FAQs - Frequently Asked Questions

We frequently receive inquiries from clients seeking guidance to resolve computer or network problems. Drawing inspiration from the classic British TV comedy series, The IT Crowd, our go-to initial suggestion is to restart the computer. If the issue persists even after trying this common troubleshooting step, our skilled computer engineers can assist by remotely accessing your machine or scheduling an on-site visit.

Questions about IT services
What are some examples of typical IT Solutions and Services?

  • Managed IT Services
  • Cloud Backup Services
  • VOIP (Voice over Internet Protocol)
  • Monitoring Services
  • Data Backup and Recovery
  • Firewall Management and Services
  • Managed Cybersecurity Services
  • Microsoft 365, Google Workplace, Dropbox
  • Antivirus Protection ; Managed or Unmanaged
  • Remote Technical Support
  • Onsite Technical Support
  • Work from Home Services and Management
  • Communications Management
  • Software as a Service; For example Microsoft 365
  • Unified Communications
  • Networking Services
  • IT Consultancy
  • Managed Print Services
  • Internet Connections




What exactly is a managed IT service?
A managed IT service is a type of IT support that is provided by a third-party IT provider (such as CT Business Solutions). The provider takes responsibility for managing and maintaining the IT infrastructure and systems of the customer's organisation. This includes tasks such as installation, configuration, and updates for the hardware and software used by the business. Managed services are provided on a subscription basis, with the IT provider generally charging a flat monthly fee for their services.

One advantage of using a managed service is that it can help a company save valuable time and resources. The IT provider handles all the IT tasks, allowing the company to focus on its core business. Managed services can also improve the security and reliability of a company's IT systems, as the provider is responsible for monitoring and maintaining them.

There are different types of managed services, including managed IT services, managed cyber security services, and managed communication services. Managed IT services cover a wide range of tasks, such as network management and data backup. Managed cyber security services focus on protecting a company's systems from cyber threats. Managed communication services involve the management of a company's communication systems, including email and phone systems.

In summary, a managed service is a way for companies to outsource their IT tasks to a third-party IT provider. The IT company takes care of the maintenance and management of the company's IT systems, allowing the company to focus on its core business. Managed services can improve the security and reliability of a company's IT systems, as well as save valuable time and resources.

Last updated:
06/01/2023
How does a managed service provider (MSP) differ from an in-house IT department?
A managed service provider (MSP) is a third-party company that manages and maintains an organisation's IT infrastructure and systems. An in-house IT department is a team within the organization that performs the same tasks. One key difference is that an MSP provides services remotely, while an in-house IT team works on site. MSPs often offer flexible, pay-as-you-go pricing models, whereas in-house IT departments require a larger upfront investment. MSPs also typically have a wider range of expertise and resources, as they serve multiple clients. Additionally, MSPs can provide more reliable and consistent support, as they have dedicated staff available at all times. On the other hand, an in-house IT team may be limited in their abilities and availability. Overall, an MSP offers a cost-effective and efficient alternative to an in-house IT department for organizations looking to outsource their IT management.
What services do IT support professionals like CT Business provide?
Many IT support professionals and Companies offer a wide range of technology services. Information and Communications Technology is a vast subject and encompasses many different specialties as in the lists below.

CT's main technology services

  • Our Service Desk operations are designed to support most of a business's technology needs. In corporates this often called "The IT Department" and encompasses the following:
  1. System Administration - maintaining system configuration and updates.
  2. Networking and Wireless monitoring and management.
  3. Helpdesk and User management - assistance with user's enquiries - hardware issues and repairs.
  4. Management of popular business tools like Email, Microsoft 365, Google workspace.
  5. Cloud Services, Azure, AWS, Google Cloud Platform.
  6. Security management. patching, firmware updates.
  7. Data backup and recovery.
  8. Reporting - providing reports on system performance.
  9. Proactive maintenance.
  10. Consultancy and advice on hardware refreshments, application licensing etc.
  11. Telecommunications, such as VOIP, Video Conferencing.
  12. Hardware Supply.
  13. Data cabling.


We would make suitable recommendations for specialists for the below:
  1. Web design and management, often including SEO tasks and adwords management.
  2. Programming, Software design. Line of business applications etc.
  3. Database management, data analytics and data science.
  4. Training



Last updated: 15/02/2023

Do you offer remote IT support services?
Yes. In fact we perform around 80-90% of all our troubleshooting and IT support tasks remotely. It's really only when your internet or network is down that we need to do a site visit.

  1. Our remote support software uses Military-grade AES-256 encryption and two factor authentication for both parties protection.
  2. Our remote control application removes itself from the support client after the completion of every session, eliminating the possibility of leaving your device vulnerable to cyberthreats. (unlike the popular software that the indian scammers use)
  3. Our remote support system requires you to be connected to the internet. (Otherwise we would need to do an on-site visit)
  4. Your business wil need to have a credit arrangement with us.




