Opening Times
24-Hours
Call us
(+649) 630 5002

FULLY MANAGED Solutions For You

Helping Protect Businesses since 1992

SECURITY DEFENCE

Safer and Better Protection
- so You and Your Organisation's reputation and computers are better protected

  • VIRUS PROTECTION
  • CYBER-ATTACK BLOCKING
  • HACKER DETECTION
  • WI-FI MONITORING
  • EMAIL SECURITY
  • SECURITY AWARENESS TRAINING
  • FULLY MANAGED & MAINTAINED

COMPUTER SUPPORT

Unlimited Fixed Price Support
- allowing You and Your Team to spend more time on work, and less time on computer issues

  • HELP DESK
  • MAINTENANCE
  • UPDATES & PATCHES
  • REPAIRS & FIXES
  • ALERTS & ALARMS
  • REVIEWS & ADVICE
  • FULLY MANAGED & MAINTAINED

DISASTER RECOVERY

Peace-of-Mind Data Backups
- including a spare Standby Computer, and extra copies of Your important files stored off-site

  • FULL COMPUTER BACKUPS
  • UP TO 5 X COPIES OF DATA
  • QUICK ACCESS TO FILES
  • AUTOMATED
  • OFF-SITE STORAGE
  • Standby Server
  • FULLY MANAGED & MAINTAINED

TELEPHONE SYSTEMS

Cost Savings & Lower-priced Calling - and You will also have an up-to-date flexible phone system that works on all your devices

  • FREE CALLING TO 65 COUNTRIES
  • FLEXIBLE & PORTABLE
  • CALL RECORDING
  • VOICE MESSAGES TO EMAIL
  • CALLS OVER WIFI & 4G
  • VIDEO & AUDIO CONFERENCING
  • FULLY MANAGED & MAINTAINED
Home Page

TESTIMONIALS

from some of PC KING's many happy Clients

Home Page

BEST VALUE PLANS

Computer Protection Plans - Price Per Computer

BRONZE

Computer Safety 

 $0.00 per month

  • PAY-AS-YOU-GO HELP DESK 
  • MONTHLY MAINTENANCE 
  • MONTHLY ALERTS & ALARMS
  •  CONSUMER ANTI-VIRUS

SILVER

Business Defence

 from $29.00 per month

  • LIMITED HELP DESK 
  •  WEEKLY MAINTENANCE 
  •  WEEKLY ALERTS & ALARMS 
  • FILE DATA BACKUP TO USB Disk
  •  BUSINESS ANTI-VIRUS

PLATINUM

Business Protection 

from $59.00 per month

  • UNLIMITED HELP DESK 
  • DAILY MAINTENANCE 
  • DAILY ALERTS & ALARMS 
  •  FILE DATA BACKUP TO USB DISK & WITH CLOUD STORAGE
  • ENTERPRISE PLUS ANTI-VIRUS

GOLD

Protection 360 

from $99.00 per month

  • UNLIMITED HELP DESK
  • DAILY MAINTENANCE 
  • HOURLY ALERTS & ALARMS 
  • FULL COMPUTER BACKUP TO usb disk  & WITH CLOUD STORAGE
  • WI-FI & NETWORK MONITORING
  •  ENTERPRISE PLUS ANTI-VIRUS
Home Page

about us

MISSION STATEMENT : "To provide Clients with reliable managed ICT solutions, that help them become more productive and profitable

OUR GUARANTEE

WE SELL 'UPTIME' 

PC KING's objective is to reduce your computer downtime, improve your business processes, thereby increasing productivity and profitability - by using their 4P approach : 

Profit = Protection + Prevention + Performance 

Solutions are tailored to suit Clients needs and requirements


QUALITY PRODUCTS
PC KING provides quality products from the best suppliers and with manufacturers' warranties

60-DAY MONEY-BACK GUARANTEE
PC KING guarantees their solutions will work, and if you are not happy within the first 60-days, you get your money-back. Not many companies can offer you this

OUR VALUES
MISSION STATEMENT
"Provide Clients with reliable managed ICT solutions, that help them become more productive and profitable"

KINGSLAND - 1992

  • PC KING has humble beginnings, opening its doors in 1992, as a new start-up retail shop in the inner-city Auckland suburb of Kingsland, across the road from the famous Eden Park.
  • The name "PC KING" - was derived from the original business name "Kingsland Computers". "KINGsland (Personal) Computers" became "PC KING"
  • Customers came from all over New Zealand and the Pacific islands, and included governments, city councils, businesses, charities and schools.
  • When Microsoft released its revolutionary DOS 6.0 & Windows 3.0 software, PC KING was one of NZ's largest Microsoft retailers

