Security & Safety Archives - Geeks on Wheels https://geeksonwheels.co.nz/category/security-safety/ Tue, 27 Jan 2026 03:09:16 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.3 https://geeksonwheels.co.nz/wp-content/uploads/2023/05/logo.png Security & Safety Archives - Geeks on Wheels https://geeksonwheels.co.nz/category/security-safety/ 32 32 217137899 Your 2026 Tech Checklist https://geeksonwheels.co.nz/computing/2026-tech-checklist/ Tue, 27 Jan 2026 03:06:32 +0000 https://geeksonwheels.co.nz/?p=19607 Hey Geek fans! A new year is the perfect excuse for a fresh start, and that includes your tech! We all make New Year’s resolutions for ourselves, but what about the devices we rely on every single day? Leave your bad tech habits behind in 2025 and start fresh in 2026. We have a simple tech checklist that will make sure you’re doing the right things for your technology this year.

Update your device!

If you read our blogs or emails regularly, then you’ve probably had enough of us telling you to update your computer.
With the Windows 10 EOL having been and gone, we spent a lot of 2025 reminding people to update.

But, even if you’re using a Mac or a Windows 11 device, you need to stay on top of updates.

Not surprisingly MacOS and Windows 11 have already rolled out updates in 2026. There have also been security patches and updates released for Microsoft Office, Google Chrome and other popular programs. Updates are constant and if you don’t keep up to date, then your device could be at risk. To check for updates to your operating system it’s simple. On Apple devices, go into Settings > General > Software Update > Update Now. On Windows devices go to Start > Settings > Windows Update, then click Check for updates. There are some other ways which are listed in this handy blog.

Still using Windows 10? It’s time to make the transition because extended security updates won’t be around forever, and your device will start to fall behind. Speak to the team about options today!

Backup your files

When was the last time you backed up your device? Keeping a backup of your precious files is an important step many of us overlook. Sadly photos, documents, and files can disappear without warning for a range of reasons. Due to things like accidental deletion, hardware failures, power issues, ransomware, or malware attacks. These events often happen without any warning. Recovering your data can be very difficult or even impossible! This means it’s the perfect inclusion on our 2026 tech checklist. Whilst backing up your files, take the time to organise things so they are easier to find down the line.

Incorporating regular backups into your tech routine is a great way to protect yourself from surprises! Whether you prefer cloud backups, external hard drives, or a mix of both, having a recent backup ensures your files are safe, no matter what happens. Your data is at greater risk if not backed up. Make backing up a habit in the new year, it’s definitely a smart move!

Backups can be physical, on external hard drives or cloud-based, using storage plans with providers like Apple’s iCloud, Google Drive or Microsoft’s OneDrive — these are technically called data synchronisations and are not as secure as true backups. If you delete a synced file from OneDrive, this file is deleted everywhere. That means that if a file is accidentally deleted, you don’t have a copy of it saved elsewhere.

Important Reminder

Using a hard drive or USB? Connect the drive or USB to your computer and use the built-in backup tool. (Time Machine for Mac or File History for Windows). Just remember to store your backup separately and avoid leaving it plugged into your device all the time. If a power surge were to happen or a virus found its way into your computer, it could potentially jump onto your backup drive.

Ensure your antivirus is active

Is your antivirus active? Have you even checked? Start 2026 with 100% peace of mind.
First of all, you’ll need to be sure that you have a premium antivirus installed. We recommend Malwarebytes Premium.

If you already have antivirus software on your device, ensure it’s active. Simply open up the software, and you should see a banner that says something like secure, active or protected. If the banner says activate or renew, your antivirus protection may have expired. For more details relevant to your specific antivirus software, we’ve put a list together here.

Whilst you have your antivirus open, run a system scan of your device to check for any unwanted viruses. If the scan finds anything, follow the onscreen steps to fix it. If a serious virus or malware is detected, give us a call for a thorough device clear-out and virus removal.

Review and update your security

When did you last update your passwords? Have you enabled 2FA or MFA on all of your important accounts? What private information can people find out about you from your online profiles?

The new year is the perfect time to review all of this. If you’d like to know if your login details have been compromised in a data breach, we suggest checking on the website haveibeenpwned.com. This website will let you know if your login details have been released in a data breach. If they have don’t be alarmed. Just make sure to update your passwords and enable MFA on any of the affected accounts.

  • Review your passwords – Make sure you’re using a different one for each login and update any compromised details with new strong passwords.
  • Enable 2FA/MFA on all accounts – For important logins, like banks, email accounts, social media platforms and any accounts with personal information, this is a must-do.
  • Review your privacy settings – Do people really need to know your whereabouts and personal information? Consider updating your privacy settings for your social media profiles so only people you know can find out information about you. You can even stop strangers from sending you unwanted friend requests.

Need help upgrading your operating system or getting your security in order, well Geeks on Wheels is the perfect team to help. Our devices give us access to our finances, communication,  healthcare and businesses or work, so ensuring they are safeguarded and ready for the year ahead is important. You wouldn’t drive an unserviced car, don’t treat a computer any differently. Let the experts tick off your 2026 tech checklist. Book today!

]]>
19607
How New Zealand Banks Are Keeping You Safe https://geeksonwheels.co.nz/security-safety/how-new-zealand-banks-are-keeping-you-safe/ Tue, 30 Sep 2025 23:55:46 +0000 https://geeksonwheels.co.nz/?p=19163

These are a few of the exciting internet banking security features that banks are keeping you safe from banking scams in 2025. We often cover the doom and gloom of internet scams, reminding readers to secure their accounts and use strong passwords. With Kiwis losing over $1.6 billion to online threats in 2024, it’s clear scams are a serious risk. But 2025 is looking brighter; banks are introducing new tools and protections to help keep your hard-earned money safer than ever.

Discover our favourite internet banking security features from Kiwi banks. Make sure that if you’re a customer, you make the most of these exciting new features. This is not an exhaustive list, so be sure to research what security features your bank has.

One major feature that has now rolled out to all major Kiwi banks is Confirmation of Payee. You’d have likely noticed this if you’ve recently paid someone new. This is when the banking app or website checks to make sure the name and account details match up, ensuring you’re not paying the wrong person.

ASB mobile banking app

New ASB security features

Aside from the standards like 2FA and Face ID, ASB has made some exciting announcements in 2025 designed to keep Kiwis safer when banking or shopping online.

Caller Check

Caller Check is ASB’s latest innovation in its fight against scammers. The tool helps protect customers from impersonation scams by allowing ASB customers to confirm they’re speaking with an actual ASB employee when they receive a call from the bank. This is done using a push notification from the ASB Mobile Banking App. Scammers will often call victims claiming to be from trusted organisations, including banks. This feature allows you to verify that simply and easily, using a trusted app already on your device.

24/7 Fraud Line

Although launched in 2024, the ASB 24/7 fraud line is a great resource for customers who require urgent help. The helpline is able to provide advice and assistance to victims and potential victims around the clock.

Westpac mobile banking app

New Westpac security features

ASB is not the only bank to roll out new security features and tools designed to keep its customers safe. Westpac Bank has improved online shopping security for its customers with its latest security tool.