Indian Scambaiting - Have a laugh
https://www.youtube.com/@ScammerPayback
https://www.youtube.com/@irlrosie


Last updated: 15/02/2023
Cyber Security
What is cybersecurity and why is it important?
.
Cyber-Security is the process of defending crucial systems and information from digital attacks and breaches. For small businesses the many facets mentioned below can be difficult to manage in-house due to resource constraints and a lack of cybersecurity expertise. This is the reason CT Business Solutions offer a Managed Cybersecurity Service, where the skilled resources and costs are shared in a cost effective manner accross a larger volume of businesses and users.

There are many facets to Cybersecurity such as. Employee training and awareness, Regular backups, Disaster recovery plans, Incident response plan, Patch management, Password management, Network security, Robust endpoint protection, Threat hunting, Encryption and access controls, Data storage security, Cyber insurance etc.

Read More:
Atlanta ransomware attack
Cyber Security
Managed Services
Business Backup Solutions
Sophos Advanced Email Protection
Has Your Email Been Breached?
Are You A Sitting Duck?

Cyber-Crime. How can I protect my business against a cyber attack without spending a fortune?



.





Basic Cyber Security


Cyber-security threats are continually evolving. Viruses, worms, trojan horses, spyware, phishing, adware and scareware have all been around for a long time. Lately, one particular form of malware known as ransomware has been creating havoc with businesses and organisations worldwide.

Ransomware when detonated works by locking up your files using encryption. You are then asked to pay a ransom to get the code that allows you to unlock your files. Lately, some cyber-criminals don’t even add value to this “service” they offer. They just take your ransom and don’t give you the code.

Many customers we see during our daily work (and rescues) don’t even have the most basic cybersecurity measures in place. This article is intended for the non-technical amongst us to assist and educate about the need to protect computer users against these ever-evolving cyber threats.

Ransomware


In every case we have seen so far, the ransomware package has been physically detonated by a human using the endpoint. Ransomware mostly arrives in email as either an attachment or as a link to a malicious or compromised website. It can also be spread from software downloads, websites and advertising delivered over online ad networks.

What can you do to protect against a cyber attack?



Educating yourself and your employees is the #1 defense against cybercriminals.

Three years ago, in the olden days, we used to say don’t open an email or attachment from someone you don’t know. These days that rule still applies, however, we have seen cases of ransomware being “redistributed” to everybody in the victim’s email address book, so it’s not just people you don’t know that you can’t trust.

Think about that attachment or link you are about to open. Common sense applies. Were you really expecting an invoice from your mother? Were you really expecting that traffic ticket from the police? (Think – how did the Police ever get your email address?)

If in doubt about an email then phone the person up and ask if they just sent you that attachment. Better to be safe than sorry.

The most basic cyber-security needed on your computers and network.



Every endpoint in your network (Cell-phones, Laptops, Desktops, Servers etc.) must have up to date and functional business grade Anti-Virus software.

Apply Operating System patches. Manufacturers like Apple, Microsoft and others regularly release patches and updates to fix vulnerabilities that have been discovered (mostly by cybercriminals) in their operating systems.

Apply application patches. Products like Microsoft Office, Adobe, Chrome to name but a few, all have vulnerabilities and exploits. As these exploits get discovered patches are released by the manufacturers to remedy the situation.

Always use the latest version of the operating system available. Whilst Microsoft’s Windows 7 is still around and is a good operating system, Windows 10 and 11 are inherently much more secure. Only 15% of Malware reported in 2017 were seen on Windows 10 whereas 63% were found on windows 7.(source Webroot) Microsoft officially ended support for Windows 7 in January 2020 so its time has been.

Restrict administrative privileges. Only log in as the administrator to perform administrative functions. Your regular login (and your employees) should only have standard user rights. Why? This makes it harder for malware to be installed, as installation usually requires administrative privileges.

On Windows machines ensure the Windows Firewall is enabled. It adds another layer of security, even if you have a firewall at the gateway to the internet.

Backup your data daily. This needs to be business grade and not to a shared drive on the network. Why? Most ransomware will spread to every “share” it can find – too bad if that is your backup. With regards to ransomware, the phrase “Backup or Pay up” springs to mind.

Beyond basic - The next level of cyber security measures.



Once the basics are covered off, we can then talk topics like application whitelisting, gateway firewalls, VPN's, cloud virus and spam pre-filtering of emails, changing settings in software, 2-factor authentication, and an application that detects and stops unauthorised encryption etc. These will give a much more comprehensive solution beyond basic, however “comprehensive” is probably beyond the scope of this document titled “Basic Cyber Security” and would make it rather long and too technical.

How can CT Business Solutions help?



