iPhone repairs geelong

iPhone repairs made easy: quick solutions for common issues

Is your iPhone acting up? Don’t worry! We’ve got some quick solutions to get your device up and running again. Whether your iPhone won’t turn on, is frozen, or won’t respond to your touch, we’ve got you covered with everything you need to know for iPhone repairs. Plus, we’ll also shed light on the importance of addressing a cracked screen and where you can go to get it fixed. 

Restart your iPhone

If your iPhone is experiencing any issues, a force restart can often get it working in a tick. The steps differ depending on your iPhone model, so follow these restart guidelines from Apple: 

  • iPhone 8 or later and iPhone SE (2nd generation): Press and quickly release the volume up button, then the volume down button. Press and hold the side button until the Apple logo appears. 
  • iPhone 7, iPhone 7 Plus, and iPod touch (7th generation): Press and hold both the side (or top) button and the volume down button until the Apple logo appears. 
  • iPhone 6s or earlier, iPhone SE (1st generation), and iPod touch (6th generation) or earlier: Press and hold both the side (or top) button and the Home button until the Apple logo appears. 

If the forced restart doesn’t work, then it might be time to take it to an Apple store or bring it into us at Geelong Technology Group, as we are your local Authorised Apple Service Provider for all iPhone repairs.  

Troubleshooting slow charging battery 

Battery life is a common complaint of people who come into GTG for an iPhone battery repair. To maximise your battery performance, try the following steps: 

  • Make sure you are using the latest iOS version. (Settings > General > Software Update) 
  • Check your battery usage information. (Settings > Battery). It will show you the App Background Activity, which apps are using Location Services and even which apps send you notifications that wake up your display. You can change the settings for the Background App Activity, Location Services and Notifications in Settings. 
  • Enable Low Power Mode. (Settings > Battery) 
  • Optimise your screen brightness by turning on Auto-Brightness to help extend your battery life. (Settings > Accessibility > Display & Text Size > Turn on Auto-Brightness) 
  • Use a secure Wi-Fi connection versus mobile data when you can.  

If your slow charging battery issue persists, consider visiting an Apple Store or an Apple Authorized Service Provider like GTG for professional assistance. 

Fixing a cracked phone screen

Fortunately, repairing a broken screen is a common service we can assist with. Cracked screens may seem like a minor inconvenience, but they can lead to more significant problems. Dust and moisture can enter your phone through the cracks, potentially damaging internal components. Don’t delay in addressing a cracked screen, especially if your iPhone isn’t functioning properly! 

iPhone repairs in Geelong

Whether you’re dealing with an unresponsive iPhone, low battery or a cracked phone screen, contact Geelong Technology Group for your iPhone repairs. 

As an authorized Apple service provider, our technicians have taken strict Apple training to repair all Apple devices. Our skilled technicians are trained by Apple to fix any issue, whether it’s an unresponsive device, low battery, or cracked screen. You can trust us to use genuine Apple parts, ensuring your repair stays under warranty. 

Contact the knowledgeable GTG techs to get your iPhone functioning as optimally as possible. 

cloud computing with Geelong Technology Group

Cloud computing – what is it and why you need it!

The cloud, cloud computing, cloud service provider – you’ve probably heard these terms but may not know what they mean. Let us introduce you to the world of cloud computing and how it can benefit your business.   

What is cloud computing?  

You may be surprised to learn cloud computing has been around for almost two decades. In fact, you may even already be using it without realising it! Netflix, Google Drive, and even social media applications like Facebook and Instagram are cloud-based applications.   

Simply put, cloud computing refers to using computing services – storage, databases, networking, software, analytics, and data intelligence over the internet, also known as “The Cloud”.  

Advantages of cloud computing for business 

The usability of cloud technology is evident in our personal usage. Now let’s examine how these services are great for your business.   


With these services, you, your team and your customers can access data anywhere, anytime. Whether in the office, at home or travelling across Australia, everyone has the up-to-date information they need in real-time.    

Plus, your customers can log into their accounts to access their information if you allow it.    

