By now, most people would have heard about the Worldwide Ransomware attack that employed the virus called Wanna Cry.
Some 200,000 computers across many counties worldwide have been affected including the NHS in Britain, the National Railway in Germany, FedEx in the USA and Spain’s National Railway system.
It has caused mayhem among some very large Institutions like those I have mentioned.
How did this happen?
Well it would seem to me that this is largely self inflicted. Microsoft released a Patch back in March that addressed the vulnerability that allowed this virus to be effective. So all supported Operating Systems, Windows Vista and on, had they been patched, were protected. But there were many PC’s still running Windows XP that were targets. Now you tell me, when Microsoft ended support for Windows XP, there were plenty of warnings and messages that support was ending. So why in the world would you continue to use obsolete, unsupported software for Critical Systems?
Like I said, self inflicted. And I suspect that those in charge of IT at some of these places will have a lot to answer for and may well lose their jobs.
Let’s look at the Home User now.
Much the same applies. You must always download, and install the Patches released by Microsoft. They release these Patches for a reason. In addition, do not continue to use PC’s with outdated Operating Systems like Windows XP. Let’s face it, we had a pretty good run with Windows XP. It first appeared in August 2001, and it was supported right up until April 2014. So people certainly got their money’s worth. Now it’s time to move on.
But if you MUST have Windows XP because of some software you run will only work on XP, then at the very least, do not have it connected to the Internet. But if you absolutely and positively need it connected to the Internet, then please make sure you have good Security Software installed and you don’t go downloading dodgy things or visit dodgy websites, and certainly be very careful about opening or even using email on that PC.
I recently read a quote that was meant to apply to Businesses, but equally applies to anyone online. And it went like this:
When you are attempting to secure your business, you have to be right 100 percent of the time. The hacker only has to be right once.
This quote highlights the ever increasing issues we all have, but in particular businesses. A business that is the focus of a successful Cyber Attack can quickly accrue costs that can, at worst, send the business bankrupt. If you lose access to your data through a Ransomware Attack and you don’t have a recent backup, or even a backup at all, you will quickly find it difficult to run your business, and you will lose customers. Not to mention the costs involved removing the threat, and securing your systems.
Cyber Attacks are in epidemic proportions. Just in the last two weeks there were two high profile incidents. One was on the Queensland State Government, and more recently, the National Census Website. Although the latter is probably more about the websites inability to cope with the traffic, nonetheless, it was subject to what is known as a DDoS (Distributed Denial of Service) Attack, designed to bring down a website and potentially expose security holes.
The Cost of Cyber Attacks
The average total cost of a data breaches world wide is around $3.79 million. The costs from cyber attacks include, remediation costs, lost productivity, legal fees, lost data and lower stock prices.
When Pokémon Go was released, Hackers created bogus versions of the App that was infected with malware which enabled the Hackers to access mobile phones and accounts. Just imagine how many businesses were put at risk from the millions of compromised smart phones. In 2014, a WordPress Plug-in allowed an estimated 50,000 websites to be hacked that allowed Hackers to upload PHP files to the Server and control the website. And it allowed the infection of all the other websites Hosted on the same Server.
The total cost to the world economy for computer and network cyber crime is $445 billion!!!
So what can you do to protect your Business?
Be proactive, not reactive. Don’t wait until something goes wrong. Have someone in your organisation that is responsible for ensuring that all PC’s have good Security Software, and that it is up to date. They must also ensure that all Windows Updates, Java, Adobe Flash and Adobe Reader updates are carried out as they become available.
Talk to your employees. Make sure that all your employees are up to speed on doing, and not doing certain things. Things like not opening email attachments they shouldn’t, particularly if they are in .zip format. But any email attachments that seem odd or out of character. Train them to recognise what bogus emails look like. For example, the typical Phishing emails from the Banks, Australia Post, Courier Companies etc. Your employees are the first line of defence, but also the weakest component if they don’t understand what to look out for.
Keep your website secure. If you have a Website, particularly if it is based on the WordPress and Joomla platforms, it is imperative that the platform, and all Plug-in’s, are kept up to date. Equally important is the use of security Plug-in’s to help mitigate any Cyber Attacks. Keep your website secure!!