Businesses without their own IT resource will often need assistance in implementing these basic cybersecurity measures. As an IT department for the small and medium-sized businesses, CT Business Solutions can be your IT resource.

We are able to deploy a management system to your computer(s) and network that keeps a track of your Anti-Virus, Patching, and Backups etc. This system reports to our service desk when things are going awry.

We are able to assist with your staff training, with a presentation and booklets etc.

Cyber Crime - Technical Stuff/Further Reading



NZ Government Communications Security Bureau – NZ Information Security

Manual Download Page


Australian Government – Australian Cyber Security Centre – Essential 8 Explained

PDF Download



Last updated: 12/01/2022
.

What is MFA or 2FA ?
MFA is an acronym for Multi-factor Authentication. 2FA is for Two Factor (essentially the same thing). Its a security method that requires 2 forms of identification to access data and resources. MFA/2FA basically makes it really hard and stops hackers from accessing your logins for the likes of email, internet banking, and company data etc.

Typically once you have entered your username and password into your application to gain access, a code will be sent to your phone or password manager to further authenticate you.

Other MFA methods include fingerprint scans, voice recognition and security tokens/fobs etc.

The beauty of MFA/2FA is that if you receive an access code for an account you're not currently trying to access then its a dead give away that someone has your username and password and is attempting to gain access to your account.

Check your email or password here:
Has Your Email Been Breached?


Read More:
NZ Govt | Cert Site | Two Factor Authentication

.
How can I create strong and secure passwords?
.
1) Use a password generator - good luck remembering it, especially since its not a good idea to write it down or store in your browsers password manager.

2) Use a proper password management system such as Keeper. The one we use and support because its easier.

3) Make up stupid long words or phrases with Capitals, Lower case, numbers and special characters. Example "FriedTennisBALL23#" , test this password in our free checker (below)

Password Generator
Never use your browsers password manager | Also describes our Keeper Tool
Email Breach and Password Checking tool

Related Services:
Cyber Security
Managed Services
Has Your Email Been Breached?
Are You A Sitting Duck?



This Article is about: How can I create strong and secure passwords? | Author: Dennis Jones | CT Business Solutions | Last Updated 09/04/2023

Our Youtube link: https://www.youtube.com/@ctbusinesssolutions
Google review link: https://g.page/r/CTiCdJZbvW8xEBk/review

.
What is a zero-day security issue?
A zero-day is where the cybercriminals (crooks) find an exploitable security hole before the good guys do, and then race to start abusing that bug to do bad stuff before a patch to fix the hole exists.

How to protect against Zero Day Attacks
  1. Stay informed - Don't tune out when you hear it on the news. Keep your staff updated
  2. Update your systems and keep them updated - Enable automatic updates etc. or get your managed service provider (like CT) to monitor
  3. Deploy additional security measures - Firewalls, EDR (endpoint detection and response), MTR (managed threat response) - at CT, dependent on your business size and needs we can deploy all of these to your business, using either Sophos or Bitdefender which are part of our managed services software platform.

  4. Last updated 12/01/2022
    #zeroday | #cybersecurity | #cybercrime | #hacker | #malware | #ransomware | #security
How do I know if my computer has a virus or is infected with malware?

  • Your computer takes longer than usual to start up.

  • The system suddenly freezes, crashes or shuts off for no reason.

  • You're seeing pop up ads.

  • You're running out of hard drive storage.

  • Your security systems or antivirus have been disabled.

  • You receive pop up alerts from rogue antivirus programs claiming that you are infected with multiple viruses.

  • There are new icons on your desktop that you do not recognise.

  • You see unusual error messages (e.g. messages saying there are missing or corrupt files or folders).

  • You are unable to access the Control Panel, Task Manager, Registry Editor or Command Prompt.

  • Your web browser's default homepage has changed.

  • You get redirected to web pages other than the one you intended to go to.

  • Strange or unexpected toolbars appear at the top of your web browser.

  • Your contacts are receiving emails from you that you didn't send

  • Your ISP and or Mail provider has blocked you from sending emails

  • You are getting emails asking you to pay legitimate accounts to a different bank



Last updated 22/01/2022
#virus | #cybersecurity | #hacking | #cybercrime | #security | #technology | #cyber | #cybersecurity | #cybersecurityawareness | #tech | #phishing
What should I do if my computer is infected with a virus?

  1. Before you do anything. Disconnect your PC from the internet and do not use it until you are ready to clean the PC

  2. Boot your computer into safe mode

  3. Delete all your temporary files using the disk Cleanup Tool.

  4. If your computer can connect to the internet in safe mode then update your antivirus to the latest virus definitions.

  5. Run your Antivirus software in its on demand scan mode. Make sure the setting is for a "full" scan not just a quick scan. It might take a while to scan. Be patient it's important to thoroughly scan all files in your PC.

