Working with hardware that suits your work lifestyle

Posted by Kaylene Giff on 19 March 2021

For as long as we can remember, the norm for a businessperson has been working at your desk, in an office, 5 days a week, except for a small portion of us who work from home or travel around.


We now find ourselves in "the new normal", where full featured portability is what everyone wants; that is to be able to perform work from anywhere at any time. Not only do you need to be able to work on documents, attend Zoom meetings and respond to email from your desk at the office but you also need to work from your desk at home, while out and about or even while you are sitting in front of the TV in the evening.


Doing business in the 20's is much different than it was 10 years ago. With such a wide variety of devices available, it is easier than ever to save a document on your workstation then view that same document on your laptop while sitting with a client, but even that can be a pain when you are relying on the computers syncing together.  Now you have the ability to take your computer with you, wherever you need to work from.

With a portable device such as a laptop or tablet, you are able to work and access your server or cloud files from anywhere, anytime; then plug in to your screens, keyboard and mouse at the office to effortlessly continue working from your desk.


No matter your requirements, Loyal I.T can provide a solution that suits your needs.


The "Go-Getter" Package

- Lenovo ThinkCentre SFF
- Lenovo ThinkVision 24" Monitor x 2
- Windows 10 Pro

$1,558* ex GST



Most powerful
Best performance for the dollar
Cloud compatible
Multiple screen compatibility



The "Agility" Package

- HP ProBook
- HP Docking Station
- Lenovo ThinkVision 24" Monitor x 2
- Microsoft Wireless Keyboard & Mouse
- Windows 10 Pro

$2,019* ex GST



Great performance
Multiple screen compatibility
Webcam as standard
WiFi standard



The "Freedom" Package

- Surface Pro Tablet
- Surface Pro Typecover
- Surface Docking Station
- Lenovo ThinkVision 24" Monitor x 2
- Wireless Keyboard
- Wireless Mouse
- Surface Pen
- Windows 10 Pro

$3,036* ex GST



Most portable
Can be used as a desktop
Multiple screen compatibility
Can be used as a tablet
Webcam as standard
WiFi as standard (4G optional)


*Does not include software, higher spec hardware or configuration and installation



For the best solution for your business, contact Loyal I.T. to discuss your specific requirements.


Posted in: Computer hardware IT Computer deductions  

Windows 10 crashing when printing due to March update

Posted by Michael Trimblett on 12 March 2021

Microsoft have done it again!

The March Windows Security Update released on March 9th is causing a "Blue Screen Of Death" when printing.  Some of the printer brands known to be affected, include Kyocera, Ricoh, Zebra and Dymo.  Clients of Loyal I.T. who are on a Managed Services Support Agreement (MSSA) will not be affected by this issue because we have blocked the roll out of this update before it can be deployed.  For more information about Loyal I.T.'s MSSA, please contact our office on 02 4337 0700.

For those not on Loyal I.T.'s MSSA, the Windows updates that are the cause of the issue are KB5000802 and KB5000808.  The only known fix at this point is to uninstall the update.  Due to Microsoft's patching policy, Windows will not allow you to decline an update, all you can do is delay it.  On Windows 10, if you go into Windows Update you can press the button to pause updates for 7 days:

You will then need to pause again next week and the week after because Microsoft are saying a fix will not be available until the April update (due for release on Tuesday April 6th).  We are hoping a release prior will fix the problem but there are no promises.

If you have the Blue Screen Of Death problem when printing, you will need to uninstall the update by going to the Installed Updates area in Windows 10, selecting the update KB5000802 and/or KB5000808 and press on Uninstall.

After restarting the computer, you will no longer be affected by this problem.

If you are unable to perform this task, Loyal I.T.'s friendly helpdesk will be more than happy to assist.  Give us a call on 02 4337 0700 and one of our techs will be able to perform the uninstall.

Posted in: Windows Computer Software Urgent Windows Update  

Get the most out of your I.T. infrastructure without a physical server

Posted by Kaylene Giff on 9 February 2021

If your business operates from the cloud, you will likely not have a server on premises.  This means your laptop, PC's, tablets and/or personal devices become the front-line interface to the internet and core business applications. 


To ensure optimal productivity and security, it is recommended businesses adapt a 'fleet management' regime, including:

  • Managing the age of hardware by replacing devices based on a planned lifecycle
  • Implement a managed services system capable of monitoring all devices remotely
  • Scheduled maintenance of devices
  • Personal data (desktop, documents, downloads etc) is synchronised/backed up to the cloud
  • Regularly updated antivirus
  • Regular cybersecurity check-ups

Such a 'fleet management' regime should be adapted because PC's and other devices become more vulnerable and less efficient with age (3 years maximum is recommended) meaning your business becomes more susceptible to downtime or lower productivity due to:

  • Hardware failure
  • Slower machines or reduced processer capacity
  • Higher exposure to cybersecurity incidents


Because your devices are now the only defence between your data and hackers obtaining unauthorised access, it is even more important to keep your hardware updated and protected.


