FAQs - Frequently Asked Questions

Often we are asked by clients over the phone for advice on how to fix their computer or network issues. If you have ever watched the Classic British TV Comedy Series the IT Crowd you would know that the classic answer is "have you restarted your computer?" Modern computers have complex self-repair systems built in and simply restarting (*see note)the machine will often fix many real problems. Make sure to save any open documents etc. before restarting. If after trying this standard procedure for solving issues, your computer still has issues, please call us and we can arrange for an experienced computer technician to either remotely access your machine or book a time for an on-site visit.

In the modern workplace using Windows 10 and 11 environments a restart is different to a shut down- go home - start again the next day. A proper restart performs different functions related to your computer.
- Also it's is a good idea to restart your computer at least once a week to prevent memory leaks etc.

Questions about IT services
What are some examples of typical IT Solutions and Services?

  • Managed IT Services
  • Cloud Backup Services
  • VOIP (Voice over Internet Protocol)
  • Monitoring Services
  • Data Backup and Recovery
  • Firewall Management and Services
  • Managed Cybersecurity Services
  • Microsoft 365, Google Workplace, Dropbox
  • Antivirus Protection ; Managed or Unmanaged
  • Remote Technical Support
  • Onsite Technical Support
  • Work from Home Services and Management
  • Communications Management
  • Software as a Service; For example Microsoft 365
  • Unified Communications
  • Networking Services
  • IT Consultancy
  • Managed Print Services
  • Internet Connections

What exactly is a managed IT service?
A managed IT service is a type of IT support that is provided by a third-party IT provider (such as CT Business Solutions). The provider takes responsibility for managing and maintaining the IT infrastructure and systems of the customer's organisation. This includes tasks such as installation, configuration, and updates for the hardware and software used by the business. Managed services are provided on a subscription basis, with the IT provider generally charging a flat monthly fee for their services.

One advantage of using a managed service is that it can help a company save valuable time and resources. The IT provider handles all the IT tasks, allowing the company to focus on its core business. Managed services can also improve the security and reliability of a company's IT systems, as the provider is responsible for monitoring and maintaining them.

There are different types of managed services, including managed IT services, managed cyber security services, and managed communication services. Managed IT services cover a wide range of tasks, such as network management and data backup. Managed cyber security services focus on protecting a company's systems from cyber threats. Managed communication services involve the management of a company's communication systems, including email and phone systems.

In summary, a managed service is a way for companies to outsource their IT tasks to a third-party IT provider. The IT company takes care of the maintenance and management of the company's IT systems, allowing the company to focus on its core business. Managed services can improve the security and reliability of a company's IT systems, as well as save valuable time and resources.

Last updated:
How does a managed service provider (MSP) differ from an in-house IT department?
A managed service provider (MSP) is a third-party company that manages and maintains an organisation's IT infrastructure and systems. An in-house IT department is a team within the organization that performs the same tasks. One key difference is that an MSP provides services remotely, while an in-house IT team works on site. MSPs often offer flexible, pay-as-you-go pricing models, whereas in-house IT departments require a larger upfront investment. MSPs also typically have a wider range of expertise and resources, as they serve multiple clients. Additionally, MSPs can provide more reliable and consistent support, as they have dedicated staff available at all times. On the other hand, an in-house IT team may be limited in their abilities and availability. Overall, an MSP offers a cost-effective and efficient alternative to an in-house IT department for organizations looking to outsource their IT management.
Who is CT Business Solutions? and what is their relationship to Computer Troubleshooters?
CT Business Solutions is a sub-brand of Computer Troubleshooters. Just as Coke Zero is to Coke or McCafe is to McDonald's. The brand was formed in 2012 to better enable those Computer Troubleshooters who wanted to, to identify more with the Business to Business market. The obvious tie is the CT used in the name, and the colours and slogans used in our branding.

Currently, in New Zealand, Computer Troubleshooter locations that identify as CT Business Solutions are Hamilton, Glenfield and Dunedin. That is not to say that other locations don't do business to business work, it was just a matter of individual CT franchisees being more comfortable with their "perceived" place in the market. CT Business Solutions in Hamilton is currently (2020) the longest-serving franchisee in the global Computer Troubleshooters organisation.

Last updated 25/04/2020
Cyber Security
Cyber-Security what is it?
Cyber-Security is the process of defending crucial systems and information from digital attacks and breaches. There are many facets to Cybersecurity such as. User education, Disaster recovery, Network security, Endpoint protection, Data storage security etc.
Cyber-Crime. How can I protect my business against a cyber attack without spending a fortune?