Digital Westpac Card

A digital card has a few benefits to users, including convenience and accessibility but the main drawcard is the added security provided by a dynamic security code. This replaces your regular 3-digit CVC on the back of your card and changes every 24 hours in the Westpac One app. This means you can shop with extra peace of mind, knowing that if your card details are entered into an unsafe website or recorded by scammers, they won’t be able to continue shopping with your card details once the CVC resets. Westpac is the first New Zealand Bank to offer a dynamic security code feature alongside instant issuance for debit cards.

24/7 Helpline

Just like ASB, Westpac bank also has a 24/7 helpline for urgent assistance. Meaning as soon as you are suspicious that something isn’t quite right, you can reach out to the bank and get things sorted.

BNZ mobile banking app

Recent BNZ Internet Banking Security Improvements

BNZ also has some great security features that go above the likes of 2FA and in-app card blocking. Their biggest new features were introduced late last year and are designed to improve customer safety and reduce the number of successful scam attacks.

Online Banking Lock

This feature lets customers disable all online banking activity if they suspect a scammer has gained access to their accounts. BNZ says “While anyone who suspects they’re the victim of a scammer should always call their bank immediately, this tool gives customers the ability to lock their online banking while they’re making the call.”

To regain access, customers must verify their identity in a branch. This is a great feature with instant results, saving precious seconds in the important time immediately following or during a scam attack.

Voice identification

Again, not an entirely new feature but one that is sure to provide some peace of mind. BNZ has extra protection when you call to speak with the Contact Centre. This is in the form of a pre-set voice identification, allowing the bank to securely identify callers.

No More NetGuard

NetGuard cards were seen as a breakthrough for internet banking security in 2006 when they were first launched. Of course in the nearly 20 years since then the online banking landscape has changed a lot. BNZ has used an app-based system to authenticate logins since 2012 but has only recently scrapped the NetGuard option altogether.

ANZ mobile banking app

ANZ Security Features

ANZ has a stack of security features designed to keep internet banking users and online shoppers safe. These include their versions of some of the features mentioned above.

ANZ Dynamic Security Code

This feature is the same as Westpac’s, with the changing CVC number, however ANZ’s option has a shorter window, changing every 12 hours. This acts as an extra layer of protection for your ANZ Visa card when shopping online.

Control How Your Card Can Be Used

One interesting security feature that not every bank has is the ability to turn off certain types of purchasing. In the ANZ goMoney app, users can turn on and off online shopping, overseas in-person purchases, contactless and online gambling purchases.

This gives you peace of mind and added security by limiting what exactly a scammer could do if they gained access to your card details.

Biometric identification

You may have seen videos of this online already. ANZ has numerous options for biometric identification, including Voice ID. Voice ID allows you to log in to ANZ Phone Banking or identify yourself with our contact centre with your own unique and secure voiceprint. This is a great extra layer of security, especially if you prefer to do your regular banking over the phone. It can also give you extra security when making payments above $10,000 in the ANZ goMoney app, by verifying your identity using your unique voiceprint.

mobile banking app

Other Good News

Even if you didn’t see your bank mentioned, chances are they have some great security features in place. All of New Zealand’s major banks have 24/7 monitoring, keeping an eye out for suspicious transactions. Most banks now require some form of two-factor authentication. Most also have some form of guarantee or protection in the event you are scammed through no fault of your own. There will be terms and conditions with these, so make sure you’re complying with them whenever you’re using your cards or accessing your accounts.

Need help identifying scams?

In today’s rapidly evolving digital world, online safety has never been more important. At Geeks on Wheels, we understand the need for a reliable defence against the ever-growing threat of online scams. That’s why we’ve developed GeekSafe™ – a membership designed to empower you. Providing the tools and knowledge to stay safe online, ensuring you can browse, email, and connect with confidence. For just $85 A YEAR, you can unlock a world of online safety knowledge and protection.

]]>
19163
Scams affecting popular online games for kids https://geeksonwheels.co.nz/security-safety/scams-affecting-kids/ Wed, 13 Aug 2025 23:48:50 +0000 https://geeksonwheels.co.nz/?p=18993

This 2025 International Youth Day just been, we’re homing in on prevalent scams that are affecting popular online games for kids! In particular, we’ll be focusing on Roblox scams, Minecraft scams and Fortnite scams!

We know it’s more often than not a parent’s card connected to their child’s gaming account. That’s why we’ve put together this handy blog which lists common scams on each online game and details how exactly they work. If anything, it serves as a perfect opportunity to initiate a family discussion around online safety tips for kids. That way, you can avoid any unexpected transactions on your credit card in the future!

Source: microsoft.com

Roblox

Roblox has been around since 2006 and it has become a hugely popular gaming choice for kids, mostly under 16 years of age. It’s got a pretty distinctive look, with characters giving off a boxy and animated appearance. Some might even say it slightly resembles Lego! It’s like a virtual playground rather than a single game. Kids can play a wide variety of user-created games, or even build their own to share with other players.

Roblox fake trading scams

Like all of the online games for kids that we’ll be covering in this blog, trading scams are probably the most prevalent. In this Roblox scam players will trick victims into giving up Robux (the games digital currency) in exchange for something else.

Roblox has official system features, one their “trade feature” and the other their “selling feature”. Any trades or deals made outside of these features are unofficial and therefore suspicious of intent.

Some examples of suspicious trades include:

  • If another player requests to “borrow” your account or items or even suggests to “lend” their own.
  • Making a trade where the other player makes you go first.
  • When another player offers to sell or trade for you on the condition they have access to your accounts and items.

If a trade feels risky, it probably is. So don’t risk it and opt out!

Free Robux generator scams

“Free Robux generator” scams can appear anywhere online, from YouTube videos to links in Roblox games and even in search results that rank high on the search engine results page.

These “free generators” will always result in your account, your Robux and your other items being stolen. Or in some cases, Malware being loaded onto your device. Unfortunately, there is no such thing as free Robux, free memberships, tricks or codes. So if a shady website or pop-up ad is promising you any of these freebies, walk away!

Buying and selling experiences

A Roblox “experience” refers to a user-created game or virtual world that is generated using the Roblox studio. They can be owned by one individual user, or a group of users.

Unlike the trading and buying of other stuff, Roblox has no official way to buy or sell experiences. And, since there is no official system, Roblox suggests not giving other players Robux or any other items in exchange for an experience. 

Usually, a scam will start when a scammer offers to buy or build experiences for victims on the condition that they provide access to their account, aka providing login details. This often results in the scammer stealing other items, Robux, and ultimately taking over the victim’s account.

Spam chain mail scams

This particular Roblox scam creates a sense of urgency and pressures the victim by strongly implying something terrible will happen to the them and their account should they not share a circulating message. The message will read something like, “Forward this or something bad will happen”.

This is obviously a hoax. Roblox has no policies or features that would require such a thing to avoid facing “negative consequences”. These messages are designed to spread malware using malicious links and could result in stolen data.

It’s also worth noting that if you do forward along messages like these, your account could get a legitimate warning from Roblox themselves for spamming.

