Search for anything.

Your search for: "" revealed the following:

Search...
TCWG Logo
  • Home
  • About
    • Our Team
    • Careers
  • Services
    • Social Media Management / Graphic Design
    • Business Relocations
    • Data Cabling
    • Data Recovery
    • Hosting
    • Mac Repairs
    • Managed Print Services
    • Managed Services Provider
    • Phone & Internet
      • NBN Plans
      • VoIP Services
      • Wi-Sky Internet
    • Recycle IT
    • Remote Assistance
    • Security
    • Starlink
    • Web Site Design
    • Workshop and Onsite
  • Shop
  • Contact
    • Townsville
    • Clermont
    • Cloncurry
    • On The Road
      • Ayr
      • Balfes Creek
      • Charters Towers
      • Clermont
      • Cloncurry
      • Croydon
      • Home Hill
      • Homestead
      • Hughenden
      • Julia Creek
      • Karumba
      • Kynuna
      • Macrossan Bridge
      • Magnetic Island
      • McKinlay
      • Mount Isa
      • Normanton
      • Palm Island
      • Pentland
      • Prairie
      • Richmond
      • Springsure
      • Winton
  • Remote Support
  • Info
    • Blog
    • Testimonials
    • Newsletters
    • Competitions
      • Winners List
      • Terms and Conditions

Have Any Questions?
1300 775 442
email us

TCWG Logo

1300 775 442support@thecomputerworkshop.com.au
FacebookLinkedInInstagram
TCWG Logo
  • Home
  • About
    • Our Team
    • Careers
  • Services
    • Social Media Management / Graphic Design
    • Business Relocations
    • Data Cabling
    • Data Recovery
    • Hosting
    • Mac Repairs
    • Managed Print Services
    • Managed Services Provider
    • Phone & Internet
      • NBN Plans
      • VoIP Services
      • Wi-Sky Internet
    • Recycle IT
    • Remote Assistance
    • Security
    • Starlink
    • Web Site Design
    • Workshop and Onsite
  • Shop
  • Contact
    • Townsville
    • Clermont
    • Cloncurry
    • On The Road
      • Ayr
      • Balfes Creek
      • Charters Towers
      • Clermont
      • Cloncurry
      • Croydon
      • Home Hill
      • Homestead
      • Hughenden
      • Julia Creek
      • Karumba
      • Kynuna
      • Macrossan Bridge
      • Magnetic Island
      • McKinlay
      • Mount Isa
      • Normanton
      • Palm Island
      • Pentland
      • Prairie
      • Richmond
      • Springsure
      • Winton
  • Remote Support
  • Info
    • Blog
    • Testimonials
    • Newsletters
    • Competitions
      • Winners List
      • Terms and Conditions

TCWG Logo
TCWG Logo
  • Home
  • About
    • Our Team
    • Careers
  • Services
    • Social Media Management / Graphic Design
    • Business Relocations
    • Data Cabling
    • Data Recovery
    • Hosting
    • Mac Repairs
    • Managed Print Services
    • Managed Services Provider
    • Phone & Internet
      • NBN Plans
      • VoIP Services
      • Wi-Sky Internet
    • Recycle IT
    • Remote Assistance
    • Security
    • Starlink
    • Web Site Design
    • Workshop and Onsite
  • Shop
  • Contact
    • Townsville
    • Clermont
    • Cloncurry
    • On The Road
      • Ayr
      • Balfes Creek
      • Charters Towers
      • Clermont
      • Cloncurry
      • Croydon
      • Home Hill
      • Homestead
      • Hughenden
      • Julia Creek
      • Karumba
      • Kynuna
      • Macrossan Bridge
      • Magnetic Island
      • McKinlay
      • Mount Isa
      • Normanton
      • Palm Island
      • Pentland
      • Prairie
      • Richmond
      • Springsure
      • Winton
  • Remote Support
  • Info
    • Blog
    • Testimonials
    • Newsletters
    • Competitions
      • Winners List
      • Terms and Conditions

Your search for: "" revealed the following:

Search...

Posted by David Halberg

HomeArticles Posted by David Halberg

Your search for: "" revealed the following:

Search...
Recent Posts
  • Complete Communication Solutions - Simplified!
    Jun 26 2025
  • How valuable is your time?
    Mar 24 2023
  • The Importance of Regular Backups: A Beginner's Guide
    Feb 07 2023
  • Community Camera Alliance
    Dec 21 2022
Newsletter

So what are Remote Monitoring and Managed Service Agreements?