Basic Cyber Security

Cyber-security threats are continually evolving. Viruses, worms, trojan horses, spyware, phishing, adware and scareware have all been around for a long time. Lately, one particular form of malware known as ransomware has been creating havoc with businesses and organisations worldwide.

Ransomware when detonated works by locking up your files using encryption. You are then asked to pay a ransom to get the code that allows you to unlock your files. Lately, some cyber-criminals don’t even add value to this “service” they offer. They just take your ransom and don’t give you the code.

Many customers we see during our daily work (and rescues) don’t even have the most basic cybersecurity measures in place. This article is intended for the non-technical amongst us to assist and educate about the need to protect computer users against these ever-evolving cyber threats.


In every case we have seen so far, the ransomware package has been physically detonated by a human using the endpoint. Ransomware mostly arrives in email as either an attachment or as a link to a malicious or compromised website. It can also be spread from software downloads, websites and advertising delivered over online ad networks.

What can you do to protect against a cyber attack?

Educating yourself and your employees is the #1 defense against cybercriminals.

Three years ago, in the olden days, we used to say don’t open an email or attachment from someone you don’t know. These days that rule still applies, however, we have seen cases of ransomware being “redistributed” to everybody in the victim’s email address book, so it’s not just people you don’t know that you can’t trust.

Think about that attachment or link you are about to open. Common sense applies. Were you really expecting an invoice from your mother? Were you really expecting that traffic ticket from the police? (Think – how did the Police ever get your email address?)

If in doubt about an email then phone the person up and ask if they just sent you that attachment. Better to be safe than sorry.

The most basic cyber-security needed on your computers and network.

Every endpoint in your network (Cell-phones, Laptops, Desktops, Servers etc.) must have up to date and functional business grade Anti-Virus software.

Apply Operating System patches. Manufacturers like Apple, Microsoft and others regularly release patches and updates to fix vulnerabilities that have been discovered (mostly by cybercriminals) in their operating systems.

Apply application patches. Products like Microsoft Office, Adobe, Chrome to name but a few, all have vulnerabilities and exploits. As these exploits get discovered patches are released by the manufacturers to remedy the situation.

Always use the latest version of the operating system available. Whilst Microsoft’s Windows 7 is still around and is a good operating system, Windows 10 and 11 are inherently much more secure. Only 15% of Malware reported in 2017 were seen on Windows 10 whereas 63% were found on windows 7.(source Webroot) Microsoft officially ended support for Windows 7 in January 2020 so its time has been.

Restrict administrative privileges. Only log in as the administrator to perform administrative functions. Your regular login (and your employees) should only have standard user rights. Why? This makes it harder for malware to be installed, as installation usually requires administrative privileges.

On Windows machines ensure the Windows Firewall is enabled. It adds another layer of security, even if you have a firewall at the gateway to the internet.

Backup your data daily. This needs to be business grade and not to a shared drive on the network. Why? Most ransomware will spread to every “share” it can find – too bad if that is your backup. With regards to ransomware, the phrase “Backup or Pay up” springs to mind.

Beyond basic - The next level of cyber security measures.

Once the basics are covered off, we can then talk topics like application whitelisting, gateway firewalls, VPN's, cloud virus and spam pre-filtering of emails, changing settings in software, 2-factor authentication, and an application that detects and stops unauthorised encryption etc. These will give a much more comprehensive solution beyond basic, however “comprehensive” is probably beyond the scope of this document titled “Basic Cyber Security” and would make it rather long and too technical.

How can CT Business Solutions help?

Businesses without their own IT resource will often need assistance in implementing these basic cybersecurity measures. As an IT department for the small and medium-sized businesses, CT Business Solutions can be your IT resource.

We are able to deploy a management system to your computer(s) and network that keeps a track of your Anti-Virus, Patching, and Backups etc. This system reports to our service desk when things are going awry.

We are able to assist with your staff training, with a presentation and booklets etc.

Cyber Crime - Technical Stuff/Further Reading

NZ Government Communications Security Bureau – NZ Information Security

Manual Download Page

Australian Government – Australian Cyber Security Centre – Essential 8 Explained

PDF Download

Last updated: 12/01/2022
#cybersecurity | #security | #technology | #cybercrime | #tech | #cyber | #cyberattack | #malware

What is MFA or 2FA ?
MFA is an acronym for Multi-factor Authentication. 2FA is for Two Factor (essentially the same thing). Its a security method that requires 2 forms of identification to access data and resources. MFA/2FA basically makes it really hard and stops hackers from accessing your logins for the likes of email, internet banking, and company data etc.

