|
|
Periodic Technical Support - Preventative Maintenance
Most businesses underestimate the need for periodic preventative maintenance. Unfortunately (and due to many technology market factors) computers and software are similar to machines or cars. If regular periodic maintenance is not done, performance is degraded gradually and the risk for a bigger problem grows constantly. When eventually the computer crisis happens, the damage (hardware, software, lost business activity) and the cost to fix it (computer technician time) is usually much more expensive and frustrating than the alternative.
Based on your specific needs and budget, we will plan and provide the proper preventative maintenance for you, and the time between maintenance visits. Generally preventative maintenance visits are recommended once every month or every three months at the latest.
Event Based Technical Support
Although preventative maintenance can reduce problems to a negligible minimum, it can never be the ultimate solution. Unfortunately there may be other unexpected reasons for computer and network problems, like hardware failure and of course – the human factor… For that purpose we can setup an agreed method for technical support to help solve all your computer and technology problems, as they happen.
Note: We do not provide a 24/7 technical support. Our technical support service is provided only to existing customers and on a pre-agreed basis.
|
|
|
|
|
Heartbleed Vulnerability patch
April 7, 2014: Within 2 hours after the bug was made public, completed patching all in house and customer servers and workstations, new SSL certificate issued and system checked. |
December 2013-February 2014 |
Complete software upgrade to eliminate dependency on Windows XP
Completed a preplanned step-by-step upgrade of an accounting firm office (dozens workstations and servers), to eliminate all dependency on Windows XP and associated software. |
Successfully foiled continuous cyber security attack
Successfully foiled continuous cyber security attack on a large office network including Linux file servers, mail servers and dozens workstations. The defence included writing small software utilities that blocks attacks as they happen and/or render the mail server temporarily invisible to the attacker. |
Smart backup procedures and virtulization
Set up an automatic backup procedure on an embedded Linux server in a small office network, in combination with VirtualBox clients on Linux workstations. |
|
|
|