Computer Security

In todays world there are many devices such as computers, smartphones and tablets, that are all vunrabilites to virus produced by black hat hackers, for either feel interest or financial gain. Do not underestimate your home or business network security! Generally a computer, smartphone or tablet can be infected with malicious software before it even leaves the shop you purchased it from. Virus detection software is only useful for reported viruses, and therefore any new virus (aka zero-day virus) can quiet easily go undetected by your virus detection software. We are able to secure various operating systems such as Windows, Apple, iOS, Android, BSD, Linux and Unix. We have been doing computer security since the 1990's.

IT Security

Worried about the security of your IT department? We can provide consulation, audits, and repairs to your IT security. We are specialists in IT security across all operating systems such as Windows, Apple, BSD, Linux and Unix. Our service is highly professional. We'll provide a detailed list of the computer, mobile device or network vunrabilites. Along with a final report to show you what has been fixed.

Computer Firewalls

Worried about the Internet? Concerned when using your online bank account? Well then contact us to have one of our highly qualified team members audit your computer network, or simply help you put security measures in place.

We specialise in technology security services. Our team keep up to date with computer vunrabilites and viruses. So helping you setup, configure and maintenance your computer security would be a pleasure.

What is a firewall?

Well wikipedia says:

"A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria."

When using the internet a firewall is a must!

Computer Virus Removal

We hear about computer viruses all the time. Most people think of a computer virus as a computer with poor health (e.g. running slow). But that is just one symptom of what is really going on.

Computer viruses are malicious software, which can be used by black hat hackers to install:

  • Spyware - allows monitoring of your behaviour and keystrokes.
  • Worms - allows the virus to spread to other electronic devices (e.g. computers, smart phones, tablets, etc).
  • Trojan Horses - allows the virus to sit dormant, until a hacker needs to use your computer for various malicious needs. Please note: the hacker could be either human or an automated software program (aka bots).

It should be also noted that computer virus are not just limited to your personal computer, they can infect your smart phone, tablet and just about any electrical device you can think of.

While virus detection software is useful, it doesn't detect every virus. If a new virus is released onto the internet today (aka zero-day virus), then your virus detection software will not detect it!

If you feel your electrical device has a virus (maybe its running very slow?) then contact us today to allow us to diagnose the device, and remove all viruses found. We would also provide a howto for future use of your electrical device, to ensure you limit (or remove) the chance of being infected again.

Computer Spyware Removal

Do you realise that most of the computers, smart phones and tablets you purchased, where most likly infected with spyware without the approval of the consumer and the vendor?

Spyware is used by black hat hackers (and in some cases corporate business) to monitor your behaviour on your computer, smart phone or tablet. This monitoring can be used to similar track what you like to do, which can be used to target products to you via web searchs, email or postage mail. Or even worse be used to log all your passwords and personally, such as your back account details, which could be used to debt your bank account, or similar to steal your identity for various financial gains in Australia or internationally.

We are very familar with this technology and therefore have many skills and tools available to find such spyware and remove it. Contact us today to get your spyware removed.

TV first! Our CTO demonstrates WiFi cracking!

Wireless Security

Worried about your Wireless security? Did you realise that approximately 30% of homes and businesses believe they have secured their wireless routers, however they are actually very unsecure wireless, and can be hacked into in minutes.

Wireless intrusion occurs when a hacker is just outside your building or home, and gain access to your network via your wireless rounter. This allows the wireless hacker to:

  • Use your Internet bandwidth for their needs (e.g. downloading large files).
  • Monitor your wireless activity (e.g. what pages you are looking at on your wireless laptop, e.g. Bank Website, Facebook).
  • Release a worm virus that could spread in your network and potentially exploit your Internet router, allowing external access.

Internet Security

We have all heard the stories about black hat hackers, breaking into big corporations and/or home networks. So its understandable most users are worried about the Internet and their online details such as bank accounts.

Securing your Internet generally involves protecting your personal and/or business network from:

  • External hackers/viruses getting into your personal and/or network.
  • Internal viruses that could then open up your network for external hackers to get in, via exploiting your Internet rounter. An internal virus could come from a visitor laptop that is infected with a worm virus
  • Wireless intrusion that would allow hackers (located just outside your building or home) to gain access to your network, which allows the wireless hacker to:
    • Use your Internet bandwidth for their needs (e.g. downloading large files).
    • Monitor your wireless activity (e.g. what pages you are looking at on your wireless laptop, e.g. Bank Website, Facebook).
    • Release a worm virus that could spread in your network and potentially exploit your Internet router, allowing external access.
  • Educating users what tools they should be using and how to use them correctly, to avoid them downloading hidden virus. A hidden virus can come from visting a websites, download files, and reading email.