Spotty Dog Computer Services can check your computer for viruses to minimise your risk to Cyber Attacks.
https://spottydog.com.au/wp-content/uploads/2016/08/cyber-attacks.jpeg8641000Adminhttps://spottydog.com.au/wp-content/uploads/2022/08/Logo-Spotty-Dog-Computer-Services.pngAdmin2016-08-14 12:12:592022-07-28 06:54:13Cyber Attacks – are you prepared?
Ransomware has been on the rise over the last six months.
I have noticed a huge increase in the number of inquiries from people who have been infected with viruses that have encrypted the data on their Hard Drives.
This article gives you some options for decrypting your data without paying the ransom.
These viruses, collectively know as “Ransomware”, encrypt your files (Documents, Photos and other files) and then attempt to extort you by requesting payment to unlock those files.
Up until recent times, my advice has been that there is little choice other than to wipe the Hard Drive and reinstall Windows and software, and if available, restore a backup of your files.
Recently however, a couple of other options have come to my attention.
Ransomware Decryption Tools
The first comes from AVG. They have released six Decryption Tools that (if you’re lucky) may help with decrypting your data.
The six methods of encrytion that these tools target are:
Apocalypse,
BadBlock,
Crypt888,
Legion,
SZFLocker, and
TeslaCrypt.
You can access these decryption tools here.
The second option is in the form of other decryption tools from a website setup by Europol.
These tools attempt to decrypt the following:
CoinVault
The National High Tech Crime Unit (NHTCU) of the Netherlands’ police, the Netherlands’ National Prosecutors Office and Kaspersky Lab, have been working together to fight the CoinVault and Bitcryptor ransomware campaigns.
RannohDecryptor
The RannohDecryptor tool is intended to be used to decrypt files encrypted by:
Rannoh,
AutoIt,
Fury,
Crybola,
Cryakl, and
CryptXXX versions 1 and 2 (files encrypted by Trojan-Ransom.Win32.CryptXXX version 3 are detected, but not decrypted).
RakhniDecryptor
The RakhniDecryptor tool is intended to be used to decrypt files encrypted by:
Rakhni,
Agent.iih,
Aura,
Autoit,
Pletor,
Rotor,
Lamer,
Lortok,
Cryptokluchen,
Democry, and
Bitman (TeslaCrypt) version 3 and 4.
ShadeDecryptor
ShadeDecryptor can decrypt files with the following extensions: .xtbl, .ytbl, .breaking_bad, .heisenberg.
You can access these decryption tools here.
Prevention is better than cure
Of course it goes without saying that prevention is better than cure.
The reason you will get one of these viruses normally stems from opening an attachment in a Phishing email.
A Phishing email is one that is constructed to look like it comes from a reputable source.
Examples are:
The Bank;
An Energy supplier. ie. AGL, Origin etc;
Australia Post;
A Courier. ie DHL, Toll etc.
Also, the prevailing advice is never pay the ransom.
By paying cybercriminals, you only confirm that ransomware works, but more importantly, there is no guarantee that you will receive the encryption key you need to unlock your data.
Spotty Dog Computer Services can remove Ransomware from your Computer.
https://spottydog.com.au/wp-content/uploads/2016/07/ransomware.png6491229Adminhttps://spottydog.com.au/wp-content/uploads/2022/08/Logo-Spotty-Dog-Computer-Services.pngAdmin2016-07-26 12:30:582023-07-28 06:25:54Ransomware – What can you do about it?
Ransomware (viral infections that encrypt data on your hard drive), are becoming more prevalent. Cryptowall and Cryptolocker are two that are increasingly infecting computers world wide, with an estimated 545,000 infections from between Sep 2013 to May 2014. Ransomwares’ purpose is to attempt to extort money from the victim with the promise that your data will be restored after payment.
The Senior Manager of Symantec’s Cyber Readiness & Response, Bob Shaker recently stated, “We’ve seen a sharp rise in requests from customers with respect to Ransomware.”
Mr Shaker tells the story of trying to help a customer who, after being infected with a ransomware virus, could only sit and watch while his company’s data was wiped out, file by file. “I never want to have to go through that again,” he says.
