Microsoft Office 365 is an indispensable tool for businesses of all sizes. With its suite of applications like Word, Excel, Outlook, and OneDrive, it streamlines operations and fosters collaboration. However, many users mistakenly believe that their data is completely safe just because it’s stored in the cloud. This misconception can lead to devastating consequences if Read more
In the rapidly evolving digital landscape, companies face an ever-growing challenge to protect their company data and maintain operational continuity. As the first line of defence against cyber breaches, firewalls play a pivotal role in safeguarding company data by forming a barrier between the external world and their network. In this blog post, we delve Read more
In today’s digital age, Microsoft 365 has become an indispensable tool for businesses and individuals alike. It offers a wide range of services and applications, including email, document storage, collaboration tools, and more. However, relying solely on Microsoft 365 to safeguard your important data can be a risky proposition. Accidental deletions, cyberattacks, software glitches, or Read more
In today’s digital landscape, where cyber threats are rampant, protecting our online accounts has become more crucial than ever. One of the most effective ways to fortify our digital presence is through multifactor authentication (MFA). This powerful security measure adds an extra layer of protection, making it significantly harder for unauthorised individuals to access our Read more
As cyber security protocols become tighter, it’s possible that some of our emails may end up in your Junk mail inbox. To prevent this from happening, we have prepared a short blog that includes a step-by-step guide which will ensure that you don’t miss important emails. Outlook If a normal email has already been filtered Read more
Have you ever sent an email with classified information to the incorrect recipient; or perhaps the email contained an embarrassing typo? Whilst it is possible to ‘recall’ an email, this does not always guarantee that the recipient has not opened and read its contents. Did you know that Outlook for Windows has a handy ‘Delay Read more
If you are thinking about acquiring the latest Apple product and/or accessories before the end of the year, we recommend that you place your orders now. Contact us today at: (09) 476-4540 and dial 2 to speak to our sales team. Alternatively, please complete the form below and one of our friendly team will contact Read more
Technical difficulties whilst working from home, can leave you feeling frustrated. Here are a few basic best practice and troubleshooting tips so that you can power through your day. Practice cyber security awareness Some security measures that are in place at your workplace, may not be in place on your home network. These include security Read more
Here’s a great feature that very few people take advantage of in the Windows 10 suite. It’s called Cloud Clipboard, and it let’s you seamlessly copy and paste text, links and pictures across multiple devices. How do you enable this feature? Hit the Windows key + i. This will bring up the setting window. In Read more
It’s easy to add an extra layer of security to your accounts and devices by adding on two-step verification — also known as multi-factor, two-factor or two-step authentication. Why you need it Passwords can be guessed or stolen. With two-factor authentication, even if an attacker gets your password, it won’t be enough to sign into Read more
Emails are often our main form of communication with our clients, prospects and colleagues. Each email is not just an opportunity to send a message, it also offers a space for building your brand, advertising and engaging with your recipient. Email Signatures are the perfect tool to deliver all of the above. They also offer Read more
In a security context, human error means unintentional actions – or lack of action – by employees and users that cause, spread or allow a security breach to take place. Almost all successful cyber breaches share one thing in common: human error. According to a study by IBM, human error is the main cause of Read more
Microsoft Surface products are designed for remote work. The Surface range of products presents exclusive features and adaptability to fit your business needs. With the ability to work from anywhere, enjoy the features of both a laptop and a tablet in the same device. If you want a device that combines the portability of a tablet Read more
Understanding the essentials of backup and disaster recovery is critical for minimising the impact of unplanned business interruption. Across industries, companies recognise that downtime can quickly result in loss of income. Unfortunately, human error, security breaches and ransomware attacks can all interrupt access to company applications and data. The importance of proper backups and effective Read more
Cyber security protects all your computer systems from theft or damage to their hardware, software, or electronic data. If your cyber security is not up to date, it’s only a matter of time before you too will become a victim. Contact us now for a complimentary cyber security assessment. Security Check Name*Email* PhonePlease select an Read more
