03 443 5499

What is monitoring?

Monitoring is the practice of routinely monitoring all the components within an organization’s network to track, measure, and troubleshoot performance issues, failures, or deficiencies.

The advantage of automated monitoring software is that it speeds up the very time-consuming areas of network monitoring. These tools help uncover what might be overlooked with manual network monitoring.

Network monitoring continues to be crucial for businesses in order to be productive and avoid serious threats from network failures and server downtime. 

Why monitor your network?

  • To optimize network performance
  • Eliminate the need for manual checks
  • Take a proactive approach to staying on top of any potential issues.
  • Diagnose issues
  • Report issues

Some of the most common performance issues include:

  • Poor network visibility: If you do not have the right monitoring abilitiesyour system can malfunction for hours before you are aware of what’s happening.
  • New additions to your system: If new devices are not installed and configure correctly, this can cause complications.
  • Reactive monitoring:To keep your network running well, you need to anticipate issues and be proactive.

How should I monitor?

When establishing your monitoring practices, you need to consider which reports you use as measurements. These are some common ones:

  • Bandwidth usage:The maximum rate your system can transmit data. If you reach critical levels of bandwidth usage, your system will be overloaded and impaired.
  • Connectivity:You need to monitor this metric to identify issues such as a broken connection or malware.
  • Availability:  If your system routinely experiences downtime, or periods when your network is not available, your productivity and profits can be impacted.
  • Packet loss: This metric measures how many data packets are “dropped” during your network’s data transmissions. The more data packets lost, the longer it takes to fulfill data requests. Monitoring this metric allows your IT professionals to improve your network’s processing speed.

Failure to monitor your network will cost you lost time and profits. Your IT Alliance member will establish a comprehensive monitoring program to meet the many challenges that your system faces. At a minimum, your monitoring program should employ the following steps:

·         Install Sophisticated Monitoring Tools

·         Monitor Incoming Traffic

·         Universal Remote Device Monitoring

·         Real-time Network Performance Monitoring

·         Track Video and Voice Performance

·         Automation

In Summary:

There are many involved reports that can be automatically generated by the monitoring software. The good thing about having all of this done automatically by your IT Alliance member is that anything outside of the parameters of normal will (mostly) be flagged immediately, and automatically fixed.

Failure to monitor in this modern way of working with remote users now becoming an everyday occurrence could cost your company in downtime as well as many other issues.

Contact us if you need any help with this.

A data breach involves any unauthorized access to confidential, sensitive, or protected information, and it can happen to anyone.

Internationally well known companies such as Apple, Meta, Twitter, and Samsung have all disclosed cybersecurity attacks this year.

In the most recent quarter, CERT NZ responded to 2,001 incident reports about individuals and businesses from all over New Zealand.

In New Zealand Phishing and credential harvesting remains the most reported incident category (from CertNZ).

This graph shows the breakdown by incident category for the past quarter in New Zealand.

Australian telecoms company Optus – which has 9.7 million subscribers, suffered a “massive” data breach this year. According to reports, names, dates of birth, phone numbers, and email addresses may have been exposed, while a group of customers may have also had their physical addresses and documents like driving licenses and passport numbers accessed.

IBM found the cost of a breach hit a record high this year, at nearly $4.4 million.

So how does a data breach happen?

Data breaches happen mainly when hackers can exploit user behaviour or technology vulnerabilities.

The threat surface continues to grow exponentially. We are increasingly reliant on digital tools such as smartphones and laptops. With the Internet of Things (IoT), we’re adding even more endpoints that unauthorized users can access.

Popular methods for executing malicious data breaches include:

  • Phishing – emails in which hackers persuade users to hand over access credentials or the data itself.
  • Brute-force attacks – hackers use software and sometimes even hijacked devices to guess password combinations until they get in.
  • Malware – infects the operating system, software, or hardware (often without the user knowing) and steals private data.
  • Disgruntled employees or political hacktivists can also be behind data breaches. However, more often than you would hope, the breach is due to poor cyber hygiene.

How to reduce risk to your business:

Here are some key tips for mitigating risks to your business. If you require help with these, please reach out.

  • Identify what is exposed to the internet: to help mitigate this risk, it’s important to identify what is being exposed to the internet. Your IT Alliance member can help you do this. You can also use scanning tools like Nmap and Nessus to help assess your situation.
  • Only expose what you really need to: Reducing the number of services you use lowers the number of targets that attackers have access to. This is known as reducing your attack surface.
  • Segment your network to stop – internet-exposed services from reaching your internal network. If your more vulnerable services get compromised, a segmented network will make it harder for attackers to reach other devices.
  • Patch services and devices exposed on the internet. Having the latest version will fix many of the vulnerabilities known to the vendor, and that means attackers have fewer known vulnerabilities they can use to gain access.
  • Turn on multi-factor authentication (MFA) to add an extra layer of security and help prevent unauthorized access.
  • Use logging and alerting to help monitor devices and services, especially any that may be exposed on the internet. These are potential weak points that attackers may target. This can help notify you of an incident and provide details of what has happened.

