Element IT Logo

Previously

BW Computers

CALL US
1300 600 550
  • Home
  • Services
  • Newsletter
    • Newsletters – Residential
    • Newsletters – Business
  • Testimonials
  • Prices
  • Contact
  • Support

Why You Need to Uninstall Adobe Flash Player

February 14, 2021 by Barry Walker

All good things must come to an end – it’s inevitable with computer software. If you’re using Adobe Flash, the day has arrived. It’s time to uninstall Adobe Flash Player.

Adobe stopped supporting Flash Player on December 31, 2020. What does this mean?

Adobe is no longer issuing Flash Player updates or security patches. The company “strongly recommends immediately uninstalling Flash Player.” The company announced the decision to bring Flash Player to end of life (EOL) in 2017.

To help secure user systems, Adobe began blocking Flash content from running in Flash Player on January 12, 2021. Major browser vendors have also disabled Flash Player from running: Safari, Firefox, Chrome, and Microsoft Edge have all stopped supporting the technology.

This renders Flash Player pretty useless. Flash was key to early Web browsing, powering interactive website elements such as animations and forms. Web developers loved it, because it saved them from offering users dull, static pages. However, open standards have matured to provide a viable alternative to Flash content. The HTML 5 standard has replaced Flash in many cases.

Adobe Flash is old, unsupported, and has unfixed security issues. It’s actively used for malware. Fake Flash Player installers have long been an effective way to deliver malware. As recently as 2020, three years after the EOL announcement, it was found that 1 in 10 Macs were infected by one prolific piece of Flash malware.

Don’t keep it on your system, and definitely don’t download versions of the Flash Play-er from third-party sites.

 

Uninstalling Adobe Flash Player

If you’re an iPhone or iPad user, you don’t need to worry. Flash was never supported on iOS devices. Otherwise, it’s worth checking if you have Adobe Flash Player in-stalled. You may not even remember downloading it, but don’t just let it sit there.

To check if Flash Player is installed, navigate to https://helpx.adobe.com/flash-player.html. Under Install Flash Player in five steps, the first step is to check installation. Click on “Check Now.” If it tells you “Sorry, Flash Player is either not installed or not enabled,” you’re in good shape.

To uninstall from a Windows computer, you will need to download the uninstaller found here
(https://helpx.adobe.com/flash-player/kb/uninstall-flash-player-windows.html) to your desktop. Then, exit all browser and other programs that use Flash. Run the uninstaller to delete all Flash Player files and folders. Restart your computer, open your browser, and verify uninstallation is complete.

Mac users will download the uninstaller (https://helpx.adobe.com/au/flash-player/kb/uninstall-flash-player-mac-os.html) suited to their OS Version. You can determine your version by clicking on the Apple icon and choosing About This Mac. You then run the applicable uninstaller. After restarting your computer, verify the uninstallation is complete.

Without updates or security patches, hackers could access your system using Flash Player vulnerabilities. It can be frustrating when software reaches EOL. Even so, it’s important to be proactive. Take the precautions to keep your system safe.

Worried about downloading and uninstalling safely? We can help. Not sure what other legacy software you might have on your computer that is putting you at risk? We can help there, too. Contact us today at (03) 5273 0230. We can review your computers to secure your confidential data and important info.

Filed Under: Residential Blogs

Share:

Tech Help for New Year’s Resolutions

January 13, 2021 by Barry Walker

Making New Year’s resolutions is a familiar habit in the Western world. Many people make resolutions relating to their physical or mental health. Fortunately, in our digital world, technology can help make resolutions more attainable.

First, a few fun facts about resolutions. Did you know:

  • The habit of making resolutions began about 4,000 years ago? The Babylonians used their new year festival to set goals to keep their good standing with the gods.
  • In Roman times, farmers were told to begin each year with an “auspicious gesture.”
  • More recently, a study found only eight percent of people keep their resolutions.

Twitter did a survey of the most common resolutions of 2017, and top ones included:

  • diet, exercise, and lose weight
  • get more sleep;
  • learn something new;
  • read more;
  • be nicer, kinder, and more patient.

The good news? If you set any of these as your resolutions, technology you already have can help!