Data security 24/7   

Using cloud services eliminates the need for onsite and offsite backups. All your digital data is stored in one central location in the ‘cloud’. Not only is the information easy to find, but the cloud also lowers the risk of data loss should any backup fail. Using Cloud providers will set up your data so it is continuously updated with every new piece of information you, your employees, or your customers add.  

According to Dell, companies that invest in cloud computing experience a 30% average reduction in security breaches, application outages, and other events. This stat showcases the value of cloud computing in protecting your business.  

Cost savings   

These are the two words every business wants to hear! While the initial price tag of setting up cloud services may be higher than you like, it’s important to consider the ROI of implementing these services.   

Dell reports that companies that invest in using the Cloud reduce costs by 19% on average!  

Once your business is on the cloud, you’ll save time and money on expensive hardware updates, data breaches and unforeseen expenses. Engaging a cloud computing service provider allows you to pay for only the storage and software you need to cut costs further.  

Cloud service provider in Geelong  

Cloud services can revolutionise how your business operates. From secure data access to enhanced collaboration to cost savings and beyond, there are many reasons to implement the cloud.   

As a Geelong-based cloud service provider, Geelong Technology Group is here for your business, offering cloud setups and troubleshooting. Fill out our contact form for a free, no-obligation quote, or contact our friendly team on (03) 5244 3030 to discuss getting your business on the cloud. 


hybrid cloud Geelong technology group

What is Hybrid Cloud? Uses and benefits of Hybrid Cloud computing

Just when we’ve gotten used to cloud computing, along comes a change in the weather, blowing us toward a hybrid cloud model. 

But what is hybrid cloud? The term refers to a computing environment that combines both public and private cloud infrastructure. In this model, a business may store some of its data and applications in a public cloud – such as Google Cloud, Microsoft Azure or Amazon Web Services (AWS) – while keeping other information in a private cloud or on-premises data centre (or both). 

 Note that there is no one-size-fits-all model for cloud architecture – every hybrid cloud environment will be different to meet the needs and goals of the organisation or business in question. The key, though, is ensuring that your business’ hybrid cloud infrastructure allows workloads to move seamlessly between the interconnected environments. 

Benefits of Hybrid Cloud for small businesses 

  1. Cost savings

One of the most significant benefits of hybrid cloud computing is cost savings. A hybrid cloud infrastructure enables SMBs to choose the most cost-effective platform for each of their applications. Allowing them to optimise their IT spending. For example, a business can store non-sensitive data in a public cloud, which is less expensive than hosting it on a private cloud. 

  1. Scalability & agility

It provides small businesses with the flexibility to scale their infrastructure up or down based on their ongoing needs. When a company experiences a spike in traffic, it can easily scale up its computing resources to ensure that its applications remain available and responsive to users. Conversely, when traffic returns to normal levels, the company can scale down its resources to reduce costs. The hybrid cloud model also allows SMBs to quickly pivot direction. This allows for business innovation and to quickly meet changing market conditions. 

  1. Security

Security is a top priority for small businesses, and a hybrid cloud infrastructure can offer enhanced cybersecurity. Companies can store sensitive data in their private cloud, which is more secure than a public cloud. Additionally, the hybrid cloud allows businesses to implement granular access controls (granting different levels of access to particular users) and to monitor data in real time, ensuring that systems are protected from unauthorised entry. 

  1. Increased productivity

By moving their applications to the cloud, SMBs can reduce the amount of time spent on infrastructure maintenance. This then allows them to instead focus on core business functions. With a hybrid cloud infrastructure, businesses can choose to outsource some IT functions to the public cloud, such as email or file sharing, while keeping critical applications in-house, such as customer relationship management (CRM) or financial software. 

  1. Disaster recovery

Hybrid infrastructure provides small businesses with an effective disaster recovery solution. By replicating critical data and applications across multiple platforms, companies can ensure that their operations remain uninterrupted in the event of an outage. If one platform is compromised or fails, the other can take over, providing business continuity (and peace of mind). 