Don’t risk data breach damage

Data breaches cause business downtime and can cost your reputation and bottom line. Once you’ve had a data breach and it has been made public, your customers may lose faith in your ability to protect their private information.

A managed services provider can install protection and take precautions against data breaches. Contact our team here to discuss this further.

Nothing is more true than the fact that IT moves quickly these days! 

Part of keeping up with IT, and the rapid changes is making sure that your business has the right equipment to do the task. 

In this article we will be providing a few ideas for how to make a plan/budget for new or replacement equipment, as well as offering you some information on leasing.  

Firstly budgeting for IT hardware

Most businesses will have a budget for IT hardware and other goods and services that they need to operate. 

Our advice is that if you have more than a handful of computers, you will benefit from forecasting and budgeting for IT expenditure. 

Once your business is established, there is a very good chance that you will need to replace your IT equipment every few years. Such a good chance, in fact, that you can plan on it! 

Drawing up an IT replacement schedule helps you plan well in advance, and helps ensure you have the funds when you need them.

This can be done in conjunction with our team here at IT Centre. If you don’t have a list already, we can assist you to do an audit of the IT equipment that you have, the date it was installed, and therefore when it is likely to need replacing based on its expected life. 

This asset management plan needs to be revised every year for budgeting purposes.

We strongly suggest that you do this years in advance of when you actually require upgrades. It’s not hard to do. 

This list can help you have a clear and actionable plan on existing equipment, when warranties expire, and the requirements for a staggered plan for new hardware. 

A look at leasing

Whilst many of our clients purchase outright as the overall cost is lower, leasing can be a good option for when you are starting out, if your business is expanding rapidly, or if cash flow is wrapped up in other parts of the business. 

Leasing turns capital expenditure which has to be depreciated, into a monthly payment that is immediately expensed. It can also be an advantage in keeping assets off your balance sheet – speak with your accountant or advisor about this.

Obviously the disadvantage of leasing is that you are using someone else’s money and so they will need to charge you for that, as well as for their efforts! You could arrange your own finance and purchase, instead of leasing, in which case it pays to do your research on interest rates. 

Upgrading your technology for modernisation and expansion and to get more reliable up-to-date technology is very important, as using outdated technology can cost money and time. Sometimes it is a case of weighing up your options here. 

Using leasing options, your business may be able to move forward more quickly then it otherwise may have been able to, financed in a way that suits your budget or cash flow. 

Whilst leasing is more costly than buying in the long run, one of the advantages is that you can establish predictable payment structures aligned to your needs, taking the stress out of an upfront payment. 

This all means that you can get the technology you need with the budget you have today by utilizing IT leasing arrangements.

“When I became self-employed 20 years ago, I got my first laptop and setup via Flexirent, as it meant I didn’t need to spend the cash and then have the asset/depreciation. Instead, I kept the cash, and the entire cost was a relatively small monthly expense. So, sometimes, especially for new start-ups, it means you can save your cash for something you do need, or as a reserve. For more mature companies, taking a lease for gear, means that the cash can stay with you, which can help with liquidity.” Comment from ITA member.

Leasing options: 

These are just a few of the leasing options that some of our clients use. This is by no means conclusive, and we are not aligned with any of these companies. All of our advice is simply that, advice. Please make sure you do your own thorough research on this subject.  Never before has the saying ‘read the small print’ been more applicable. We strongly advise that you speak with your financial advisor and or accountant about this. 

Feefunders
From Fee Funders website: Your business receives 100% of the customer invoice paid upfront, whilst your customers enjoy the flexibility of monthly installments. Fee Funders manages the monthly customer’s payments by direct debit over three, six, nine or twelve months . Your business achieves upfront cash flow at no cost. Your clients pay a basic interest rate to achieve a spread of their outgoings. It’s like outsourcing a spread payment option for free!A simple, hassle free approach to funding for your business and your clients.Your business has the money in the bank within three working days of the customers first direct debit, giving enhanced cash flow with no debtor management distractions. Staff can remain focused on core business activities.
Flexicommercial
Flexicommercial offers your business flexible equipment finance solutions. The credit criteria for finance varies depending on whether you are an existing or new business and the required amount of finance.Choose the equipment you need.Choose the type of lease that best suits your needs.Select the payment term to best suit your budget.Apply over the phone or through your supplier in store.Sign and return the paperwork for approval

Of course these are just suggestions and all leasing arrangements should be thoroughly considered before being entered into. 