Since then, Symantec has gone to great efforts to ensure that businesses understand the risks and have a clear picture of what to do, and what not to do, to protect themselves from becoming a victim of Ransomware.
Here are some Ransomware Do’s and Don’ts
1. NEVER pay the Ransom!
Your first response will undoubtedly be panic, and your first instinct will be to pay the Ransom.
Don’t do it. This will just encourage the attackers, and help fund further development of these types of attacks.
And even if you do pay, there is no guarantee that you will get your data back.
Instead, Do:
Remove the infected system from the network if you are on one, and clean the system of all viruses.
Then restore data from a known good backup. Restoring data from a backup is the quickest way to get back up and running.
2. Do install a quality security solution
A multi-faceted security solution (like Norton Internet Security for example) should be installed. Norton has protections for not just file-based threats (traditional Viruses), but it also includes download protection, browser protection, heuristic detection technologies, a firewall and a community sourced file reputation scoring system.
3. Do educate employees
One of the main ways you can be infected is through “Spear Phishing”. This is whereby an unsolicited email arrives from an unknown sender that incorporates an attachment that, when opened, executes a program (the virus).
If you have employees, you must take the time to educate them about these threats, and how to recognise suspicious links and attachments, and what they should do in such circumstances.
4. Do use content scanning and filtering on your mail servers
All Incoming emails should be scanned for known threats and should block any attachment types that could potentially pose a threat.
5. Do make sure that all computers and software are kept up-to-date with security patches and updates
Compromised websites are frequently used to spread viruses. Regular patching of vulnerable software like Internet Browsers, Java, and Adobe Flash is necessary to help prevent infection.
6. Do limit end user access to mapped network drives
Ransomware is capable of looking for and encrypting data on any mapped drives that a user has access to. Restricting permissions for shared folders and files of a mapped network drive will limit what the Ransomware virus will be able to encrypt.
7. Do make sure that you have a comprehensive backup solution in place.
The fastest way to get back up and running after this sort of attack is to have a backup of your data.
These Dos and Don’ts will not prevent an attack, but they can certainly reduce your risk level.
https://spottydog.com.au/wp-content/uploads/2014/12/ransomware.jpg6941000Adminhttps://spottydog.com.au/wp-content/uploads/2022/08/Logo-Spotty-Dog-Computer-Services.pngAdmin2014-12-10 07:29:112022-07-28 06:54:20Ransomware – The do’s and don’ts to protect you and your business
I recently had a Laptop in the workshop that had a particularly difficult to remove Rootkit Virus installed on it.
I couldn’t use the removal tool that I normally use because it isn’t compatible with Windows 8, so I did some research and found a different tool called GMER.
What is a Rootkit Virus?
But before I go on and explain how useful the tool was, I’ll just quickly explain what a Rootkit Virus is.
The name comes from a term used in Unix and Linux Operating Systems, with “Root” referring to a “Privileged” account or in other words an account with Administrative rights, whilst the “kit” part of the name refers to software components that implement it. A Rootkit virus assumes admin control of the Operating System, making it very difficult to remove.
So having found that my usual bag of tricks was not going to work, it was time to find something else.
During my research, I came across a removal tool that I hadn’t heard of before (as previously mentioned, GMER), and I gave it a shot.
To my surprise it was very simple and effective.
I downloaded the Removal Tool, and unlike many other tools, I didn’t have to rename the executable file to something that a potential virus wouldn’t recognise and therefore prevent running, because it is already named with a random file name at download. It was also a very small file size of 372kb.
GMER scans for the following:
hidden processes
hidden threads
hidden modules
hidden services
hidden files
hidden disk sectors (MBR)
hidden Alternate Data Streams
hidden registry keys
drivers hooking SSDT
drivers hooking IDT
drivers hooking IRP calls
inline hooks
If a Rootkit Virus is present, you will be notified with a screen that looks like the following:
Removing the identified viruses involves right clicking on the identified virus and choosing “Delete the Service”.
https://spottydog.com.au/wp-content/uploads/2014/07/Rootkit-Virus.jpg360360Adminhttps://spottydog.com.au/wp-content/uploads/2022/08/Logo-Spotty-Dog-Computer-Services.pngAdmin2014-07-24 12:22:452022-07-28 06:54:22How to remove a Rootkit Virus
A friend of mine recently sent an older copy of this to me via email.