Source: nintendo.com

Minecraft

Minecraft was initially released in 2009 and was created by Markus Persson, also known as Notch. Explained simply, it’s a sand box game where players can build, explore and survive in an iconic pixelated terrain. It’s seen as one of the more beneficial online games for kids, thanks to its educational value. It’s even been used in schools! There are five different game modes that players can choose from. Survival mode, hardcore mode, creative mode, adventure mode and spectator mode.

Fake Minecraft app scams

Recently, an investigation found 80 fake Minecraft mobile apps on Google’s Play Store that were downloaded approximately a whopping million times!

These malicious apps will aim to do a number of things. They spam users with ads, redirect users to shady websites, and/or spread malware that’s main purpose is to steal important information and data from the victim.

Our online safety tips for kids, when it comes to downloading applications, include the following.

  • Only download from trusted sources. (Apple’s app store, Google’s Play Store, Microsoft Store etc.…)
  • Check out reviews and app permissions before you hit install.
  • Keep your device up to date so it has the latest security software.
  • Ensure you have a reputable anti-virus loaded onto your device. We recommend Malwarebytes!

Minecraft phishing scams

Since Microsoft owns Minecraft, scammers will often send out phishing emails that claim to come from the reputable tech company.

These phishing emails can allege a number of things. From account issues to prompting the recipient to update.

These emails will likely include malicious links that either spread malware or take you to fake websites or payment portals. You will often be prompted to enter sensitive information, such as your login details or even financial details, ultimately resulting in money loss, account takeover or virus infections.

We’ve put together some tips for parents and kids to help spot phishing email scams. While younger children might not have their own email accounts, scams can still land in a parent’s inbox. So, both kids and parents could be tricked if they don’t know what to look for. Here’s what to keep an eye on.

  • If you hover your cursor over the email and the hand pointing icon appears, this means the entire email is one image and could have something malicious linked.
  • Poor spelling and grammar
  • Not personalised. Doesn’t address you by name.
  • Unexpected or unasked for.
  • Includes strange links or addresses. Legitimate ones should end in mojang.com, minecraft.com, minecraft.net or microsoft.com.
  • Names or logos might not look quite right.

If you’ve checked all these points and you’re still not 100% confident, go directly to the Minecraft website or Microsoft website. Just log in to your account and you’ll be able to see if there are any new notifications or pending account updates available.

Minecraft fake discord server scams

A popular Minecraft scam is when scammers pretend to need a teammate and invite users to a fake discord server that looks official.

Discord is a communication platform where users can speak to other users using text, voice or even video. People often use it to join “servers,” which are like group chat rooms for specific games or communities, so they can strategise, share updates, or just hang out and talk with friends who enjoy the same games.

In order to “join in as a teammate” via Discord, the victim is made to “verify” their account and tricked into giving up login details and a one-time code. What the victim doesn’t know is, this “one-time code” is actually for a password reset so the scammer can gain complete access to their account.

Some online safety tips for kids regarding Discord servers:

  • Don’t talk to random people asking you to “verify your account” on Discord. (If you do, don’t join their server)
  • If you’ve joined the server, don’t complete the verification if they ask for your Microsoft email or a one-time code. Real Minecraft servers will never ask for these.
  • Stay cautious and do some research if you’re not 100% confident in the legitimacy of the server. Try googling what the scammer requested of you followed by the word “scam”. In this case “Minecraft Discord verification scam”.

For more advice on Discord scams, click here to read Discord’s official tips!

Source: epicgames.com

Fortnite

Fortnite was released in 2017 and is an online multiplayer shooting game. It has a lot of different modes that players can choose from, such as Save the World, Lego and Creative. The most popular online games for kids being Fortnite Battle Royale. This is where 100 players enter an online game with the goal of being the last individual or group standing.

Fortnite fake trading scams

A big part of the appeal of Fortnite, is the buying, earning and collecting of skins, features and items. Fortnite “skins” are outfits or costumes that a player’s character will wear in the game. Features or items can be anything from free battle passes to cosmetics, to pickaxes (used for gathering resources in Fortnite).  

Several of these skins and features are not for sale in Fortnite’s online store, but are only available based on a rewards system and other accomplishments. Because these items are so in demand, some players may choose to buy and trade for user accounts that have the items they are after.

As you can probably guess, the victim of this Fortnite scam will either pay real-world money using payment methods like Apple Pay or PayPal, or trade V-Bucks (Fortnite’s digital currency) or even their own account in exchange for the scammer’s account with its coveted skins and features. In the end, the scammer will block the victim after getting payment or access to their account. That is, without ever handing over their own account or whatever they promised to trade.

Fortnite free V-Bucks generator scams

Any Fortnite scam centred around the promise of free V-bucks is always likely to catch young Fortnite gamers who want fast money! Often, by offering “free V-Bucks generators” scammers can easily lure kids into providing their parents’ card information and other sensitive information.

Scammers will link these “free V-Bucks” promotions on websites such as YouTube and Facebook, which are platforms that are already pretty loaded with adware. They’ll also strategically promote on videos that are intended for kids. These ads will link to the scammer’s malicious websites, where the child will then be prompted to provide sensitive information.

The best lesson you can teach your kids here, is that there is no work-around for earning V-Bucks and patience is important (probably not what they want to hear!). Whether it is an Epic Game’s employee promising free V-Bucks, or a very genuine-looking ad on YouTube, it’s never legitimate!

Fortnite fake tournament scams

Since competition is a big lure for Fortnite players, scammers have wisely taken advantage of this and started creating fake tournaments.

Scammers will entice players with tournaments that promise considerably large prizes such as V-Bucks, rare items or exclusive skins.

You’ll notice the promotion of these fake events on social media or on untrustworthy websites. Please note, if a tournament is not advertised on Fortnite’s official channels or other trusted e-sports platforms, you’re probably dealing with a scam.

A fake tournament will usually go as follows. The scammer will ask for a small registration fee and/or ask you to register with personal information and account details. They’ll then collect money and sensitive credentials from hundreds of players and vanish before holding the tournament.

The scammer may also get you to download virus-loaded software by claiming that it’s a gaming tool that will improve game play.

Our biggest red flags for a Fortnite fake tournament scam are:

  • Promises of large prizes that are “too good to be true”.
  • Asking for a small registration fee. Although some legitimate tournaments may have a small playing fee, more often than not, it is free to enter official Fortnite events.
  • Asking players to download third-party untrusted software for “better game play”.

Has your little one fallen for a scam affecting popular online games for kids? Don’t deal with the after affects yourself! Geeks on Wheels can help you manage a malware loaded device and get you set up with scam protection to prevent future mishaps having such a nasty roll on affect! We can also help you set up other preventative measures such as parental controls, data backup and two-factor authentication! Just call the Geeks today!



]]>
18993
What to do if I lost my phone? https://geeksonwheels.co.nz/security-safety/lost-my-phone/ Mon, 21 Jul 2025 02:30:29 +0000 https://geeksonwheels.co.nz/?p=18816 Billie Handley

Unfortunately, none of us are immune to losing our phones or having them stolen. What we’re trying to say is… it happens! That’s why we want to help you stay better prepared in case it happens to you. After all, it’s better to be safe than sorry. We’ll help you answer the question “What to do if I lost my phone?” by giving you a step-by-step guide on what to do if your phone goes missing!

Call it!