Hint – Leasing companies will usually be quite happy to include IT engineer setup costs in the value of the lease. For larger or more complicated systems, this can be quite a substantial part of the project costs. This means you can also expense those costs as well.

In summary 

We can help you to do an audit of your current equipment, and make a plan for future expenditure.

Something that makes this type of IT cash-flow of forecasting easier, is if you are on an  MSP (managed service provider)plan. Being on a Managed Service agreement removes many of the fluctuations of IT budgeting as generally you pay a fixed monthly fee for IT support. 

Please feel free to reach out to our team at the IT Centre to discuss this further. 

Passwords made simple!

Let’s be honest. Remembering passwords on top of the million other things to do in any given day is a lot.  Are your team’s passwords fairly similar across multiple online accounts? It’s okay, you are not the only business.

Most people reuse their passwords over many different applications, and have one or two passwords only.  With the increased need for security, however, there are now much better ways to protect your accounts and provide additional layers of security.

Nowadays almost all online services, banks, social media, shopping have added a way for your accounts to be more secure.

Here we help you to understand MFA and 2FA plus introduce you to LastPass to manage your passwords.

What is MFA and 2FA?

Maybe you’ve heard of the term MFA or 2FA and are slightly confused. Let us help you break what this is and why you need it.

MFA = Multifactor authentication

2FA = Two factor authentication

In the old days!

In the old way of doing things you signed in to your online accounts in a process called ‘authentication’. That included a basic login and password. For example

  • Login = Matt@olddays.co.nz
  • Password = Matts dog or Matts birthday (something that Matt could remember easily and something that Matt used across all of his accounts)

Multifactor Authentication (MFA), however, works by adding additional layers of security to your online accounts.

This provides a “second” thing – what we call a second “factor” – to prove who you are.

Yes, the first layer remains as your username and password, however now you can add another layer of protection. For example:

  • An additional password, or a PIN.
  • A code accessible through your smartphone, or a secure USB key.
  • A fingerprint, or facial recognition.

How does MFA work?

What this additional level of protection does is helps to ensure that you are who you say you are when logging into your online account.

So even if someone gets your user name and password, and logs in with your credentials, they will be stopped!

You will get an immediate notification on your phone to indicate that someone is trying to login to your account.

You can then decline the authorisation, locking them out. This also tells you that your password has been guessed, so you know to change your password.

How do I get MFA?

Many of your current apps will have an MFA feature that you can turn on. For other things like email, you can enable MFA.

This may mean talking to your ITA provider so that we can assist you to help turn on your Microsoft 365 MFA feature.

Once it is turned on, you and your team will need to use MFA before you can next access you emails/Teams and other applications.

Make sure that everyone is ready for this and knows what to do. It isn’t hard, but like with all changes, its best to ensure that you have support from the rollout.

What about Passwords?

1.Can I re-use Passwords?

Reusing the same passwords across multiple accounts is not a safe idea as it creates an opportunity for credential stuffing attacks.  A credential stuffing attack is one where leaked credentials from one site/service are used on another site/service to see if they work.  It would be like using the same key for your car and your house.

For example, if you use the same password on your online bank account and Facebook, an attacker can easily breach both of your accounts even though you may not have reused the same password on your email account.  This potential harm this practice can cause may be a monetary loss, data loss or loss of sensitive personal details.

Here at the ITA we recommend that you update your password after every three months, unless you have been the victim of a cyber-attack, then you should change your password immediately. This ensures that if your credentials are breached, then they are not able to immediately breach other accounts also.

2. How strong is my password?

Password strength is a big topic of discussion.  You know the drill, you must use lower and uppercase letters, use numbers, use special characters, make sure it is long.  But even after all this effort, your password can still be weak!

You can test your passwords out before you use them at https://www.passwordmonster.com/ or https://password.kaspersky.com/. This information gives you feedback about the strength of your password, which should help you to strengthen your password choices:

(Note:  Your password is not collected or stored at either of these websites.  They are well known secure sources of information that you can trust)

3. Should I use a Password Manager like LastPass?

Yes, it is definitely best practice to use a Password Manager.

Password Managers allows you to keep track of your passwords without having to remember them.

The advantages of a password manager are:

  • A password manager can generate for you long, complex, unique passwords across different sites and services
  • A password manager reduces the need to remember your passwords
  • A password manager is good at spotting fake websites, so they can alert you to a potential phishing attack
  • A password manager can generate new passwords whenever you need to update your credentials
  • A password manager can sync your passwords across all your devices, so you’ll have them with you regardless of what device you are using to login.
  • A good quality password manager is a safe, trustworthy and highly recommended security tool.  Known trustworthy tools such as LastPass can be trusted to protect your account logins.