In simple terms, it is the remote monitoring and management of your IT systems carried out by an IT service provider for a fixed monthly fee.

The intention is to ensure that your systems are kept in an optimal operating state, and any issues are detected early and addressed, or you are notified of these issues and the requirements and costs to fix them.

So, what is the difference?

Remote Monitoring is checking on devices, services, and systems to make sure they are working (switched on) and operating correctly, often this service does not include remediation if there is a fault but will include notifications being sent to an appointed person either by phone or email. If it is required to carry out work to resolve an issue it will normally be chargeable. This will be a cheaper service and is not ideal for any mission-critical equipment or services.

Managed Service Agreements are normally formal agreements that are made between the parties involved, the services provider (IT Company) and the client (end-user).

Within a managed service agreement, the exact work to be carried out will be outlined, it should define what is included and what is not, the equipment that is covered, what will be carried out on that equipment, and any other checks that are required to be carried out.

There could also be some form of service level in the agreement that would outline any reporting periods and the time scales for the remediation of faults.

Among these are the operating hours that the agreement will cover and if there are any out-of-hours charges and what other charges for service are not covered in the agreement, there will also be an indication of what would be considered out of scope for the agreement.

There is generally some form of a report provided at the end of the month outlining details of any checks that have been carried out during the month and if updates have been carried out, and any other works that are included in the support.

Ok so that may all seem a bit heavy,

This is designed to keep your business up and running and should there be any downtime keep it to an absolute minimum, it will be a more expensive option but is the way to go for systems and resources that need to be working or are mission critical.

As you can see both Managed Services and Remote Monitoring are similar but have very different use cases.

Here at The Computer Workshop Group, we can help you with both Systems Monitoring and Managed Service Agreements, please call for assistance 1300 775 442

David Halberg
November 1, 2022
0
Share:

Under constant attack

We just seem to be constantly bombarded with malicious attempts to gain access to our data whether it is by email of through other electronic devices there seems to be a tidal wave of threats at present, so here is a brief description of some of the threats.

Email Phishing – The most common threat we see, is generally a mass email attack attempting to gain access to your user details and data, the emails will often look like they come from legitimate sources and will often be made to reflect well-known business emails in an attempt to fool you.

Spear Phishing – This is similar to an Email Phishing attack but is targeted at a much smaller target base, often only a single person that has been identified as a person of influence in a business.

There are a number of variations on this theme, but all are basically trying to gain access to either your username and password or data that you may hold.

We often see where a business email has been spoofed (email address looks correct but has come from a different source) these often are requesting some form of urgent action, usually to do with finances and often with very little detail. We have even seen the asking for iTunes cards to be purchased and the details be sent to the originator of the email.

If your email has been compromised the attacker (or as they are often now referred to the Threat Actor) will most likely monitor your emails and try and identify potential high-value targets and then either use a Man in The Middle or a Spear Phishing attack.

Man in The Middle – is literally as it sounds, messages are read by the attacker without the knowledge of the sender or recipient, sometimes used to introduce malware onto a user’s PC but often used to divert emails in an attempt to extract funds by changing payment details on Invoices or misdirect funds in some other way.

But of course, it doesn’t end there, the above are all email-related, and you are still under attack on your mobile phone and other phone systems.

Vishing – This is scam phone calls, they can be pretending to be from a State or Federal government department (Tax Office, Police State or Federal, etc) or a business that you may legitimately use, like Microsoft or Amazon. Threats for arrest or fines to pay may be the approach or a message saying your payment has been taken and if you have an issue hold and speak to someone, even requests to access your computer to fix an issue (that not only you didn’t know about but doesn’t exist).

A note on the above, Microsoft, The Tax Office, Federal or State Police, and your Bank will not ring you, if you get a call like this hang-up and if you think it may have been a genuine call back on a phone number you can find on the caller’s website, not the number they have called from.

Smishing – this is where you receive an SMS with a link to click on that takes you to either a malicious site or downloads malware onto your device.

I think that is enough for now, have a good day and be aware of those threats.

If you need help with your computers or IT,  give us a call on 1300 775 442

We are always happy to help

David Halberg
September 29, 2022
0
Share:

IT 101

We all joke about the things you should do when you are having IT issues but so often, they are the things that we forget.