Tech Tips for Resolutions

Let’s start with trying to change fitness or eating habits. There is an abundance of apps available for that for your phone or your computer. You might try:

  • Daily Workouts, a mobile and desktop app with nearly 200 exercise routines that can be done with or without accessories (such as exercise ball, stretch bands, or kettle bell weight);
  • Seven, a mobile and desktop app providing quick, on-the-go exercise routines. All you need is seven minutes and, possibly, a chair or wall.

You could also set a recurring alarm on your work computer to remind you to get up and walk around for a minute each hour. Those with an Apple Watch already get a notification at 10 minutes to the hour if they haven’t moved enough.

Looking to get more sleep? You could use Night Shift on your iPhone or Night Light on Android devices to dim your screen. Windows also has a Night Light feature (under Settings > System > Display. All these change screen display to warmer colors, which reduces eyestrain and helps you sleep better.

You might also be interested in Sleep Bug. This white noise app provides 300 different soft sounds to build a background to help you zonk out.

Those who want to read more or learn something new could benefit from limiting social media. Apple has Screen Time and Android has Digital Wellbeing. Both track your app usage, plus, you can set apps to lock if you use them for too long.

You can also use Windows 10 to limit app and game time on computers, tablets, Xbox, and Android devices. Under the Family tab of your Microsoft account page, you’ll find an Activity tab. You can turn on app monitoring, limit app and game usage, and set restrictions for the amount of time and time of day apps can be used.

Good Luck with Your Resolutions

We’d argue that all this can help with that other resolution, the one where you’re going to be more patient and kinder. If you’re feeling healthier, sleeping better, and spending less time in a social media trance, you can be more mindful. And hey! While you’re at it, make that a resolution, too.

If you need help finding the right technology to support your resolutions, we can help! Call us now at (03) 5273 0230.

Filed Under: Residential Blogs

Share:

Got a Bad Case of Password Exhaustion?

November 20, 2020 by Barry Walker

You’re not alone! Most people use the same password everywhere – home, work, Gmail, Facebook… even for banking.

Considering how many passwords we’re expected to remember and use on a daily basis, password exhaustion is a very real thing. It’s no wonder that when yet another prompt for a password appears, users enter easily guessed combinations like ‘abcd’ or ‘password’.

Trouble is, even if your password is making the required effort, hackers are taking a daily stroll around the internet and collecting logins and passwords as they go, from either leaked details or sites with security flaws.

Then, they’ll try their luck with that login/password set elsewhere. They know more than half the internet users in the world have only one password and email combination, so the chance of gaining access to your accounts is actually quite high.

Even the big names in tech are at risk of password breaches:

360 million MySpace emails and passwords leaked.

117 million LinkedIn account details leaked.

Same password used elsewhere? Cue the domino effect!

One site breach follows another and another until hackers have nothing more to gain. The only way to break this chain reaction is to use a different password for each site.

How to Create Easily Remembered Passwords

Have a system or template for creating your own unique passwords, that you’ll be able to remember, but is not obvious to hackers.

For example:

<character> <word> <something about the site> <numbers> <character>

Becomes !K1ttyFB75!

It might seem complicated, but the above is really just based around the words ‘kitty’ and ‘FB’ for Facebook. Change the FB to something else for other sites.

What to Do If Your Password Has Been Hacked

You can check to see if any of your accounts have been compromised by entering your email into a site like haveibeenpwned.com

If it alerts a breach, you need to change your passwords immediately – all of them. Use the example system above to create a new set. If you’re struggling to remember your set of passwords, consider using a secure password tracker such as LastPass. (http://www.lastpass.com)

If you need help changing your passwords or setting up a secure password system, let us know on  (03) 5273 0230 and we’ll be more than happy to help you.

 

Filed Under: Residential Blogs

Share:

What Are Cookies?

October 9, 2020 by Barry Walker

Fresh-baked cookies are yummy, but you may not have the same positive associations with cookies on your computer. Here’s what you need to know about cookies and what they mean for your internet browsing.

Cookies have been around for a long time, but new laws now require websites to ask for your permission to use them. You’ve likely noticed more sites informing you that “this website uses cookies,” and they’ll ask you to click to accept the use of cookies. But what exactly are you agreeing to?

A website cookie is a small piece of text the website you are visiting stores on your computer.

Cookies are equivalent to your ticket to get onto the website. Website owners track your individualized code to gather information.

Cookies tell the website that the user has been to the site before. The website can recall personal login information and other preferences. A shopping site will remember your cart and let you continue shopping, or suggest other goods you might like.