If you’re Googling what to do if I lost my phone, take a breath and start simple! Before anything, and that includes before thinking the worst and panicking, give your smartphone a call! You can do this using a friend or family member’s device. But you will have to know your contact number!

As long as your device isn’t on silent mode, do not disturb, or airplane mode, you should be able to hear if it’s within earshot or not! Just give it a few calls while retracing your steps. Because, it very well could have slipped down the side of the couch. Or, been left on your car seat when you ran your errands in town.

Sometimes, you might even get an answer from a stranger who has picked up your phone, or had it handed in to them. In that case, you can organise a pickup safely.

Pro tip: Enable flashlight alerts so that if you do misplace your phone and it’s on silent, you might still be able to find it by seeing the flashing notification. This works especially well at night, of course.

Track it!

If you’ve retraced your steps, called your phone a few times, and still had no luck… It’s best to track your phone to confirm its whereabouts!

You can track the location of your device with either ‘Find My’ for Apple users or ‘Find Hub’ for Android users. But first, you’ll need to make sure they’re enabled on your smartphone. It’s worth noting, you won’t be able to enable tracking after your phone goes missing. So, it’s important to get it sorted now, just in case!

To enable ‘Find My’ on your iPhone, open Settings > tap [Your Name] > Find My > Find My iPhone > Slide the toggle on.

To enable ‘Find Hub’ on Android, make sure you are signed into Google on your device before you do anything. Next, go to Settings > Google > All services > Find My Device > Slide the toggle across to turn it on.

Now you’ve got these awesome tracking tools enabled on your smartphone, you’re ready to find my lost phone!

Wondering how to find a lost phone’s location when you don’t actually have your phone on you? If you’ve set up tracking tools in advance, you can use another device. Whether that device is yours or someone else’s, to help locate it.

If you’re using another one of your own devices that’s signed in with the same account as your lost phone, just open the ‘Find My’ app on Apple or the ‘Find Hub’ app on Android, if you have them pre-downloaded. There is also the option to use the website version for both Apple and Android. This is your easiest option!

If you’re using someone else’s device to find a lost phone, that’s okay too! On an Android, you’ll need to sign in as a guest using your Google account. On an Apple device, it either needs to be logged into your Apple ID, or the person you’re borrowing it from has to have already shared their location with you.

Here’s how to find a lost phone’s location for iPhone users! Open the ‘Find My’ app > Devices > tap your lost device > find the location and get directions.

To find your Android location using the app, open the ‘Find Hub’ app > under ‘My devices’ locate your missing device.

Lock it!

There are plenty of preventative measures your smartphone offers beyond just tracking options. That is if you’re still up in the air about what to do if I lost my phone.

Using your smartphone’s find my lost phone features on both an Android and Apple device, you can also remotely lock your device as a security measure. This means no one will be able to access anything on your device. Here’s how!

To lock your iPhone, open the ‘Find My’ app > Devices > tap your lost device > tap Lost Mode under Lost iPhone? > Continue > Enter contact number (obviously not your own) > Enter message > Activate!

On the other hand, to lock your Android, open the ‘Find Hub’ app > under ‘My devices’, tap on your lost device > tap the gear icon which reads Find Hub > Remote Lock > toggle on Remote Lock.

Change your passwords!

To air on the side of caution, it’s a good idea to change passwords for important accounts! In particular, it’s a good idea to start with your email. This is so thieves can’t gain access to your other accounts by doing a quick and easy password reset. So, whether you need to change your Gmail password, your Outlook password or any other email account for that matter, make sure you do it first before anything else!

Don’t know how to change your password? The easiest way is usually by clicking the ‘Forgot Password’ or ‘Reset Password’ link. This is more often than not found right on the login page of the service you’re trying to access! After clicking either of these links, follow the on-screen instructions!

Block your SIM!

If someone has got their hands on your smartphone, the last thing you want them to do is make calls or send texts to your contacts pretending to be you. Even with your phone locked, someone could remove the SIM card and still access your number as well as any information potentially stored on it.

How to block SIM card? Just contact your mobile network provider. For example, this could be Skinny, Spark, One NZ etc.. You’ll want to report to them that your phone is stolen and you’d like to temporarily block your SIM. If you later find your phone, you can then contact your provider again to have them unblock your SIM.

How to block a SIM card permanently? The process is similar to temporarily blocking it, but keep in mind, once it’s permanently blocked, it can’t be reversed. Even if you find your phone later, you’ll need to request a new SIM.

Contact your bank!

These days, our smartphones hold a lot of sensitive information. This includes your bank cards, whether saved in browsers or loaded into Apple Pay and Google Pay. The last thing you want is that kind of access falling into the wrong hands!

If you know you’ve got cards stored on your lost phone, then what to do if I lost my phone should definitely include locking or blocking your bank cards to keep your money safe.

You can easily lock or block a banking card through your banking app, which you can log into from another device. For example, in the Kiwibank app you can go to Cards > select the card you want to lock > then toggle on Block this card.

If blocking or locking your card via the app on another device seems a little too confusing, simply call your bank provider and have them do it for you!

If you’re someone who has their bank cards loaded onto their Apple Pay or Google Pay, you can also disable these too. Again, you can do this using another device.

To disable Apple Pay on a Mac go to System Settings > Wallet & Apple Pay > select the card you want to remove > click Remove or the minus symbol (-). To disable Google Pay on a Windows PC go to myaccount.google.com and sign in if needed > Privacy & personalisation > Download or delete your data > Delete a service > Google Pay > Delete > Follow the on-screen instructions.

Report it!

If you’ve tried calling and tracking your phone with no luck, it’s about time to report your phone lost or stolen to the police. Remember, for non-emergencies such as this, call the 105 number, rather than 111.

When you report a phone lost or stolen, you’ll ideally want to provide your phone’s IMEI number. This can help the police track or identify your phone.

Since you can only find your IMEI using your physical device, it’s a good idea to note it down now as a preventative! Unless of course this isn’t an option for you. If your device is already lost or stolen, you could find your IMEI on the original packaging of your device. You’ll just have to cross your fingers you still have it!

Find your imei

To find your IMEI on iPhone, go to Settings > General > About.

To find your IMEI on Android, go to Settings > scroll down to About phone.

You can also find your IMEI by simply dialling *#06# on your phone. After typing this out a pop up with your IMEI will appear on your screen.

And there you have it! 7 steps to take if you’ve lost your phone. If you’re reading this as a precaution, now’s the perfect time to switch on your phone’s tracking features and jot down it’s IMEI number. Just in case it ever goes missing.

But if your phone’s already lost, we hope these steps help you track it down. Or, at the very least, keep your personal data safe.

Need help getting your smartphone prepared in case of future loss or damage? Book a Geek! We can help you back up your data, set up long and strong passwords and more! Just give us a call at 0800 4 A GEEK!