  6. Make note of any malware that is discovered. You may need to manually remove parts of the virus later and knowing its name is helpful when researching removal methods.

  7. If your Antivirus software failed to find anything (or you were unable to update its definitions) you may need to download an alternate product or run an online scanner. Online scanners of course can be difficult to run if you are disconnected from the internet. There are alternatives however. Using another computer to download a 30 day trial malware removal program like Hitman Pro or Malware Bytes to a memory stick and then running that application on the infected computer is probably the easiest.

  8. It is a good idea to use either of these programs even if your antivirus does allegedly clean-up your problem. Its amazing how much these specialist products find as they are more geared to spyware and adware than a traditional antivirus product.

  9. Remember to remove these applications after your computer is back to normal or else they will nag you to buy them. With Malware Bytes there another Gotcha if you dont pay careful attention on the install. Typically hitting next next without paying attention will install the "Premium" version for its trial. In this circumstance, if you have already an existing Antivirus and both are running your computer will slow to an absolute crawl.

  10. Alternately you could uninstall your old antivirus and purchase the product that saved your bacon. Or contact us and go onto our managed anti-virus solution.

  11. In some cases scanners will find issues but are unable to deal with the problem or put the file into quarantine. This is where you will need to do a bit of googling to find out how to manually remove the virus and its debri.

  12. Sometimes these manual removal methods require registry edits and other things that only trained IT specialists should perform. After all - That is why we are here. Alternately if you live out of our area please goto Computer Troubleshooters and find the office nearest you.




Last updated 12/01/2022
#virusremoval | #computerrepair | #itservices | #itsupport | #techsupport

What is the best antivirus?
Often when us “computer people” are out working or talking with customers, networking, at social events, or even at a family BBQ some-one invariably will ask. What is the best antivirus?

My answer usually "depends" on the circumstances of the person I'm chatting with.

Home Users:
If the person asking is a DIY type and not liable to use CT Business Solutions for ongoing IT support and services then I simply tell them to look at an independent testing organisation such as Virus Bulletin and select one of the top 5 products that has been consistently listed with a VB100 (see explanation below) in each of the last 4 or 5 tests. Consistency being the key. I tell them to avoid magazines or online magazine articles that generally turn up at the top of a Google or Bing search, as those generally are just there to support a paid advertiser who actually has absolutely no interest in providing independent advice. Also be wary of the "big name" products typically sold in chain stores. They may well be technically good at malware detection but as a general rule, they tend to slow your computer down to a crawl. The kids selling this stuff in said chain store have no knowledge of working with 1000's of business customers in busy offices. Nobody buys a computer just so they can watch their Anti-Virus startup and then slow down their daily tasks.

Business Customers:
If the person is a customer of ours or a prospective client, then I just tell them to trust our 20 years experience and use our managed Antivirus service. Depending on your circumstances and budget we will use a product such as Sophos with Intercept-x or Bitdefender.

We offer monitored Anti-Virus services as part of our Total Protection Plan. At the budget end of this plan, we use Bitdefender to achieve this purpose. Bitdefender is light on computer resource and has excellent detection rates. The Sophos product is also light on resource and with the added value of intercept-x, plus integration with the Sophos firewall, we can offer supreme levels of synchronized security and protection.


Links to Great Anti-Virus Products:

Sophos
Bitdefender


Explanation of the VB100
The VB100 is awarded to products that detect all virus samples with no false positives.

Last updated 30/04/2022
#antivirus | #bestantivirus | #cyberattack | #cybersecurity | #sophos | #bitdefender



.
I'm in Business - Do I need a Business Grade Router/Firewall or will the Modem supplied by my Telco suffice?
Yes you do need a business grade router or firewall.

A lot of people are of the opinion that the only difference between business class routers and the routers for your home and the ones for your business is the price. Unfortunately for most, this is very incorrect.
Beyond the obvious of specifications like memory and processor speeds, the software inside the business grade device is usually more robust, secure and offers more protections for business data and content. Functions such as VPN hosting, support for static public IP addresses, access point to cloud services, WiFi and VLans all come to mind as being valuable to the small business.

For those hosting their business or employees in their home, VLANS can be one of the most important options in a router. VLANS allow for the network on the property to be segregated into separate networks. For the home office environment, this allows for the business network to be separate from the network that the kids use for streaming movies, accessing social media, and other activities that put the business data at risk.

A lot of the routers supplied with your internet connection by the Telco's are the cheapest that they can find (after all they do supply them as "free") and simply don't have the cyber security capabilities that a business needs. In fact the author would go as far as to say that they are about as effective as an "ashtray on a motorbike" or a "chocolate teapot" in terms of providing security for your business.

Proper business grade routers are not that expensive either. Talk with us and we can give you a guide as to what is suitable for your business operations.