LastPass is a free or paid personal password manager for an individual, however, if you want to protect your business, you need LastPass Business.  We can help you specifically with this.

In conclusion:

Having MFA or 2FA is an essential these days, and so is having decent and unique passwords. For practical reasons you need to have a business password solution in place to ensure your team are password secure.

Here at the IT Centre, we can help you to simplify this process, and provide you with support to easily and effortlessly apply these tips. If you would like to discuss your specific needs, please feel free to reach out to us here.

How a Managed Service provider can help your business

In IT we love to use fancy jargon, and Managed Service provider or MSP is no exception.

In this article we will break down what an MSP is, how it can help your business, and use some real-life examples of businesses, like you, who have made the switch to an MSP.

Firstly, what is a Managed Service Provider???

In a nutshell an MSP is your ‘outsourced IT Dept’ that provides proactive IT support. An MSP provides preventative measures, detecting most issues long before they become a problem.

The mission of an MSP is to protect your business from costly downtime and ensure that business continues seamlessly.

What is the break-fix model of IT support?

In contrast the ‘break-fix’ model of IT support is when you call an IT company when something breaks, and they come and fix it, on an adhoc pay by hour model. There is no ongoing support or preventative security measures taken. This is a bit like the ambulance at the bottom of the hill.  

Top advantages of an MSP for your business:

We become an IT partner to your business: As an MSP we are interested in understanding your entire business. We see ourselves as a business partner who wants to help your business to succeed and grow. This is quite different from the ‘break-fix’ model. We anticipate a long-term working relationship with your business.  

Proactive IT Support: As an MSP, our mission is to keep your business technology safe and available, and to anticipate your needs and requirements. This means minimum costly down time, and maximum business continuity.

Knowledge of your needs: As we have a long-term relationship with your business, we become closely acquainted with your IT systems, and your personnel. Because of this we understand how the parts make up the whole, rather than just offering a quick short-term solution, which may be costly in the future.

Cost savings: By outsourcing your IT management to us, you get a well-informed IT department on your team, without the cost and responsibility of training, recruiting, and retaining staff.

Case-Study

“An IT Alliance member had a company who was reaching out to them on a ‘break-fix’ basis. During Covid the IT Alliance member reached out to them to discuss becoming their MSP. They sat down and discussed what this actually meant, the services that the MSP offers, and the priority that is given to MSP clients. The client has been using them as an MSP for over two years now, and happily sings their praises, saying that having an MSP has revolutionized their business. No more waiting for IT support, no more downtime and so much more alignment”

So, what does an MSP actually do?

Remote Monitoring: An MSP proactively monitors, patches, and updates your software on an ongoing basis with 24/7 monitoring. This is all done in the background on an ongoing basis and requires no input from you.

Security: As an MSP we constantly review your systems to identify and address vulnerabilities. We can keep up with system updates, software patching, antivirus and more. It would be difficult for any business to keep up to date with all the daily security alerts. With an MSP this is all taken care of and is one less thing to worry about, so you can focus on your business.

Optimising hardware: An MSP provides information on optimal hardware that synchronises across your business. This includes laptops, desktops, and mobile devices, plus your network and servers.  We can work with you to understand your growth requirements and work on the best timeline for your budget.

Strategic advice: As IT is our passion, we hear about a myriad of tools that may be of benefit for business goals. We share this advice with you, rather than you having to research or find out how you can optimise technology for your needs.

Regular reviews: As an MSP client, you are a priority which means that we schedule in regular proactive reviews. No more waiting on the phone to talk to someone to get IT support.

Business Continuity and disaster-recovery strategy: Nowadays it is crucial that you have a solid data-backup plan. We can help you with this process and ensure that everything can be efficiently restored should the need arise.

So what do I do now?

So now you have an overview of what an MSP is, and how they can help your business. The next step is talking to the team at IT Centre about your specific needs. Please feel free to reach out here for further advice. 

A number of our clients have been asking us about Microsoft 11. “Should I upgrade?” “Should I wait?”. It’s new and everyone wants the latest and greatest right.

In this case, however, it may be best to WAIT

With most upgrades, updates are something to install as a matter of course. The manufacturer, after all, is delivering new efficiencies, improved processes, and increased security, so why wouldn’t you?

Well with Windows 11 it’s not quite that simple:

First of all, Windows 11 has been called “the biggest update we’ve seen to Microsoft PC software in more than half a decade.”

Why you don’t need to rush this upgrade:

  • Windows 11 is still in its early days and upgrading to it now may cause more problems than anything.
  • The feedback we are getting from our industry is that Windows 11 has a number of bugs, and has very limited support for other applications and devices.
  • There also seems to be some issues with both software and hardware, such as printers, not being compatible.

