NETWORK DESIGN & SUPPORT
We build IT.
BACKUPS
We build IT.
Are your backups stored on site? What if an attack hits your network and randomizes all your files and deletes your on-site backups? Backups saved to the cloud could help. But restoring files from the cloud can be time consuming. What if you don’t have that time? A second set of on-site backups obfuscated to hackers would help. We also partner with several cloud backup providers which allows us to save your data to multiple cloud vendors, just in case a hacker is able to penetrate one of the cloud backup repositories. Are we a bit paranoid about securing your data? ….maybe.
REDUNDANCY
We build IT.
What if one of your servers went down? Do you have another server standing by with near real-time replication of your files? Do your servers have the redundancy to withstand failed hard drives, failed power supplies, or failed fans? And how often are the servers checked to confirm all redundancies are working properly?
REMOTE ACCESS
We build IT.
Did you forget to email yourself those documents you wanted to work on over the weekend? Or did you suddenly have a brilliant business idea late at night and need immediate access to documents back at the office? We can set up secure access back to your office. Plus, with the added security of dual authentication, your smartphone will ping you, asking for your approval, whenever you attempt to connect to the office.
VIRUS, RANSOMWARE, & MALWARE PROTECTION
We build IT.
We have partnered with Malwarebytes, a long established and respected antivirus, malware and ransomware detection provider. As a partner, we have access to their enterprise line of products which allows us to centrally manage and monitor your desktops from the cloud and receive infection alerts. We even have custom rules that, when triggered, can automatically disconnect a suspicious computer from the network, limiting the spread of any contagion.
EMAIL SECURITY
We build IT.
Do you use Office365 as your email provider? Did you know that anyone around the world can try a variety of passwords to gain access to your email? We can lock down your email to define which countries can log in to your email account. We can also define which of your personal devices can log in to your email, like your phone or your iPad. And, we can even enable dual authentication, which would require your phone in order to complete the login process.
WIRELESS
We build IT.
Does your Wi-Fi drop, run slow, or just seem patchy across the office? We are certified enterprise wireless administrators. We’ve even set up clients moving into newly constructed office spaces to work mostly wirelessly, saving our clients the cost of running network cables to every cubicle and office.