Computer Security

In todays world there are many devices such as computers, smartphones and tablets, that are all vunrabilites to virus produced by black hat hackers, for either feel interest or financial gain. Do not underestimate your home or business network security! Generally a computer, smartphone or tablet can be infected with malicious software before it even leaves the shop you purchased it from. Virus detection software is only useful for reported viruses, and therefore any new virus (aka zero-day virus) can quiet easily go undetected by your virus detection software. We are able to secure various operating systems such as Windows, Apple, iOS, Android, BSD, Linux and Unix. We have been doing computer security since the 1990's.

IT Security

Worried about the security of your IT department? We can provide consulation, audits, and repairs to your IT security. We are specialists in IT security across all operating systems such as Windows, Apple, BSD, Linux and Unix. Our service is highly professional. We'll provide a detailed list of the computer, mobile device or network vunrabilites. Along with a final report to show you what has been fixed.

Computer Firewalls

Worried about the Internet? Concerned when using your online bank account? Well then contact us to have one of our highly qualified team members audit your computer network, or simply help you put security measures in place.

We specialise in technology security services. Our team keep up to date with computer vunrabilites and viruses. So helping you setup, configure and maintenance your computer security would be a pleasure.

What is a firewall?

Well wikipedia says:

"A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria."

When using the internet a firewall is a must!

Computer Virus Removal

We hear about computer viruses all the time. Most people think of a computer virus as a computer with poor health (e.g. running slow). But that is just one symptom of what is really going on.

Computer viruses are malicious software, which can be used by black hat hackers to install:

  • Spyware - allows monitoring of your behaviour and keystrokes.
  • Worms - allows the virus to spread to other electronic devices (e.g. computers, smart phones, tablets, etc).
  • Trojan Horses - allows the virus to sit dormant, until a hacker needs to use your computer for various malicious needs. Please note: the hacker could be either human or an automated software program (aka bots).

It should be also noted that computer virus are not just limited to your personal computer, they can infect your smart phone, tablet and just about any electrical device you can think of.

While virus detection software is useful, it doesn't detect every virus. If a new virus is released onto the internet today (aka zero-day virus), then your virus detection software will not detect it!

If you feel your electrical device has a virus (maybe its running very slow?) then contact us today to allow us to diagnose the device, and remove all viruses found. We would also provide a howto for future use of your electrical device, to ensure you limit (or remove) the chance of being infected again.

Computer Spyware Removal

Do you realise that most of the computers, smart phones and tablets you purchased, where most likly infected with spyware without the approval of the consumer and the vendor?

Spyware is used by black hat hackers (and in some cases corporate business) to monitor your behaviour on your computer, smart phone or tablet. This monitoring can be used to similar track what you like to do, which can be used to target products to you via web searchs, email or postage mail. Or even worse be used to log all your passwords and personally, such as your back account details, which could be used to debt your bank account, or similar to steal your identity for various financial gains in Australia or internationally.

We are very familar with this technology and therefore have many skills and tools available to find such spyware and remove it. Contact us today to get your spyware removed.

TV first! Our CTO demonstrates WiFi cracking!

Wireless Security

Worried about your Wireless security? Did you realise that approximately 30% of homes and businesses believe they have secured their wireless routers, however they are actually very unsecure wireless, and can be hacked into in minutes.

Wireless intrusion occurs when a hacker is just outside your building or home, and gain access to your network via your wireless rounter. This allows the wireless hacker to:

  • Use your Internet bandwidth for their needs (e.g. downloading large files).
  • Monitor your wireless activity (e.g. what pages you are looking at on your wireless laptop, e.g. Bank Website, Facebook).
  • Release a worm virus that could spread in your network and potentially exploit your Internet router, allowing external access.

Internet Security

We have all heard the stories about black hat hackers, breaking into big corporations and/or home networks. So its understandable most users are worried about the Internet and their online details such as bank accounts.

Securing your Internet generally involves protecting your personal and/or business network from:

  • External hackers/viruses getting into your personal and/or network.
  • Internal viruses that could then open up your network for external hackers to get in, via exploiting your Internet rounter. An internal virus could come from a visitor laptop that is infected with a worm virus
  • Wireless intrusion that would allow hackers (located just outside your building or home) to gain access to your network, which allows the wireless hacker to:
    • Use your Internet bandwidth for their needs (e.g. downloading large files).
    • Monitor your wireless activity (e.g. what pages you are looking at on your wireless laptop, e.g. Bank Website, Facebook).
    • Release a worm virus that could spread in your network and potentially exploit your Internet router, allowing external access.
  • Educating users what tools they should be using and how to use them correctly, to avoid them downloading hidden virus. A hidden virus can come from visting a websites, download files, and reading email.

