for gamers and other power computer users. However, the series has faced a number of problems since its release, which have caused frustration and disappointment and even chip burnout for many users.

Read more …
ANZAC Day in New Zealand

Honoring Sacrifice: ANZAC Day in New Zealand

Tomorrow is ANZAC day, so I wanted to write something different than computers, but about this special day.
ANZAC Day holds a special place in the hearts of New Zealanders, as it is a time to remember and pay homage to the brave soldiers who fought and made the ultimate sacrifice in the Australian and New Zealand Army Corps (ANZAC) during World War I. Observed annually on April 25th, ANZAC Day is a solemn occasion that serves as a poignant reminder of the valour, camaraderie, and selflessness of those who served their country.

Read more …
How You Can Keep NZ Green?

How You Can Keep NZ Green?

How Much E-Waste Is Created In New Zealand Every Year?

The exact amount of e-waste created in New Zealand every year is difficult to determine, as there is no comprehensive national e-waste data collection system. However, according to a report by the Ministry for the Environment in 2020, it is estimated that New Zealand generates approximately 98,000 tonnes of e-waste each year. That’s approximately 20 kg of e-waste from computers and other electronics from every person each year.

Read more …