SANDRINGHAM - PRESENT DAY
  • Today PC KING has transformed itself into a Professional Managed Services provider, with advanced computer security protection, data backup solutions, and telephone systems.
  • And over the years, the Team at PC KING have learnt through research, testing and experience - what works best, and what may not.
  • This combined knowledge and learned expertise, not only gives PC KING a competitive advantage, but also benefits Clients by way of cost-effective solutions that deliver immediate return-on-investments

CONTACT PC KING NOW - info@pcking.co.nz or 0800 PCKING

  • So what are you waiting for? Make the change now. 
  • If you want honest and practical advice? And need value-for-money guaranteed solutions?
  • If you would you like to be supported by certified Engineers who actually own the business? 
  • Then PC KING is for you - your reliable, trustworthy IT partner, that has been around for over 27 years
Do not wait any longer. Get the peace-of-mind you need, and deserve

Home Page

SPECIAL OFFERS


just FOR YOU


Home Page

FLYERS


Home Page

NEWS & BLOG


FROM OUR BLOG

14 Critical things to help protect against Cyber Crime - advice from the NZ Government

This information is a bit technical – so if you need help or more information on any of these solutions - please feel free to contact PC KING at info@pcking.co.nz 

1. Enforce Multi-Factor Authentication (MFA)
Credential dumps and credential harvesting attacks are common. They give attackers access to large numbers of usernames and passwords. Protect your business systems and data by enabling MFA on all privileged or remote access systems – such as VPN’s, administrative consoles, webmail

2. Patch your Software
Keep software, like operating systems and applications, up-to-date. It's one of the most simple and effective steps you can take to secure your environment. We've seen many organisations attacked by malware that exploits known vulnerabilities. Applying patches would have helped them avoid these attacks.

3. Disable Unused Services and Protocols
Keeping your systems up-to-date isn’t always enough to keep attackers away. Older services and protocols often have their own vulnerabilities. Leaving them on your network gives attackers more opportunity to breach your network. To mitigate this, scan your network for services and protocols that are no longer used, or known to be vulnerable. If you identify any, carry out remediation based on your findings. The recent ‘WannaCry’ incident demonstrated what can happen when attackers exploit out-of-date protocols.

4. Change Default Credentials
Security is sometimes overlooked in the rush to get new technology into production. A key step to take for any new application or device is to change or remove all default credentials. This will prevent an attacker accessing your network with known usernames and passwords. We continue to see organisations compromised by attackers using unchanged default credentials.

5. Implement and Test Backups
Backups are critical for recovering from incidents like ransomware. Store your backups offline, and test them often. Organisations often need to restore data from their latest backup in response to threats like ransomware. We've seen organisations lose data and incur significant operational costs because they didn't have up-to-date, well-maintained backups.

6. Implement Application Whitelisting
Two of the most common ways to infect a user’s workstation with malware are through email clients, and web browsers. To prevent this, identify a list of applications that your users need. Make sure they can only execute approved applications. Most malware incidents reported to CERT NZ are likely to have originated from opening malicious email attachments, or drive-by downloads. Whitelisting the approved applications will help protect the system from these attacks. It's a key security control for your network.

7. Enforce the Principle of Least Privilege
Grant users the minimum level of access and control in your network that they need to do their job. Remove their accounts when they're no longer needed. This will limit the damage that intrusions into your network can cause. We also recommend enforcing separation of privilege. When a user requires administrative privileges, use a separate account. We're aware of incidents where users held unnecessary administrative privileges. Attackers were able to exploit their accounts to make unauthorised changes to the environment.

8. Configure Centralised Logging and Analysis
Storing and securing your logs in a central place makes log analysis and alerting easier. Logs are a key part of understanding what happened in an incident. Configuring alerts for key actions can help you detect abnormal behaviour and tell you what to investigate. Without good logging, it’s very difficult to discover the nature and extent of a compromise. This makes your efforts to contain and recover from an incident much harder. Logs weren't available for many of the incidents reported to CERT NZ. This meant it wasn't possible to do a complete post-incident investigation.

9. Implement Network Segmentation
Proper network segmentation relies on the implementation of other critical controls, in particular disabling unused services and protocols, and enforcing the principle of least privilege. We've seen incidents where attackers used common management tools and protocols to gain control of other machines on a network. There are also tools scripted to get credentials. The credentials are then used to access other devices and applications in a network.

10. Use Network Tools
You can prevent attackers spreading through your network by using network tools like firewalls and ‘netflow’ traffic monitoring , and following the other critical controls.

11. Manage Cloud Authentication
We're aware of incidents where cloud authentication misconfigurations let attackers bypass security controls. They do this by using legacy authentication protocols. Organisations are also moving toward using more cloud-based services. It's easy to end up in a situation where you have multiple authentication systems. Centralising authentication gives you better control and visibility over who has access to your systems and information. It also provides a unified experience and lets you configure MFA for applications that may not support it.

