Our Managed Services differ from
Frequently Asked Questions
How do we contact you with problems?
You can use a variety of methods
Our Managed Services clients get 24X7 service so you will get a response without having to wait until
the next business day.
Some examples and information follow.
Set up a new computer
Several people can’t work
Open a ticket from our website
How am I billed for services?
Invoices will contain two different
For services payable in advance
For services performed in the last month
Any work performed in the last calendar month that
How long should the work take?
This is an intentionally broad question to cover some common scenarios.
Some problems involve unique software or hardware products like scanners, cameras or specialized accounting, design, and database software. In these cases, we might lean on a particular team member with experience in this, contact the vendor, or coordinate support between vendors (like Microsoft and the developer). These resolutions can take a few hours to a
The longer an issue takes, the more likely we might develop a “workaround”. The idea is to restore productivity while we resolve the root problem. We can’t create workarounds for everything, but spare hardware or software can
Does Managed Services save me money?
Yes. In our process, we help you determine what you’re spending today, and make sure we build a program which addresses areas of weakness and support business growth and expansion without adding a lot of cost.
On average, clients who come on board with us in our Managed Services program save 30% over their IT costs year over year. We must understand that the costs of systems that aren’t maintained and have poorly responsive support cost more than just the bill from the IT provider. Lost sales, employees who can’t do anything while they wait for support, and of course the bill all contribute to the total IT spend.
Typically, the first few months run a
Is [insert name of antivirus] good enough to protect my computer?
There are many solutions out there for security software. Many of them are very good. Usually there’s a tradeoff in terms of how effective it is, and how much it might slow your computer. The most modern computers today (with abundant memory, processor speed, and solid state hard drives) aren’t impacted by these slowdowns.
Additionally, there’s consideration for what kinds of activities the computer is doing. Some activities expose the computer to more threats than others. Responding to public requests for information and clicking on many inbound links can create problems. As well as searching websites for information that might not have good security standards in place and could be hijacked and spreading malware.
We do provide a managed security product which is a very effective balance between protection and performance impact and can be customized for whatever threats the computer might be exposed to.
Is the Cloud secure?
There are good reasons for this question. It seems like every month there’s a new, major company who has suffered a security breach. Most of these companies have their own programming staff which write the software to the specifications of the company. Unfortunately, in nearly all these cases, proper attention wasn’t paid to security which allowed the breach.
We recommend cloud services which encrypt the data in all stages of the data transmission process and offer two-factor authentication. These two best security practices thwart most security risks and keep your data safe.
Isn’t employee monitoring just spying?
Once an organization reaches a certain size, attention to the productivity of a single employee can wane and it is common that despite more people, productivity drops. Employee monitoring can be an excellent benefit to the organization, yet there is a stigma of spying which makes business take pause.
Have a specific question?
Search our Knowledge Base for the answer.
Most Popular Posts
Supply Chain Security: Why You Should Worry About it and How to Protect YourselfWith ever-increasing cyber attacks, the concerns over supply chain security are rising, too. The supply chain is an integral part of many businesses. Most businesses, no matter how big or...
How to Protect Yourself from Business Email CompromiseToday, cybercriminals are devising new strategies and increasingly complex tactics to succeed in their malicious intentions. Every other day, we hear about a new cybercrime that sends business owners all around the...
3 Ways to Protect Yourself Against Ransomware AttacksRansomware incidents have become a nuisance for organizations globally. From startups to multi-million dollar companies, anyone can become the target of notorious ransomware attacks. Did you know that almost 80% of...
Download for Help Right Now
You can best reach us Weekdays between 8 AM and 5 PM. Not available during holidays. Services rendered are hourly with a 30 minute minimum after
Click the download link below for your computer type.