Services

Services

I have been working in IT for 30 years, I have been a developer, consultant, tech support engineer and run my own web hositng and web development company. I can assist and advise with most IT related problems, but if I cannot help, then I will know someone who can.

My personal mission has always been to use my skills to help people and provide the quality of service that I would expect to receive myself at a reasonable price. I am proud to be able to say I do not blag my clients or oversell them services I do not need, and will always be 100% honest even if it is not in my best interest to do so.

usually my work can be done remotely, but I can provide on-site support and assistance within the Thanet area. Below is a breakdown of the various services I can provide.

 

Security & Risk Intelligence

If you do not have anyone managing and monitoring your IT systems and do not have any security policies or procedures in place for data storage, passwords, internet usage, email etc, then you are most definitely at risk from malware, ransomware and cyber criminals hacking your systems and stealing your data or even your identity.

In 2016 there were over 1 billion malware attacks and 54% ok UK companies were hit by ransomware.


Many SME's will often use a local IT support company to maintain their office IT, but this is usually just a break-fix solution, which means you call them when something breaks, they then come and fix it. This is great for keeping your equipment up and running, but sadly does absolutely nothing for your ongoing security risks or to resolve any security issues you may have already as the service they are providing is not pro-active, so they will only fix the specific issue you contacted them about and nothing else, so your problems will continue to exist unheeded.

What I can also tell you in my many years of experience in dealing with clients who use such IT support companies, is that the general tech support guys are often just as uneducated when it comes to security and have the same bad practices as everyone else.

Solution

I can perform a full security and risk intelligence audit on all your systems and network to identify any common/known issues.

  • Data risk communicated as financial impact
  • At-risk data discovery
  • Deep vulnerability scanning
    • Missing Windows updates/patches
    • 3rdParty software
    • Malware
  • Risk trending reports
  • Discovery of inappropriate access and alerts
  • PCI and HIPAA compliance scans
  • and more

View sample risk intelligence report.

Locate Sensitive Data across Networks and Workstations

Sensitive data left exposed on systems poses a great risk to your customers. Often, companies amass large amounts of sensitive personally identifiable information (PII), including social security numbers, driver's license numbers, credit card information, and more in dispersed persistent storage. Risk Intelligence roots out sensitive data and potential vulnerabilities no matter where they are stored, providing actionable insights for sensitive data protection so you can mitigate the risk.

Reduce the Risk of Multiple Sources of Attacks

Beyond identifying at-risk data, Risk Intelligence points out the vulnerabilities that could lead to a data breach. Whether a customer’s biggest risks come from email or from malicious web downloads, Risk Intelligence will help you tighten your security where you need it most.

Business Continuity

Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred. Business continuity planning establishes risk management processes and procedures that aim to prevent interruptions to mission-critical services, and re-establish full function to the organization as quickly and smoothly as possible.

The most basic business continuity requirement is to keep essential functions up and running during a disaster and to recover with as little downtime as possible. A business continuity plan considers various unpredictable events, such as natural disasters, fires, disease outbreaks, cyber attacks and other external threats.

Business continuity is important for organizations of any size, but it may not be practical for any but the largest enterprises to maintain all functions for the duration of a disaster. According to many experts, the first step in business continuity planning is deciding which of an organization's functions are essential and allocating the available budget accordingly. Once crucial components have been identified, failover mechanisms can be put in place.

I can assist with the following areas of your business continuity plan.

Backup and Recovery

I will Implement the backup process for all your local servers and desktop PC's. This can be backed up both locally and offsite to the cloud for redundancy. I can provide full training on how to use the backup software and how to restore backups, or provide this as a remote service.
You can manage the backups yourself, or I can provide this as a managed service, monitoring your daily backups to ensure they complete and dealing with any issues automatically.

In the case of hardware failure, backups can be restored to a replacement machine or even to a virtual machine.

 

Remote Desktop Support

Remote desktop support

Using TeamViewer I can remotely access your PC to troubleshoot issues and provide support, such as:-

  • Installing software and updates
  • Solving driver issues
  • Configuring backup
  • Optimizing your computer performance
  • Malware removal
  • Remote training
  • Security scans
  • Email setup and support
  • more....
Website Management & Support

Why do you need your website to be professionally managed?

cyber criminals hacking your websiteA massive 75% of websites get hacked, due to not being properly maintained and managed.  This can result in the theft of any personal or financial data you collect on your website, putting you in breach of the data protection act, or malware can be inserted into your site and spread to all your visitors, eventually causing your website to become blocked by google.

Cyber criminals are scanning the web for security holes and vulnerabilities all day, every day. Any website which runs on backend technology such as ASP, PHP, ColdFusion, Java etc will have vulnerabilities, especially if they are running off the shelf eCommerce or CMS systems such as WordPress, Joomla, Drupal and many others. When these vulnerabilities are discovered, they are patched by the software developers, and those updates then need to be applied to your website and any plugins.
If you have a bespoke built website, then you are less likely to be targeted, but this also means that you have no assurances about the quality of the code and any vulnerabilities in the code will never be detected until it is too late unless you are manually and routinely reviewing the code, which rarely ever happens.

I will audit your website for issues, providing you with a report of any problems found with recommendations. I can optionally provide ongoing monthly management and maintenance of your websites to make sure they stay secure and up to date. For legacy websites I can get them converted to a more modern solution such as WordPress and hosted on a fully managed platform.