Disadvantages of Hybrid Cloud for small businesses 

This infrastructure offers numerous benefits for SMBs, but it is not without its challenges. Its structure may be complex to manage and must be properly configured and maintained, particularly when it comes to data integration. Businesses may need to invest in specialised software or tools to enable data to move seamlessly between their public and private clouds. Furthermore, while this infrastructure can enhance security, it can also introduce new security risks. Companies need to ensure that their cloud environment is properly secured and monitored to protect against data breaches. 

Contact Geelong’s cloud computing specialists 

Not everything belongs in a public cloud, which is why so many forward-thinking companies are choosing a hybrid mixture of services. Getting the mix right, though, is key, which is where Geelong Technology Group can help. Our IT professionals can assist businesses in Geelong and surrounds to move from an on-premises configuration to a hybrid cloud. Ensuring you avoid the possible disadvantages of the hybrid model in the process. 

For more information on moving your business IT infrastructure to a hybrid cloud model or for a free technology audit consultation, contact us online or give Geelong’s best business IT support company a call on ️1300 GET GTG (1300 438 484). 

building healthier technology habits with your devices with Geelong Technology Group

Take charge of your technology: 7 Tips for building healthier technology habits

In this Choose Your Own Adventure scenario, the powers-that-be have decided that the internet should be turned off for at least an hour daily. How do you react? Do you embrace the time away from your devices and head out for a walk? (Turn to some other blog!) Or do you start rocking in a corner? (Read on!)

Although smartphone use is now integral to many parts of our busy lives, research has shown that excessive use of devices is associated with sleep problems, impaired cognitive function, anxiety and depression. The good news is that a recent study has shown that a conscious reduction of daily smartphone use by just one hour can contribute to greater mental wellbeing and a healthier lifestyle.

So, let’s get started today! Here are some tips to help you build healthier technology habits with your phone and other devices: 

1. Set boundaries

Yes, sorry, this does involve some work on your part! And one of the most important things you can do is set boundaries for your technology use. Avoid using your phone during meal times or when spending time with your family or friends. You can also establish ‘no device’ zones in your house. An obvious one is your bedroom. An even more obvious one is the bathroom!

2. Replace your alarm clock

With your bedroom now an official ‘no phone zone’ – it’s likely you’ll need something other than your smartphone to wake you up. Invest in an old-fashioned alarm clock (or one of those new-fangled options that wake you gently with ‘natural sunrise colours’!).

3. Install a screen-time tracker

It’s always easier to fix a problem when we know the exact parameters of the problem. Use a screen-time tracker such as Apple’s iOS Screen Time app or the Android Digital Wellbeing app to see when and where you’re spending the most time online. Once you know which apps are your biggest time-suckers, you can start to break those bad habits (see Set Boundaries above and Practice mindful use below!).

4. Practice mindful use

Mindful use means being intentional about how you use your devices. And now that you know your online Achilles heel(s) via your screen-time tracker, you can set specific time limits for those apps or activities. Focus on one task at a time. Limit multitasking (which can lead to feelings of stress and overwhelm). And avoid mindless scrolling!

5. Customise your settings

You can enhance your ability to practice mindful use by customising your device and app settings. Many devices now come with built-in tools to help you manage your technology use. You can set screen time limits, for example, or turn off notifications for certain apps. You can even go so far as to set up the ‘Do Not Disturb’ function so that all texts, notifications – and even phone calls – are effectively silenced at certain times (dinner, overnight, work hours, kid’s sporting events etc…!).

6. Take breaks

Taking breaks from technology is essential for our mental health and wellbeing. If the powers-that-be really did turn off the internet for an hour a day, other than causing chaos, it would actually be a good thing! Set aside time each day to disconnect and do something offline – rediscover the joy of reading a book, heading out for a walk or spending ‘us time’ with your family or pets. You can also try taking a digital detox for a day or a weekend to help you reset your priorities and recharge your wellbeing battery.

7. Establish healthy technology habits

It is essential to establish healthy habits when it comes to your technology use. This starts with ‘everyday’ things like getting enough sleep, staying physically active and taking care of your mental health. By prioritising your overall wellbeing, you’ll be better equipped to manage your technology use in a healthy way. Don’t be beholden to your technology – take charge today!