Most importantly, Microsoft has said it will support Windows 10 until October 14, 2025, so there is no need to rush any decision.

  • Microsoft typically keeps a ten-year lifespan for its products which means that there is no rush to upgrade.
  • Windows 11 is not an essential upgrade, so there is no need to do anything right now.
  • One of the advantages of waiting is that you will come after the initial launch issues and bugs.
  • Yes, the software has been available in beta since June 2021, however, as more users get access, you can expect more updates on the horizon.

A sneak peek of what can you expect from Windows 11:

Windows 11 is a redesigned operating system aiming at improved user navigation. Expect:

  • A more Mac-like experience
  • Integration with Android apps
  • A facelift for Microsoft Teams
  • Streamlined switching from monitor to laptop
  • Direct access to widgets from the Taskbar
  • A few gaming performance enhancements

If you do decide to go ahead here are some things you need to know….

  •  The upgrade is rolling out gradually. Those who recently purchased a new laptop before Windows 11 was pre-installed have access now.
  • If you are an existing Windows 10 user, you’ll see the Windows 11 upgrade sometime between now and mid-2022. Most users will go to Settings > Update & Security > Windows Update and click Check for Updates. If available, you’ll see a Feature update to Windows 11. Click Download and install.
  • Remember to backup all your important documents before starting the installation process!
  • Also, don’t fall for any fake versions of Windows 11. Wait to receive an official notification of a systems update.
  • Do NOT click on links promising the software on social media or via email. You could end up downloading malware.

Other tips:

If you are in the market for a new laptop, make sure you’re getting one with Windows 11 pre-installed. That way, you’ll be sure to get one that will be able to run the new operating system without hassle.

Your IT specialist may have already suppressed some of the reminder notices for you, so that you don’t get asked to upgrade all of the time. However, they can’t stop them all.

If you see the official Microsoft screens saying ‘click here to install Windows 11’ our suggestion is to not do anything and just wait. It might be a good idea to also inform your team to do the same.

Conclusion:

One thing to be mindful of is that if you do go ahead and install Windows 11, any problems you encounter may not be covered by your IT specialist under your current plan.

However, if you are sitting at your computer reading this and are still using Windows 7 and Windows 8, its definitely time for an upgrade to at least Windows 10. Windows 7 and 8 are no longer supported by the manufacturer and without support or security updates, these systems are vulnerable to malware attacks.

In conclusion the best thing to do is to talk to IT Centre about this upgrade to Windows 11 to see when and if it is right for you. For now, you won’t be disadvantaged by doing nothing, so you can just relax, take a breath, and contact us here

How Microsoft 365 Exchange has revolutionized and simplified communications for a Kapiti Kitchen company.

Meet Orchard Joinery

Meet Orchard Joinery. A family-owned business from the Kapiti Coast, that has crafted bespoke kitchens, bathrooms, windows, doors, stairs and furniture for over 20 years! Whilst they really know their stuff, they were struggling with their customer communications, much of which is by email these days.

Inefficient Email

All the company emails had been set up to come into one email address, leading to missed communication and some unhappy potential customers. The office manager had to check through emails every day to make sure that all communications had been addressed. What a headache!

Aiming for Change

Orchard Joinery contacted their local IT Alliance member for a free consultation. Together they worked out a solution using 365’s business grade email facility – Exchange Online. Ideally, they were after a way to split and redirect emails to the correct staff to ensure efficient and correct action and response. 

They did this by outlining a list of new addresses that were needed. Next, the IT Alliance member set up Microsoft 365, new email addresses, and when they were all ready, they switched emails across to the new system. They then onboarded staff onsite, so they felt supported and knew what to do from day one. The email system now has custom access settings, and the Manager can see everything if they need to.

The End Result

The end result was a much clearer process for customers and staff alike. Orchard Joinery now has an easy-to-use mail system with access across all accounts. There is clear allocation of emails and tasks and there is one incredibly happy office manager who no longer has to sift through screeds of emails to find the correct recipient!

“Very happy with the result, and with the changeover process. The IT Alliance member made this easy and was on call to help with any adjustments promptly. Particularly impressed with the ability of the staff to translate difficult IT related information into easy-to-understand applications.” – David, Orchard Joinery

This is just a simple case study involving email, but there is so much more that can be done to improve your internal and external communication and efficiency.  

If you are ready to empower your business with Microsoft Products like these, you can join us at our upcoming FREE event through the EMPOWER series. Click here to register.

More then just that flashing box, lighting up like a disco in the corner of the room, routers play a particularly important role in keeping your business safe, and your data secure, as well as creating efficient, and safe remote working conditions.

