Webinar Replay : Learn How to Protect Yourself from the Darkweb Now

What does it mean If your personal details are leaked on the darkweb?   Learn how you can manage your risks. The darkweb is a network of websites and servers that are not indexed by traditional search engines and require special software to access. It’s a place...

Training builds staff capability and productivity

How are you supporting IT Training and Development? Training builds staff capability and productivity Unlock the features and potential of your staff and computer systems.​ Providing employees with training, shows them a clear growth plan and help you retain your top...

Protect Yourself from AI Phone Scams: A Terrifying New Trend

The rise of AI phone scams has brought personal targeting to a whole new level.   Scammers are using AI-created fake texts (smishing) or even AI -created cloned voices of social media users. It has already found its way to New Zealand shores – New AI combats...

KARE – Will your support plan need to change?

2008 was a long time ago. New Zealand was a different place. The IT maintenance needs of business were so much simpler! Locally, there was a change of government.  Internationally, we were watching the start of the GFC with the fall of Lehman Bros bank.    In the...

Putting a light on the dark web with upgraded monitoring

What’s the Dark Web? The Dark Web, is often associated with a veil of notoriety, is a part of the internet intentionally hidden from traditional search engines. It requires specific software, such as Tor, to access, offering an anonymous platform where privacy...

What is Micro-Coaching?

What is Micro-Coaching? Short one to one sessions where you learn, solve problems, achieve goals and transform through Insight Led Learning.​ Each session lasts for up to an hour and gives you the opportunity to work with one of our consultants to work through a goal,...

Are you still using email attachments to share documents?

Microsoft are working hard to change your habits. We’ve all experienced the problem of sharing emails and finding that our documents proliferate different versions with different edits which can be quite challenging to bring together. But that’s not the only problem....

When does using CC in an email become a privacy breach?

Sometimes you need to use the BCC (Blind carbon copy) function in email! Last month, the email addresses of 147 gun owners were shared in an email. Whoever was sending the email put everyone in the ‘cc’ line. That meant their email addresses could be read...

Don’t accidentally throw away your WiFi!

Canon just sent out a warning. Wipe your old printers before selling/discarding them! It seems that printer technicians can access the memory and go into settings to uncover old Wifi passwords. Their advisory seems to suggest wiping the settings a couple of times...

REWATCH – Webinar – Meet the Microsoft Teams 2.0

We rely on Teams for so much and now, Microsoft are releasing a major update to it. Teams has been changing in front us, and adding new features, but this new version means that change is accelerating. Why are Microsoft changing it? What is ‘new’ in it,...