Viewing and Controlling Cookies

So, why are sites asking for permission to store their cookies on your computer? Users are more concerned now about the digital footprint they are leaving on the Web: they want to protect their Web history.

Let’s be clear. When you accept a cookie, you are not allowing access to your computer or any of your personal data, unless you have knowingly provided it as you do when online shopping, that is.

Also, it’s not possible to execute code from a cookie. That means a bad actor can’t use a cookie to deliver a virus or malware.

Overall, cookies on their own are safe. Agreeing to first-party cookies from the website simplifies session management, personalization, and tracking.

The danger comes from third-party cookies generated by advertisers or analytics companies. Say, for instance, you surf to a webpage that has 10 ads on it. You don’t even have to click on any of those ads to generate 10 cookies. These cookies track your browsing history across the Web on any site carrying their ads. That’s why people are becoming more wary of the privacy implications.

That’s the Way the Cookie Crumbles

Users can make their own cookie choices. Those who allow cookies will enjoy a more streamlined Web surfing experience. Those who don’t want cookies tracking their browsing history will opt out. Without cookies these users have to re-enter their data every time they visit a website.

Often you can control your cookies in your browser settings. In Google Chrome, for example, you’d select “Settings” from the menu drop down in the upper-right corner, then “show advanced settings” and then “content settings.” In the Cookies section you might choose “Keep local data only until you quit your browser” and “block third-party cookies and site data.”

If you’re really annoyed by the pop-ups asking you about cookie use, you can install a browser add-on, too.

The “Incognito” mode on your browser can be used to save cookies for the current session, but when you close the browser the cookies will be deleted.

We can help you minimize the extent to which you are being tracked on the internet. Contact our IT experts today on (03) 5273 0230.

 

Filed Under: Residential Blogs

Share:

7 Reasons to Replace Your Internet Service Provider (ISP) Email

September 18, 2020 by Barry Walker

When you sign up for an internet service, the provider will hook you up with an email address, too. Your internet service provider (ISP) wants to keep you connected to them. But this convenient email address isn’t always the best long-term solution for you.

That “[email protected]” email address may work fine. You use it to keep in touch with your family and friends, you get bills to that address, and you’ve used it to login to your social media and online news and shopping sites.

But relying on your ISP for your email address may not be the best strategy for you. Here are some drawbacks to consider.

#1 If you rely on your @isprovider.com address, you could end up locked in with poor service or high prices. You feel stuck because you can’t take your email address with you if you want to switch providers.

#2 Internet service providers are not in the email business, whereas email providers such as Gmail and Outlook are always working to improve. Your ISP may not have updated its email offerings for a decade.

#3 Most ISPs have very limited storage space for email, which can make your service less reliable and convenient.

#4 Also, ISPs don’t make the same effort to keep your email secure and your inbox spam free. A provider more focused on email services offers more sophisticated filtering. ISP emails usually have primitive spam filtering that is easy to bypass.

#5 With an ISP email, your email is often accessible only on the provider’s mail servers, and you need to be able to access those servers to get to your emails. A cloud-based email provider lets you access your inbox via a Web browser and Microsoft Outlook. So, it doesn’t matter where in the world you are; you can still get access.

#6 You might be supporting a local ISP with your business. If that smaller provider goes belly up, however, your email address is gone forever, too.

#7 Most ISP’s (internet service provider) emails don’t synchronize well across multiple devices. Let’s face it most people have emails on multiple devices now thanks to iPhones and iPads.

Making the switch to an email provider

You may feel compelled to remain loyal to your ISP because changing your email address is a headache. It’s not as hard as you might think. We can even automatically forward emails to your new address, so you don’t need to go updating your email address with everyone.

Fortunately, once you make the switch to a Web/cloud-based email provider, you can move ISPs without it making any difference to your email communications.

You could even pay a small fee to upgrade your email with a custom domain name. Maybe you’ve always wanted to have your email come from @yourlastname.com, because it looks cool. Or, if you have a home business, you could have your email come from @yourbusiness.com. This looks more professional, and you can move the address to any provider, as the domain remains the same.

Whether you’re using an ISP or Web/cloud-based email provider, it’s also a good idea to back up your emails. By downloading and backing up your email, you gain more control and peace of mind.