The constant joke made about the request of have you turned it off and back on again may seem like a simple solution but on so many occasions it can save hours of frustration trying to get a machine to work.

This also holds true for situations where your internet is not working, often turning the router off and then counting to 10, then powering it back on will resolve the issue.

After all the first thing your Internet provider will ask you to do when you contact them is to restart the router.

Quick note: restarting and resetting the router are two different things, to restart your turn the power off and back on again, to reset the router you clear all the settings usually by holding in a small button and waiting for the lights to flash, this is usually the last resort as if there are any account details in your router for your internet connection they will be lost.

Another common one is my internet and applications are not working, my PC is fine it was working yesterday but nothing is working now, it’s turned on ok!

Check that your WiFi is connected or if you have a network cable that this is plugged in, so often you find a cable has become unplugged.

My password doesn’t work, I’m sure I have it right it’s the same one I have been using for years.

So have you checked that you don’t have Caps Lock on? Does it have numbers in it and are you using the Number Pad, if so, is that turned on?

So often these simple checks will resolve this one, it is so easy to catch the Caps Lock key without realizing it especially when you are typing your password.

Of course, we keep the best to last, nothing works! No power!

Have you checked that the power is turned on, or is the power cord plugged in?

I know it sounds silly, but you would not be the first person to have this happen to you, I have been out to the site with a client and they were convinced that the PC was dead only to find the plug was not in the power socket. A very expensive mistake.

David Halberg
June 22, 2022
0
Share:

Cyber Security – Your next security breach

Now here is a hot topic and I honestly don’t see it changing any time soon, if ever.

The biggest threat to your business is the threat of a cyberattack, every business is a target and with organized crime organisations driving the increasing events of cyber-attack it is not going to go away.

In a recent ACSC Survey, it is estimated that over $300 million is lost to cybercrime every year, the true figure is likely to be much higher as many crimes are not reported.

Someone is a victim of Cybercrime at least every 10 minutes.

So, who are these victims?

In the survey, it covers sole traders to businesses that employ up to 200 people, the attacks are across the board, and no one is too small or too big to be targeted, don’t think that we don’t turn over enough to be a target, regardless of your business income whether it is less than $50k a year or several million dollars you are still on the radar to be attacked.

That the facts and figures but it’s ok it won’t happen to me, sorry but if that is how you think it’s time to wake up.

Here are some common fallacies:

We have a good firewall, no one can get into our systems

It’s ok, all my programs are in the cloud I don’t have to worry

We don’t need to worry we are too small

My anti-virus will stop it

To these I would say, firewalls are great, but most cyberattacks are made against people, not systems (firewalls), the attackers know that firewalls are almost impossible to get through, but people are easy to trick and will often give access to systems without realizing the threat.

If all your programs are in the cloud all an attacker needs to get is your username and password, I know you are careful but again the person is the weakest link.

No one is too small, just look at the statistics, if you have something of value you are a target.

Your antivirus will not stop you from inadvertently giving away your details, email phishing attacks are used, and unfortunately, they work far too often.

Be aware that we are constantly being tested or attacked with phishing emails, these are trying to get you to give a threat agent your user name and password, so any email that you receive that is asking you to enter your user details needs to be treated with care if you don’t know the sender I would just delete it if it’s genuine the sender will be back in touch (so far this has never happened for me). Also, consider two-factor authentication for your emails, it just gives another layer of security.

Oh, and it’s not just the phishing emails, it’s the constant bombardment of phone calls, you know the ones “I’m ringing from Microsoft, there is a problem with your computer give me access to fix it” NO STOP, do not let them in, Microsoft will not call you unless you have called them first.

Yes, you have backups, but they are only useful if you can restore from them, if you back up to a drive connected to your computer this is there only to make you feel good, in reality, if your computer gets infected with a ransomware attack it will encrypt the backup drive too. Backups that are either on a network file store that requires authentication or some form of off-site solution are better.

The real secret is to trust no one, if you have an issue with your computers, you choose who helps you to fix the problem, make sure it is someone that you trust and has your best interests at heart.

Most businesses have little or no budget for Cyber Security, yet it is most probably the biggest threat to the future of your business. Make sure you are getting the correct advice on what you should be doing to protect your business, don’t just do what “old mate” at the pub reckons you should do.

If you suffer a cyberattack the likelihood, is you will suffer a financial loss that could end your business, if you survive the attack and can continue to trade you may have lost both business reputation and standing. You are also five times more likely to suffer another cyber-attack after you have suffered one.