Contact Geelong’s technology specialists

Okay, so we can’t help you break your smartphone habit (aside from setting up apps and daily limits), but we can help with just about anything else tech-related. If your device is playing up, you need a tech upgrade or you’re concerned about cybersecurity, we’re here to help. (We even offer a pick-up and drop-off service!) 

Our experienced technicians and retail staff are here to help with advice and support for Geelong and Bellarine Peninsula homes and businesses. 

☎️ 1300 GET GTG (1300 438 484)

📨 support@geelongtechnology.com.au

📍 166 Francis St, Belmont


safe travel and device protection

Top tech tips for safe travel

Overseas travel on the cards? Lucky you! (Can we come?!) Seriously though, if you’re heading overseas, or even just interstate, now is the time to think about the safe travel and security of your devices and data. Now. Not when you have a spare five minutes in the café at the airport. And definitely not when you’re opening your suitcase at the hotel, hoping you packed the right charger.

Getting ready for safe travel

Make savvy device decisions

The more devices you have with you, the greater the possibility that something will get lost, stolen or maliciously accessed. If, for instance, you know you’ll mostly just be checking your emails, opt to do so on your phone and leave your laptop securely at home.

Protect your devices

Device protection comes in many guises, both virtual and physical:

  • Ensure your devices are locked with a pin number or fingerprint ID.
  • Install antivirus and anti-malware protections – or ensure your current protections are fully up to date. The same goes for a VPN. And make sure your operating system is up to date while you’re at it.
  • Before you travel, change all of the passwords you regularly use and, where possible, enable two-factor or multi-factor authentication.
  • Make sure your ‘Find My iPhone’ (Apple) or ‘Find my Device’ (Android) application is toggled on and ready for action – should it be needed!
  • If your tech is particularly precious, consider purchasing an anti-theft bag – there are various options now available that are not only RFID safe, but also have slash-proof materials that guard against cut-and-run thieves. Some even come with built-in power banks to keep you charged on the go.

Check your power

Speaking of power banks – make sure you have one! Read on to find out why, but in the meantime, also ensure you’ve got the cords you need, and consider purchasing a multi-charger for charging various devices at one time.

When you’re on the road

Charge your device securely

Be mindful that USB chargers at airports, hotels and other public places cannot be trusted. Hackers can use these potential ‘juice-jacking’ ports to steal your data when you plug in. This is where your trusty power bank comes in (see above) – to keep you charged until you can access a direct-power (AC) outlet.

Lock your device

Yes – it may seem simple, but make sure to always lock your device when you are not using it. That way if you do accidentally leave it in a café, you won’t come back to discover the barista inverting your colours or toggling your animation settings.

Avoid public wi-fi usage

Logging on via an unsecured network can be an invitation to cyber criminals to access your data. It is best practice to turn off automatic wi-fi and Bluetooth connections so your device will not automatically connect to (or send your data over) unsecured networks. And if you don’t have a choice but to log in publicly, make sure your VPN is up and running and keep your sensitive data as safe as possible.

Scan your device

Regularly scan your devices for viruses or malware while you’re travelling. If something has inadvertently slipped through your security net, the quicker you get onto the issue, the better.

Contact the Geelong technology experts

If you have any questions about ensuring safe travel with your tech, need antivirus advice or support, or just need a better laptop, tablet or phone to take with you – give Geelong Technology Group a call. Our experienced technicians and retail staff are here to help, with advice and support for Geelong and Bellarine Peninsula homes and businesses. 


️ 1300 GET GTG (1300 438 484)

📧 support@geelongtechnology.com.au

📍 166 Francis St, Belmont

scrolling on phone that has a mobile malware attack

5 ways to protect your phone from mobile malware attacks

We know that you know not to click that email link from the Arabian prince. Or to give your personal details to the bank that you don’t actually bank with. But what about that quick text message link on your mobile phone about a missing package – just when you’re expecting a delivery? Or downloading that app that you haven’t fully read up on? With mobile malware attacks surging, we all need to be more vigilant when it comes to mobile security. But what does that mean on a day-to-day basis?