I thought to myself, this is something that deserves to be shared.
So a quick Google search yielded the website link to ACCC Little Black Book of Scams
On this page, you can download the PDF or listen to it.
It covers things related to following:
The Scammers’ Black List – top 10 scams to avoid.
Advance fee fraud – If you are asked to provide payments in advance to receive goods or money, think twice.
Lottery, sweepstakes and competition scams – Don’t be lured by a surprise win—only the scammer takes home a windfall.
Dating and romance scams – Don’t let love byte you online.
Computer hacking – If your computer’s security is compromised, you are too.
Online shopping, classifieds and auction scams – Scammers love the ease of online shopping too.
Banking, credit card and online account scams – Keep your financial details secure and your money safe.
Small business scams – Scammers take advantage of the busy nature of many small businesses to swindle them.
Job and employment scams – Big income guaranteed? Unlikely!
Golden opportunity and gambling scams – ‘Risk-free investment’ opportunity or opportunity for misfortune?
Charity and medical scams – Charitable and health conscious consumers beware, scammers will try anything to get your money.
Scam delivery methods.
The scammers’ tool box.
Beware the personal touch.
The Golden Rules – top 10 tips to protect yourself.
The ACCC Little Black Book of Scams is a very worthwhile read.
Don’t think that you are immune. Even the best of us can get caught out as the scams and fraud evolve and become very professional and easier to fall for.
https://spottydog.com.au/wp-content/uploads/2014/06/ACCC-Little-Black-Book-of-Scams.jpg400308Adminhttps://spottydog.com.au/wp-content/uploads/2022/08/Logo-Spotty-Dog-Computer-Services.pngAdmin2014-06-14 14:18:422024-08-20 08:48:38ACCC Little Black Book of Scams
Increasingly I am seeing not only my own business targeted, but I am getting a huge amount of inquiries from other businesses asking me if something they received in an email or through the post or via the telephone is legitimate or a scam.
Invariably they are scams.
There are all sorts of tech threats such as viruses and spyware out there, but it’s the age old tricks that are still fooling small business owners.
Instead of trying to hack into your computer by stealth, scammers are finding it easier to just send you an email, or fax, or just phone you with an offer they hope you can’t refuse.
One of their common tricks is to send a business a fake Invoice in the hope that someone in the office pays it without asking any questions. It’s easy enough to do when you’re under the hammer and snowed under with paperwork.
Office supplies have become a favourite with scammers invoicing you for stationery or toner and ink cartridges that you never ordered, or even sending you an email stating that your refills are ready. Such an innocuous-looking bill could easily slip through the cracks and be paid, especially in a small business without a dedicated accounts department to keep an eye out for such things.
There are a multitude of variations to the fake billing scam, so always check your bills carefully. Another big one is receiving an invoice from dodgy Directory Services or Advertising Company requesting payment for listings which were never published or were ran without your authorisation.
Fake Domain Name renewals are becoming more prevalent now. They will ask for payment so you can continue to use your website address. Sometimes you’ll receive a bogus invoice, perhaps for your Domain Name, or more commonly, one which is similar to your Domain Name.
Some dodgy Domain Name Registrars have been known to send out what looks like an invoice from your current provider but is actually an authorisation to transfer your Domain Name to them. They even check online records to see when your Domain Name is due for renewal, with the hope of catching you off guard because you’re expecting an email from your real Domain Name Registrar anyway.
Dodgy Domain Name Registrars are also known for sending out emails claiming that your competitors are trying to buy up Domain Names similar to your own and offering to sell those Domain Names to you first.
For example my website is www.spottydog.com.au, so they might offer me www.spottydog.net.au and www.spottydog.org.au – claiming that if I don’t pay for them my competitors will buy them in an attempt to steal my customers.
Scam emails are also used to sneak spyware onto computers. Rather than sending out Spam offering cheap medications and viagra, hackers are now sending spam disguised as a legitimate notification from a Bank, Courier Company, Airline, the Tax Office or Post Office.
The style might change, but they all require you to open an attachment or click on a link to check the status of an order or delivery. Do so and your computer could be infected with Malware designed to steal passwords or perhaps lock down your computer and hold your data to ransom.