We’re always being interrupted from our work. Notifications pop up at random intervals to pull our attention away from what we really need to be doing. Focus Assist is here to keep you on track. Flick a switch and you’ll banish notifications, alerts and more from pestering you when you need to stay on track. Change Read more
We are absolutely thrilled to be able to supply our customers with the full range of Apple Business products. We will be able to deliver your business device with all the required business tools (like Microsoft 365 and outlook) to make your working day as productive as possible. Customisable Options An added bonus when you Read more
With the advances in technology, it is now truly possible to work from your boat – from many remote locations and at an affordable cost. Heading down to your boat early on a Friday morning is usually better than battling late Friday afternoon traffic in the summertime. You can get an early start commuting to Read more
Around the globe, small and medium companies are partnering with managed service providers (MSPs) to support their growing IT needs. The question is, what’s motivating companies to use a MSP for managed IT? We’ve uncovered 10 reasons why SMEs are partnering with MSPs. Predictable Costs Future planning by MSPs provides businesses with a predictable cost. Read more
A cluttered computer desktop can hamper productivity. When a bunch of files, folders, and applications are fighting for space on your desktop, it can be difficult to look for the ones you need. You may not realize it, but the clutter affects the way you work and slows you down. Follow these tips to get Read more
Welcome Tom Warren Tom joins us with an extensive background in corporate IT Support . He is a solid addition to our team. Tom gets on very well with customers and prides himself on his person to person relationships. The customer feedback speaks for itself 😊 Tom enjoys exploring how things work and has Read more
Microsoft Teams has the ability to adjust volume settings while in a meeting but it’s not exactly clear where these settings are. Here’s how to raise or lower the volume in a Teams meeting. Adjust Volume in the Teams Desktop Client Step 1: Join a Teams meeting. While in the meeting, click the 3 dots in Read more
Working from home is convenient, and even necessary as part of a business continuity plan, but isn’t necessarily as safe for the services and data you’re accessing remotely. Some security measures that are in place at your workplace, may not be in place on your home network. These include security measures such as web filtering, Read more
Last Word Research conducted a survey in July and August 2020, with the aim of finding which conferencing and messaging technologies were most helpful during the initial transition to a remote workforce. See the full report below (hover over the pdf and click on the arrows on the bottom left corner of the document to Read more
A virtual private network (VPN) is a technology that improves your online security and privacy. In the past, a simple antivirus software was all you needed to stay safe from online threats. Today, it takes more than that to protect your PC and the information stored on it. Whether you’re sending an important email or Read more
Small- and medium-sized businesses are adopting cloud technologies. However, some business owners may not be aware of certain hidden costs. These costs don’t seem much at first, but they can eventually snowball. Follow these five tips to keep the cloud from breaking the bank. No standalones Cloud services come in various shapes and sizes, many Read more
Small businesses are always seeking ways to ensure their employees make effective use of computers. But before you go out and buy bigger hard drives and faster processors, you should consider upgrading your desktops to a dual monitor system. Read on to find out about the advantages of using two monitors per desktop. Enhanced productivity Read more
Email is one of the best things the internet has given us. We use it to sign up for websites, apply for jobs, make payments, get in touch with friends and family, and many more. However, your email is also one of the platforms hackers can exploit to steal information or launch malware attacks. Here Read more
The internet is an exciting place to be in — as long as website owners do their share in keeping it safe for their visitors. Here are three tips to do exactly just that. Tip #1: Use HTTPS Short for Hypertext Transfer Protocol Secure, HTTPS indicates that a website has an extra layer of security Read more
The useful life of a server is around three years. While it’s not unheard of for servers to function properly beyond year three, relying on them beyond this point can be risky as hardware problems occur more often.
When you’re starting or growing a business, cash is often in short supply. One way to manage your cash flow is through the use of our innovative MiRental solution. You can rent-to-buy essential and critical hardware required for your operations instead of buying it. Mi-IT can help you save money and alleviate your cash flow Read more
If you think your email is safe from hackers, think again. A lack of sufficient email security measures can result in data theft, unauthorized access to sensitive information, and malware attacks.