David Halberg
May 30, 2022
0
Share:

Why Sign it?

So you are starting out in business, you have had your business logo designed you start to brand your business, signage on your shopfront if you have one, you have your vehicle sign written, some nice workwear with your logo on, now you are looking very sharp.

Then you have spent money on a domain name to improve the look of your business, yes it looks very professional, well done.

So what have you done about your email signature?

This is one of those things that is often overlooked, let’s take that lovely branding that you have created and add it to your emails.

But why you ask?

Here are a few reasons that you should have an email signature:

Email signatures look professional, as opposed to an email signed off with just a name one with a signature including your business logo and your contact information, and all matching your branding gives a much better impression.

The information in the signature makes it so much easier for people to contact you, make sure you have included your telephone number, email address, street address, and website details.

You can also add links to your social media if you wish, the whole idea is to make it easy for someone to contact you, this could be an opportunity to gain extra followers on your social channels.

They are a good way to promote your brand, emails are often one of the first ways we contact people, having all your business information in one place not only makes it easy for the potential client to get back in touch with you but also helps them to identify with your brand.

Email signatures are to all intents and purposes digital business cards, they allow you to show some personality, you have the ability to design the signature however you want to allow your Business and Logo to stand out, some people like to have a headshot in the signature to help make it memorable.

The most important thing is to be creative with your signature but be consistent, when you settle on your design, apply it across all email accounts so you are giving a consistent message in all your digital communications.

In reality, email signatures are an easy addition to improving the professional look of your business, they also make it really easy for you to share your contact information in a way that most people will never loose, unlike a business card most people don’t throw out emails.

If you need help designing an email signature we are here to help, we can help with the design and show you how to add them to your mail program so whenever you send an email or reply to one your signature is included.

David Halberg
May 3, 2022
0
Share:

So why do we do updates?

The question we often get is why should we do updates? it’s either that or we have that client that says I never do updates my machine works fine….

So those updates on your computer are usually either “Patches” or “Service Packs” to address issues with your software, sometimes they may be updated versions of your software.

So I know they always want to be installed at the most inconvenient time, but there is good reasoning behind the necessity for them.

So here are four reasons to run updates

Help to Reduce Vulnerabilities.

This is most probably the most important one, security updates are critical to reducing the risk of cyberattacks, the updates are there to protect against known vulnerabilities and malicious attacks that have been identified by your software vendor, they want you to have the best experience using their software possible and therefore want to protect you.

Using your computer without applying these patches is a bit like leaving the front door open and your keys wallet on the table, it’s almost like giving an open invitation to the criminals to come and take your sensitive data or hold it for ransom.

Fix bugs in software.

Things that make your software crash or other glitches that can be frustrating and time-consuming, software providers recognize this and release these updates to get you on the most stable and current version of their software, they are also aware that if they look after you by doing this you will be a more loyal customer so for them it is also about giving you the best user experience.

Often it is where the software developers have uncovered issues with their software often from user reports or due to common issues, never be afraid to contact your software provider if you are having a problem with their product, they may have the solution.

Ensure compatibility

I heard this described as not being like a dinosaur in the technology age.

With the never-ending improvements in technology, we need to try and keep current so our systems are compatible with the organisations, businesses, and other individuals we interact with.

Keep the playing field level don’t insist on using an old, slow, and outdated computer that is struggling to perform the tasks you have to do, look at the benefits of upgrading.

Stay ahead of the Competition

Ok, so you are happy with all of the above, what else?

How about just staying ahead of the game (or the competition), why not be the innovator or market leader by keeping your systems at the top of their game, making your business the most efficient to deal with by leveraging the most up to date technology and systems.

So, updates are there for a reason, I know they can be a pain when there are installed and it’s true they can sometimes, very rarely break your system, but if they do there is always an easy fix.

The best advice we can give is Update, Update, Update, there is always a good reason.

David Halberg
April 11, 2022
0
Share:

What’s in a name (Domain Name)?

I am constantly amazed by the number of businesses that do not have their own domain name, they trade on free email accounts and have no real website, ok they may have a Facebook page but not much else.

So why should you have a domain name, what does it do for your business?