 

We can help you find the right email provider or ISP for your needs. We’ll help you migrate your email, and we can set up a backup too. Let us help you, call us now at (03) 5273 0230

Filed Under: Residential Blogs

Share:

Your Webcam Could Be Spying

August 6, 2020 by Barry Walker

In the midst of a global lock down, many of us have been relying on webcams to stay connected. These cameras let us join virtual meetings for work and online hangouts with friends. But bad actors can also use a webcam to spy.

Someone watching through a small laptop or personal computer camera may sound far fetched. And if you don’t make a hat out of tinfoil, aliens will take over your brain, right? Except, it is true that webcams can be used for spying.

Seeing someone with a piece of tape over their webcam isn’t that unusual. Even Facebook’s founder does it. At conferences now, you might even receive a branded sliding webcam cover as swag.

 

How Webcam Spying Works

How can someone access your webcam in the first place? Typically, they’ve installed malware. The malicious software allows them to remotely control your computer and view its webcam.

A cyber-criminal might access your webcam using spy software, a remote access Trojan (RAT). The software spreads through freeware, spam emails, infected attachments, or fake website links.

The software allows the remote user to take control of your computer. They could view your online activity, read messages, or capture screens and keystrokes, and they’ll be able to turn your webcam on to spy on you – without you knowing it.

The webcam light located near the lens will indicate whether camera is currently recording. However, it’s easy to miss and many people don’t understand what the light means.

 

What to Do About Webcam Spying

Well, there’s that piece of tape, or you might use a Post-It note to cover the camera, but that doesn’t address the bigger issue. Since we’re talking about malware here, the usual rules apply.

  • Don’t trust attachments, even from people you know.
  • Hover over external links to see where they will take you before clicking.
  • Question the credibility of any freeware you might download onto your computer.
  • Install a good antivirus system, especially one that checks emails.
  • Put a good firewall in place to prevent attackers from accessing your computer.
  • Install patches for your operating system, browser, and software to keep security current.

While we’re talking about webcams, keep in mind your smartphone camera and any surveillance cameras need protection too. On your phone, keep your passcode private and make sure antivirus and security patching is up to date. With a surveillance system, always change the default password – you’d be amazed how many people don’t bother to do so – as that’s just making the hackers job easy for them!

Want to be sure you’re not being spied on? Our IT experts can make sure you have a strong firewall in place to monitor network traffic and block suspicious activity. We can also ensure your antivirus and malware security is top notch.

Don’t find yourself on camera when you’re not ready for your closeup!

Give us a calls today on 1300 600 550!

Filed Under: Residential Blogs

Share:

Backup Your Apple Computer

July 15, 2020 by Barry Walker

There are many moments in life when we would like to travel through time. One common instance is when an important document disappears from our computer screen. Making things worse, we forgot to save it! That’s hours of work lost. Fortunately, Apple users have Time Machine’s built-in backup feature for added protection.

This software automatically backs up apps, music, photos, email, documents, and system files. You can backup to

  • external storage devices;
  • another Mac set up as a backup destination;
  • network-attached storage (NAS).

It’s simple. Connect your Mac to an external drive, then Open Time Machine to select your backup destination. You can select when backups happen and what gets backed up, and you’ll also have the option of encrypting your backup, which is a good idea.

Time Machine keeps hourly backups for 24 hours, daily backups for a month, and weekly backups for previous months until full. The oldest backups get deleted when space is needed.

All you need to do to restore your original files is turn on and connect the Time Machine backup disk. Then, you can use the timeline on the Time Machine screen to find the items to restore.

We recommend all Mac users set up Time Machine to backup to at least an external drive, and Apple makes it easy to setup this minimum level of backup. With the local device, you’ll have a first line of defense close at hand if you need to recover or restore your computer.

However, this basic backup does limit your options. To amplify your protection, consider these alternatives.

Gaining More Control of Your Backup

Third-party software offers additional layers of protection. You gain detailed control of what is backed up and when, and what happens afterwards (perhaps you’ll want the software to eject the external device or shut down). You can also find software that backups operating systems and settings too. This could prove useful if your Mac gets stolen or damaged. You’ll be able to move to another device and quickly get all your data and applications configured as they were.

Another alternative for enhanced backup is the cloud. Time Machine and third-party software solutions require a local device to hold the backup. But if your computer is stolen, the thief is likely to have taken your backup too. Or, if your laptop is damaged in a flood or fire, the backup is probably also destroyed.