Last updated 12/01/2022
#router | #vpn | #cybersecurity | #firewall | #sophos | #mikrotik | #cyber | #cybercrime
How do I check to see if my email has been compromised?
A compromised email can have serious consequences. Please use our FREE email data breach tool here to find out.
Email Vulnerability Check

If your email appears on any sites (even if they are historical or you don't know how they got there), the danger is that your email address is now on a hackers target list. Hackers love it when you have used the same password as the one that's been hacked, and they will attempt to cause all manner of crimes against you.

To remedy, change your passwords everywhere you login online, do not use the same passwords at any site, make them difficult by using a password generator and use multifactor authentication. Once thats all in place enforce a regime to change them regularily.

Or better still use our Keeper-Security password manager.

-

How to enable ransomware protection in Windows 11?
.
1) To enable ransomware protection in Windows 11, you first need to access Windows Security. This can be done by clicking on the Start menu and selecting the gear icon to access the Settings app. From there, click on the "Privacy & Security" tab and select "Windows Security."

2) Once you are in Windows Security, click on the "Virus & threat protection" tab and then click on "Ransomware protection." From here, you can see if ransomware protection is currently enabled and access the settings to turn it on if it is not.

3) One of the key features of ransomware protection in Windows 11 is Controlled Folder Access. This feature can prevent unauthorized changes to files in protected folders. To enable Controlled Folder Access, simply toggle the switch to "On" under the "Controlled Folder Access" section of the Ransomware Protection settings.

4) In addition to enabling Controlled Folder Access, you can also customise the folders that are protected. To do this, click on the "Protected Folders" section under Ransomware Protection settings and then click on "Add a protected folder." From there, select the folder you want to protect and click "OK."

5) While Controlled Folder Access can be effective in preventing unauthorised changes, it can also prevent legitimate apps from accessing protected files. To allow apps through Controlled Folder Access, click on the "Allow an app through Controlled folder access" option and then click on "Add an allowed app." From there, select the app you want to allow and click "OK."

6) It's important to be notified if ransomware protection is triggered so that you can take appropriate action. To set up notifications, click on the "Notifications" section under Ransomware Protection settings and toggle the switch to "On" under "Notify when ransomware is detected."

Note: While Windows 11 includes built-in ransomware protection, some users may prefer to use third-party ransomware protection software. This type of software often includes additional features such as real-time protection, advanced scanning, and behavior-based detection.

Third-party ransomware protection software can also offer improved detection rates compared to Windows 11's built-in protection. This is because third-party software is often designed specifically to detect and protect against ransomware threats.

Contact Us | Talk to us about third-party ransomware protection

Last updated 07/05/2023 by Dennis Jones - CT Business Solutions.

.
Computer Problems
Do you fix home computers?
No, we don't. We are not a 'break fix' computer shop who do quick repairs to domestic computers. In the case of work from home employees its a little different as we provide the required ongoing support to our business customers to keep them running at optimal efficiency.

Last updated 17/02/2023 by Dennis Jones

.
Do you fix Windows XP or Windows 7 machines?
No - We are aware that there are still companies that have XP and Windows 7 machines running due to software needs or peripherals that only work with these systems, so for these customers we do offer a limited (see below) service to support them. If you are simply running XP or Windows7 to save money, then you probably aren't. With a modern, fast pc running Windows 10 or 11 your business will see an improvement in efficiency and a massive increase in security. We are not in the business to simply sell people 'boxes' but an old computer is like a blunt worn out saw, it needs to be replaced literally for one that will cut things better.

Support limitations for OLD Operating Systems:
  1. We can't protect you from viruses and zero day exploits.
  2. We can offer you "extended" 1 year Microsoft support licenses for Windows 7, but its almost cheaper just to get another PC.
  3. If you are using equipment that is more than 5 years old then you are setting yourself up for a hardware failure anyway.


Some perspective on Operating Systems:
  • Windows 11 was first released October 2021
  • Windows 10 was first released July 2015
  • Windows 8 was first released in August 2012 but it was an unmitigated disaster and we wouldn't let our business customers use it.
  • Windows 7 was first released in July 2009
  • Windows Vista was first released in January 2007 but it was an unmitigated disaster and we wouldn't let our business customers use it.
  • Windows XP was first released in November 1985


Last updated 17/02/2023 by Dennis Jones

.
Do you fix Tablets and Smartphones?
As the technology used in business grows we have adapted our services to include all systems a company might be using in their offices. This includes computers, peripherals, printers, tablets, phone systems and any number of other integrated items.

In most respects we only support the usage side of these devices. Like setting up your email or access to applications like Microsoft Office or Google Workspace.

The physical repair of these smaller devices is beyond our current capabilities.