A significant point to note is that all recent PC's and laptops have a Solid State Drive (SSD); there are great advantages including faster and more efficient processing and less chance of corruption. However, there is little warning that a SSD will fail or arrive at it's end of life and it is common that data will be corrupted or lost completely if a SSD reaches capacity or fails.


While on the subject of hardware, there are growing preferences for tablets, such as the Microsoft Surface Pro. Modern tablets offer the same specifications and capabilities as a larger workstation yet is compact and able to be taken anywhere the user goes. It is also just as easy to connect it in to a docking station and interact as you would normally at a desk computer.


Contact us to discuss your requirements for protecting your business from downtime or if you would like to learn more about our Surface Pro bundles.

Posted in: Computer hardware Security Computer Software  

Vulnerability Scans - Isolate the weak security points in your IT systems

Posted by Michael Trimblett on 18 January 2021

A Vulnerability Scan is a relatively simple way to test your IT systems risk to scams, theft or sabotage. It's an application that, when applied correctly and with the right advice, is an extremely efficient and effective strategy for SMB's.

With the cloud becoming the norm, your user-interface and other systems and devices become your frontline cyber-security guards by default. Therefore, it is now more imperative than ever to ensure you are 'sure and secure'.

A Vulnerability Scanner is an application that can:

  • Identify and create an inventory of all your systems (including desktops, laptops, tablets, servers if you still have one, virtual devices, personal devices, firewalls, switches, wi-fi and printers) connected to a network.
  • Identify all operating systems and the software installed, along with other attributes such as open ports and user accounts.
  • Attempt to log in to systems using default, standard issue or common credentials.
  • Check each item in the inventory against selected databases of known vulnerabilities

Apart from having an effective inventory of items in your IT systems, the outcome from the scan is a calculated risk list of vulnerabilities for each and every part of your system.

With the right advice and consultation from a knowledgeable source like Loyal IT, you can then prioritise which vulnerabilities need to be explored and how they should be mitigated.

As a point of interest for small to medium sized businesses that no longer have a server (and utilise 'the cloud'), one of the most effective risk mitigation strategies is to have an effective hardware management regime, a little bit like a vehicle fleet management regime; but more about this in our next blog.

Posted in: Services Security IT IT Consulting Networking Security Computer Software  

'Bulletproof' solution to remote access security.

Posted by Michael Trimblett on 8 December 2020

One of the Essential Eight in Business Cyber Security

Multi-Factor Authentication (MFA) is typically described as a bulletproof solution to remote access security.

It is an effective way to add an additional security 'gate' to deter unwanted access to remote databases or sensitive information. Many of you may already have seen some version of MFA when you log into your bank account or when you re-log into your email account (such as Office 365) - once you have logged in with your username and password, you are then sent a text and asked to enter the code.

The Essential Eight guide defines that MFA is for VPNs, RDP, SSH and other technologies, and for all users when they perform a privileged action or access an important (sensitive/high-availability) data repository. Why?: Stronger user authentication makes it harder for adversaries to access sensitive information and systems.

The Small business cyber security guide defines it as a security measure that requires two or more proofs of identity to grant you access; Multi-factor authentication (MFA) typically requires a combination of something the user knows (i.e. something you know), something the user physically possesses (i.e. something you have) and/or something the user inherently possesses (i.e. something you are).


Examples of the three categories of identification could be:

Something you know:

  • PIN
  • Username/password
  • A secret question and answer

Something you have:

  • Card
  • Token
  • Random PIN sent to your phone

Something you are:

  • Fingerprint
  • Face scanning
  • Voice recognition
  • Iris scanning
  • Retina scanning


Most remote access security comes down to something you know; and that something is almost always a password. In creating a password, both length and complexity used together is the best defence. Length is perhaps more important (mathematically) from a time point of view. It will take less time to crack a 6 character letter, number and special character password than it will for a 16 character letter and number only password. It's also best not to do "keyboard walks" in password creation because every cracker will have them in their password lists. (Keyboard walking is simply typing in straight lines up and down the keyboard).


Our recommendations

Because the first factor in remote access security authentication is vulnerable (i.e. usually a password), then it's essential to have a second or even third authentication factor.

However, implementing multi-factor authentication can be a hindrance to users as it can slow down the access to the system. There is always a balance between security and usability. There is a curve that we look to when making decisions and recommendations about the balance. Our advice is that MFA should be implemented and we also know how to determine the right combination of MFA versus user's tolerances.

Loyal I.T. Solutions can help your business set up multi-factor authentication for services that support this technology.

< Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next >

Latest News

Working with hardware that suits your work lifestyle

Mar 19 2021
For as long as we can remember, the norm for a businessperson has been working at your desk, in...

Email contact

for enquiries or log a job.

Michael, thank you so much for your patience an...

Dr. Jackie Amparo
Read All
Bookmark SiteTell a FriendPrint