You’re also at risk of ransomware with Time Machine and third-party software. If malicious software compromises a device (yes, Macs are vulnerable too), it’s going to spread to connected or networked devices. So, the USB backup drive or NAS is as susceptible to encryption as the main Mac device.

Cloud backup provides a solution that helps avoid all these issues. Your backup data is stored in a datacenter that the thief, fire, flood, or ransomware can’t touch. Most cloud backup providers boast rigorous security protocols.

Eventually, all hard drives will fail. Backing up important data to one device leaves you at risk of a single point of failure. Cloud backup removes the fear that the one backup drive isn’t going to be working when you need it.

Need help setting up Time Machine, a third-party backup, or configuring your cloud backup? Let our computer experts help! We don’t want anyone to go without the safety and security of a reliable backup.

Contact us today on 1300 600 550!

 

Filed Under: Residential Blogs

Share:

What Computer Repair Can Be Done Remotely?

June 15, 2020 by Barry Walker

There are many problems with isolation. We don’t want to get you started. We know it’s true, but one issue we can help with is computer repair. Yes, there are problems with your home devices that we can address remotely.

Perhaps before sheltering in place you were willing to make do, or you’re only facing challenges now. You’re working at home, kids are online learning, and you’re sharing the same computer.

You need to remain connected to the world and continue working, but you don’t want someone to come into your house to check your computer, and you’re not keen on going out to wait in line at a computer repair shop. Fortunately, with technology today, it’s much easier for IT experts to resolve computer issues remotely.

Remote Repair of Home Computers

There are many common computer issues that we can help address remotely. We’ll start out by sending you a link to download a tool that gives us remote access and control of your computer. Please know that we value our customers’ privacy. Even with this tool, we’ll still be able to access the computer only when you allow us to.

Now, what can we do once we have eyes on your computer from our remote location? Many things.

If you’re troubled by a slow computer, we can run diagnostics. We’ll find ways to speed up and optimize your computer to get you back in business more efficiently.

Running into software errors? We can take a remote peek and troubleshoot the issues to get you back on track.

The problem might be due to a virus or malicious software. A remote computer expert can identify security risks and remove viruses or spyware.

Perhaps you need to install software for video conference calls or online learning. With remote access, IT experts can install and set up applications, and personalise them to your needs.

Working from home has many of us setting up separate email accounts, because we need to keep personal and professional communication separate. With authorised access, remote tech support can install email and handle problems.

Your home printer may have been up to the job when it was in use intermittently, but it’s struggling to manage the demands of everyone at home at once. Installing printer drivers and some maintenance tasks are doable through remote support.

Get the IT Support You Need. Contact us today at 1300 600 550.

 

Filed Under: Residential Blogs

Share:

Keep in Touch While Social Distancing

May 12, 2020 by Barry Walker

Quarantine doesn’t have to mean you’re on your own all the time. Sure, back in the days of the plague or pox, people were stuck. But now, we have technology to let us remain connected even while social distancing. Here’s a roundup of top options for fun with family and friends.

You can’t have an actual party at your home right now, but a virtual house party could be fun.

The Houseparty app (houseparty.com) allows up to eight people to connect online in a video chat “room.” There’s no need to call people (like on FaceTime) – you get a notification when friends are online. Plus, you can switch between rooms easily. It’s like wandering from the kitchen into the backyard.

Zoom (zoom.us) is another app that lets you have a virtual get-together. Only the host needs to have a Zoom account and the other participants follow the link to the video conference. Free meetings are capped at 40 minutes, though, for groups of three or more.

If your friends and family are on Google, you can bring up to 150 of them together in a Google Hangout (hangout.google.com). Long ago, a go to for a international calling, Skype is another video chat option.

 

Social Distancing Chat

Maybe you want to catch up but really don’t need to see each other’s faces. Perhaps you don’t want to have to get dressed!

Take texting up a notch with Slack (slack.com), which can keep clubs and teams together during quarantine. You can easily share files, instant message, share gifs and also jump on a video call.

Discord (discordapp.com) is another app that combines text chat, voice chat, video chat and more. A favorite already with gamers, Discord offers helpful templates to get started. People also use this app to live-stream art creation, read stories, play music together and even host digital conventions.

Nextdoor (nextdoor.com) helps you connect with your neighbors. Did you see a coyote? Want to know when garbage pickup is coming this week? Hosting a virtual garage sale? This is social media specific to your ’hood – and you don’t have to go out of doors to get caught up.