Here we look at the role of the router, and what you can do to ensure you have the right one for your business.

Think of your router like an important Traffic Officer only allowing approved content in and out of your business.

The difference between an entry level router and a higher quality router, provided by IT Centre is a lot. Sometimes it pays to think outside the box, and not just take the router provided for free in the box.

Top reasons why you need a good quality Router:

  • Determines the speed with which your internet will work.
  • Speed determines the productively of remote workers.
  • A good quality router means that multiple people can work remotely at once.
  • Ensures you can connect to the office remotely.
  • Controls what sites are allowed to be accessed during work hours.
  • Allowing access to other content to protect data loss from staff.
  • Adding additional security features from software such as intrusion protection.
  • Prevention from attacks like denial-of-service attack, designed to cripple your router, or make it just give up and let hackers in.
  • Keeps your business safe from Cyber-attacks
  • Ensures that accidental clicks from staff on content does not cause a security issue.

Security and Routers:

 When it comes to security, it is a good idea to take preventative measures. This is where the best secure routers come in. A router with built-in security controls and services that monitor your network around the clock is going to save you a lot of potential headaches. With your router protecting your area of coverage, your devices and your network safe.

SECURITY TIP

“You must always change the factory default password for the router and ensure that the firewall and other security features are in fact enabled”.

Ever been confused by the codes that come up when you go to log in to your network?

WPA2 and AES are the best settings to secure your Wi-Fi from hackers. Remember that if a hacker is able to breach your network, they could steal important information, like bank details, or even your identity.

We strongly suggest against using an open network. An open network means you won’t have a password, so anyone can have access to your Wi-Fi and all of your devices.

Make sure to apply WPA2 to your router for improved protection of your online information.

In Conclusion:

Routers can be complex and can create harmony or havoc depending on the route you choose to follow. Buying a router with the highest security is crucial to protect your network.

Remote working conditions are the new normal, which means that many of us may need to upgrade our home routers too.

By speaking to The IT Centre, you could find quick connectivity and security gains with an upgraded router.

To save time and money and to make sure that you have done all that you can to make your business feel free to reach out to us here.

With the increased need for security, and rising Cyber Security threats, it is imperative that all businesses have a strong password management system.

80% of data breaches are caused by weak, reused or stolen passwords

A password management system is able to store encrypted passwords online making digital security accessible and simple for businesses to manage the passwords for all employees.

In today’s world, most businesses have dozens or even hundreds of passwords for different employees with different accounts, profiles, and applications.

#1. Generate secure, fool-proof passwords

With 80% of all data breaches happening because of weak passwords, having a password management system is crucial.

If you want to ensure your data safety, you must use complex passwords that include a combination of letters, numbers, symbols, and uppercase/lowercase.

A password management system will automatically generate fool-proof passwords based on your specification. This ensures you always create extremely secure passwords, thus avoiding hacks.

This also prevents your employees using generic and basic passwords such as their dogs name, or date of birth, and lets the password management system create a unique password that has all of the factors required for high security, including symbols, upper and lower case, numbers.

Let’s face it, it is much harder to hack KiUR&*!RTQ then it is Snoopy1222!

#2. Eliminate employee password reuse:

With a password management system, passwords are automatically updated and renewed. This ensures employees practice good password hygiene.

#3. Manage passwords from one place:

There is nothing worse than trying to keep tabs on every employee’s passwords. When a staff member is on leave, the last thing you want to do is try and find the post-it note they left with the login details.

Similarly, if a disgruntled employee leaves and takes their passwords, this can create an unnecessary headache.

With a password management system, you can easily give every user their own personalized vault, while maintaining oversight of all passwords with an admin dashboard.

#4. Protect your sensitive data:

Keep everyone’s credentials, notes, and information safe using the password management system.

#5. Admin functions make managing passwords a breeze:

Have multiple employees working on a particular app? No problem. With a good password management system, you can securely share credentials where employees and clients require access and organize shared credentials by Groups.

Admin functions may include (depending on the system you use):

  • Instantly add and remove team members.
  • Safely share passwords with others.
  • Give each employee their own vault for safeguarding passwords.
  • Store digital records: WiFi logins, software licenses, employee IDs, and more.
  • Set security controls and restrictions based on your team’s needs.

#6. Notification of a data breach

A password management system will constantly monitor all of your email addresses and sends instant alerts whenever it suspects that your data has been compromised. This allows you to act promptly and change all the necessary passwords, thereby preventing your information from being used by hackers and identity thieves.

#7. Multifactor authentication for employees

Another feature available in most password systems is multifactor authentication. This provides a second layer of security to verify the user’s login, usually in the form of fingerprint verification, one-tap mobile notifications, SMS codes, etc. This can be used to ensure the highest levels of security in businesses.