Phone security to prevent mobile malware attacks

When it comes to the security of our smartphones, avoiding complacency is key. For some reason, we assume that the tiny computer in our pocket is somehow safer from malware than the big computer on our desk. Not true!

Use a VPN when on public wi-fi

With a good data plan, using public wi-fi should not be necessary. Public wi-fi is dangerous. Public wi-fi is a swimming pool full of sharks – avoid splashing around in it! But if you do have to jump in, use a VPN application. VPNs are a barrier between your device and the internet. They route your data through a secure server, keeping your information away from public wi-fi sharks (and pirates!)

Only use trusted sources to download apps

One of the most common methods hackers use to spread malware is via apps and downloads. When it comes to application downloads, third parties or untrusted sources are to be avoided. If you’re on an iPhone, you don’t have much choice – the Apple App Store is your one-stop shop. If you’re an Android user, trusted app stores include Google Play, the Microsoft Store and Amazon Appstore.

Remember: a dangerous app downloaded to your phone can infect it with malware. And once infected, simply removing the app is unlikely to also root out the malware.

Use mobile anti-malware

Yes – antivirus and anti-malware solutions are now available for mobile devices. Install one from a trusted source (see above!) and run it regularly to ensure your device is secure. Also – seriously – look out for malware disguised as virus protection. Cybercriminals are sneaky. And hiding malware in an app that’s supposed to make you more secure is sneaky 101.

Again: ONLY download legitimate apps from trusted sources.

Keep your device updated

Keeping your device updated includes removing old apps you no longer use. When was the app last updated by the developer? Old apps can become security liabilities – if you’re not using it, get rid of it! And speaking of updates, make sure you keep your device’s operating system updated. Sometimes those update requests are easy to ignore, but doing so may leave your device vulnerable to security breaches. Keep on top of updates – and automate them if possible.

Beware of SMS phishing

We’ve written a whole article on the perils and pitfalls of smishing, but essentially this cyberattack is launched via text message. Just as you do on your computer, look at any communication from unknown sources with a very wary eye. If it seems fishy, it’s likely not legitimate. Err on the side of caution and don’t click on links in text messages. And if you think it might be valid, go directly to the source – look up the company’s official business webpage or phone number, making sure to locate the details independently of the text message.

Avoid mobile security threats: contact the Geelong cybersecurity experts

Don’t wait until your phone is infected with malware to secure it. And if you’re a business owner, ensure smartphone security is included in your information security planning.

If you need more information or help with automated solutions to protect your devices and data, give Geelong Technology Group a call. Our experienced IT professionals are here to assist you with mobile phone security. Helping individuals and businesses in Geelong, the Bellarine Peninsula, the Surf Coast, and surrounding regions with their information security is our top priority, so give us a call today on 1300 GET GTG (1300 438 484) or drop into our showroom at 166 Francis Street, Belmont.

BYOD (bring your own device) to work

How to avoid common BYOD pitfalls

Remember the image of the corporate golfer with two phones clipped to his or her belt – one for business, one personal? Mercifully we don’t see this crime against fashion too often anymore… thanks partly to company BYOD policies.

The BYOD (bring your own device) movement has transformed the workplace, allowing employees to use their own devices for work purposes. Employees working in a BYOD-friendly company use their own smartphones, laptops or tablets to do their work, rather than using a company-issued device. BYOD can increase productivity and collaboration in the workplace, as individuals are already familiar with their own devices and can customise their use to their own needs. No learning curves with unfamiliar tech. No more playing ‘snake’ on the company Blackberry because that is the only program you can figure out!

It all sounds quite idyllic, but there are certainly challenges for businesses to overcome and pitfalls to avoid.

