Remote Desktop Support
Using a neat little unobtrusive app called TeamViewer, I can remotely access your desktop to troubleshoot issues and provide remote IT support, such as:-
- Installing software and updates
- Solving driver issues
- Configuring backups
- Optimizing your computer performance
- Malware removal
- Remote training
- Vulnerability scans
- Email setup and support
£29.99 for the initial consultation.
If I can resolve your issue within the first 30 minutes, then there will be no additional charge. If more time is required then it will be billed at my usual rate.
New websites built with WordPress, the #1 solution used by 25% of all websites. All the functionality you need, e-commerce, google analytics, forms, social media integration and much more.
A fully responsive website that looks good on tablets and mobile phones. Reach your customers on any device.
Rebuilt From the Inside Out
Happy with the look of your current site, but just need it modernized and mobile friendly? No problem, I can rebuild your existing website in WordPress and migrate all the content.
Extensive Demographic Data
Obtain advanced demographics and analytical information through integration with Google Analytics. Find out what parts of your site are working and which are not and adjust accordingly.
Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred. Business continuity planning establishes risk management processes and procedures that aim to prevent interruptions to mission-critical services, and re-establish full function to the organization as quickly and smoothly as possible.
The most basic business continuity requirement is to keep essential functions up and running during a disaster and to recover with as little downtime as possible. A business continuity plan considers various unpredictable events, such as natural disasters, fires, disease outbreaks, cyber attacks and other external threats.
Business continuity is important for organizations of any size, but it may not be practical for any but the largest enterprises to maintain all functions for the duration of a disaster. According to many experts, the first step in business continuity planning is deciding which of an organization’s functions are essential and allocating the available budget accordingly. Once crucial components have been identified, failover mechanisms can be put in place.
I can assist you with implementing your business continuity plan.
Backup & Recovery
A business that fails to maintain a copy of its data is asking for trouble. It is extremely easy to lose data and all but impossible to rebuild that data if backups don’t exist. I can Implement a backup process for all your local servers and desktop
I can Implement a complete backup and recovery process for all your local servers and desktop PC’s. This can be backed up both locally and offsite to the cloud for redundancy.
You can manage the backups yourself, or I can provide this as a managed service, monitoring your daily backups to ensure they complete and dealing with any issues automatically.
In the case of hardware failure, backups can be restored to a replacement machine or even to a virtual machine, depending on the backup solution implemented.
Security and Risk Intelligence
In 2016 there were over 1 billion malware attacks and 54% ok UK companies were hit by ransomware.
If you do not have anyone managing and monitoring your IT systems and do not have any security policies or procedures in place for data storage, passwords, internet usage, email etc, then you are most definitely at risk from malware, ransomware and cyber criminals hacking your systems and stealing your data or even your identity.
Many SME’s will often use a local IT support company, who provide what is called break-fix support, which means you call them when something breaks, they then come and fix it. This is great for keeping your equipment up and running, but sadly is useless for keeping your systems secure, ongoing security or detecting any issues you may have already as the service they are providing is not pro-active. They will only fix the specific issue you contacted them about and nothing else, so your unseen problems will continue to exist unheeded.
What I can also tell you in my many years of experience dealing with such IT support companies, is that in general most tech support guys are often just as clueless and uneducated when it comes to security as everyone else.
I can perform a full security and risk intelligence audit on all your systems and network to identify any common/known issues.
- Data risk communicated as financial impact
- At-risk data discovery
- Deep vulnerability scanning
- Missing Windows updates/patches
- 3rdParty software
- Risk trending reports
- Discovery of inappropriate access and alerts
- PCI and HIPAA compliance scans
- and more
Locate Sensitive Data across Networks and Workstations
Sensitive data left exposed on systems poses a great risk to your customers. Often, companies amass large amounts of sensitive personally identifiable information (PII), including social security numbers, driver’s license numbers, credit card information, and more in dispersed persistent storage. Risk Intelligence roots out sensitive data and potential vulnerabilities no matter where they are stored, providing actionable insights for sensitive data protection so you can mitigate the risk.
Reduce the Risk of Multiple Sources of Attacks
Beyond identifying at-risk data, Risk Intelligence points out the vulnerabilities that could lead to a data breach. Whether a customer’s biggest risks come from email or from malicious web downloads, Risk Intelligence will help you tighten your security where you need it most.
Website Management & Support
A massive 75% of websites get hacked, due to not being properly maintained and managed. This can result in the theft of any personal or financial data you collect on your website, putting you in breach of the data protection act, or malware can be inserted into your site and spread to all your visitors, eventually causing your website to become blocked by google.
Cyber criminals are scanning the web for security holes and vulnerabilities all day, every day. Any website which runs on backend technology such as ASP, PHP, ColdFusion, Java etc will have vulnerabilities, especially if they are running off the shelf eCommerce or CMS systems such as WordPress, Joomla, Drupal and many others. When these vulnerabilities are discovered, they are patched by the software developers, and those updates then need to be applied to your website and any plugins.
If you have a bespoke built website, then you are less likely to be targeted, but this also means that you have no assurances about the quality of the code and any vulnerabilities in the code will never be detected until it is too late unless you are manually and routinely reviewing the code, which rarely ever happens.
I will audit your website for issues, providing you with a report of any problems found with recommendations. I can optionally provide ongoing monthly management and maintenance of your websites to make sure they stay secure and up to date. For legacy websites I can get them converted to a more modern solution such as WordPress and hosted on a fully managed platform.