Can you visit my office to fix my computer?
Yes, we have a team of qualified technicians who visit customers to fix and maintain their computer systems. Often, we can 'remote in' to computers to fix them both more quickly than waiting for a site visit and at an often lower cost.
Do you fix printers?
1) For smaller "non managed" printers.
We do offer a service to reinstall the software that makes printers work and in some cases we can fix the physical machines. However, in most cases the printer will need to be returned to the manufacturers repair center to ensure it is fixed effectively. We can coordinate this for you, helping to reinstall the printer when it is returned.

2) For customers using our managed print service.
Generally this applies to the larger business grade Konica Minolta and Brother printers. Maintenance and Repairs are all covered as part of the monthly contract, and generally a technician will attend your site to effect the repair.
Why wont my computer work?
This might seem like a dumb question, but we do get people who call us up and without giving us any further information ask us why their computer isn't working. When you do call us up we will ask you a series of questions that will help us to better understand the situation, similar to going to a doctor for a pain in your side. Once we understand the situation we will be better poised to offer help and advice.
VOIP Questions
What is a VOIP Phone System?
VOIP phone systems use the internet instead of the old style copper phone lines to make and receive calls. VOIP stands for Voice Over Internet Protocol.

One of the main benefits of a VOIP phone system is that it can be used with just about any internet connected device, such as a computer, laptop, tablet, or smartphone. This means that you can make and receive calls from anywhere as long as you have an internet connection.

Another benefit of a VOIP phone system is that it can often be less expensive than a traditional phone system. This is because you don't need to pay for expensive phone lines or equipment. Instead, you can just use your internet connection to make and receive calls.

Overall, a VOIP phone system is a very flexible and cost-effective way to make and receive phone calls using the internet. It can be used by businesses and individuals alike, and it offers many benefits compared to traditional phone systems.

Note:
In New Zealand the traditional landlines were introduced starting in 1880 to Auckland and then rolled out to most of the rest of the country by 1890. Chorus (as current managers of that old system) have now stated that when this landline infrastructure fails in any given area, and broadband internet is available in that problem area, then they will not "fix" the old copper based infrastructure, because people can easily use VOIP.

Related Services:
VOIP Phone Systems
Video Conferencing


Last updated: 17/06/2023 by Dennis Jones


.
What are the Disadvantages of VOIP
VOIP Phone Systems rely on a stable internet connection.
- If your internet connection is poor then you will suffer issues of call quality.
- If your internet is down then you will not be able to make or receive VOIP calls.

Note: We do have a work-around for a 2nd 4G/5G internet connection that fails over if your fibre internet connection ever goes down. Please talk to us about our failover internet system.

Related Services:
VOIP Phone Systems
Video Conferencing


Last Updated: 17/06/2023


.





Is VOIP as good as a Landline?
The quality of Voice over Internet Protocol (VoIP) and landlines can depend on a variety of factors, including the technology used, the quality of the network connection, and the specific features offered by the service provider.

In general, VoIP technology has improved significantly over the years, and for most users, it will provide a better quality to that of a traditional landline.

Some advantages of VoIP over landline include:

Cost: VOIP services are generally more affordable than traditional landline services. Most of our customers experience savings between 25% and 85% vs. the traditional landline systems.
Mobility: VOIP allows users to make and receive calls from anywhere with an internet connection. The system we use also allows you to make VOIP calls over the internet to/from your smartphone.
Features: VOIP providers offer additional features like video conferencing, call forwarding, and voicemail-to-email.
Availability The traditional landline phone network is becoming obsolete, and both ADSL and VDSL internet are following suit. Due to its age, the (1890's era) copper infrastructure has become outdated, and in certain instances, it can be difficult to repair faults because the necessary parts are no longer being manufactured. New Zealand Telcos (Like Spark, Vodafone, 2Degrees etc.) are ditching the old copper network where they can.
Support: Support from your local IT provider is faster and more understandable than that of a large Telco's service desk, where english may be a 2nd or 3rd language.

The downsides of VOIP:
If you have poor internet connectivity then VOIP might not be for you, especially if landlines are still available in your area.

Related Services:
Video Conferencing
VOIP Phone Systems


Contact Us for more information about VOIP

External Link:
Consumer NZ | The copper network is being withdrawn


Last Updated: 17/06/2023 by Dennis Jones


.
What are the three Types of VOIP Services?
Home VOIP: This service allows individuals to make and receive phone calls using their internet connection. Home VOIP services typically include features such as caller ID, voicemail, and call forwarding, and they can be used with a variety of devices such as computers, laptops, tablets and smartphones.

Business VOIP: Business VOIP services are designed for use in office environments. They typically offer the above features plus advanced features such as video conferencing, virtual meetings, call routing, and call recording, and they can be used with a variety of phone equipment such as desk phones, conference phones, soft phones and headsets. At CT the system we use caters for small individual businesses with maybe 1 or 2 phones right through to large call centres with 100's of employees and phones.