]]>
18816
How to protect your business from ransomware attacks https://geeksonwheels.co.nz/security-safety/protect-your-business-from-ransomware-attacks/ Fri, 18 Jul 2025 00:02:50 +0000 https://geeksonwheels.co.nz/?p=18802

In recent weeks, some local businesses have been pressured to shell out thousands or risk losing important data as a result of ransomware attacks. Ransomware attacks involve installing malicious software or malware on a computer or device that usually encrypts files, making them unusable. Once ransomware has found its way onto your devices or systems, there is little that can be done to recover your data. You wont be able to unencrypt files and get your business back up and running. Taking preventative measures will help you minimise the impacts of a ransomware attack. These steps will ensure you mitigate the costs and disruption to your business are effectively. 

1.      Make regular backups of your important files.

This statement is true for your personal data and devices too. Make regular backups of all data, essential files needed for business operations. If you were to lose access to all of your recent client files today, would you be able to keep operating?

  • Check that you or a member of your team know how to restore files from the backup, and regularly test that it is working as expected.
  • Ensure you create offline backups that are kept separate, in a different location (ideally off-site), from your network and systems.
  • Make sure that the devices containing your backup (such as external hard drives and USB sticks) are not permanently connected to your network or plugged into your device. Attackers can target connected backup devices and solutions to make recovery more difficult.
  • You should ensure that your cloud service protects previous versions of the backup from being immediately deleted and allows you to restore to them.

Backup accounts and solutions should be protected using 2-factor or Multi-Factor Authentication (MFA), and the MFA method should not be installed on the same device that is used for the administration of backups.

2.      Staff training to prevent malware infections

Make sure you and your team are familiar with identifying potential malware and are aware of the common ways ransomware infects systems. It’s also a good idea to set some guidelines for best practice to help keep everyone’s devices and data safe. Ransomware can find its way onto systems in different ways, some common ones include:

  • Social Engineering: This could include phishing emails, persuasive phone calls or even social media messages. So, training staff on how to identify these is important.
  • Outdated Systems: Outdated devices, or software containing unpatched publicly known exploitable vulnerabilities are easy targets. Ensure your team is using up-to-date devices and software.
  • Malicious links/websites: Just like any malware, ransomware can often find its way onto systems from malicious sites. Ensure your team isn’t using their work devices for personal use and know how to identify and avoid malicious sites.
  • Infected physical drives: This method is less common today, but something to be aware of. If an unsuspecting user plugs an infected drive into your computer, it may execute malware and begin the encryption process, bypassing network security. Make sure you have guidelines around plugging drives into devices.
  • Device usage: Training around using work devices safely is important. Ensure business devices are kept for that purpose and not used for personal use.

3.      Review your current network security

Many businesses, especially smaller ones, treat cybersecurity as an annoying hassle. Something they will eventually get around to, but don’t always prioritise. Now is the perfect time to review your current security protocols and implement any changes needed.

  • Install antivirus & browser protection: At a minimum, make sure you have antivirus and browser protection running on all devices connected to your network or those with access to your backups and important files. Even with the above training, users can still make errors and find themselves on malicious sites.
  • Update devices and software: By updating your system, you can mitigate risks associated with unpatched vulnerabilities. In simple terms, older software has security risks that newer versions have already fixed. If you don’t upgrade to the newer versions, these known risks are easy for scammers to exploit.
  • Use MFA & strong password policies: Multifactor authentication is an important tool for keeping your backup files secure. It can also be used to authenticate users so that if malware steals credentials, they can’t easily be reused. It’s also important to ensure all users are using strong, unique passwords that have no personal information and are not used for other personal logins. Read our guidelines for creating strong passwords here.
  • Review and remove invalid permissions: This is an easy step to forget, but it’s important to remove permissions after team members move on. Review this regularly. More valid user credentials are more (potentially vulnerable) entry points to your system.
  • Segment networks & layered defence: Although not always possible for smaller businesses, it’s a good idea to limit the access a malicious actor has if they gain access to one part of your network.

4.      Have a plan

Failing to plan is planning to fail. That adage applies to cybersecurity as well. In the modern digital landscape, risks and threats are inevitable. It’s important you have a plan and procedure in place for what to do if the worst should happen. Response plans can start simple and become as complex as your business or organisation requires. The basics include things like:

  • Establish critical data and assets: Understand the impact a malware attack may have on your most important devices.
  • Decide who needs to know what: A quick response is vital to limiting the fallout of a ransomware attack, so it’s important to establish who needs to be contacted at the first sign of an attack.
  • Discuss how you will respond: It’s important you’ve thought about how you will respond to the ransom demand and what your first steps will be to protect your systems.

Should I pay the ransom?

The New Zealand Government strongly discourages the payment of ransoms to cybercriminals according to their guidance on cyber ransom payments. The government guidelines go on to outline the implications of paying a ransom, which include.

  • No guarantee of the end of an incident, or the removal of malicious software. It does not guarantee that you will get your data back.
  • Creating a financial incentive for criminals to continue or expand their activities, including potentially targeting you again.

If you haven’t put a plan in place for how to manage ransomware risks and respond to attacks, then now’s the best time to get started! Reach out to the friendly Geeks on Wheels team for some friendly support and advice on 0800 424 335.

]]>
18802
Interesting facts about technology (or technology myths?) https://geeksonwheels.co.nz/computing/technology-myths/ Wed, 25 Jun 2025 21:19:10 +0000 https://geeksonwheels.co.nz/?p=18782

You probably hear all sorts of things about technology, some true, some… not so much. While some assumptions might really be interesting facts about technology, others are simply just rumours. As a professional IT company, we’re here to set the record straight and debunk some of the most common technology myths.Think you’ve got your technology knowledge straight? Put yourself to the test with these New Zealand technology facts (or technology myths). Check out if you’re as tech savvy as one of our very own computer experts!

Can Macs get viruses?

You might have been told that Macs don’t get viruses. So, as an Apple user you don’t need to worry so much about online safety. We’ve got to stress this… that is false!

Although Macs are definitely less vulnerable than other computers, they are still susceptible to cyber threats.

No operating system is perfect, and that includes macOS. If you download software from untrusted sources, click on suspicious links or engage in other dodgy online behaviour, there is a high risk that your Mac will be exposed to a computer virus. As Macs continue to grow as a popular computer choice, they will become a bigger target for cybercriminals. This means that unique malware will be developed specifically to attack macOS systems. We have no doubt there is plenty of this malware out there having already been developed.

Does closing background apps speed up your phone?

It is indeed a tech myth that closing background apps will speed up your phone.

When your apps are open in the background of your device, they are in a suspended state. This is where they are readily available. And your phone will do a background app refresh of content and updates behind the scenes.

When you close your background apps, your smartphone is forced to re-initialise the apps when you open them again. This uses more time and system resources than simply restoring them from a suspended state. Ultimately slowing down your smartphone. Although closing your background apps slows down your smartphone, leaving them open also uses battery power and data. So if you’re wondering “Should I turn off background app refresh?” this depends on what improvements you’d rather see. It comes down to whether you want better performance, or prefer to save on battery and data.

Should I shut down my PC once a week?

Of all the technology myths, this is a bit of a tricky one. For PC’s, a restart, rather than just shutting down your device helps your PC run better. It does this by clearing memory, refreshing the system kernel, resetting the cache and finishing pending updates.

Shutting down on the other hand, stores current system data so it can reload quickly. This can also reload existing issues.