12. Remove Legacy Systems
Legacy systems are systems that a vendor no longer supports, or systems that an organisation no longer maintains. This includes end-of-life or unsupported software, as well as devices. When it comes to legacy systems, organisations have to choose between two options; to replace them or staying with the unsupported systems. There are challenges in finding the right option as both require time, money, and resources to address.
Both options introduce similar risks :
Risk 1: If the systems are replaced, there is a risk of affecting that critical process.
Risk 2: If the system is not replaced, there is a risk that any known problems or security vulnerabilities in that system that could be exploited. Two available options to mitigate this are to remove/replace the system, or restrict access to the system.

13. Manage BYOD Devices
A mobile device is any portable device that can access and hold organisational data. It's important to secure these devices, as you would any other device that sits within your network. It's become more common to use mobile devices for work. Your staff may use a laptop to work remotely travel often and work on their mobile phones. This is convenient, and can provide real benefits to your staff and business. But, there are a few security points to consider before you give these devices access to your network. You need to think about physical security. Because these devices are portable, they're more likely to get lost or stolen. Devices may connect to networks that are not controlled by the organisation, such as a home or hotel Wi-Fi. This means they won’t get the benefit of any network-level security controls, like web proxies. These networks may also be able to see sensitive data in the connections made from these devices. This is because other people manage this routing equipment

14. Maintain Best Practices, including Password Policies
We recommend you also continue with best practices, like maintaining an effective password policy.

Protect Your Data From Ransomware With These 5 Steps

Ransomware is malware (similar to a computer virus) that is malicious software that encrypts (scrambles) your computer files and data, so that it is unusable). Your information (your documents, images, browsing history, basically everything on your device) is rendered unreadable by this attack. This is usually followed by a demand for money, if you want your data decrypted.

You don’t want to be affected by ransomware. Your data is yours, not a toy for some faceless scammer to take off you until you pay up, usually in Bitcoin or some other crypto-currency.
Fortunately, we have some steps you can take — and behaviors you can adopt — to keep your data out of the hands of the scammers.

5 Steps to Defend Against Ransomware

1. Make regular backups.

This is Ransomware Defense 101. The scammers want to restrict access to your data, but if you have a recent backup copy of it, they’ve already lost. Organise your vital data so that it is stored in a single location, and regularly back it all up.

But backup copies that are connected to your computer can also be encrypted by ransomware - so also take a backup copy off-site, and disconnected and away from it's original location. Your backup schedule should be based on how often your files are updated. Daily user? Backup daily, or even, hourly.

2. Keep your computer updated
Whatever platform you’re using, desktop, tablet, or smartphone - keep your software up-to-date. This includes Windows, Mac or Android - updates install the latest security patches and bug fixes, thus protecting you from software vulnerabilities.

3. Spot suspicious files, enable file extensions
One way of combating ransomware (and other malware) is to use your eyes. Don't open or click on email messages that you don't recognise or are from unknown people. And don't download files or information from unknown internet websites or people you don't know. Remember what children are taught : "Don't talk to strangers"!

Many malicious software have multiple file extensions (such as, for example, .PDF.EXE) which immediately identifies them as dangerous, if you know what you’re looking for. By enabling file extensions in Windows, you can spot and delete them (or let your anti-virus software destroy them).

There is also training available to learn how to identify and deal with this.

4. Use Email filtering
In 2019 you should not be receiving emails without first filtering or checking them for viruses, malware and phishing attempts. If you don’t, at least set up a rule that filters out, and deletes, email-bound EXE files. These should never be sent via email and never be opened when received.

5. Use an internet security suite
No matter how careful you are when using the Internet, it's always advisable to have antivirus software installed on your computer.  As with all security challenges, the best protection you’ll get from ransomware is with a competent internet security suite. While free internet security tools maybe sufficient for live scanning for viruses, you need to consider a paid alternative. 

And when it comes to ransomware protection, only premium internet security suites offer tools that protect your data. By blocking permission to these directories, your data should remain safe. Various suites offer this feature.

(For more information on how to better protect against Ransomware and other Malware and malicious Viruses, contact PC KING)

Source : https://www.makeuseof.com/tag/protect-data-ransomware-5-steps
Home Page

CONTACT FORM & DETAILS


Contact Us

Get in touch with PC KING - for Peace-of-Mind computing.

Make the change now. If you want honest and practical advice. And value-for-money guaranteed solutions. Supported by certified Engineers. From a reliable, trustworthy IT partner, that has been around for over 27 years.

Don't wait any longer. Get the peace-of-mind you want and deserve.

Address Unit E . 103 Saint Lukes Road . Sandringham . Auckland . New Zealand
(Offices are not always staffed - appointments necessary if visiting)
Opening Times 24-hours
(24-hour Telephone and Email Support available. Offices are not always staffed - appointments necessary if visiting)