Typically once you have entered your username and password into your application to gain access, a code will be sent to your phone or password manager to further authenticate you.

Other MFA methods include fingerprint scans, voice recognition and security tokens/fobs etc.

The beauty of MFA/2FA is that if you receive an access code for an account you're not currently trying to access then its a dead give away that someone has your username and password and is attempting to gain access to your account.

Check your email or password here:
Has Your Email Been Breached?

Read More:
NZ Govt | Cert Site | Two Factor Authentication

What is a zero-day security issue?
A zero-day is where the cybercriminals (crooks) find an exploitable security hole before the good guys do, and then race to start abusing that bug to do bad stuff before a patch to fix the hole exists.

How to protect against Zero Day Attacks
  1. Stay informed - Don't tune out when you hear it on the news. Keep your staff updated
  2. Update your systems and keep them updated - Enable automatic updates etc. or get your managed service provider (like CT) to monitor
  3. Deploy additional security measures - Firewalls, EDR (endpoint detection and response), MTR (managed threat response) - at CT, dependent on your business size and needs we can deploy all of these to your business, using either Sophos or Bitdefender which are part of our managed services software platform.

  4. Last updated 12/01/2022
    #zeroday | #cybersecurity | #cybercrime | #hacker | #malware | #ransomware | #security
How do I know if my computer has a virus or is infected with malware?

  • Your computer takes longer than usual to start up.

  • The system suddenly freezes, crashes or shuts off for no reason.

  • You're seeing pop up ads.

  • You're running out of hard drive storage.

  • Your security systems or antivirus have been disabled.

  • You receive pop up alerts from rogue antivirus programs claiming that you are infected with multiple viruses.

  • There are new icons on your desktop that you do not recognise.

  • You see unusual error messages (e.g. messages saying there are missing or corrupt files or folders).

  • You are unable to access the Control Panel, Task Manager, Registry Editor or Command Prompt.

  • Your web browser's default homepage has changed.

  • You get redirected to web pages other than the one you intended to go to.

  • Strange or unexpected toolbars appear at the top of your web browser.

  • Your contacts are receiving emails from you that you didn't send

  • Your ISP and or Mail provider has blocked you from sending emails

  • You are getting emails asking you to pay legitimate accounts to a different bank

Last updated 22/01/2022
#virus | #cybersecurity | #hacking | #cybercrime | #security | #technology | #cyber | #cybersecurity | #cybersecurityawareness | #tech | #phishing
What should I do if my computer is infected with a virus?

  1. Before you do anything. Disconnect your PC from the internet and do not use it until you are ready to clean the PC

  2. Boot your computer into safe mode

  3. Delete all your temporary files using the disk Cleanup Tool.

  4. If your computer can connect to the internet in safe mode then update your antivirus to the latest virus definitions.

  5. Run your Antivirus software in its on demand scan mode. Make sure the setting is for a "full" scan not just a quick scan. It might take a while to scan. Be patient it's important to thoroughly scan all files in your PC.

  6. Make note of any malware that is discovered. You may need to manually remove parts of the virus later and knowing its name is helpful when researching removal methods.

  7. If your Antivirus software failed to find anything (or you were unable to update its definitions) you may need to download an alternate product or run an online scanner. Online scanners of course can be difficult to run if you are disconnected from the internet. There are alternatives however. Using another computer to download a 30 day trial malware removal program like Hitman Pro or Malware Bytes to a memory stick and then running that application on the infected computer is probably the easiest.

  8. It is a good idea to use either of these programs even if your antivirus does allegedly clean-up your problem. Its amazing how much these specialist products find as they are more geared to spyware and adware than a traditional antivirus product.

  9. Remember to remove these applications after your computer is back to normal or else they will nag you to buy them. With Malware Bytes there another Gotcha if you dont pay careful attention on the install. Typically hitting next next without paying attention will install the "Premium" version for its trial. In this circumstance, if you have already an existing Antivirus and both are running your computer will slow to an absolute crawl.

  10. Alternately you could uninstall your old antivirus and purchase the product that saved your bacon. Or contact us and go onto our managed anti-virus solution.