Common BYOD risks and challenges

The freedom and flexibility of BYOD for employees can come at a cost. Some of the biggest pitfalls when individuals start using their own devices at work include:

  • Security vulnerabilities – especially when we consider that the user is often the weakest link in endpoint security. One well-timed malware attack on one user device could instantly threaten the confidentiality of all of your sensitive business data.
  • Reduced privacy for both the employer and the employee.
  • Issues with data removal and retrieval – particularly when an employee leaves the company.
  • Compatibility and support concerns – will company systems and software work across various devices? And who will help if individuals have issues with their phones or tablets?

Avoid BYOD pitfalls with a strong BYOD policy.

If your business already has a BYOD program – without having an actual policy – or you’re looking to implement BYOD soon – read on.

Your BYOD policy should:

  • Explicitly define your BYOD expectations. This will include your device criteria, including compatibilities and maximum age; expectations around updates and security requirements; passcode guidelines and management; and a comprehensive privacy approach that considers both your company and your employees.
  • Be evergreen. Not updating your policy as your business and/or external factors change over time is as problematic as not having a policy at all. Review your policy regularly and keep it up to date.
  • Include data and cybersecurity training for all employees. Head over here to read up on how often cybersecurity awareness training should occur in the workplace.
  • Consider VoIP apps for business calls. Avoid the issue of giving customers access to employees’ personal numbers by using a business VoIP phone system. VoIP mobile apps allow employees to make and receive calls through a business number and include a range of other useful features.
  • Incorporate onboarding and offboarding processes. Outline what security measures must occur when an individual starts with your BYOD program. And ensure your exit procedures include specific details about data retrieval and removal.

Contact your Geelong IT experts if you need advice, devices or VoIP technology.

The team at Geelong Technology Group are big fans of BYOD programs – if they’re well implemented! We can help you explore solutions to ensure a secure BYOD policy and recommend tech tools to manage BYOD challenges. We can also assist with a tailored business-ready communications package that includes up-to-the-minute VoIP technology.


Oh, and if you’d prefer your company sticks with its HYOD (here’s your own device) program, we can assist with bulk-buy technology purchases too.


Give us a call or drop by our specialised service centre and showroom to chat in person:

☎️ 1300 GET GTG (1300 438 484)

📧 support@geelongtechnology.com.au

📍 166 Francis St, Belmont

new year new IT infrastructure

Assessing your IT infrastructure

New Year’s Resolutions: get fit, get healthy, and complete a Business IT infrastructure review!

A comprehensive review of your IT systems involves a strategic look at the effectiveness of your current technologies. It’s a chance to look for areas of optimization, streamline operations and to root out redundancies or inefficiencies. An IT infrastructure assessment can also scrutinize your business cybersecurity measures and identify possible security flaws.

The IT infrastructure assessment lowdown

An IT assessment will help your business:

  • ensure you have the right hardware, software and user access levels
  • stay on top of security – analysing your policies, technological safeguards, and employee training and behaviour.
  • Create a roadmap towards more agile and proactive operations.

Checklist to consider when reviewing your technology

Now that you’re aware of the benefits of a new-year IT infrastructure review let’s look at the areas you’ll need to assess.

Current state assessment

What is the state of your system right now? Are your employees working productively with what they have or experiencing a lot of downtime? Are your customer-facing systems up to scratch? Do your IT approaches match your company priorities? Are you meeting your regulation and compliance responsibilities? Do your technology policies reflect new conditions (working from home, for instance)?

Answering these questions will give you a baseline of what you want and need to accomplish. Don’t skimp on this step! Identifying your current processes, policies, and pain points will help you identify improvement opportunities.

Software and hardware assets inventory

This is where you get to the nitty-gritty. Take a detailed inventory of all the software and hardware in your business. Tally up hardware assets (desktop computers, laptops, mobile phones, printers, servers, routers etc.) and software assets (operating systems and versions, business solutions, antivirus software etc.) to see what may need to be replaced, upgraded or removed.

Remember: outdated systems and applications can create holes in your technology security. The last thing you want is to skimp on upgrades, and then suffer a costly cyberattack down the line.

