How To / What Is

Major WIFI security upgrade, are you ready?

Let's take a moment and talk about some upcoming changes to the WiFi standards, these changes will bring massive security enhancements – However there’s a couple of things you need to be aware of. Over the years, we have seen WiFi overtake wired networks as the preferred and simplest way to connect devices: Enterprises are using WiFi to connect staff and devices to corporate networks. Retailers using it for POS and tracking of stock movements in warehouses. Public “Free WiFi” [...]

ICTAA Level 3 Accreditation: Business Continuity

Business Continuity Accreditation is for the forward-thinking business who won't tolerate ICT outages and disruptions, this level will pull together various automated redundancies focused on increasing system availability so staff can operate without interruptions, we also will explore disaster recovery techniques and ICT security. As a forward-thinking business, you will develop ICT lifecycles that will help to navigate your future ICT requirements and this also works to ensure your ICT evolutions is heading in the desired direction. Some of the items [...]

ICTAA Level 2 Accreditation: Business Intelligence

Business Intelligence Accreditation is for the business who is focused on leveraging their ICT ecosystem to gain the greatest efficiencies, this level helps you to further streamline your procedures and reduce the unnecessary IT annoyances for example, we will explore your email systems and implement Spam mitigation and other security strengthening. We will also take a deeper look at your IT systems and discover ways to reduce outages and time to recover from disasters. Some of the items we cover [...]

ICTAA Level 1 Accreditation: Business Awareness

Business Awareness Accreditation is for the business who wants to get a snapshot of their current ICT ecosystem and establish solid ICT management frameworks within their business, we cover basic processes and various IT components, this incorporates documenting your assets and building up repositories of critical information. We also explore basic processes in your business for example, we will explore your data backup procedures and ensure that you have adequate protections in place to backup and protect your business data. Some [...]

Add some Automation with Automate

Automate – The Hitchhiker’s IT Guide for Solo-preneurs and Start-ups. We have added a new digital download to our store, Automate. Automate is practical and essential IT guide for Solopreneurs wishing to grow their business. With easy-to-follow and proven steps will see you eliminate stress, automate systems and delegate successfully. Written by Stefan Floratos, an IT solution provider and developer; this guide provides information to small businesses and owner operators about their computers and ICT environment. You can check out Automate in our [...]

WHOIS, who was and where

What is WHOIS? WHOIS stands for "Who is?" and is a utility used to look up information on domain names. It is also the record system that identifies who owns a domain and how to get in contact with them. Every top-level-domain (e.g. .com, .net., .me, .name) handles records differently and they have their own WHOIS servers and record formats. Most countries also have have an organisation that regulates domain name registration and ownership; such as auDA (auda.org.au) in Australia.   Why is [...]

Who Owns Your Domain Name?

The International Corporation for Assigned Names and Numbers (ICANN) is the organisation that authorizes registrars to issue or assign domain names to public. A registrant is the person or entity who is considered to be the domain name owner authorised to make or request for changes to be made in vital information related to domain name. It is, therefore, critically important to know the “owner” registrant of a domain name and also the person or entity having administrative, billing and [...]

What is RMM (Remote Monitoring and Management)?

RMM or Remote Monitoring and Management is a proactive approach taken by Managed Service Providers that keeps an eye on your computers and servers. Typically, an ICT Service Provider will use a system specifically designed to monitor your business 24 hours a day 7 days a week. If a problem arises or the signs of a potential problem arise, your provider will get alerted (email or SMS). They will then filter these alerts through a triage process according to severity. [...]

Email Disclaimer

Have you ever wondered why there are so many different email disclaimers? That fine grey print at the bottom of nearly every incoming email that hits your Inbox. You may already have one set by your IT department/provider. Here is a great site that has a variety of formats and uses for email disclaimers http://www.emaildisclaimers.com/Sample_disclaimers.htm Also, this is the one we use at ICTAA which you are free to reuse: This communication is intended only for use of the addressee and may [...]