  11. In some cases scanners will find issues but are unable to deal with the problem or put the file into quarantine. This is where you will need to do a bit of googling to find out how to manually remove the virus and its debri.

  12. Sometimes these manual removal methods require registry edits and other things that only trained IT specialists should perform. After all - That is why we are here. Alternately if you live out of our area please goto Computer Troubleshooters and find the office nearest you.

Last updated 12/01/2022
#virusremoval | #computerrepair | #itservices | #itsupport | #techsupport

What is the best antivirus?
Often when us “computer people” are out working or talking with customers, networking, at social events, or even at a family BBQ some-one invariably will ask. What is the best antivirus?

My answer usually "depends" on the circumstances of the person I'm chatting with.

Home Users:
If the person asking is a DIY type and not liable to use CT Business Solutions for ongoing IT support and services then I simply tell them to look at an independent testing organisation such as Virus Bulletin and select one of the top 5 products that has been consistently listed with a VB100 (see explanation below) in each of the last 4 or 5 tests. Consistency being the key. I tell them to avoid magazines or online magazine articles that generally turn up at the top of a Google or Bing search, as those generally are just there to support a paid advertiser who actually has absolutely no interest in providing independent advice. Also be wary of the "big name" products typically sold in chain stores. They may well be technically good at malware detection but as a general rule, they tend to slow your computer down to a crawl. The kids selling this stuff in said chain store have no knowledge of working with 1000's of business customers in busy offices. Nobody buys a computer just so they can watch their Anti-Virus startup and then slow down their daily tasks.

Business Customers:
If the person is a customer of ours or a prospective client, then I just tell them to trust our 20 years experience and use our managed Antivirus service. Depending on your circumstances and budget we will use a product such as Sophos with Intercept-x or Bitdefender.

We offer monitored Anti-Virus services as part of our Total Protection Plan. At the budget end of this plan, we use Bitdefender to achieve this purpose. Bitdefender is light on computer resource and has excellent detection rates. The Sophos product is also light on resource and with the added value of intercept-x, plus integration with the Sophos firewall, we can offer supreme levels of synchronized security and protection.

Links to Great Anti-Virus Products:


Explanation of the VB100
The VB100 is awarded to products that detect all virus samples with no false positives.

Last updated 30/04/2022
#antivirus | #bestantivirus | #cyberattack | #cybersecurity | #sophos | #bitdefender

I'm in Business - Do I need a Business Grade Router/Firewall or will the Modem supplied by my Telco suffice?
Yes you do need a business grade router or firewall.

A lot of people are of the opinion that the only difference between business class routers and the routers for your home and the ones for your business is the price. Unfortunately for most, this is very incorrect.
Beyond the obvious of specifications like memory and processor speeds, the software inside the business grade device is usually more robust, secure and offers more protections for business data and content. Functions such as VPN hosting, support for static public IP addresses, access point to cloud services, WiFi and VLans all come to mind as being valuable to the small business.

For those hosting their business or employees in their home, VLANS can be one of the most important options in a router. VLANS allow for the network on the property to be segregated into separate networks. For the home office environment, this allows for the business network to be separate from the network that the kids use for streaming movies, accessing social media, and other activities that put the business data at risk.

A lot of the routers supplied with your internet connection by the Telco's are the cheapest that they can find (after all they do supply them as "free") and simply don't have the cyber security capabilities that a business needs. In fact the author would go as far as to say that they are about as effective as an "ashtray on a motorbike" or a "chocolate teapot" in terms of providing security for your business.

Proper business grade routers are not that expensive either. Talk with us and we can give you a guide as to what is suitable for your business operations.

Last updated 12/01/2022
#router | #vpn | #cybersecurity | #firewall | #sophos | #mikrotik | #cyber | #cybercrime
Computer Problems
Do you fix home computers?
No, we don't. We are not a 'break fix' computer shop who do quick repairs to domestic computers. In the case of work from home employees its a little different as we provide the ongoing needed support to our business customers to keep them running at optimal efficiency.

Last updated 12/01/2022:
Do you fix Windows XP or Windows 7 machines?
We do know that there are still companies that have XP and Windows 7 machines running due to software needs or peripherals that only work with these systems, so for these customers we do offer a limited service to support them. If you are simply running XP or Windows7 to save money, then you probably aren't. With a modern, fast pc running Windows 10 or 11 your business will see an improvement in efficiency and a massive increase in security. We are not in the business to simply sell people 'boxes' but an old computer is like a blunt worn out saw, it needs to be replaced literally for one that will cut things better.