For years I have been working with small business owners helping them with their technology solutions so they can present a professional front for their business, one of the first things I always suggest is to register a domain for your business, it makes you look like a much bigger business than you may actually be and it does not cost a fortune. Using your Bigpond, Hotmail or Gmail email address just makes you look cheap, as a potential client I would be questioning how committed you are as a business owner.

To put it into perspective a domain name costs around $50.00 per year with maybe $150.00 a year for email hosting, ok you may have to pay someone to set it up for you so maybe another $200.00, so for around $400.00 a year you can go from that bloke down the road that’s doing things on the cheap to someone that looks professional and gives the impression of being a big business.

Take it a stage further add a simple website that shows what you do and you can add some testimonials from clients that you have carried out work for and you suddenly look like a big business, again the cost of this is not massive, $150.00 a year for website hosting, and for a simple Website a one of cost around $1000.00-$2000.00.

For a relatively small investment, you have now in your client’s eyes become a much bigger business, you will be viewed in a different light by your competitors and other people in your industry.

The most common objection to registering and using a domain name for emails is “I have been using this one for years and everyone knows it”, ok so you redirect the emails to the new account and send an email out to everyone to let them know about your new address, you could also announce your new website and maybe even include some other marketing to promote your business. I know you are already so busy you don’t need any more work, but it’s always good to reconnect with your old clients.

The other good thing about registering your domain name using the .com.au or the new .au domains is it identifies you as an Australian business and if you have a web page it will help you rank higher in web searches.

So I would urge you to think about registering a domain for your business, rob@robthetradie.com.au or rob@robthetradie.au look so much better than robthetradie@outlook.com

If you would like to discuss your options we are happy to sit down with you and look at how we can help, our aim is to help you be the best business you can be.

https://www.auda.org.au/au-domain-names/au-domain-names

David Halberg
April 1, 2022
0
Share:

So what is “Digital Disruption” and how does it affect me?

Let’s start off with what is digital disruption, let’s not get confused we are not talking about something that is limited to information technology businesses or computer systems.

Digital disruption should not be considered a negative process, it is the process of transforming and evolving our business practices with the aid of digital and other emerging technologies, it allows us to re-evaluate how we do things and helps us to improve or redesign our business processes

Whilst talking to local motorcycle dealer I was interested to hear them describing the change from the mechanics having access to a computer to look up information on servicing bike’s in a central office to how they now have computers at every service bay because it is now an essential tool as not only do they look up service information but need to be able to run diagnostics and checks on the modern motorbikes.

Not only does this save the mechanics (or should we call them technicians) time but has ultimately made them more efficient and put them in a situation where all the tools they need to complete their job are easily at hand.

So what we traditionally look at as a non-tech business is being affected by what is referred to as digital disruption, being open to the possibilities that this disruption and opportunity has brought has given this business an advantage and enabled them to be more efficient.

We can look back at other examples where digital disruption has changed the way we work and live and look at the lessons to be learned.

A fantastic example is Kodak Cameras, they were leaders in bringing photographic cameras to the masses, unfortunately, they did not see the trend for digital cameras as a threat to their traditional market and viewed it as a gadget thing, this allowed other brands to develop this market to a point where film cameras became mostly redundant, by this time it was too late for Kodak to change, and they went the way of the Dodos.

Another example is the encyclopedia, the change that we can see in living memory is enormous, it used to be a status symbol to be able to say you owned a set of Encyclopaedia Britannica, the mass of volumes of books containing information and facts. Then in 1993 Microsoft released Encarta a digital version of the encyclopedia, this had a massive effect on printed versions of encyclopedia due to the ease of access and the fact it took up very little space, interestingly Encarta became a victim of its own success and was discontinued in 2009 due to the advent of easy access to the internet as a source of information and fact. It should be noted that Encyclopaedia Britannica transformed its business and is still available as an online digital resource.

Just because you don’t see yourself as a Tech company does not mean that Digital Disruption will not or cannot affect your business

Digital disruption is something that we need to embrace, it is not something to be afraid of, often it is consumer-driven and if embraced will help us to be more successful in the future.

David Halberg
March 24, 2022
0
Share:

What’s in a password ?

I was chatting to a friend, and they were talking about how their email password for work had to be changed every 28 days and this was causing some of their colleague’s issues as they were shift workers and sometimes their shift pattern may mean they did not work for up to a two week period. The two issues were they may have forgotten the password because they had to change it so often or because they had been away for so long they were not able to reset the password when they logged in as there was a small window to do this and so had to contact IT support for a password change (sounded like a long call and wait)
Whilst I understand that some businesses like to have users change passwords on a regular basis and conform to a set of paraments like minimum length, a combination of upper case and lower case letters, numbers, symbols, and not repeating the last number of passwords used I wonder if this is the best path to take.