With all of this considered, Macs are the exception to this restarting vs. shutting down rule. In fact, the roles are reversed. So, it’s best practice to shut down your Mac regularly, rather than restart it. Don’t know how to restart computer on your Windows PC? Simply click the Start button (Windows key), click the Power button, then select Restart. Alternatively you can press and hold down on the Ctrl key + Alt key + Delete key, then choose Restart.

Does private browsing keep you totally anonymous?

No, unfortunately private browsing or incognito mode isn’t as private as you think!  

What is incognito mode? It’s a function that prevents your browser from storing your activity locally. However, it doesn’t hide your activity from websites, your internet provider or even your employer. Figure you might as well not use it anymore then? Wondering how to turn off incognito mode or how to turn off private browsing? Simply exit the private browsing or incognito mode window or tab. This is done by clicking the “X” next to your tab or closing the browser window. If you have multiple private browsing tabs up, you’ll then to exit them all to exit the incognito mode session.

Should I be charging my device to 100%?

Short answer, no. This is one of many common technology myths! If you’re sat wondering “Why is my phone not charging as efficiently as it was before?”, this is probably because you’ve been stressing your battery with bad charging habits.

Keeping a device constantly at high voltage, for example keeping it fully charged at 100%, speeds up chemical aging and generates more heat. Both of which can shorten the lifespan of your device’s lithium ion battery.

You should also keep in mind that batteries have a limited number of charge cycles before their capacity starts to decline. So, if you charge your device to 100% and use it till it needs recharging, you’ll be using up a full charge cycle. To maintain optimal battery health, you should keep your device’s charge between 20% and 80%. Whether it’s plugged in or running on battery.

Will my device still get infected if I don’t click on anything?

For the last of our technology myths, we have the common misconception that your device can’t get infected if you don’t click on any malicious links. This is false!

Having viruses and malware downloaded onto your device is potentially what happens if you click a scam link. Amongst many other negative possibilities! However, although malicious links are a common tactic scammers use to load your device with viruses, there are other ways your device can become infected!

Your device can also get viruses if you download software from untrustworthy sources, if you visit you visit a fake website or even if a new update has a zero-day vulnerability which hasn’t been patched yet.

This is why you should always exercise caution and have a reliable anti-virus installed on your device. At Geeks, we recommend Malwarebytes!

There you have it! 6 common technology myths that we’ve debunked, just for our Geek fans! Now if you hear someone sharing “interesting facts about technology” and they bring up one of the above misconceptions, you can confidently set the record straight! Geeks on Wheels is expert in all things technology, so if you’re stuck with any tech problems you can’t solve on your own, we’re more than happy to lend a helping hand. Just Book a Geek today!

]]>
18782
Risks Of Not Upgrading to Windows 11 https://geeksonwheels.co.nz/security-safety/risks-of-not-upgrading-to-windows-11/ Wed, 11 Jun 2025 01:36:59 +0000 https://geeksonwheels.co.nz/?p=18750

You’ve likely seen that Windows 10 is ending support on October 14th, 2025. Whether it’s pop-ups on your Windows 10 devices, emails from Geeks on Wheels or articles in the news. Everyone has been talking about it. Microsoft will no longer provide free software updates from Windows Update, technical assistance or security fixes for Windows 10 for all users. We have mentioned that those who don’t update will be at risk, but what does this mean? Reminder, this doesn’t apply to those using Apple Mac devices.

The risks of not upgrading to Windows 11 are numerous and varied, depending on how you use your devices. For most users, security is the first and major concern. In time, functionality may also be affected, and for businesses, compliance factors may be an issue. Read on to learn more about the risks of not upgrading.

Want to check if you can upgrade?

Do you have a Windows device and you’re not sure what version it is? Or perhaps you want to try upgrading your current computer before splurging on a new device? Check out our how-to guide for checking your OS and updating.

Increased Security Risks

The major concern for most users and us here at Geeks on Wheels is the end of security fixes for Windows 10. Without security updates your device and systems are vulnerable to a range of cyber threats, including viruses, malware, and hacking attempts. Attackers will exploit new security vulnerabilities to gain access to devices. They may then go on to access or steal data, disrupt operations or manipulate your device. Security updates would usually aim to patch these vulnerabilities before they can be exploited.

This all sounds very doom and gloom but it is the unfortunate reality of a device that is not properly protected. The consequences of such attacks can include financial losses, data breaches and potentially reputational damage. Nobody wants to put themselves at risk unnecessarily, so check if you can upgrade today.

Reduced Software Compatibility

The next major issue will be the lack of updates. Software is always evolving, with new features, requirements and capabilities rolling out constantly. With the recent advancements in AI we can expect that to continue at a rapid pace.

By continuing to use an outdated software version (Windows 10 or earlier), you will be missing out on new features. Windows 11 has numerous new features, including optimised performance, improved security features, Auto HDR, and updated memory management. Not updating doesn’t just mean you will miss out on the improved capabilities of Windows 11. Over time, the popular software and applications you use will also release updates. These will likely not be compatible with older operating system versions.

For example, the latest version of Google Chrome available for Windows 8.1 users is Chrome 109, which was released in January 2023. For up to date users the latest version available is 137.0.7151.68/69. That means users with outdated software will be missing out on nearly 3 years’ worth of security updates, improvements and new features. You might also notice some of your favourite websites or widgets require an up-to-date browser to use or access them.

These flow-on effects of an outdated operating system are numerous, compounding and inconvenient. They also put your device at constant risk. Not only will your device not have security updates from Windows, it will eventually no longer have security updates from new software versions of your favourite programs.

Increased Operational Downtime

Older devices are less efficient. Just like us, computers slow down as they get older. Especially when they can’t be updated anymore. Running older versions of Windows means your devices will not have access to the latest features and updates, which could save you time and increase productivity. This is also true for the software and applications that will fall behind.

Similarly, cyberattacks and security vulnerabilities cost individuals and businesses both time and money. They can often result in lost business and operational disruptions.

Regulatory Compliance

While this one only affects businesses and organisations, it is a great point to note.
By utilising outdated software, even given the numerous risks, you might not be meeting regulatory requirements. Depending on your industry or how you handle data, the risks may vary. Up-to-date and supported operating systems are standard across most industries and ensure the security of your devices, data and systems.

Remember, you don’t necessarily have to purchase a new device to update to Windows 11. If your device is less than 5 years old you might be able to update, provided it meets the minimum hardware requirements.  Whether you’re updating your existing device or looking for a brand new one with Windows 11 pre-installed, Geeks on Wheels are your experts for all things Windows 11. Give the team a call today and they can recommend the perfect device for your needs.

]]>
18750
Common Ways Computers Get Infected With a Virus https://geeksonwheels.co.nz/security-safety/common-ways-computers-get-infected-with-a-virus/ Thu, 29 May 2025 04:35:40 +0000 https://geeksonwheels.co.nz/?p=18716

There are countless ways malware can get onto your computer. If you use the internet (which, if you’re reading this you obviously do), then your device could be exposed to viruses, malware and adware. We’ve compiled a list of 7 common ways computers get infected. Knowing these means you can take steps to actively avoid putting your device at risk.