Which password management system is right for you?

There are a number of password management systems available. Finding one that is easy for your team to use, economical and with a long track record is imperative.

To find out more information about which system is right for you, please contact us here

A cheat sheet to help you make the most of your subscription

Written by: Peter Marshall, Voicecom Technologies

If you have Microsoft 365 for business, we want to make sure you’re making the most of it. You’re already paying for the subscription so why not take advantage of a whole suite of integrated applications that can streamline your workflows?

While remote work has been a key driver for Otago businesses to adapt the way they work and assess the systems they use, along the way they’ve realised that these apps not only offer remote capabilities but also the opportunity to integrate apps and business processes to allow them to better serve customers, streamline work, and improve employee productivity.

Four apps you’re paying for but missing out on

Microsoft SharePoint – SharePoint can seem overly complicated because it can offer so much. But it doesn’t need to be so scary. You can start small and use more functionality as needed or as you grow. Basically, it’s a platform that offers content management and collaboration. It helps with reducing duplicate files, gives you remote access (needed more than ever!) and allows you to work on the same document at the same time. Find out more about SharePoint here.

Microsoft Power Automate – Microsoft Power Automate allows you to automate workflows across applications. You can use it to connect email and instant message alerts, synchronise files between applications, copy files from one service to another, collect data from one app and store it in another, and much more. Templates are available to get you started. Efficiency is key for sustained success across businesses and Power Automate assists this by simplifying workflows with the automation of repetitive tasks.

Microsoft Forms – Forms allows you to create shareable surveys, quizzes, and polls in just minutes. You can then invite others to respond to it using almost any web browser or mobile device, see real-time results as they’re submitted, use built-in analytics to evaluate responses, and export results to Excel for analysis.

Microsoft Planner – A simple, visual, task management app that helps remove chaos from the team collaboration environment. You can create multiple task lists associated with different projects or set up daily to-do checklists.

Other apps to take advantage of.

Microsoft Teams – a chat-based workspace that integrates people, content, and tools into a single platform. Find out more about Teams here: https://ita.co.nz/microsoft-teams-more-just-video-conferencing

Microsoft OneDrive – OneDrive is essentially an online folder system for file storage. Similar to SharePoint however SharePoint offers much more in the way of collaboration. You might use OneDrive to save your personal drafts and then move them to SharePoint when you’re ready for collaboration.

Microsoft Lists – Helps you track information, organise your work and easily share with others. Lists are simple, smart, and flexible, so you can stay on top of what matters most to your team. Track issues, assets, routines, contacts, inventory and more.

Microsoft Stream – Your central destination for your business video content. It’s like an internal, secure YouTube for your business. This is the perfect place to keep things like training videos or marketing content for staff to easily access.

Microsoft Sway – Sway is a cloud only story-telling application similar to PowerPoint but provides more narrative options than a slide show.

Microsoft Whiteboard – A digital version of the traditional whiteboard that allows collaboration and brainstorming with your team in an interactive and engaging manner.

Microsoft MyAnalytics – Uses your data to provide insights into two of the key factors in your personal productivity: how you spend your time and who you spend it with. MyAnalytics takes a look at your everyday work patterns, finds areas that could benefit from your attention, and provides you with the tools to achieve more thoughtful use of your time.

Microsoft Power Apps – If your business needs a specific app to do a specific job, this is what PowerApps can do. Using simplified development techniques and with the help of your IT expert, you can create sophisticated applications using features, procedures, and processes found in Microsoft 365.

If you want to find out more about how any of these Microsoft 365 applications can benefit your business, contact us today on +64 3 443 5499. If you’d like to visit or email us, you can find our details here.

How a proactive approach can save you money and mitigate risk
Written by: Phil Strang – Technology Partners

Do you find yourself so caught up in other areas of your business that you tend to only manage your IT when things go wrong or it becomes an absolute must?

This is called reactive IT Management. With it, brings a mountain of stress, disruption and blown budgets.

A proactive approach to IT management doesn’t have to be difficult or expensive. In fact, it can save you money and keep you focused on doing what you do best.

This is where a Managed Service Provider steps in. They’re not just the guy you call in for computer repair, they’re essentially an extension of your team. An MSP is there to support you and ensure the IT side of your business is efficient, cost-effective and low-risk. Let’s look at some of the benefits of proactive IT management and why businesses in Otago might want to move away from a more reactive response.

Preventing blown budgets

Large, unexpected IT bills can often be avoided with a good plan in place. A Managed Service Provider can help prevent the unnecessary cost of fixing things by implementing a plan with regular, scheduled maintenance. Additionally, they can give you the tools to effectively manage your IT life cycle, forecasting hardware and software upgrades. With a fully prepared life cycle, IT budgets can be planned in detail for years to come. Everything from printers to operating systems can be prepared on a tightly controlled schedule. Adopting an IT life cycle is a great way to eliminate unwanted surprises and make the most out of your IT budget.