Having worked in this sort of environment you get used to people needing password resets as they cannot remember the last password after a weekend (must have been a good one). This in turn reduces productivity. It also encourages people to write their passwords down, often in the back of their desk diary or on sticky notes on their desk, where is the security there, I can remember having to look at a user’s PC and not knowing the password but being able to access by just checking around their desk or even under their keyboard in some cases.

For several years now, the big players in the market have been recommending that we create secure strong passwords for each account and not change them unless we think that they have been compromised.

The reason for this is they have recognized that users suffer from password fatigue, changing your password every 28 or even 60 days becomes an issue when you have to conform to rules like no repeat of the last six passwords, minimum of eight characters, etc.

So, if you make passwords strong, increase the time period between changes, or better still do not require the password to be changed unless it is believed to be compromised, add multi-factor authentication to the account, encourage people to use unique passwords for each website or service, using a password manager can help with this.

So what would I recommend?

A password of 12 characters long but longer is better

A mix of uppercase letters, lowercase letters, numbers, and symbols

Different from your other passwords

Something easy to remember whilst still being difficult for someone else to guess, a good way is to use a memorable phrase but adapt to suit the password requirements like “M4ryH4daL!ttleLam8”

Remember an eight-character password in lower case will be broken by a computer instantly, add an upper case and a number and it takes 1 hour, make it then characters and add a symbol and it will take 5 years

Makes you think !

David Halberg
March 8, 2022
0
Share:

It’s a long story or… follow my file path

So, you know when you have been working on that file and you go save and put it in your company folders on a server or storage drive and it takes the first line of text as the file name….

Then later you go back and look for that file or try to move it and you get some sort of error, something to do with file path or length!!!

Well, here is an explanation of what is happening from our Mr. Whiffin:

Hi Bob,

I have mentioned this in the past but most likely not directly to yourself.  Windows and many devices do have a limitation to the number of characters in filenames/paths.  Just in case anyone doesn’t understand what a path is, it is referring to the location that a particular file is in.  Let’s say for example that you have a file inside of the documents folder called “Word Document 1.docx” on your local workstation and your windows username is just “user”.  The filename in this case is called “Word Document 1.docx” and is only 20 characters but the file path is referring to the entire location of this file which in this example would be “C:\Users\User\Documents\Word Document 1.docx” and the length of this is 44 characters.

The reason that you are experiencing the error above is because of the length of folder/file names that are being used by staff initially on the NAS.  For example, if someone decides to make a folder under live projects, business name, followed by an address for example this path is going to reach this limit very quickly.  Then when a new word document is created to save into this folder, word has this habit of choosing its own name based off the first sentence of the document and people just accept it.  For example, say I am the customer at The Computer Workshop Group and I’m wanting to save a document under our address in your live projects where the document starts with “Hi David, the guys can start working on your job in one months’ time and the cost is going to be X amount of dollars.  If you need further information about this, please let us know.”  In this example if I am to use the default filename that word generates the full path here will be “S:\Live Projects\The Computer Workshop Group\361 Bayswater Road, Garbutt\Hi David, the guys can start working on your job in one months’ time and the cost is going to be X amount of dollars.docx” and the path length is 194 characters.

If you’re experiencing these issues then the solution is that folder paths, filenames need to be reduced or abbreviated.  Unfortunately, there is no easy workaround to this and it’s just something that everyone needs to be aware of.  It’s most likely that there are many folders that are nested deep within each other and likely long folder names.

Hope this makes sense.  You should be able to resolve the problem by renaming some of the folders/files beneath the file you were trying to open but WARNING be careful what folders you are renaming because if you went and renamed the Live Projects folder to just LP for example then everything inside of this folder needs to be uploaded to OneDrive again which is a huge amount of data and also if someone tries to open a file from their recently opened files or shortcuts from their desktop to the NAS they will be trying to access the old folder name.

Just try to understand the above and then maybe give us a call before you change anything.

Kind Regards,

David Whiffin | Senior Technician

Hope this helps if not please feel free to give us a call

David Halberg
February 28, 2022
0
Share:
1 2
TCWG Logo

Copyright © 2022 — All rights reserved.