Skip to content
UnderCtrl IT Consulting Logo

YOUR IT NEEDS UNDERCTRL

1300 362 637
  • IT Services
    • IT Consulting
    • Managed Internet Services
    • IT Security and Data Backup
    • Business IT Solutions
    • Business Email Hosting
    • IT Support
    • Managed Solutions
    • Cloud Computing Brisbane
  • Cloud Computing
  • IT’s Working for You: IT Blog
    • Cloud Computing Explained
    • Understanding IT Security
    • IT for Managers and Owners Blog
  • About Us
  • Testimonials
  • Contact
  • TeamViewer Login
  • IT Services
    • IT Consulting
    • Managed Internet Services
    • IT Security and Data Backup
    • Business IT Solutions
    • Business Email Hosting
    • IT Support
    • Managed Solutions
    • Cloud Computing Brisbane
  • Cloud Computing
  • IT’s Working for You: IT Blog
    • Cloud Computing Explained
    • Understanding IT Security
    • IT for Managers and Owners Blog
  • About Us
  • Testimonials
  • Contact
  • TeamViewer Login

Category: IT Managed Services Blog

Home > Archive by category "IT Managed Services Blog"

Category: IT Managed Services Blog

Google Docs or Microsoft Word?

Google Docs or Microsoft Word?

If you’re looking at Word Processing software there is a good chance you are going to be looking at either Google Docs and/or Microsoft Word. There’s also a fairly good…

Josh Stedman January 18, 28 Business IT Solutions Blog, IT Managed Services Blog Read More...

What is Cloud Computing in Simple Terms?

What is Cloud Computing in Simple Terms?

Cloud computing is a common phrase thrown around by IT and Businesses when talking about the latest IT infrastructure developments. If you don’t have cloud you are “behind the times”….

Josh Stedman January 18, 15 Cloud Computing Blog, IT Managed Services Blog Read More...

Where is Cloud Storage Kept? Where in the world is your data?

Where is Cloud Storage Kept? Where in the world is your data?

Cloud storage security should be a high ranking consideration when a business decides to move IT infrastructure to a cloud based model. One of the primary benefits of the cloud…

Josh Stedman December 17, 8 Cloud Computing Blog, IT Managed Services Blog, IT Security Blog Read More...

What is PaaS | Platform as a Service Explained

What is PaaS | Platform as a Service Explained

What is PaaS? What is PaaS? Platform as a Service, or what is commonly referred to as PaaS, is a cloud based system that allows developers to build applications in…

Josh Stedman October 17, 21 IT Managed Services Blog, IT Support Blog Read More...

Outlook Tips & Hints: Shortcuts, Rules and Notifications

Outlook Tips & Hints: Shortcuts, Rules and Notifications

While Outlook might not have the reputation of being the trendiest piece of software, it is still used widely in businesses across the globe. That being said, if you know…

Josh Stedman August 17, 7 IT Managed Services Blog Read More...

Cloud computing business benefits

Cloud computing business benefits

  While adopting a cloud computing IT infrastructure can lead to many benefits for a business, there a number of considerations to be made before implementing a business wide cloud…

Josh Stedman July 17, 4 Business IT Solutions Blog, IT Managed Services Blog Read More...

What is Two Factor Authentication?

What is Two Factor Authentication?

Security beyond a Password When we talk security in IT, one of the biggest areas of risk lies in the password.  Ever smarter cyber criminals, armed with advanced technologies mean…

Josh Stedman June 17, 24 IT Managed Services Blog, IT Security Blog Read More...

Difference Between Software as a Service(SaaS), Platform as a Service(PaaS) and Infrastructure as a Service(IaaS)

Difference Between Software as a Service(SaaS), Platform as a Service(PaaS) and Infrastructure as a Service(IaaS)

When considering a cloud computing option, there are three different options to choose from. You can go with either Software as a Service (SaaS), Platform as a Service (PaaS) or…

Josh Stedman May 17, 26 IT Managed Services Blog, IT Support Blog Read More...

What is Encryption? Using Symmetric and Asymmetric Keys

What is Encryption? Using Symmetric and Asymmetric Keys

Encryption is a method used to ensure your data is protected and only allow those you intend to share a message with to do so. A very simple form could…

Josh Stedman April 17, 4 IT Managed Services Blog, IT Security Blog Read More...

What is Infrastructure as a Service? IaaS Explained

What is Infrastructure as a Service? IaaS Explained

What Is IaaS? Infrastructure as a Service(IaaS) is a way for a business to gain access to cloud based infrastructure. This can include access to servers, storage or networking via…

Josh Stedman September 16, 28 IT Managed Services Blog, IT Support Blog Read More...

What are IT Consulting Services & Why do You need them in Your Business?

What are IT Consulting Services & Why do You need them in Your Business?

Commonly when we speak to business owners they question why they need IT consulting services – surely IT is just a matter of installing a network, plugging in a computer…

Josh Stedman August 16, 13 Business IT Solutions Blog, IT for Managers and Owners Blog, IT Managed Services Blog Read More...

What is Ransomware? Cryptolocker & Co.

What is Ransomware? Cryptolocker & Co.

Ransomware has been gaining notoriety since 2013, when the Cryptolocker virus hit the scene and started locking down peoples files. For some, it was photos, for others, it was important…

Josh Stedman July 16, 28 IT Managed Services Blog, IT Security Blog Read More...

What is Phishing? How Hackers Steal your Identity

What is Phishing? How Hackers Steal your Identity

Over the past few months we have been sharing common phishing scams such as the Australia Post, AGL and ATO email scams, in the hope we can stop our followers from…

Josh Stedman July 16, 22 IT Managed Services Blog, IT Security Blog Read More...