Productivity / Minimal disruption

There’s nothing worse than when you get halfway through the day and you realise you’ve spent most of it troubleshooting or dealing with an IT issue. Can you imagine how frightening the numbers would be if you calculated the total number of hours lost due to IT-related disruption? A Managed Service Provider’s core purpose is to lessen this disruption and would likely pay for themselves rapidly. An MSP often does routine maintenance outside of hours so when you log in the next morning, you’re good to go! They’re your Clark Kent, unobtrusively making things happen in the background and quickly embracing their capes should anything big arise.

Knowing your business

Something stops working at the worst of times and you find yourself giving an IT technician your full operational history to help you both connect the dots of where things went wrong. Sound familiar? The great thing about an MSP is that they get to know your business, and more importantly, have a detailed documentation process. The team will get to know your business and you’ll often be dealing with the same technicians who know you and your systems. Having an intimate knowledge of your site’s configuration and a detailed service history means they’ll spend less time troubleshooting and more time working on the job. Familiarity when working regularly on a system means clients are not paying for a technician to relearn the basics for each job or call out. As an added bonus, when you partner with an MSP, the charge is often much less than the hourly rate of one-off call outs.

A practical and trusted approach to technology

In the technology space, there are changes and updates left, right and centre, often leaving you overwhelmed. This leads to you either falling behind with your IT services or purchasing things your business may not need. A Managed Service Provider is across all things IT, so you don’t have to be. You have the option to meet on a regular basis to discuss and review appropriate changes or updates that should be considered to your IT infrastructure. They know what’s happening in the industry and can guide you according to your specific needs. They’re not about telling you that all your computers need to be updated with the highest spec and most expensive models. In fact, an MSP will get to know how you operate with an audit and provide you with a plan on where you can best spend and save money. They’re about plans with priorities and delivering a solution according to budget.

If you’d like to find out more about how a Managed Service Provider can help you move from reactive to proactive IT management, contact us today on +64 3 443 5499. If you’d like to visit or email us, you can find our details here.

Local Technology Nationwide

Big-business quality IT for SME’s
By Delia Gill

The IT Alliance are a group of nationwide partners that banded together to offer businesses high-quality, flexible support with a local touch. They are small enough to feel part of your team but backed by a bigger organisation and network of support. It doesn’t matter if you’re located in Otago or on the road across the country, they have the infrastructure set up to ensure you’re covered with all things IT.

Your Local Partner

How great is it that technology allows us to remote in and help clients at the drop of a hat? Although remote support is an excellent tool, sometimes an on-site visit is what you need. After all, it might be a little too much to expect Frank from accounts to troubleshoot why his keyboard isn’t connecting to his docking station, which isn’t connecting to his laptop, which is only connecting to one of his two screens, which seem be missing some cords?…you get the idea!

All of the partners in the IT Alliance pride themselves in providing, fast, high-quality local support. They’re focused on building long-lasting client relationships and working with you to ensure IT is strengthening your business, not obstructing it.

Nationwide Support

As a group of 12 independent IT companies across New Zealand, the IT Alliance work together as a group to deliver products, projects, training and support throughout New Zealand. Regular meetings during the month are held where specialist knowledge is shared among members and then passed onto clients from a local source.

Having partners that can reach the entire country means there are no limitations to servicing your business. Whether you’re travelling and need help, or have staff based around New Zealand, they can provide you with flexibility by supporting you no matter where you are.

Flexible and Responsive

The issue with partnering with a single, large IT company is that you can often get lost in the noise. Partnering with a member from the IT Alliance means you’re getting the benefits of small and local but also the access and knowledge of big and broad. Smaller and local offers agility, with the capability of changing and adopting new technologies at a faster pace, bypassing lengthy procedure. Additionally, you’re not paying a premium to support a single large organisation that has substantial overheads to cover.

Collaborative Knowledge

A collaborative approach is critical with the fast-paced nature of the IT space. The IT Alliance team are backed with a wealth of knowledge and varying specialties. This means they each bring something unique to the table and can share the most important information with each other rather than wading through the sea of updates and changes the industry consistently presents. The core purpose of the partners coming together frequently is to brainstorm, explore all points of view, share experiences, stretch perspectives and challenge the way things are down. All with the objective to ensure the best possible IT solutions are offered to their customers.

If you’d like to find out more about how the IT Alliance works or can help your business, contact us today on +64 3 443 5499. If you’d like to visit or email us, you can find our details here.