Revolution - Your IT Partner

Revolution - Your IT Partner

IT Services and IT Consulting

Auckland, Auckland 187 followers

Your IT partner - specialising in IT solutions for small to medium NZ business

About us

With years of experience, Revolution delivers professional and reliable IT support, service and solutions to businesses in Auckland and New Zealand. We do not believe in a “one size fits all” approach – every customer is different. By understanding your business, we tailor our solutions to your specific needs. We then deliver – end of story. Outsource your IT requirements to Revolution and we’ll deliver increased productivity, efficiency and performance for your business.

Website
http://www.rvn.co.nz
Industry
IT Services and IT Consulting
Company size
11-50 employees
Headquarters
Auckland, Auckland
Type
Privately Held
Founded
1996
Specialties
UFB Internet

Locations

  • Primary

    774 Great South Road

    Penrose

    Auckland, Auckland 1061, NZ

    Get directions

Employees at Revolution - Your IT Partner

Updates

  • Congratulations Tony Dey, Ron Hendriks, Frazier Johnston and the team at Pt Chevalier Family Dentist on the recent revamp of the practice! The IT systems required some updates, and here are some changes we installed during this project including: updating their server PC and tidying their network cabinet, and replacing large box computers with tiny graphics-capable PCs in all the treatment rooms. Check out the new and improved practice if you live near The Point https://www.pcfd.co.nz/

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
  • Good guys to work with if developing a new dental practice, some of our past IT projects overlap and you can see our IT installations in some of their portfolio projects https://lnkd.in/gwE3yNDv

  • View organization page for Revolution - Your IT Partner, graphic

    187 followers

    Today marks a significant cybersecurity milestone for Revolution IT as we partner with a new Extended Detection and Response (XDR) provider. 🚀 Why does XDR Matter? Enterprise-Grade Cybersecurity: We are completely committed to safeguarding our clients’ digital landscapes. Our new XDR service brings unparalleled expertise in threat detection, incident response, and proactive security measures across your whole organisational IT - not just the computers. Simplified Licensing: With just one license per computer, our clients gain access to best-in-class cybersecurity solutions with no hidden fees—just straightforward protection. 24/7 Vigilance: Our round-the-clock monitoring ensures that threats are identified and neutralised swiftly, minimising any potential impact on our client’s operations. Every organisation, regardless of size, deserves robust cybersecurity. For NZ-based small to medium businesses, our cybersecurity service now means you have access to the same enterprise-grade tools that the big guys have to defend against evolving threats 🛡️

  • MFA is the easiest thing to turn on with the largest effect on security: https://lnkd.in/gu_k8uC3

    View profile for Barry Porter, graphic

    I.T. Business Development Manager | I.T. Solutions for Business | Healthcare I.T. Specialist

    Why MFA is Your Digital Guardian. Every day we are logging into our own digital worlds with usernames and passwords. Imagine your digital world as a Castle Fortress – inside your fortress is the Castle Keep - where you keep your most confidential and valuable information. The entrance to the Keep is secured by a locked door (your username and password), but wait…there are no guards. Anyone who has a key or can pick the door lock can get in and plunder your treasure. Where are the guards? That's where Multi-Factor Authentication (MFA) comes in – the extra layer of protection that proves you are who you say you are. 🔐 Why MFA Matters In a time when cyber breaches have become an everyday occurrence, MFA is not just an option; it's a necessity. It's like having a secret handshake that only you and your trusted devices know. 🛡️ The MFA Effect Most username/password compromise attacks can be blocked by simply turning on MFA. But…. not just any kind of MFA. For example, Microsoft 365 MFA should be enabled in such a way as to prevent a phenomenon known as “MFA Fatigue”. 💡 Make the Switch Turning on MFA is a simple step but may require the assistance of your trusted IT partner. Hope is not a business strategy, and hoping your passwords are secure shouldn’t be for your digital security either! So, take a moment to activate MFA on your accounts. It's a small action you can take now that can prevent a big headache in the future. Here’s the thing – most businesses wouldn’t know: A: What systems they are using that can have MFA enabled (like Microsoft 365 or other cloud apps); and B: How to enable MFA across all their users on these apps. Your task for today – check that MFA is enabled in your digital world. If you don’t know, send an email to your IT helpdesk, and ask them how to enable MFA in your business. Future You will thank you for letting your Digital Guards do their jobs! #MFA #CyberSecurity #ProtectYourData #DigitalGuardian