Mobile VOIP: Mobile VOIP services allow individuals to make and receive phone calls using their smartphone or other mobile device. Mobile VOIP services typically use a special app that is installed on the device, and offer features such as call forwarding and voicemail. Mobile VOIP services can be used over a cellular data connection or a Wi-Fi connection, the latter saving on expensive cellular charges.


Contact Us to get your business on VOIP

Related CT Service:
Video Conferencing
VOIP Phone Systems



Last updated: 17/06/2023 by Dennis Jones


.
Cloud Computer Services
What is Cloud Computing?
Cloud computing refers to the delivery of computing resources, such as servers, storage, databases, software, and more, over the internet. Instead of keeping these resources on a local computer or server, users can access them remotely from anywhere with an internet connection. Cloud computing is becoming increasingly popular due to its scalability, flexibility, and cost-efficiency.

CT Business Solutions are partners for all the major Cloud Computer providers and facilitate access and management services to many of our customers for their Cloud Computer Services.

The current major cloud computing providers are: Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP)


Cloud Computing Services

Last Updated: 29/06/2023
Author: Dennis Jones | CT Business Solutions


.
What are the benefits of cloud computing services?
Scalability: cloud computing resources can be easily scaled up or down as needed, making it ideal for businesses with fluctuating needs.

Cost-efficiency: cloud computing eliminates the need for expensive hardware and software, reducing capital expenses.

Flexibility: cloud computing allows users to access resources from anywhere with an internet connection, making it ideal for remote work.

Reliability: cloud computing providers typically offer reliable and secure services, with built-in backups and disaster recovery options.

CT Business Solutions are partners for all the major Cloud Computer providers and facilitate access and management services to many of our customers for their Cloud Computer Services.

Cloud Computing Services

Last Updated: 11/03/2023
Author: Dennis Jones | CT Business Solutions
What types of cloud computing services are available?
There are three main types of cloud computing services:

Infrastructure as a Service (IaaS): Provides virtualized computing resources such as servers, storage, and networks.

Platform as a Service (PaaS): Provides a platform for developing, running, and managing applications.

Software as a Service (SaaS): Provides access to software applications through the internet, eliminating the need for local installation.

CT Business Solutions are partners for all the major Cloud Computer providers and facilitate access, support and management services to many of our customers for their Cloud Computer Services.

Cloud Computing Services

Last Updated: 11/03/2023
Author: Dennis Jones | CT Business Solutions
What are the security considerations when using cloud computing services?
There are several security considerations to keep in mind when using cloud computing services, including:

Data privacy: Ensure that sensitive data is protected and compliant with relevant regulations.

Authentication and access control: Use strong passwords, multi-factor authentication, and access controls to prevent unauthorized access.

Encryption: Use encryption to protect data in transit and at rest.

Backup and disaster recovery: Have a backup plan in place in case of data loss or system failure.

Service-level agreements: Ensure that your cloud computing provider meets your security and performance standards.

CT Business Solutions are partners for all the major Cloud Computer providers and facilitate access, support and management services to many of our customers for their Cloud Computer Services.

Cloud Computing Services

Last Updated: 11/03/2023
Author: Dennis Jones | CT Business Solutions

.
How do I choose the right cloud computing provider for my business needs?
Choosing the right cloud computing provider depends on several factors, including:

Cost: Consider the pricing model, including any hidden fees.

Service level agreements: Ensure that the provider meets your service level requirements.

Security: Check the provider's security measures and compliance with relevant regulations.

Support: Consider the level of support and availability provided by the provider.

Scalability: Ensure that the provider can meet your changing needs over time.

CT Business Solutions are partners for all the major Cloud Computer providers and facilitate access, support and management services to many of our customers for their Cloud Computer Services.

Cloud Computing Services


Last Updated: 11/03/2023
Author: Dennis Jones | CT Business Solutions

Servers and NAS (Network Attached Storage)
What is a NAS device and how does it work?
A NAS (Network Attached Storage) device is a special type of storage device that can be connected to a network. It allows multiple devices on that network to share the same storage and access data from it.

A NAS device is like a file server that is designed to work well with sharing files. It usually includes one or more hard drives or solid-state drives, which can be accessed over a network connection such as Ethernet. It can be managed using a web interface, which makes it easy for users to configure and manage the device, as well as access and manage files.

When you connect a NAS device to a network, it will appear as a shared folder that can be accessed by any device on the network that has the right permissions. This allows users to access shared files and folders from their computers, tablets, smartphones, or other devices. The NAS device can also support different protocols to provide access to the stored data.

NAS devices offer additional features such as remote access, backup and recovery, media streaming, and security and access controls. Many NAS devices also support RAID technology, which can help protect against data loss in case of a hard drive failure.

NAS devices are a great way to manage and share data across a network. They are commonly used in homes and small businesses as a centralized storage solution for sharing and collaborating on files and data.

