• November 3rd, 2017
    The latest Security Flaw: Wifi KRACK
    The latest Security Flaw: Wifi KRACK            Sounds scary and technical, another vulnerability, another frightening acronym KRACK, makes… Be Sociable, Share! Tweet

    Read More

  • September 30th, 2017
    Basic Cyber Security
    Cyber security threats are continually evolving. Viruses, worms, trojan horses, spyware, phishing, adware and scareware have all been around for a long time. Lately, one particular form of malware known… Be Sociable, Share! Tweet

    Read More

  • August 29th, 2017
    BackUp or Business Continuity
    The facts according to the Boston Computing Network’s Data Loss Statistics, are that 60% of companies that lose their data, will shut down within 6 months of… Be Sociable, Share! Tweet

    Read More

  • July 30th, 2017
    Protecting a Business against Ransomware and Scams
    Every day, every month there is a new threat to being able to conduct business effectively and efficiently. How do you protect a business from the threat of disruption… Be Sociable, Share! Tweet

    Read More

  • July 3rd, 2017
    Connectivity, Disruption, The Internet of Things, Small to Medium Business
    The world is becoming more connected and the buzz word of the year is “The Internet of Things”. What does this really mean and will small to… Be Sociable, Share! Tweet

    Read More

Older Posts
Download Free Report

COMPUTER HARDWARE & ACCESSORIES

As your Trusted IT Advisor we strive to offer a complete IT solution for your business. As such we have developed additional services based on requests from our business clients. Some of these are handled locally, others are handled by dedicated and prescreened specialists around the country.

These services include:

  • Leasing – Should you require leasing for new systems and hardware, we generally recommend specialist IT leasing companies who focus on business to ensure you get competitive rates.
  • Data recovery – When physical damage to hardware has occurred or when traditional methods are unable to recover data we call in our specialists. The physical device is shipped to a laboratory for examination.
  • Forensic data analysis – Required where electronic records need to be deciphered for legal reasons. This is a very specific field of analysis and requires legal knowledge to be completed successfully.
  • Ink and toner – Don’t pay full retail pricing for your printer ink and toner supplies, many businesses are unaware they can buy at wholesale rates or use cheaper new compatible cartridges.
  • Hardware upgrades – Improve the performance of your computer with component upgrades for a fraction of the cost of a new computer.
  • Accessories – Talk to us about software, speakers, adaptors, cables and many other peripherals and accessories.
  • Power protection - Protect your IT investment against serious electrical and physical damage caused by lightening and power supply fluctuations (power surges).
  • Uninterrupted power supplies – Prevent data corruption or data loss caused by sudden loss of power with a battery backup system which allows your equipment to shutdown correctly.
  • IP camera systems – IP surveillance recording equipment allows visual monitoring over the web.

“A lightening strike to our office took out several of our computers and telephones. CT Riverwood provided a quick fix to get us back up and running quickly. They even helped us with the insurance claim.” Terry Thompson – Owner – Terry Thompson Project Management

Computer Hardware & Accessories Sydney
Computer Hardware & Accessories Brisbane
Computer Hardware & Accessories Melbourne
Computer Hardware & Accessories Adelaide
Computer Hardware & Accessories Perth

Be Sociable, Share!