- we cant protect you from viruses and zero day exploits.
- We can offer you "extended" 1 year Microsoft support licenses for Windows 7, but its almost cheaper just to get another PC.
- If you are using equipment that is more than 5 years old then you are setting yourself up for a hardware failure anyway.

Windows 11 was first released October 2021
Windows 10 was first released July 2015
Windows 8 was first released in August 2012 but it was an unmitigated disaster and we wouldn't let our business customers use it.
Windows 7 was first released in July 2009
Windows Vista was first released in January 2007 but it was an unmitigated disaster and we wouldn't let our business customers use it.
Windows XP was first released in November 1985

Last updated 12/01/2022:
#windows | #windowsvista | #windowsxp | #windows7 | #cyber | #cybersecurity
Do you fix Tablets?
As the technology used in business grows we have adapted our services to include all systems a company might be using in their offices. This includes computers, peripherals, printers, tablets, phone systems and any number of other integrated items.
Can you visit my office to fix my computer?
Yes, we have a team of qualified technicians who visit customers to fix and maintain their computer systems. Often, we can 'remote in' to computers to fix them both more quickly than waiting for a site visit and at an often lower cost.
Do you fix printers?
1) For smaller "non managed" printers.
We do offer a service to reinstall the software that makes printers work and in some cases we can fix the physical machines. However, in most cases the printer will need to be returned to the manufacturers repair center to ensure it is fixed effectively. We can coordinate this for you, helping to reinstall the printer when it is returned.

2) For customers using our managed print service.
Generally this applies to the larger business grade Konica Minolta and Brother printers. Maintenance and Repairs are all covered as part of the monthly contract, and generally a technician will attend your site to effect the repair.
Why wont my computer work?
This might seem like a dumb question, but we do get people who call us up and without giving us any further information ask us why their computer isn't working. When you do call us up we will ask you a series of questions that will help us to better understand the situation, similar to going to a doctor for a pain in your side. Once we understand the situation we will be better poised to offer help and advice.
VOIP Questions
What is a VOIP Phone System?
VOIP phone systems use the internet instead of the old style copper phone lines to make and receive calls. VOIP stands for Voice Over Internet Protocol.

One of the main benefits of a VOIP phone system is that it can be used with just about any internet connected device, such as a computer, laptop, tablet, or smartphone. This means that you can make and receive calls from anywhere as long as you have an internet connection.

Another benefit of a VOIP phone system is that it can often be less expensive than a traditional phone system. This is because you don't need to pay for expensive phone lines or equipment. Instead, you can just use your internet connection to make and receive calls.

Overall, a VOIP phone system is a very flexible and cost-effective way to make and receive phone calls using the internet. It can be used by businesses and individuals alike, and it offers many benefits compared to traditional phone systems.

In New Zealand the traditional landlines were introduced starting in 1880 to Auckland and then rolled out to most of the rest of the country by 1890. Chorus (as managers of that old system) have now stated that when this landline infrastructure fails in any given area, and broadband internet is available in that problem area, then they will not "fix" the old copper based infrastructure, because people can easily use VOIP.
What are the Disadvantages of VOIP
VOIP Phone Systems rely on a stable internet connection.
- If your internet connection is poor then you will suffer issues of call quality.
- If your internet is down then you will not be able to make or receive VOIP calls.

Note: We do have a work-around for a 2nd 4G/5G internet connection that fails over if your fibre internet connection ever goes down. Please talk to us about our failover internet system.

Last Updated:
What are the three Types of VOIP Services
Home VOIP: This service allows individuals to make and receive phone calls using their internet connection. Home VOIP services typically include features such as caller ID, voicemail, and call forwarding, and they can be used with a variety of devices such as computers, laptops, tablets and smartphones.

Business VOIP: Business VOIP services are designed for use in office environments. They typically offer the above features plus advanced features such as video conferencing, virtual meetings, call routing, and call recording, and they can be used with a variety of phone equipment such as desk phones, conference phones, soft phones and headsets.

Mobile VOIP: Mobile VOIP services allow individuals to make and receive phone calls using their smartphone or other mobile device. Mobile VOIP services typically use a special app that is installed on the device, and offer features such as call forwarding and voicemail. Mobile VOIP services can be used over a cellular data connection or a Wi-Fi connection, the latter saving on expensive cellular charges.