Alternatively, you might be logging into a spoof website and handing over your password. The safest option is never to trust links or attachments in such emails and to contact the service provider directly if you’re unsure.
Scammers aren’t afraid to use the telephone either and there have been a spate of phone calls in recent times purportedly from Microsoft, claiming your computer is infected with a virus or has some other issue.
The scammers request remote access to your computer, and then identify supposed errors as an indictaion you have a virus and then demand money in order to remove the virus. If you receive one of these phone calls, just hang up on them. Once inside your computer they can cause extreme havoc if you refuse to pay.
All of these types of scams rely on human error rather than technical and security weaknesses. Scammers will often target junior staff hoping to fool them. The best way to protect your business is to educate your staff about the potential dangers of scams and enforce strict policies regarding the placement of orders and payment of invoices.
Vigilence and education are the keys to keeping your Business and Bank Accounts safe!!!!
https://spottydog.com.au/wp-content/uploads/2013/07/be-scam-smart3.png298244Adminhttps://spottydog.com.au/wp-content/uploads/2022/08/Logo-Spotty-Dog-Computer-Services.pngAdmin2013-07-26 16:31:322022-07-28 06:55:06Small Business Targeted by Scammers
Well I’ve come to the conclusion that if people want a safer Internet browsing experience, then everyone needs to critically look at what they are doing online, how they are doing it, and what they should be doing but aren’t.
It has become painfully evident that the main reason PC’s are getting infected and compromised with viruses and malware is because of the User’s activities online, in conjunction with the User’s reluctance to do updates when they are presented. The reason why updates are important to safe browsing is because if you don’t do them, simply visiting a compromised or deliberately malicious website can infect your PC. This is regardless of what Security software you use. There are something like 50,000 new viruses being released every single day, so it is near on impossible to protect yourself against that.
The other subject I will cover is what Browser I recommend and why, but I’ll address the updates issue first.
I am consistently told by User’s that they do not do updates for several reasons. Those being:
I never know if they are legitimate.
They take too long.
I have done updates in the past and they caused problems.
I couldn’t be bothered.
Let’s look at these excuses one by one.
I never know if they are legitimate. This is just a ridiculous thing to say. If you get a pop-up or a message that tells you there is an update available, and you don’t know whether it is legitimate, then you must also believe that you are infected with something malicious, so why aren’t you doing something about it? You must do all updates including Java, Adobe Flash, Adobe Reader, and all Windows Updates. These updates generally address security holes that can be exploited by Hackers and bad people in general. It is a no brainer and is not an option.
They take too long. Seriously? You can sit on Facebook for two hours but you don’t have time to do updates? Try this. Switch on the computer, let it boot-up, get your updates underway and go for a walk in the fresh air. Both yourself and your computer will be better for it.
I have done updates in the past and they caused problems. This one I can understand. I’ve done plenty of updates myself and afterwards the computer has crashed or something else just isn’t right. However, this just isn’t an excuse for not doing updates. There will be some underlying problem that has caused the issue. You might already be infected with a virus that is screwing up the update for example. Whatever the issue, you should address it and resolve it.
I couldn’t be bothered. Well what can I say to this? If this is your attitude then expect that it will be a case of when you get infected rather than if. Not much more to say about this one!!!
Also, when you are thinking updates, DON’T FORGET to make sure you always have the latest version of your Security Software and Browser.
For example, quite often I see people with AVG 2011 or 2012 installed, but the current version is 2013.
The same applies to your Browser.
I see Internet Explorer 8 installed, when IE9 (latest version compatible with XP) or IE10 is available.
It’s more secure than the default Internet Explorer.
You can install add-on’s and extensions that give it greater functionality, but more importantly extra security.
Which Add-on’s or Extensions should you use in Firefox?
Well there are literally thousands of Add-on’s and Extensions available, but there are 3 that I consider essential.
They are:
NoScript – No longer available.
BetterPrivacy – No longer available.
Adblock Plus – This Add-on isn’t specifically a security Add-on, but by blocking Ad’s, you won’t be tempted to click on things you possibly shouldn’t. Besides, who needs all those Ad’s anyway? Adblock Plus blocks all annoying ads on the web by default: video ads on YouTube, Facebook ads, flashy banners, pop-ups, pop-unders and much more.