Once malware is on your device, it can cause all sorts of trouble. Such as slowing things down, deleting or corrupting files, stealing personal information and even locking you out of your computer. Before we dive in, we must stress that hands down the best way to avoid viruses and malware is by ensuring you have an active premium antivirus subscription. Antivirus works in the background 24/7, protecting your computer and stopping malware from finding its way onto your device.

Clicking on Malicious links

By far one of the most common ways computers get infected with a virus is by clicking on malicious links. These are everywhere, from phishing emails and scam texts to sneaky call-to-action buttons on social media ads. Malicious links are generally only harmful when clicked, so here are our top tips to help you avoid clicking on a malicious link:

  • Always hover before you click. When you hover your cursor over a link or button, the full URL will usually appear at the bottom of your screen or next to your mouse pointer. If it doesn’t match what you expected, don’t click!
  • Watch out for image-based scam emails. Some phishing emails turn the entire message into one big image linked to a scam website. If your cursor turns into a hand icon when hovering over the email (without clicking), it’s likely a scam. Close the email and delete it.
  • Look for odd-looking links. If a link is packed with random letters, numbers, or symbols and doesn’t clearly match the company, steer clear!
source: Astril.com

Visiting Fake Websites

Anyone can make a website and publish it on the internet. So, you should always exercise caution with websites you’re not familiar with. Fake websites are a common way for viruses to sneak onto your computer. Simply clicking on one can trigger an automatic download. Some of these sites might also hit you with fake pop-up warnings designed to trick you into downloading malware. Or even fake payment portals or signup pages designed to steal your information. Learn more about how to spot fake websites.

  • Always do your research. Are you shopping somewhere new? Yes? Then it’s a good idea to do a quick Google search on the company for online shopping security measures! Look for any negative news articles, verify their contact details, ensure they offer customer support, and check their physical location on Google Maps.
  • Double-check that everything lines up. Check that the URL of the website matches what the company is selling. For example, if a company with the URL Betty’s Baked Goods was selling Nike shoes, that should raise a red flag that the website is illegitimate. 

One of the easiest ways to protect yourself from these dangerous sites is by using an anti-virus browser extension. We recommend giving Malwarebytes Browser Guard a try!

Clicking On Malvertising

Malvertising is another of the common ways computers get infected with a virus.
We have a whole blog breaking down malvertising, what it is, how it works and most importantly, how to avoid it. Scam ads, better known as malvertising, are everywhere. They can show up on websites as pop-ups or banners, sneak into sponsored search results, and even take over your social media feeds!  

Usually, ads will run ‘clean’ for a week or two, sometimes even months, in order to build trust. After this period of time, scammers can implement the virus so that anyone who clicks it from that point on can be infected.  

These are our top tips for avoiding malvertising:

  • Avoid sponsored search result listings. Sponsored results are a common way for scammers to direct traffic to their malicious links. When you search for something on a search engine, the top results are usually “sponsored”. You can tell this by the “sponsored” tag usually above the listing. Simply scroll past these results to the organic ones.
  • If something seems too good to be true, it probably is. We all love a good deal, but take the time to stop and ask yourself if the promotional offering seems too good to be true.
  • Avoid ads with headings like ‘Official Website’. This isn’t always a sign of a scam, but it is usually a wise idea to look a bit more closely before clicking on links that try to convince you they are legitimate.

Connecting To Public Wi-Fi Networks

Using free Wi-Fi at places like cafés or airports might seem handy, but it can be risky. Hackers often hang around these networks, looking for ways to steal personal information or send viruses to your device.

 Here are some simple ways to stay safe on public Wi-Fi:

  • Avoid entering sensitive info. When using public networks, try not to input important details (like passwords or credit card details).
  • Use protection. If you need to use public Wi-Fi, use a VPN (Virtual Private Network). This creates a secure, private connection,  even on public networks.
  • Set up security measures. At home, always protect your Wi-Fi with a strong password and make sure your router uses WPA2 encryption (this is a setting that helps lock out hackers).

Downloading Unsafe Files or Programs

One of the most common ways computers get infected with a virus is by downloading infected software. This usually happens when you download software from websites that aren’t safe. Pirated programs or apps from unknown places often come with hidden viruses that install themselves on your device without you knowing.

Our tips for avoiding viruses in this scenario:

  • Use trusted sources. Only download software from official websites or trusted sources. This helps avoid sneaky viruses hiding in the files.
  • Only use certified software. Don’t download pirated or cracked software. It often comes with hidden malware.
  • Protect your devices. Use antivirus software to scan files before you open or install them. This adds an extra layer of safety.

Use An Antivirus

You should always have an anti-virus active on your devices! Antivirus acts like a security guard for your device — scanning files, blocking threats, and warning you about anything suspicious. Without it, you’re leaving the door wide open for viruses, malware, and other cyber nasties to sneak in. At Geeks on Wheels, we install and recommend Malwarebytes Premium. If you need any help with staying safe online and avoiding viruses, make sure to call the team.

]]>
18716
Alternatives to uBlock Origin 2025 https://geeksonwheels.co.nz/security-safety/alternatives-to-ublock-origin-2025/ Tue, 29 Apr 2025 21:55:12 +0000 https://geeksonwheels.co.nz/?p=18526

If you’re a Chrome user, you may have noticed that uBlock Origin is no longer working. A trusted and reliable ad blocker used by many internet users in recent years. Google has recently cracked down on browser extensions, disabling those that don’t comply with Manifest V3, the company’s new browser extension framework.
This blog looks at some other options if you’ve found yourself without an ad blocker after the recent Chrome changes.

What Is An Ad blocker?

If you’re not already using an ad blocker but stumbled across this blog, it might be time to consider one. Ad blockers usually come in the form of browser extensions.
Extensions shape the way you use your internet browser of choice. They usually focus on one particular task, from spell checking to blocking ads or maybe protecting your data whilst browsing.

Where you download your browser extensions will depend on what internet browser you use. If you use Safari, you’ll want to head to the app store. Chrome users on the other hand can access the Chrome web store etc.

So an ad blocker, as the name suggests, is a browser extension designed to block ads. That’s likely part of the reason browsers aren’t overly fond of ad blockers. Afterall, most web browsers make a large portion of their revenue from advertising income.

Why would you want an ad blocker? Well the simple answer for many internet users is ads are annoying. They pop up, clutter pages and don’t always look the prettiest. The other major concern is safety. Ads aren’t always safe or legitimate. So if you are concerned about online safety, then removing the possibility of clicking on a malicious ad is a worthwhile step.

Changing Browser

If you are a fan of uBlock Origin and haven’t found an ideal uBlock Origin alternative, then changing browsers may be the only realistic solution. Some users recommend a manual install without using the Chrome Web Store. But, switching browsers might be a simpler option.

This would of course require some getting used to, along with the reinstallation of extensions on new browsers and logging into all of your accounts once again. If all of that sounds like a bit of a hassle then scroll on to check out some other options to keep ads at bay.

Ad blocker Alternatives To uBlock Origin


Decided you don’t want to switch browsers to keep using your favourite ad blocker? Well, fear not! We have a few uBlock Origin alternatives you might want to try for your ad-blocking needs!