To meet the demands of businesses of all sizes, many IT companies like Microsoft started to offer hosted Exchange. In this setup, your IT provider makes space available on one of their servers. They then install Microsoft Exchange in a secure space accessible only to your company, over an internet connection.
This month has been one of the most rewarding months for me at Mi-IT. I have had the pleasure of welcoming our community in as they arrive laden with boxes and bags of warmth. Each parcel carries an extra something special with it: love by the bucketload! Whether it’s a preloved blanket or a package Read more
We receive calls on a daily basis from customers who have received an email but are unsure if it is from a legitimate source. Phishing scams are becoming more sophisticated so it pays to remain vigilant. We’d like to share 6 top tips on how to prevent a Phishing attempt. 1. Check for spelling mistakes Get Read more
I am excited to announce that after 10 years of service I am exiting Mi-IT to pursue my personal goals. I have enjoyed helping to grow Mi-IT into the company it has become with the help of all our loyal customers and staff and hope I have served you all well to the best of Read more
You can’t afford to lose business data. It takes away the trust of your clients, leading to loss of revenue. Cybercriminals are here to stay, so it’s more important than ever to utilise tight security measures to keep your business data safe. Still, some hackers may have advanced cracking skills or are really determined to Read more
Cybersecurity is everyone’s responsibility. But you don’t need to be an IT expert to know how to protect yourself from a cyber attack. To help you get started, here are helpful terms you need to know so you’re not left in the dark, whether you’re teaching yourself how to update your anti-malware, updating your systems, Read more
We are pleased to advise that Mi-IT has recently been awarded a ‘Corporate Partnership’ with the IT Professionals of NZ. IT Professionals (ITP) is New Zealand’s body for software and IT experts who care deeply about professional practice in IT. ITP does two things: develops professionals and the professional community, and works on behalf of Read more
Winter is making itself felt across New Zealand and sadly, for varying reasons, there will be families who struggle to stay warm. Mi-IT is supporting the wonderful work of ‘Give a Kid a Blanket‘. They describe what they do as a ‘community action of kindness’. During June and July, they gather donations of warmth from Read more
Even the most attentive customer service representative can make mistakes; after all, he or she is only human. If your business uses VoIP as its telephony solution, errors can be lessened through call recording. Find out how this helpful VoIP feature can benefit your organization. #1. Improve customer service One of the most important reasons Read more
Hackers use cryptojacking to mine cryptocurrencies, and this process can cause PCs to run below optimal speeds. If you have a relatively new computer but are experiencing performance problems after clicking a link or visiting a website, you might be a victim of cryptojacking. Here’s what to do. Hijacked hardware Instead of paying for computing Read more
There are a lot of pros and cons when it comes to monitoring your employees online. We’ve put together an honest and transparent list of arguments for and against this practice. And if you decide it is something you want to pursue, we’ve provided some tips for a smooth implementation process. The case for monitoring Read more
Imagine going back to the office after a long holiday, only to be greeted by a messy workstation. If your company wants clean, organised technology, this IT hardware checklist is just what you need. ✓ Clean up your computer components Wipe your monitor with clean, static-free fabric; remove excess dirt from your mouse’s exterior; and tidy Read more
Everyone knows how to do a Google search. After all, we use it every day to find the information we need. Ironically, not a lot of people know how to make the most out of this search engine. Include and exclude keywords Google will understand most of the search terms you type into it. However, Read more
The benefits of virtualisation are numerous: centralised IT management, faster hardware resources, improved business continuity, and reduced overhead costs. It makes perfect sense for everyone to jump on board. But to maximise virtualisation’s benefits, beginners should follow the following best practices. Conduct an assessment Evaluating your IT environment is an important step in the implementation Read more
At Mi-IT we remain committed to investing in a new generation of talented staff. Luke Turner is no exception. A born and bred Aucklander, Luke had decided to carve out a career for himself in IT. When we recruit new members of staff, we assess them on technical skills, attention to detail and most importantly Read more
