This question, “How often should I replace my laptop?”, is very common. People seem to have different views on the answer, and often that answer is based on hearsay or something someone once told the person, and it’s stuck. The thing with laptops is that by their very nature, they are a portable device and […]
Cyber Security Week: Multi-Factor Authentication is too hard
Icon IT is celebrating Cyber Security Week in New Zealand by pushing aside the myth that Multi-Factor Authentication (MFA) is too hard. We’ve heard lots of the reasons that clients don’t want to move to MFA. You can read more about MFA in this blog post. None of those reasons are actual reasons, each one […]
Why Should I Get An Independent IT Review?
Let’s say you feel that your IT systems aren’t working as well as they should be. Are our backups safe from ransomware? Do we have the correct security measures in place to reduce our IT security risks? Why do all our computers seem so slow? Too often, a company will simply call their IT provider […]
Were your IT systems ready for this lockdown? How to avoid the IT lolly scramble
By now, most company’s IT teams or IT providers should have been all set for this latest lockdown, with little or no disruption to your staff. If this didn’t happen for you, then it’s time to start asking, ‘why?’. For people who can work from home (WFH), they should have been able to grab their […]
Why should I keep my Windows up to date?
On visiting three separate clients lately (to carry out IT Reviews) we have noticed a growing trend of users not keeping their Windows up to date. There are always lots of common excuses, but it does make you wonder: why should I keep my Windows up to date? Upgrades vs. Updates In this blog post, […]
What can we learn from Waikato DHB?
In the aftermath of this major IT event, is there something everyone can take from this? What can we learn from Waikato DHB, and the pain they are still going through as they restore their systems and their services? For Icon IT, there is one simple answer to this: people click on things they shouldn’t. […]
How do I make a decent password?
During our Phishing Education and Training sessions, we cover off passwords. Far too many people have simple passwords, or just change the number at the end of ‘Mary123’ to become ‘Mary124’. It’s a question often asked, “How do I make a decent password?”. Password no-nos I hate to think how many times I’ve been in […]
Case study: My email has been hacked, what do I do now?
No one wants this to happen, but it happens. Somehow, a hacker has got your password and now has control of your email account. It’s a terrible position to be in – especially so if it’s a business or corporate account – but you need to know what to do next. This post comes from […]
Case study: Business owner gets demanding email
A client (who is the business owner) received the below demanding email, and since she had done our Phishing Education session, she didn’t click – thankfully. This is the sort of tone in an email that screams ‘SCAM!’. This is a common scam email to receive, suggesting that you are using copyrighted photos on your […]
Case Study: What is Teams for Calling?
A client has come to us asking about desk phones and their PABX system, and asking, what is Teams for Calling? Most of their staff have a phone on the desk, but are they necessary? They wanted to look at options of removing the phones to let up some desk real estate, but also to […]