Windows 10 Tips for your business

Windows 10 Tips for your business

So you’ve taken the plunge and upgraded to Windows 10. Firstly, this version of Windows does not come with the same issues that we suffered with Windows 8. Windows 10…

Josh Stedman July 16, 15 IT Managed Services Blog Read More...

AGL Scam Email

AGL Scam Email

Another Phishing scam posing as an Australia service provider is making its way across the internet. This time the scammers are posing as AGL – the electricity provider. With the…

Josh Stedman June 16, 9 IT Managed Services Blog, IT Security Blog Read More...

ADSL, Cable or Fibre?

ADSL, Cable or Fibre?

Upload, Download, Reload? What to consider when picking an internet connection. When it comes to picking a new internet service there can be a lot to consider, especially when picking…

Josh Stedman June 16, 2 IT for Managers and Owners Blog, IT Managed Services Blog Read More...

What is Malware? Viruses, Trojans and Worms

What is Malware? Viruses, Trojans and Worms

Malware is a term given to a wide range of software programs, designed to cause havoc to your IT system. Malware can be annoying, by slowing down your computer system,…

Josh Stedman March 16, 20 IT Managed Services Blog, IT Security Blog Read More...

Tips for Buying a Computer

Tips for Buying a Computer

Buying a computer for your business can be a complicated process. While many people use a computer daily, we often don’t consider what it is that is powering all the…

Josh Stedman March 16, 11 IT Managed Services Blog Read More...

Should I Upgrade to Windows 10

Should I Upgrade to Windows 10

After the low-points of previous Windows upgrades there are many people who are taking a Windows 10 upgrade cautiously and with a sense of skepticism. While many have already taken…

Josh Stedman March 16, 11 IT for Managers and Owners Blog, IT Managed Services Blog Read More...

What is a Computer Network?

What is a Computer Network?

Computer networking is the process of linking up all of your computers, printers and other devices, so that you can share files and communication with one another. This has obvious…

Josh Stedman February 16, 24 Business IT Solutions Blog, IT Managed Services Blog Read More...

IT Jargon Explained

IT Jargon Explained

IT Terminology Translated for the rest of the world At UnderCtrl we know the world thinks we in the land of IT speak another language. We asked around and got…

Josh Stedman February 16, 17 IT for Managers and Owners Blog, IT Managed Services Blog Read More...

What is Web Hosting?

What is Web Hosting?

Web hosting or website hosting refers to the way in which you store your website for the rest of the world to access. Much like any other computer file, such…

Josh Stedman February 16, 8 Business IT Solutions Blog, IT Managed Services Blog Read More...

What are Managed IT Services?

What are Managed IT Services?

Managed IT services are those particular business services delivered by an IT Managed Services Provider, focused on maximising the performance of your IT infrastructure, to ensure your IT performs smoothly…

Josh Stedman January 16, 26 IT for Managers and Owners Blog, IT Managed Services Blog Read More...

IT Costs: 4 IT Cost Saving Initiatives

IT Costs: 4 IT Cost Saving Initiatives

Business owners know that in order to be successful you must have control of your expenses. Get your IT budget under control with these cost saving initiatives to reduce your…

Josh Stedman January 16, 20 Business IT Solutions Blog, IT Managed Services Blog Read More...

5 Tips for Improving Your Business Wireless Network

5 Tips for Improving Your Business Wireless Network

Wireless networks are now extremely common in most businesses, from office based businesses to manufacturing and warehousing, wireless offers a wide range of benefits to business employees as well as…

Josh Stedman December 15, 21 IT Managed Services Blog, IT Support Blog Read More...

What’s in store in 2016

What’s in store in 2016

Apple Security, Mobile Attacks and More As we look towards a new year in 2016 we are optimistic about how technology will develop further to make our businesses easier to…

Josh Stedman December 15, 16 IT Managed Services Blog, IT Support Blog Read More...

What is an IT Security Policy? Considerations for Business

What is an IT Security Policy? Considerations for Business

An IT security policy is one of the fundamental elements in a business’s IT infrastructure system to ensure the integrity of data security and preservation. It encompasses a wide range…

Josh Stedman December 15, 16 IT Managed Services Blog, IT Security Blog Read More...

Think Like a Start-Up: Applying Start-Up Principles to Your Business

Think Like a Start-Up: Applying Start-Up Principles to Your Business

In Australia, there is a real popularity with the word start-up at the moment. It seems to be coming from everyone. Politicians, industry, people on the street – many of…

Josh Stedman December 15, 7 Business IT Solutions Blog, IT Managed Services Blog Read More...

5 IT Business Ideas to Improve Profit

5 IT Business Ideas to Improve Profit

When it comes to business, IT can be incredibly beneficial in streamlining your systems and business tasks. We look at 5 IT Business Ideas that will help you improve your…

Josh Stedman October 15, 21 IT Managed Services Blog, IT Support Blog Read More...

Australia Post Email Scam

Australia Post Email Scam

A number of people have received scam emails, claiming to be from Australia Post, requesting the email recipient click a link in order to generate a ticket for a parcel…

Josh Stedman October 15, 13 IT Managed Services Blog, IT Security Blog Read More...
Services
  • Managed IT Services
  • Cloud Solutions
  • IT Consulting Services
  • IT Support
  • Managed Internet Services
  • Business Email Hosting
  • IT Security and Data Backup
Pages
  • Home
  • About Us
  • Testimonials
  • Sitemap
  • Privacy Policy
  • Contact Us
Contact Info

Telephone: 1300 362 637
Email: info@underctrl.com.au
Address: 494 Old Cleveland Road, Camp Hill, Brisbane, Qld 4152.

Copyright © 2011-2017 UnderCTRL. All rights reserved.