If you want to use your laptop in an airport, a co-working space, or a cafe, the first thing you would look for is a power socket. If you are not lucky enough to find an available outlet, you’ll have to depend on your laptop’s battery (assuming it still has power after your last charge). Read more
Cloud technology is becoming more pervasive every day. A Forbes report found that 77% of companies have at least one application or a portion of their computing infrastructure in the cloud. But somehow, myths about its lack of security remain. Hands-on management Unless you have an overinflated budget, relying on local copies of data and Read more
Many internet users still do not understand what the padlock icon in their web browser’s address bar is for. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. This is an important feature that lets users know whether the site they are visiting is secure or not. Read more
Today, you simply can’t survive without a Wi-Fi connection. Businesses need fast, secure, and reliable internet to get work done and satisfy customers. But what about when you experience Wi-Fi issues? These fixes ought to do the trick! Range constraints Wi-Fi works via radio waves that are broadcast from a central hub, usually a piece Read more
Businesses are more reliant on technology today than ever before. No matter whatever else is going on in the business, technology is not something that you should have to worry about. Additionally, with the rapid developments in technology, it’s worth considering leasing your IT equipment instead of buying the devices. Benefits of Leasing Leased devices Read more
This year, Mi-IT has reached an important milestone. We are celebrating our 10 year anniversary! We have based our foundations on the early adoption of technology and continued innovation. This has made Mi-IT one of the most trusted and reliable IT Services providers in Auckland. Early Days When we opened our doors for business in 2009, we Read more
OneNote is a useful but underutilized app that comes with Microsoft Office. It enables you to create and share digital notebooks that contain text, audio, video, and other multimedia, taking your note-taking to another level. Discover the ins and outs of this wonderful app by reading on. Organize your digital notebook While both Microsoft Word Read more
Advertisers have found a new way to track you through the autocomplete password function in your web browser. According to Freedom to Tinker, a few advertising networks are using tracking scripts to capture the email addresses that you fill in on websites. Why auto-fill passwords are so dangerous When you save your username and password on a Read more
Managing your print infrastructure efficiently is key if you wish to save on printing costs. It sounds impossible, but it can be done. Many small and big enterprises don’t realize that they are using ineffective printing models. You can make a difference if you follow these tips. Replace outdated printers Outdated and cheap printers may Read more
As one of the fastest browsers in the market, Google Chrome is the perfect match for quick-paced internet users of the 21st century. But like any technology that stores information, Chrome’s performance can slow down and frustrate its users. It can also affect their productivity and lower their motivation. If you’re using Chrome and finding Read more
Does your organization need to optimize its migration and provision of Office 365? Here are 6 strategies for managing and making the most out of your subscription to Microsoft’s premium cloud-based productivity suite. Declutter your inbox If you’re having trouble managing the overwhelming amount of emails in your inbox, then using Office 365’s “Clutter” feature Read more
Did you know that you can dial contact numbers directly from your browser? The ‘click to call‘ function instantly detects phone numbers on websites, customer portals and popular CRM software such as: Office 365, SugarCRM, Salesforce and many others. Simply click on a phone number and the call will be made via the MiTalk Web Client. Read more
Over the years, Google Chrome has had several versions, with each one providing new benefits to users. In December, Google will launch the 71st version of Chrome, introducing a money-saving feature to users. How will it do that? The money-saving warning The Google Chrome update aims to protect users from websites with “insufficient mobile subscription Read more
Microsoft only offers Windows Support of past versions for a certain period. This can pose a significant challenge for businesses. Currently, Windows 7 is on “extended support” until January 14, 2020. What does it mean when Microsoft terminates support of your Windows version? Let’s have a closer look. No more security updates End of support Read more
If you’re thinking of transitioning your business to the cloud, consider the security of the platform. While providers would like us to believe that the friendly, fluffy cloud image used to market the service means it is automatically secure, the reality is far different. Just ask one of the nearly seven million Dropbox users who Read more