    • No alternative text description for this image
  • Check out our post about an easy-to-understand analogy for your business cybersecurity: https://lnkd.in/gNpkfcqR

    View profile for Barry Porter, graphic

    I.T. Business Development Manager | I.T. Solutions for Business | Healthcare I.T. Specialist

    I get asked all the time to explain cybersecurity. Some people say having cybersecurity is like having insurance. Not really though? Insurance pays out AFTER you have an accident. 🏰 I always say cybersecurity is more like a medieval castle 🏰 You’ve got your Moat (the Perimeter Security): The moat surrounds the castle, just like perimeter security which includes things like firewalls to keep out unauthorised access. Then there’s the Castle Walls (Network Security): Thick, high walls filled on the inside with traps, deadfalls, and internal barricades which protects against invaders who make it past the moat. This is like how network security defends against threats moving within your system. How about your trusted Guards? (Endpoint Security): Guards patrol the castle, just like endpoint security software like EDR or MDR monitors your devices for suspicious activity. Don't forget your Archers (Threat Intelligence): Archers in towers are there to spot and defend from threats from a long way off. Threat intelligence provides early warnings about potential cyber threats out there in the wild. The you have the Castle Drawbridge (Access Control): The drawbridge allows entry only to authorised people, a bit like how access control mechanisms (like with Microsoft 365 Business Premium) ensure only authenticated users can access your sensitive data. There’s also the Castle Keep (Multi-factor Authentication): The keep (your inner stronghold), secures the crown jewels. Without the proper keys, you can’t get in. Using multi-factor authentication means that even if the castle walls are breached, the intruder still cannot access data secured with MFA without the authenticator token (the keys). The Dungeons (Managed Detection and Response - MDR): If an intruder is caught, they’re taken to the dungeon and interrogated. MDR identifies intruders and quarantines them where they cannot harm your business. A human then analyses the threat and decides whether it needs to be mitigated. Your Knights on Horseback (Web Filtering): When you are roaming out in the wild threats can appear from the trees or in other sneak attacks, and your knights are there to protect you. With web filtering, when you are using the internet, malicious websites are identified and blocked before they can harm, your business systems. Fortify YOUR digital kingdom!

  • "It takes 20 years to build your business's reputation, and just a few minutes of a cybersecurity incident to ruin it" Cybersecurity is always on our minds as we update our Cybersecurity Suite (now called Total Care Cyber). Total Care Cyber is our common sense and easy-to-understand cybersecurity plan for New Zealand SMEs. A good cybersecurity strategy uses an established framework like NIST. Your job today - fire an email to your IT provider and ask about your cybersecurity status. You may be surprised by their answer...

  • Landlines and phone systems have come a long way since the old days of copper lines, complex PABX systems, and desk phones. This is my desk phone now. With cloud-based phone systems, the options are pretty much limitless. I don't have a 'phone' as such, but have this Yealink base station for the wireless headset which pairs with my PC softphone. This base station is quite good as it comes with the mobile phone stand/charger as well. When my DDI number rings, I can choose to pick it up on the headset, or if I'm out and about - I just pick the call up on my iPhone. Cloud-based phone systems are pretty neat.

    • No alternative text description for this image
    • No alternative text description for this image
  • We all love our dual monitors - but have you ever thought about a single ultrawide monitor instead? They are cleaner and simpler, and they look amazing. Depending on the width you go for (34-inch or 49-inch wide) you can have all your usual apps up and visible and snapping them around the monitor is a breeze. We're now installing more and more of these for our clients instead of replacing dual monitors on wall-mounted or desk-mounted brackets. There are pros and cons obviously but these are becoming more popular!

    • No alternative text description for this image
    • No alternative text description for this image

Similar pages