What about Security Software?
My advice to people on this changes periodically.
13 years ago I would have recommended VET Antivirus, but then it changed to CA Antivirus and that’s when the problems started. Since then the recommendations have ranged from a choice of free to paid for products.
I am finding that this product is offering very good protection, functions and features including Social Media protection, and at a price of $29 for 12 months cover, it’s great value as well.
So what does it all mean?
The main points are:
Do all the updates including Windows, Java, Adobe Flash and Adobe Reader.
Use Firefox with the recommended Extensions and Add-on’s.
Use good security software.
But above all else, use your brain before clicking on or downloading anything.
Be absolutely sure that you know it is legitimate first.
Spotty Dog Computer Services can help provide you with a Safer Internet Browsing experience.
https://spottydog.com.au/wp-content/uploads/2013/03/safe_browsing_v37pdt1.jpg213300Adminhttps://spottydog.com.au/wp-content/uploads/2022/08/Logo-Spotty-Dog-Computer-Services.pngAdmin2013-03-06 09:26:222022-07-28 06:55:09Safer Internet Browsing
Adobe has released a critical update to users of their Reader software, patching a critical vulnerability that can allow hackers to take control of a victims’ computer.
Adobe recommends the Patch for all users of Adobe Reader and Acrobat, version XI and earlier. The update affects Windows, Macintosh, and Linux users for versions 11.0.01, 10.1.5, 9.x, and all earlier versions. The patch can be downloaded from Adobe’s website, or through the automatic update feature.
Adobe has said that while automatic updates are enabled by default, individuals can manually check for an update by clicking on Help > Check for Updates.
The exploit was discovered by a security company named FireEye, and they appear to be the first people to breach the technology used by Adobe to protect their software. In an attack, victims would typically receive an email with a PDF attached, which in turn contains a well hidden JavaScript.
When the attachment is opened, the embedded Malware will download two DLL files. One file will display a fake error message and open a PDF document, and the other one installs “callback” software onto the victim’s computer. Once this software is installed, it “calls back” to a Remote Server.
Those with Adobe Reader or Adobe Acrobat (which is just about everyone) should update their software immediately. This can be done through either the software itself, or directly from Adobe. If for some reason you can’t update your Adobe software, you can instigate “Protected View” in Reader or Acrobat. This will reduce the number of options available in the software (eg. printing) but it will prevent malicious code from being executed from within documents.
To turn on “Protected View,” go to Edit> Preferences > Security (Enhanced) and then check the box next to “Files from potentially unsafe locations.” You can also check the “All Files” option, as well.
Remember, always be on the lookout for weird or unsolicited emails with PDF attachments. It is also a good policy to check with the sender to see if the attachment is legitimate or not. They might thank you, because it could be the only warning that their PC has been compromised (and it will keep you safe, too).
https://spottydog.com.au/wp-content/uploads/2013/02/Adobe-Exploit1.jpg220220Adminhttps://spottydog.com.au/wp-content/uploads/2022/08/Logo-Spotty-Dog-Computer-Services.pngAdmin2013-02-22 07:24:392022-07-28 06:55:12Adobe Patches Exploit in Acrobat and Reader
Could your computer or networking equipment be one of more than 10,000 that are still affected by the “DNSChanger” malware from last year?
Over 10,000 users in Australia and New Zealand could potentially be infected and be left with no access to the Internet after 9th July 2012.
Initially these dodgy DNS servers were going to be shut-off on 8th March, but that deadline has since been extended to 9th July 2012.
After this date, if your computer or network equipment is infected you may not be able to access the Internet.
How to check if your computer is affected by DNSChanger malware
The Australian Communications and Media Authority (ACMA) recently launched a very simple website that enables you to check if the computer you’re using is relying on the DNSChanger DNS servers.
You used to be able visit the site at: , but it no longer exists.
So what happens when your computer is configured to use a malicious or untrusted DNS server?
Well for example, you might type “www.google.com.au” into your web browser and instead of connecting to Google, your computer could connect to somewhere completely different – or to a computer pretending to be Google!