If you want to ensure you are secure from Internet "bad guys", please contact us today. We can provide consultation, interest security reviews/audits, which can be deployed to reduce (and ideally remove) the threat of Internet.

Information About Palm Island

Palm Island (also known as Great Palm Island, or by Aboriginal name Bukaman) is an island and community 65 km north-west of Townsville, on the east coast of Queensland, Australia. At 64 km², Palm Island is the main island of the Greater Palm group, and consists of small bays, sandy beaches and steep forested hills rising to a peak of 548 metres. Neighbouring islands outside the Palm group include Rattlesnake Island and Magnetic Island.

Palm Island is often termed a classic "tropical paradise" given its natural endowments, but it has had a troubled history since the European settlement of Australia. For much of the twentieth century it was used by the Queensland Government as a virtual penal settlement for Aboriginals considered guilty of such infractions as being "disruptive", being pregnant to a white man or being born with "mixed blood".

The community created by this history has been beset by many problems over the years and has often been the discussion point of political and social commentators. Since its creation as an Aboriginal reserve, Palm Island has been considered synonymous with indigenous disadvantage and violence. At the same time it has been at the forefront of political activism which has sought to improve the conditions and treatment of Australia's Indigenous people as well as redress injustices visited on them broadly as a race and on Palm Island specifically. Of significant sociological concern is a lack of jobs and housing.

The indigenous population generally identify with either the Bwgcolman or Manbarra people. Compared with other parts of Australia, the Palm Island community is young with 35.6% under 15 and only 6.4% over 55. Only 5.1% of the population describe themselves as being non-religious compared with 18.7% of Australians, 42.6% are Catholic (25.8% Australia wide), 23.2% Anglican and 11.2% being other Protestant.

The community, consisting of some 42 mainland and Torres Strait Islander clan or family groups, suffers from chronic alcohol, drug and domestic abuse, has an unemployment rate of 90% and an average life expectancy of 50 years, thirty less than the national average.

Computer Security Solutions for Palm Island – Our Clients: Big Brands & Small Businesses


Computer Security Solutions for Palm Island – Amazing Customer Testimonials

Luke from COLETEK provided server setup and consultation for our media production Business. They were prompt, professional, and helpful, and gave us some good ideas and options when it came to a custom and cost effective solution. They have been prompt and responsive since initial setup, offering advice as needed and supporting additional requests. Highly recommended!

thumb

I was very impressed with the prompt service I received from COLETEK IT. I submitted a request for assistance on Thursday when my Windows PC failed to boot. I dropped the computer off Friday. Saturday - I was notified that analysis was complete and that a reinstall of Windows was required. Sunday - I was notified that Windows had been reinstalled and all my data had been copied back. Monday - I picked up my recovered machine from COLETEK. Four days from initial contact to having my system back would be great service in anyone's book. I have no hesitation in recommending COLETEK IT.

I have outsourced many projects through COLETEK over the years for a variety of applications. Applications such as a online based software platform that pulls live data feeds and updates in real-time to the user. A custom built website for adding users and products that achieved over 20,000 listings. Mobile applications. Data recovery and hardware repair. Custom SEO services and secure hosting services. I choose COLETEK because I know that a job will get done as requested and within a reasonable time frame. Also I'm a stickler for security and they're the best.

We experienced some issues with our Linux server. I contacted Luke and explained my concerns, Luke come to our office (after hours) to run some tests and when advised me that some programming was required and that the hard drives were overdue for replacements. Luke suggested I drop the server of at his office on Friday late afternoon so he could do the fix on the weekend and he would come to our office on Sunday afternoon to install the updated server. I gladly accpeted such a great offer. Everything went exactly to plan even though we had to deal with really bad storms and some power outages on that weekend. Job well done.

thumb

We recently engaged the services of COLETEK to perform some penetration testing on our systems. We found Luke flexible and accommodating with our specific needs. Luke provide what we needed to show our clients our security measures with our systems. I would have no hesitation in recommending Luke.

thumb