Data storage and disaster recovery plans

Your new-year IT infrastructure assessment should also consider your data storage and recovery practices. You should assess where and how you store critical data and how it is backed up. Audit your storage infrastructure to ensure the correct data is being stored on-site, off-site and/or in the cloud, and identify any changes that may need to be made.

Disaster recovery precautions and processes should also fall under this assessment. If disaster strikes (whether it be a cyber breach or a flooded office), do you have procedures at hand to deal with it?

User access and experience

Assessing user experience covers both internal and external parties. Survey your employees on their current technology use and satisfaction. What apps are kicking goals? What improvements would they like to see? Are there workflow inefficiencies that could be improved with technology? This assessment is also a chance to look at your onboarding practices, ongoing IT training, and where your staff are with their security knowledge. We don’t want to see anyone using the password, ‘pa$$w0rd’!

Don’t forget to look at the customer experience of your tech infrastructure, also. Is website navigation a problem? Are there wait times on your phone lines? Identifying these types of issues is the first step to solving customer-facing technology issues.

Need help? Contact Geelong’s IT assessment specialists.

An IT assessment is a robust way to improve the efficiency of your infrastructure. After all, if you make technology and upgrade decisions on the hop, they may not result in the best outcomes for your business in the longer term. Planning ahead allows you to budget for technology requirements and avoid unplanned expenses.


Of course, detailed technology and security assessments take time, and you may already be juggling multiple competing business demands. Don’t leave your new year’s technology review resolution by the wayside – we’re here to help!


The experienced team at Geelong Technology Group can thoroughly review your technology environment to give your business a roadmap for the new year. We service Geelong, the Bellarine Peninsula, the Surf Coast, Golden Plains, Colac, Warrnambool and beyond, so get in contact today!


Top Things to Consider When Buying a New Computer

Buyer’s remorse: that sick feeling you get in the pit of your stomach when you know – you know! – that you’ve made the wrong decision. You should have purchased X instead of Y., Or you really should have spent those few extra hundred dollars to get the functions you now know you definitely need, instead of opting for cheap and cheerful (or aesthetic and impractical!). So, what should you consider before spending your hard-earned dollars on a new computer?

Laptop or desktop?

Let’s start here. Consider a desktop if you don’t need to take your work on the go. A desktop with identical specs to a laptop will generally be less expensive (as they don’t need to cram all of their hardware into a portable space), but don’t forget the extra cost of a dedicated monitor. Desktops are also easier to upgrade and customise, but you obviously can’t pop down to your local café with it!

How much memory (RAM)?

Random access memory, or RAM, is essentially your computer’s short-term memory. The more memory it has, the more it can multitask and the quicker it will run. Lots of RAM – 8GB or even 16GB or more – will help your computer cope with running multiple programs at once or having a bunch of web browsers open at the same time.

Know your processor

While RAM is your computer’s short-term memory, the processor is its overall brain. And, yep, a better brain will give you a better experience! Processors can be measured by their ‘clock speed’ (in GHz) and the number of cores. The key factor to focus on for your processor decision will be the type of applications you’re likely to be running – if you need something that can run heavy-duty software (for film editing, for instance), you’ll want more processing power.

Storage space

Storage space, or your computer’s hard drive, holds your operating system, programs and files. So, do you need big digital cupboards or will most of your programs and data be accessed through the cloud? If you do store most of your files in the cloud, then you may not need a lot of hard drive space – and the less space you need, the lower the price.

When it comes to the type of hard drive, a newer-tech solid-state drive (SSD) is the way to go if you can afford it. SSDs are faster than traditional hard disk drives (HDDs) and are less likely to have read/write issues.

Operating system: Windows or macOS?

Now, this is a personal choice! Your operating system is the software that runs your computer, and Windows and macOS are the two most popular. It’s easy to find opposing ‘10 Reasons Why ONE is better than THE OTHER’ online, but for a very broad perspective, Windows is often considered better for PC gaming, while macOS is preferable for creative activities like graphic design. You choose! (We love both!).