As you now may appreciate, it is a very effective means of attack and the ramifications of this type of attack can be very serious.
Internet banking sites and other previously trusted websites could be faked, right down to the address in the browser address bar.
Excellent customer service, called to see if they could help regarding my laptop and advised me to try something first (all for free over the phone). Did that and it seems to have worked. Thanks for your authentic and professional service.
I was very happy with Iain's service and the new computer he supplied me is great. I was quite concerned about Windows 7 finishing but Iain made the transition so easy I should have done it earlier!My new machine is terrific and I highly recommend him. His service is personalised and he takes the time to listen to you.
It was time for a new computer and I came across Iain's business after a google search. I have since purchased my new computer from Iain and have been nothing short of impressed with his business ethic, professionalism, expertise and realistic prices. My new computer is simply fantastic and Iain didn't try to sell me anything I didn't need (he even provided me with free advice over the phone). We run a small business and have now chosen to have Iain attend to any future computer repairs or sales.
Very helpful advice, and my problem was sorted out on the spot (pun intended) :-)It was the classic recovery of data on a hard drive when the computer won't start up.Thank you for helping me out of a sticky situation.
I've been dealing with Spotty Dog Computer Services for as long as I can remember. Probably around 18 years. Iain has supplied us with several Laptops and Computers over the years, and has assisted us with any IT issues along the way. I would happily recommend him for any computer related problems.
I needed a new PC for my family business, and I was just going to buy off the shelf at one of the big retail stores. But after talking with Spotty Dog, I decided to go with a custom built PC. As Iain explained, we had the benefit of choosing what components were used and their quality. I have been very pleased with the resulting speed and performance, not to mention the reliability. I am so glad I didn't just buy what the retailers were trying to clear off the shelf.
I Have dealt with Iain for the past two years and have found him to be very professional, knowledgeable and extremely helpful. Most importantly he is very prompt and will act immediately on all changes we require to our website. I would recommend him to anyone looking for an all round professional service.
Our business requires our computer system to provide reliable, solid and simple functionality with the ability to manage and store large quantities of data on a daily basis.Our ability to process, back up and retrieve data efficiently is critical.Iain has managed our computer system requirements for as long as I can remember and provides successful outcomes every time.
After years of being scared of entering into the world of websites and the internet platforms we found Spotty Dog. What a lot of wasted anxiety.Iain has led us through the process so professionally effective and at no stress. We now have a totally modern and revitalised business.Thanks.
Ian has been our computer Technician for at least 15years. He is knowledgeable and efficient at his work. We email him and get a response within 24hours. In the last 15 years we have purchased and had Ian build a number of computers for us. We have always found him to be prompt and friendly.
Iain has been my go to man for some years now. He has built two computers for me and sorted out problems with two others. I have always found him to be so helpful and so willing to do more than I ask of him. I thoroughly recommend Spotty Dog Computer Services.
I have used Ian - Spotty Dog Computer Services for many years, the service he provides from custom builds and installs is a credit to his skills. he is prompt and totally professional, I would have no hesitation to recommend his business.
Iain is the most professional upfront website person I’ve experienced. My Training, Website Services and Backup Support have often exceeded expectations and punctuality appears to be one of Iain’s specialties with 100% on time delivery. I highly recommend Spotty Dog Computer Services, a breath of fresh air in this dog eat dog industry.Caroline Berkeley – Sasiani African Safaris
We have used Iain (Spotty Dog Computers) for probably over 15 years. He has built & supplied us with many computers for both our business and personal use over that period. He has dealt with all our maintenance and repairs issues immediately, meaning his service is excellent. We consider his charges are very reasonable and will continue to use Spotty Dog Computers into the future.
I'm very pleased to be writing this review on Spotty Dog Computer Services. Firstly I cannot believe that such a talented web designer as Iain is a local, the web page he designed for me is out of this world and I still feel it's the best deal I've had.The after sales service is what I also like as Iain always makes himself available if I want changes done or things included and he always gives me good advice so I don't make any mistakes. I highly recommend this company to anyone looking for quality, service and value for money, it ticks all the boxes for me. Eric Shields
Thanks to Iain from Spotty Dog Computer Services for his prompt service and excellent advice. When the home computer finally bit the dust, Iain gave me a fast assessment on the benefits of repairing versus replacement, and his direct advice and knowledge was refreshing. Iain had me up and running again with a new PC fully installed and operating in less than 24 hours. Highly recommended computer service provider.