Small- and medium-sized businesses don’t have the time to maintain IT infrastructure, let alone assess whether it’s still driving value for the company. However, if you want to ensure everything runs smoothly, it’s important to be proactive and conduct technology business reviews when you can. What is a technology business review? A technology business review Read more
There are plenty of things to love about Office 365. For a small monthly fee, you get the latest cloud-based version of Microsoft Office apps and robust communication tools. Office 365 dramatically improves collaboration and productivity. It’s also an extremely secure platform that can defend against the most cunning phishing attacks. Effective anti-phishing solutions must Read more
With the rapid developments in technology, it’s worth considering leasing your IT equipment — moving from CapEx to OpEx – instead of buying the devices. Benefits of Moving to OpEx Leased devices give you greater asset flexibility. You’ll be able to cut costs, since you only need to lease the capacity you need. You will Read more
VoIP has become indispensable, now that digital collaboration is an integral part of any business. Unfortunately, as it becomes more widespread, so do the threats against it. These attacks may not be as serious as ransomware or phishing, but they’re just as dangerous to SMEs. Here are five ways to protect your VoIP network against Read more
With disaster recovery (DR), we see business owners clinging to ideas that no longer apply. What kind of DR myths are still widely accepted by the masses? Here are three that need to be retired immediately. Tape backups are the best DR solution Backup tapes are physical objects that deteriorate over time. Don’t believe us? Read more
When it comes to hackers and cyber attacks, most business owners get hung up on the technical and logistical details. They forget another important aspect: motive. Why are hackers attacking people and organizations?And whom are they targeting? By answering these questions, you’ll have a better understanding of which of your business’s resources need the most Read more
In today’s business world, computers are an essential investment. Considering the tight budgets of small- and medium-sized enterprises (SME), one can’t afford to invest in the wrong hardware. Which is the smartest investment, especially for startups? Laptops or Desktops? Portability Laptops allow you to keep working when you don’t have an electrical outlet. However, this Read more
Are our workplaces smart enough? What do employees want from technology in the workplace? Market research firm Penn Schoen Berland (PSB) recently interviewed 3,801 employees around the world about their technology expectations. AI and automation are the big concerns PSB found that respondents were expecting to be more mobile and to do less work face-to-face. Read more
We’re now living in the data economy, so you can’t afford to neglect the possibilities of employee actions causing data loss and leakages. Sometimes this can be malicious; it’s been estimated that one-quarter of employees will take or share sensitive company information when they leave their job. The findings of a 2016 Biscom survey of Read more
The idea of a hybrid cloud set-up – combining on-premises and off-site services – is an increasingly popular option. However, you do need some careful planning to make this type of implementation work. There are number of practical and technical challenges to overcome, such as deciding what data goes where. You will also have to Read more
You have moved to Microsoft Office 365 and that’s GREAT! Productivity is enhanced You have reduced your costs Your teams have access to data wherever they are Greater flexibility has made your employees more engaged and motivated It’s all good …… or is it? “Well, it’s in the Cloud, so it must be backed up, Read more
A cloud is a cloud is a cloud, right? Hosted Cloud Desktops Absolutely and positively not. Especially not when what is being advertised as a “cloud” solution is really only partially rooted in cloud computing. When it comes to really digging into Microsoft Office 365 and a hosted desktop platform (otherwise referred to as “cloud desktops,” Read more
Over the course of the weekend major New Zealand Internet providers have admitted that there is a back door into their customer’s routers and therefore potentially their customer’s computer networks. This is a huge security concern for New Zealand companies and business. Why, because many help and support desk personal are located off shore. Of Read more
Miit’s new Hyper Converged infrastructure and software defined storage utilising Server 2016 went live this week and our clients have been migrated across to the new platform. During the coming weeks clients OS will be upgraded to server 2016 and windows 10 desktop. Feedback to date has been hugely positive. Miit proud to be first! Read more