Need help? Contact Geelong’s computer hardware specialists

All of the above may be a lot to take in, and talking to an expert can help you drill down to discover exactly what you need. Geelong Technology Group is your one-stop tech-needs shop if you’re after a new machine and want to walk through your desired specs. We source only high-quality components from reputable suppliers to ensure your home or business computer solution is just what you require. No buyer’s remorse here!

Give us a call or drop by our showroom to chat in person:

️1300 GET GTG (1300 438 484)

🕘 9am to 5.30pm Monday to Friday

166 Francis St, Belmont

connectivity energy ball wi-fi

Five common wi-fi issues – and how to fix them!

Do you remember how we once lived without wi-fi? Nah, we don’t either! We’ve become so used to having instantaneous access to the internet that when we experience wi-fi issues, it can feel like the world is about to end! Avoid catastrophising and read on for common wi-fi issues – and their (generally straightforward) solutions.

The single device won’t connect to the internet

When everyone else is busy working, but you’re languishing in a wi-fi free purgatory, try the following:


  1. Turn off the wi-fi on your phone/tablet/computer.
  2. Instruct your device to forget the connection.
  3. Turn off your device and turn it back on.
  4. Try to reconnect now. (You may need your password.)


If the old ‘disconnect, turn off, turn on’ routine doesn’t work and you’re running Windows 10 or 11, you can also run through the ‘Identify and repair network issues’ diagnostics. (MacOS users can try ‘Wireless Diagnostics’.)  

No devices can connect to wi-fi

If the problem is with multiple devices, the router is likely the culprit. Start by checking the status of the lights on your router: the internet signal light (usually white or green) should be on and solid. The wi-fi light should also be on and is generally blinking. No lights or red lights mean something is amiss. The first (and often best) fix for router issues is to restart/reboot it:


  1. Switch off your router and unplug the power cable.
  2. Wait 60 seconds, then plug it back in and switch it back on.
  3. The router may take several minutes to reboot. (Practice mindful patience!)
  4. When the router is back up and running, reboot your device and try to connect again. 

No internet access (or slow access) in certain rooms

Wi-fi uses radio waves to transmit information between the router and your device. These waves broadcast in all directions from the central device, so the more centralised the router placement in your coverage area, the better your reception will be. Higher is also better: a higher router means a wider broadcast and better overall coverage.

Wi-fi signals can easily pass through wood and drywall, but tiles, metal and concrete can interfere with messages getting through. While they’re running, microwaves, baby monitors, and cordless phones can also run interference.

If your home or office space is too big for one router to handle, or you know there are obstructions, you can extend your signal’s reach with a wireless repeater or mesh system.

Slow internet throughout your home or office

If your wi-fi speed is slow throughout your usage area, try plugging a laptop directly into your modem and test your internet speed using a provider such as speedtest.net.


  • If your speed is still slow: you may have a connection problem. Speak to your Internet Service Provider.
  • If your direct-connect speed is good: you may be competing with another router for the channel bandwidth. Try switching wi-fi channels.
  • If your direct-connect speed is good but switching wi-fi channels has no effect: your router may need an update. Try a factory reset and update the settings.
  • And if the factory reset and update had no effect? Your router might be dying, and upgrading may be the best option.

The network connects, but there’s no internet

We’ve said it before (just up above, actually!), and we’ll say it again: try resetting your router (and your modem if it’s a separate device) by unplugging it, waiting 60 seconds, and plugging it back in.

If your device is still in an internet-free zone, connect your laptop to the router directly to check where the problem lies. If there’s still no internet, you may have an outage, and it’s time to contact your ISP.

Still can’t connect? Call the Geelong technology specialists

If the standard fixes above aren’t working and you think there’s something more serious going on, don’t waste your time tearing your hair out – give the experts at Geelong Technology Group a call. (Then take your laptop down to your local café!).

Having a professional IT technician from Geelong Technology Group come into your home or office to assess your wi-fi issues, check for problems and make suggestions for improvements could improve your wi-fi coverage and performance significantly.

Get in contact via phone or email, or drop by our specialised service centre to chat in person:


☎️ 1300 GET GTG (1300 438 484)

📧 support@geelongtechnology.com.au

166 Francis St, Belmont