Last Updated: 17/02/2022 by Dennis Jones

.
How many hard drives can I use with a NAS device, and what capacity should they have?
If you're wondering how many hard drives you can use with a NAS device, it depends on the specific device and its capabilities. Some NAS devices have just one or two drive bays, while others may have four, six, or even more.

As for the capacity of the hard drives, it also depends on the device and how you plan to use it. If you're planning to use the NAS device for basic file storage and sharing, then you may only need a few terabytes of storage. However, if you're planning to use it for more demanding applications such as media streaming, backup and recovery, or virtualization, you may need larger capacities or even multiple drives in a RAID configuration.

It's important to note that using multiple hard drives can provide benefits such as increased storage capacity and data redundancy for added protection against data loss. Some NAS devices also support hot-swapping of drives, which means you can replace a faulty drive without shutting down the system.

When choosing hard drives for your NAS device, it's important to select ones that are compatible with the device and designed for 24/7 operation, as NAS devices are typically always on. You may also want to consider the speed of the drives, as faster drives can improve performance when accessing and transferring data.


Contact us so we can supply and setup a NAS suitable for your business needs.


Last Updated: 17/02/2023 by Dennis Jones


.
What brand of NAS system is best?
At CT we have been supporting NAS (Network Attached Storage) devices for many years.
As always, there are cheaper brands for home users, and the proper business grade models designed for use in a business network.
Given our business is all about providing IT support to businesses we don't use the cheaper home grade models.

Our favourite business brand is Synology and we always recommend the + (Plus) models. These come in both a Tower Style Case and a Rackmount model if you have a server cabinet.
The Plus models have all the software included that we need to do things like:
- Backup each computer in the network.
- Share files amongst users.
- Allow sharing over the internet using a secure VPN.
- Backup your office 365 or Google Workspace.
- Replicate your Synology+ device(s) to our Synology Devices for redundancy.
- Replicate your Synology+ device(s) to Synology's C2 secure cloud storage for redundancy**.
- Regularily update the security of the NAS.

** The recent cyclone (Gabrielle - Feb 2023) had us rescuing a sunken business NAS in Hawkes Bay, with their data restored from the Synology C2 replication and made available to their users connecting securely over the internet from their laptops to our Synology NAS.

Here is a link to Synology's Plus Models of Network Attached Storage Devices.
https://www.synology.com/en-nz/products?product_line=ds_plus%2Crs_plus
CT Business Solutions Story Time
The history of CTS, Computer Trouble Shooters, Computer Troubleshooters and CT Business Solutions.
Basically things evolve over time | Originally when we started out way back in 1999 we joined an Australia/NZ based computer franchise organisation known as Computer Troubleshooters. At the time the dictionary's correct spelling of Troubleshooters was 2 words "Trouble Shooters". Hence the CTS in our website name, as we wanted to be correct, and at that time we didn't have the "influence" of American spelling oddities, or subsequent changes made to widely available dictionaries.

As there was already a cts.co.nz in Wellington (Computer and Telephone Services) and at the time we were not into phones, and since we didn't clash, we decided on the cts.net.nz option as suitable for our domain name.

As the now global franchise group developed and HQ was moved to the USA the powers that be decided to use CT instead of CTS as a primary identification. and business names like CT Phoenix, CT Location-name, became common. Also the tagline was changed from " Local Service - Global Strength" to "Technology Solved" and incorporated into our branding.

Later on (about 2012) the franchisees wanted to be identified more as a business to business operation as opposed to a business to consumer type organisation and felt that the name "Troubleshooters" was unfortunately identifying us in the same league as what one might imagine a name like geeks or nerds in the URL or website name would appear.

So a sub brand was created called CT Business Solutions.

Other Companies that will also turn up on an average NZ google search for "cts" are:
- Commercial Transport Spares Christchurch
- Cylinder Testing Services
- CTS Fishing
- Cadillac CTS

We are not any of those:

Last updated: 27/02/2023 by Dennis Jones

.



Who is CT Business Solutions? and what is their relationship to Computer Troubleshooters?
CT Business Solutions is a sub-brand of Computer Troubleshooters. Just as Coke Zero is to Coke or McCafe is to McDonald's. The brand was formed in 2012 to better enable those Computer Troubleshooters who wanted to, to identify more with the Business to Business market. The obvious tie is the CT used in the name, and the colours and slogans used in our branding.

Currently, in New Zealand, Computer Troubleshooter locations that identify as CT Business Solutions are Hamilton, Glenfield and Dunedin. That is not to say that other locations don't do business to business work, it was just a matter of individual CT franchisees being more comfortable with their "perceived" place in the market. CT Business Solutions in Hamilton is currently (2020) the longest-serving franchisee in the global Computer Troubleshooters organisation.

Last updated 25/04/2020