 

Movies with Friends

Another way to chill together online is by enjoying a movie or binge watching a TV series.

With Watch2Gether (watch2gether.com) you can create a room and invite friends and family to watch YouTube, Vimeo, Dailymotion and SoundCloud. You could even use this app to replicate the group gym class experience. PopSugar, for instance, offers a wide range of free videos available on YouTube.

If you have a Netflix account and a Google Chrome browser, you can tune in together with Netflix Party (netflixparty.com). The app lets you chat back and forth while viewing. The best thing is that all party members are watching the video in sync. No one ruins that big moment by texting a response a few seconds early!

 

Other Great Options

Looking for more active virtual fun? With Rave (rave.io) you can host a virtual dance party. You can sync music videos from YouTube, Vimeo, Reddit, Google Drive, Dropbox, and Viki with friends in real-time, or create a playlist of songs, then text and video chat simultaneously.

If you’re wishing you could meet someone new, try Quarantine Together (quarantinetogether.com). This dating app starts out by asking you if you’ve washed your hands today. Then, it will match you with someone else for a text chat. After 20 minutes of texting, you’ll be sent a video chat URL.

Really, there’s no excuse for being a hermit during quarantine – unless you want to be, of course!

If you need help setting your devices up with any of these apps or the video or voice technology, our experts can help – remotely.
Contact us today on 1300 600 550.

Filed Under: Residential Blogs

Share:

Steer Clear of Coronavirus Scams

April 5, 2020 by Barry Walker

With the world struggling with a health pandemic, scams are shocking. Unfortunately, bad characters are everywhere, always looking for opportunities and they’re seeing one in the coronavirus. This article outlines what you need to watch out for and how to stay cyber safe.

The last thing you want to read right now, is that there’s another threat out there – sorry, but it’s true. Cyber-criminals take advantage of fear. They take timely concerns and use them to target victims. Using the anxiety and upheaval around coronavirus is their mission.

What to Watch Out For

So far, several coronavirus-related attempts to cyber-scam people have been reported. There are examples of:

  • emails that appear to come from government health departments;
  • offering a tax refund to get people to click on malicious links;
  • memos to staff that appear to come from large employers;
  • COVID-19 test offerings from private companies;
  • fake websites promising to sell face masks or hand sanitiser;
  • soliciting donations to help fund a vaccine.

What to Do

Be cautious. It’s understandable that you’re anxious, but don’t let that stop you from taking cyber precautions. You should still:

  • be wary of anything that tries to play on your emotions and urges immediate action;
  • question where emails are coming from – remain vigilant even if the communication appears to come from a reliable source;
  • hover over links before clicking them to see where they will take you;
  • avoid downloading anything you didn’t ask for;
  •  doubt any deals that sound too good to be true (“a mask that stops the virus 99.7% of the time!”);
  • ignore any communications requesting your personal information;
  • don’t be suckered by fraudulent pleas for charity.

Global health organizations generally do not send out emails with advice. Instead, navigate directly to that reputable health institution for real news.

If you’re still not sure about the validity of the communication, check it out. Do so by calling or using another medium to get in touch with the “source” of the received message.

While there is not yet a vaccine for COVID-19, you can put anti-virus protection on your computer. Also, make sure that you’ve applied all available security updates to keep your software safe.

We hope you’ll take care and stay healthy both physically and online in these tough times.

Need help installing security software and keeping your technology safe? Our cyber-security experts can give your home a tech immunisation.

Contact us today at 1300 600 550.

 

Filed Under: Residential Blogs

Share:

  • 1
  • 2
  • 3
  • Next Page »

Newsletter Categories

  • Newsletters – Business
  • Newsletters – Residential

Recent Newsletters

  • Why You Need to Uninstall Adobe Flash Player February 14, 2021
  • Tech Help for New Year’s Resolutions January 13, 2021
  • Got a Bad Case of Password Exhaustion? November 20, 2020
  • What Are Cookies? October 9, 2020
  • 7 Reasons to Replace Your Internet Service Provider (ISP) Email September 18, 2020

Element IT

1300 600 550
(03) 5273 0230

Element IT – Geelong

Monday to Friday 9am to 5pm

FOLLOW US

Copyright © 2021 · Element IT · (03) 5273 0230