See what we can do for your business.
Since 2012, we've provided stable IT environments through proactive, professional and proven solutions designed specifically around stability, security and flexibility. We have proven solutions whether based in house or in the cloud as our solutions can be implemented to whatever solution suits your company’s needs.
Affordable, proactive IT management and support to assist growing businesses. Utilising our cloud based management platform we deliver proactive services to keep your critical systems up and running.
Optimal solutions for your business at both hardware and software layers. Combine with our Cloud and Managed Services solutions for a stable working platform for your business to grow.
NETWORK + WIFI SOLUTIONS
Leverage the power of the "cloud" to control your Network and Wifi Solutions over one or multiple access points from anywhere in the world while providing the same access and security permissions across the platform.
Specialists in high level security to limit attacks from viruses, malware and spam. Symantec Cloud solutions allows us to remove these threats before they reach your infrastructure and also allows other features including archiving and content control.
BACKUP + SECURITY SOLUTIONS
Enable recovery in any situation when these products fail whether from environmental issues (cyclones, fire, flood etc) or failure in hardware or services.
Utilising Telstra Solutions we can provide a hosted phone solution that meets your company requirements. We offer a complete unified communications solution that is simple, flexible and scalable, and highly reliable.
We have been able to help businesses in the many industry types such as automotive, aged health care, construction, manufacturing, accounting and more. Some of our clients have been with Michael for over 10 years and continue to have a great relationship on a business and personal level.
With over 20+ years in the IT industry Michael started his career by securing a traineeship position for a local IT company in Bundaberg called D2K after purchasing his first computer. Four years later he became the Senior Technician consultant for the company where he provided technical and sales support for their clients. Finally after 7 years honing his skills with D2K a change was needed where he moved to Townsville to continue his career. After working for a few local IT companies in the Townsville region the opportunity arose to found External IT.
Michael has built External IT with a key core value in mind for his clients and staff - empowering people through technology, with people coming first. Whether it is through helping clients use technology to grow or improve their business, to having the privilege of working with fantastic and dedicated employees with the same core values, investing in people has always been a key to External IT - your internal IT support.
Another key area Michael has put his focus towards is using the best products and solutions available. Empowering people would not be possible by using just the industry standard or by cutting corners, which is why External IT has partnered with the likes of CISCO Meraki, HP, Microsoft and Datto to provide scalable and reliable solutions so you can focus on what matters the most, your business.
Meet our team.
Meet some of our crew from the directors to technicians and some of the duties we perform day to day.
Good reads from our blog.
What is Phishing? Phishing is a tactic used by Cyber-Criminals to lure you into providing your personal information such as account details, passwords or credit card number through deceptive emails and websites. Scammers have been using this tactic for a while now with phishing attacks first noticed in Australia as far back as 2003. Since…Read More
Social Engineering is a tactic used by hackers to manipulate human behaviours in order to access to your computer or data assets. IT software and security has improved recently, making it harder for someone to gain access through a computers weak spot. Hackers have adapted to this taking a different path to make a breach by manipulating…Read More
PBX stands for Private Branch Exchange, which is a private telephone network used within a company or organization. The users of the PBX phone system can communicate internally (within their company) and externally (with the outside world), using different communication channels like Voice over IP, ISDN or analog. A PBX also allows you to have more…Read More
Today we have so many accounts online it is difficult, near on impossible to remember every password we have. However strong password security is vital to keep your systems and data secure and protected. Cyber-criminals target weak passwords and use software that can guess 350 billion passwords a second. Unfortunately there is a lot of…Read More
Two factor authentication (known as 2FA ) or Multi-factor Authentication (MFA) provides an extra layer of security when accessing an account. Why do I need a second factor for an account? Many accounts we use daily hold valuable data. If any of these fell victim to a cyber crime attack , the result would be…Read More
Send us a message.
We would love to hear from you.
Interested in learning more about how our solutions can meet your business needs?
Have a question about our services?
We would love to answer your queries and help solve your IT problems, so please do get in contact.