AdBlock

With over 60 million users on Chrome, AdBlock is one of the leading Ad blockers available. The AdBlock extension will stop Pop-up style ads and limit exposure to malware by stopping malicious ads. AdBlock will also limit exposure to Facebook ads which can often be used by scammers to target victims on the popular social media app.

AdBlock has a 4.5 star rating from 290,000 reviews on the Chrome Web Store. So, it is a trusted option as a suitable ad blocker in 2025. Boasting such a large user base, it’s hard to look past.

AdGuard

AdGuard is another popular alternative to uBlock Origin and provides many of the same benefits. Perhaps even a few more. With over 15 million users and a 4.7 star rating from 64,000 reviews, it’s no wonder AdGuard is a great alternative.

Overall AdGuard is much like any other ad blocker, helping you navigate the web without annoying ads. AdGuard claims to be the fastest and lightest adblocker extension that effectively blocks all types of ads and trackers on all websites! Install it for your browser and get an ad-free and safe web experience. They also have a suite of other products including a VPN and DNS protection if you’d like to take your internet privacy and security to the next level.

AdblockPlus

Rounding out our list is AdblockPlus, another highly rated adblocker which is still compatible with Chrome’s recent MV3 updates. AdblockPlus has a 4.4 star rating from over 18,5000 reviews and a whopping 42 million users. AdblockPlus is slightly different from the other options above, in that it does allow some ads to be shown. This is achieved through their acceptable ads initiative which removes malicious, annoying and intrusive ads but allows acceptable ads in order to help websites which rely on them to survive. You can always update your settings if you’d like to block all ads.

Has your hunt for a suitable uBlockOrigin alternative come to an end? Whether you decide to switch browsers or try a new ad blocker, make sure you protect your device and your data whilst browsing. We recommend Malwarebytes browser guard, the perfect browser defence for safer surfing. Have you ever clicked on a suspicious ad? There’s a chance that malware may have been downloaded onto your device. For a thorough scan and removal of malware, book a Geek today!

]]>
18526
Is My Antivirus Active? https://geeksonwheels.co.nz/security-safety/is-my-antivirus-active/ Wed, 05 Mar 2025 23:45:46 +0000 https://geeksonwheels.co.nz/?p=18401 Did your device come preloaded with antivirus software? Or perhaps you downloaded Norton Antivirus or Malwarebytes a few years ago. Are you asking yourself, “Is my antivirus active?” It’s worthwhile checking if your protection is up to date. If your antivirus has expired or requires updating, then your devices may be vulnerable.


We get a lot of customers asking, “Do I need antivirus on my Mac?” Or “Do phones need antivirus?” It’s important to keep all of your devices and important files protected. So, read on to learn how you can check if your antivirus is active. Please note that you will need an internet connection to renew your subscription and activate your antivirus.

Why should I check if my antivirus is active?

New devices often come with trial versions of popular antivirus software. Once these trials expire, your device may no longer be protected. Or perhaps the version installed was a limited free offering that doesn’t run constant scans on your device. If that is the case, your computer could be at risk!

Maybe you never activated your antivirus software because “Macs don’t get viruses” or “it already has Windows Security installed”. Mac users should still use premium antivirus software for an extra layer of protection. The same can be said for those with Windows devices. While Windows Security is pre-installed, more robust protection is recommended. It offers better safeguarding against Zero-day attacks and constant background scans to keep your device protected around the clock.

Watch out for antivirus renewal scams!

It’s great to ensure your antivirus subscription is active. But always be wary of pop-ups or emails either pushing you to renew or claiming a renewal has been processed and paid for.
Always verify the sender’s address and verify your subscription details by opening the antivirus app on your device and looking at your subscription details. Usually, these will be found in the account section of the app.

Alternatively, you can check your account and subscription details through the antivirus website. Avoid the sponsored results at the top of the page and find the genuine website.

Do not click links in unexpected emails and avoid providing personal details, payment information or login credentials, except via the application if possible.

Image Source: Malwarebytes

How do I check if my Malwarebytes antivirus is active?

Malwarebytes makes it easy to see if your antivirus is active. Simply open up the application, and if your antivirus protection is no longer active, a pop-up message should appear. If that isn’t the case for you, there should be an “Activate subscription” button on the top banner of the application window.

If you can see that button, or any of the features have a lock icon with Upgrade then you are running the free version. This is fine if that’s all you want, but….
You aren’t getting any of the benefits of antivirus software, which you likely need. No 24/7 antivirus and anti-malware protection, no rootkit protection, ad blocking or phishing protection. All of this leaves your device vulnerable.

If you decide you’d like to activate the Malwarebytes premium antivirus protection, simply tap Activate Subscription then Sign in using your login details or create an account if you haven’t already. Alternatively, you can choose to activate your subscription using a license key we provide. Simply renew your subscription via the GeekShop and your renewal code will be emailed to you.

Image Source: Norton Antivirus

Norton: Is my antivirus active?


Norton Antivirus is another popular anti-malware software that comes with a free trial pre-installed on many devices sold by large retailers. If your free trial has expired or you haven’t renewed your subscription, your device may be vulnerable.

Unless you’ve chosen another premium antivirus software, then it’s a great idea to activate or renew your antivirus subscription.

If you need to activate your Norton antivirus on a Windows or Mac, simply open your Norton device security. Click Activate Now or Subscribe, then sign in to your Norton account and follow the steps to Select the license > Enter a key. If you don’t have an existing subscription, click Buy a subscription. Instructions for activating a subscription via a mobile device can be found on the Norton site.

There are two ways to renew an expired Norton Subscription. Via the application is the first method. Simply open your Norton application, then on the main window, click Renew or Renew Now. Follow the instructions to make a secure payment.

The other way to renew your antivirus subscription is to renew it from your account via the Norton website. Sign in to your account, in the My Subscriptions tab, click Subscribe Now next to the subscription that you want to renew. Then follow the payment instructions.

Now you can rest easy knowing your antivirus is active and working to protect you and your device.

Image Source: McAfee Antivirus

Renewing my McAfee antivirus: How to

McAfee is another popular antivirus software that often comes preinstalled on devices. So how can you verify your subscription? Or even activate or renew an expired subscription.

Firstly, you’ll want to verify if your subscription is active. To do this on a Windows device, find your McAfee icon in the task bar and right-click, then select verify subscription from the menu. You can also check within the app. Open your McAfee app, Click Account, then select My Subscription. Here, you will be able to find details of your subscription status and when it will expire.

Similarly to Norton or Malwarebytes, you can also check your subscription details via the web. Visit myaccount.mcafee.com and Sign in using your registered email and password and Click Subscriptions to see the details. This will include your expiration date, product info and purchase history all in one place.

If your subscription has expired simply click renew and enter your payment details to ensure you stay protected. If you need to activate a new subscription, it’s just as simple.
Head to mcafee.com/activate and redeem your product key. Then, you’ll need to enter the unique product key found on your Retail Card or eCard. After you’ve done this, it’s just a matter of following the onscreen instructions to download and install your McAfee security application.

An active antivirus subscription is often the only layer of defence you and your devices have against malware and other malicious files. An inactive antivirus subscription is like having a security alarm that isn’t plugged in. If you’re struggling to activate your antivirus subscription or would like some help with staying safe online, call Geeks on Wheels today.

]]>
18401