We have used Iain – Spotty Dog Computer Services for over 8 years now from custom building & installing computers to suit our business needs; to repairs and the design of our website along with ongoing maintenance of our website; advice on email management and data backup options. When we have had an install of a new computer or software, the transition is smooth and the downtime is very minimal. Iain is very experienced in diagnosing a computer issue and issues are resolved quickly. Most importantly, he is honest, upfront and reliable and he provides a great service at a very reasonable cost both onsite and at his business.
I had an issue with my Outlook giving me an error message saying there was a problem connecting to the Gmail IMAP Server. I called Microsoft to see if they could fix it but they said they had no idea what was causing it. So I called Spotty Dog Computers and talked to Iain. He got me to take it to his office and leave it while he checked it out. To my surprise, later the same day I got a phone call telling me my Laptop was ready to pick up. You've gotta be happy with that kind of Service!!
Iain has recently created & designed a website for me. He is very knowledgeable,& helpful & has a great knack for putting things in simple terms for you too understand. I would thoroughly recommend Spotty Dog Computer Services !
I cannot recommend Iain & Spotty Dog Computer Services highly enough. He has be knowledgeable, professional, super helpful, consistent & fast with regard to our new website, You Tube, Google+ and any query that I happen to throw his way! Thanks Iain for helping Skin Focus step up into the technology era!! Love your work!!
WARNING ! To All Potential Website Customers -My Story -5 Months ago after searching through suitable Web Developers my wife and I settled on a Local Caboolture Computer Shop that promised they could not only supply the website that we needed, but that our website was guaranteed to have the WOW Factor.Previously they had fixed our computer and we where comfortable they would give us the wow site we wanted.Little did we realize that the WOW factor would refer to just how badly our website would be built and the Speed of our new $3500 website was the biggest Wow, Pages dropped out constantly,pages took over a minute at times to load and the site was breaking all over the place. It was unusable and so slow customers where leaving in droves.The money we paid took all of our resources and after 5 months left us with a site that was failing badly. Speed was our number one concern and here we had a site that was slower enough to make customers leave in droves.It was obvious we where losing customers and money because of the speed and page drop outs.We received a half built site that was amateur at best and completely useless.ENTER SPOTTY DOG- It was at this point where we sought the assistance of Iain from Spotty Dog Computers, as we simply had to get our site out of the current web developers hands and into someone that knew not only how to fix the speed but to set out our Website the way we wanted it.Iain not only managed to give us the site we wanted, his advice led us into building a site we are not only proud of, but our customers love it too.BEWARE- Just because your Local Computer Shop fixes computers, does not mean you will get an experienced Web designer or that they will produce what they promise in regards to building a website.SPOTTY DOG COMPUTERS - Guaranteed ! After dealing with several Developers I believe Spotty Dog Computers can deliver ANY website requirement needed, Iain has extensive knowledge in WordPress and this extensive knowledge is Impressive to say the least.Needless to say, Spotty Dog Computers now Host our Website, Maintain our Website and advise us on any changes we want to make in regards to Improvements.To say I am grateful we found Spotty Dog is an understatement.BUSINESS OWNERS NEEDING A WEBSITE - If you are looking for a business website or E-commerce store, then I offer you the chance to avoid my Mis-Fortune, give Iain from Spotty Dog Computers a call and save yourself a lot of money and heartache.If we had chosen Spotty Dog Computers at the beginning we would have saved hundreds of dollars and received the site we wanted in the first place only better.Thanks Iain for saving us and our website before it was too late.Needless to say we are now your biggest fan !
Iain at Spotty Dog Computer Services has just designed our website for Ali Cats Boutique Cat Boarding. We couldn’t be happier. Iain organised the web hosting and designed our website. We needed a website which we could edit and update regularly. Iain informed us on content requirements and how to update our site. He promptly replies to all our queries with accurate, concise, informative and illustrative instructions. We would highly recommend Iain at Spotty Dog Computer Services to anyone looking for reliable, local, supportive and affordable webhosting and website design.