If you want to ensure you are secure from Internet "bad guys", please contact us today. We can provide consultation, interest security reviews/audits, which can be deployed to reduce (and ideally remove) the threat of Internet.

Information About Struck Oil

Solidifying Foundations in Rockhampton: COLETEK's Commitment to Struck Oil and Beyond

As the heart of Queensland's mining industry, Rockhampton is a city that prides itself on its resilience and adaptability. And yet, amidst the rugged beauty of the Australian outback, lies a thriving business community that relies on trusted partners like COLETEK to drive growth and success. Nestled in the midst of this entrepreneurial spirit, Struck Oil stands as a testament to our collective determination and resourcefulness – an attitude embodied by COLETEK's commitment to supporting local companies and fostering innovation throughout Rockhampton's dynamic precinct. With over two decades of experience under its belt, COLETEK has earned a reputation as a trusted Australian company that understands the unique quirks and challenges of working in rural Queensland. Our unparalleled national reach allows us to tap into networks that span the length and breadth of our great country – providing Rockhampton-based businesses with the connections they need to take their ventures to the next level. What sets COLETEK apart, however, is our unwavering dedication to community engagement and partnership. We don't just do business in the area; we're an integral part of it, working hand-in-hand with local entrepreneurs to help them overcome obstacles and seize opportunities. It's a relationship built on trust – built on mutual respect and collaboration. To us at COLETEK, 'Struck Oil' isn't just a reference point for the region's rich natural resources; it symbolizes our capacity to strike the perfect balance between innovation, expertise, and community involvement. When your business needs a partner that can navigate the complexities of regional growth, then you need a company like COLETEK – boots-ontheground, in-touch-with-local-conditions pioneers who know how to make the best of what exists, while charting a course for the future. The results speak for themselves: from strengthening supply chains and optimizing operations to fostering strategic alliances and spearheading investment initiatives, our team brings unrivalled expertise and local knowledge to the table. So whether your business is looking to tap new markets, upgrade infrastructure, or simply overcome specific challenges, we'll stand shoulder-to-shoulder with you every step of the way. So why wait? Reach out to COLETEK today – [Contact Us](/contact/)

Computer Security Solutions for Struck Oil – Our Clients: Big Brands & Small Businesses

Computer Security Solutions for Struck Oil – Amazing Customer Testimonials

Luke from COLETEK provided server setup and consultation for our media production Business. They were prompt, professional, and helpful, and gave us some good ideas and options when it came to a custom and cost effective solution. They have been prompt and responsive since initial setup, offering advice as needed and supporting additional requests. Highly recommended!

thumb

I was very impressed with the prompt service I received from COLETEK IT. I submitted a request for assistance on Thursday when my Windows PC failed to boot. I dropped the computer off Friday. Saturday - I was notified that analysis was complete and that a reinstall of Windows was required. Sunday - I was notified that Windows had been reinstalled and all my data had been copied back. Monday - I picked up my recovered machine from COLETEK. Four days from initial contact to having my system back would be great service in anyone's book. I have no hesitation in recommending COLETEK IT.

I have outsourced many projects through COLETEK over the years for a variety of applications. Applications such as a online based software platform that pulls live data feeds and updates in real-time to the user. A custom built website for adding users and products that achieved over 20,000 listings. Mobile applications. Data recovery and hardware repair. Custom SEO services and secure hosting services. I choose COLETEK because I know that a job will get done as requested and within a reasonable time frame. Also I'm a stickler for security and they're the best.

We experienced some issues with our Linux server. I contacted Luke and explained my concerns, Luke come to our office (after hours) to run some tests and when advised me that some programming was required and that the hard drives were overdue for replacements. Luke suggested I drop the server of at his office on Friday late afternoon so he could do the fix on the weekend and he would come to our office on Sunday afternoon to install the updated server. I gladly accpeted such a great offer. Everything went exactly to plan even though we had to deal with really bad storms and some power outages on that weekend. Job well done.

thumb

We recently engaged the services of COLETEK to perform some penetration testing on our systems. We found Luke flexible and accommodating with our specific needs. Luke provide what we needed to show our clients our security measures with our systems. I would have no hesitation in recommending Luke.

thumb