When we find something good, we like to tell people about it. And we have found something good in the training courses we get from Ace Training. Ace have branches in Auckland, Hamilton, Wellington and Christchurch and provide training for End Users and IT Professionals. They […]
Does your company handle personal information?
IT Partners can help you avoid privacy law breaches by knowing and taking care of your responsibilities.
Privacy is a hot issue, with constant media presence and every company from Xero to Google continually publishing updated policies and perspectives. But what […]
As the technology behind security software on the web advances, so too does the determination of attackers to infiltrate it. SSL and TLS are the basis of encrypted communications on the internet, many of us will use it every day without even knowing it.
SSL does […]
If you’ve got a website that isn’t mobile-friendly, you really should fix it. Beginning 21st April, Google put a new search algorithm in place that lowers the search result ranking of websites that don’t work properly on mobile devices.
This is a big deal for two reasons; […]
I cry a little when I see a @xtra.co.nz email address being used personally. In writing this blog, I started to think am I being a little sensitive about the topic, is it just me? So I decided to Google “problems with xtra email” which […]
Email security is in the news again with the latest Yahoo! hacking episode, but perhaps the headlines should really be reflecting the following.
Email is not secure. It was never designed to be.
It seems counter-intuitive, but the biggest security risk to your emails is your own […]
Given how many technology predictions come unstuck, I thought that professional firms had shied away from giving predictions. Deloitte recently sent me a copy of the 2015 Technology, Media, & Telecommunications Predictions for 2015, you can find it on the web here.
Some interesting commentary around hot […]
IT Partners re-installs Windows 7 or Windows 8.1 on new machines, so that we get a consistent client experience, known set of drivers, and only the software that we want on the machines. In our experience this lowers support calls and costs.
Some IT companies and […]
You might have become aware of firms and home users being infected with Cryptolocker. For a better understanding of what this piece of malware does, this is a useful article.
A recent report from AIG notes that only 36% of data breaches come from malware and external attack […]