CJN IT Solutions - News, articles and cooperation

News

CJN IT Solutions - Backup Solutions

3 months ago

What do you do to prevent the loss of data in your business?

Do you want to make sure that your business doesn’t close after a disaster?

Contact Sonja Nagel today at sonja@cjn-it.co.za for a free no obligation consultation.

Most businesses have mission-critical data which they cannot afford to lose. We assist you in formulating and implementing comprehensive backup strategies.

Why do I need a backup solution?

- To protect one of the most important assets of any business, a reliable backup strategy is essential.

- Very few businesses recover from complete or partial data loss. What would happen to your business if you no longer had access to the data used for its daily operations?

- Regulatory requirements require business and individuals to keep certain documents for many years.

- Protection against the increasing threat of Ransomware where your businesses data is targeted by criminals.

Why use CJN IT Solutions for my backup strategy?

- CJN IT Solutions have a proven track record with our customers, with a 100% data recovery rate from the backup systems we have implemented.

- We use industry leading products, such as Acronis Backup & Recovery software to ensure full snapshot backups are done, which enable us to restore your entire system to different hardware if required.

- We provide our clients with an effective and secure backup strategy as well as a disaster recovery plan.

- We encrypt all our client's backups to ensure that their data cannot be accessed if the backups fall into the wrong hands.

- The systems put in place are automated, with little to no user intervention required.

- The systems can be easily monitored.

- We test backups on a regular basis to ensure that the backup files are intact.

CJN IT Solutions provides a complete IT solution which encompasses all your IT needs, including;

  • IT maintenance.
  • IT support.
  • Backup solutions.
  • Disaster recovery plans.
  • Data recovery.
  • Network design and implementation.
  • Office 365.
  • Repairs of hardware and software.
  • Internet connections, domain, website and email hosting.
  • Hardware and software upgrades.
  • Removal of viruses and malware.
  • Server support, deployment and related services.

CJN IT Solutions IT Support

3 months ago

Does your current IT provider provide you with the best possible service?

Do you want an IT support provider you can trust to get the job done?

Contact us at sonja@cjn-it.co.za for a free, no obligation consultation.

Our diverse team of skilled IT support personnel have been providing onsite as well as remote IT support to customers for more than 14 years.

What is IT support?

IT support or “tech support” as it is commonly referred to, is when specialised help from an IT professional is required to help solve a specific IT-related problem. Hardware, software and networking-related problems are the most common.

Some considerations when choosing an IT support provider:

1. Am I receiving value for money?

2. Are they reliable and do they have a proven track record?

3. Do they have the skills required to resolve problems effectively?

4. What are the turnaround times to resolve problems?

Why consider CJN IT Solutions as your trusted IT support partner?

- Our rates are affordable and offer great value.

- CJN IT Solutions is an established business, rendering IT services since 2003. The business owner is actively involved in management of the day to day operations, ensuring that you receive reliable service of the highest standard.

- We only employ technical personnel with proven knowledge and experience in their field of expertise.

- Our response times are second to none, with problem resolutions usually complete within 24 hours. Customers opting for our SLA option can expect even faster turnaround times, of 1 to 4 hours depending on the nature of the problem.

- We provide a complete solution, there is no need for you to engage with multiple service providers, we do all that is necessary on your behalf. Internet not working? We deal with the ISP. Pastel problem? We will sort it out with them on your behalf.

CJN IT Solutions offers support on both an ad-hoc and SLA basis:

Ad-hoc support is provided on a reactive basis and is charged per hour for problems to be resolved. This form of support is for you if you rarely have IT problems and require occasional support with an IT problem. We have had many cases where our customers were unaware of serious underlying problems on their pc’s, so it is not a bad idea to have a check-up done on your pc every few months.

SLA (Service level agreement):

This model of support provides an unlimited amount of support hours per month at a fixed monthly fee. This model is more cost effective and provides proactive maintenance and support. This method of support is for businesses which require ongoing support to their IT infrastructure and cannot afford downtime arising from IT-related problems.

It’s that simple, we ensure all your IT support is taken care of for a fixed monthly fee, no unplanned expenses, only IT systems that work as they should and a support structure you can rely on. You get a full-time IT department without the need to employ any IT staff.

The SLA advantage:

· Access to a variety of IT skills across multiple fields of expertise.

· Standardised IT environment based on best practice principles.

· Ongoing advice for future proofing your IT environment.

· Technical account managers (familiar with your IT environment).

· Customer service focus (friendly and timeous response and resolution to problems).

· Guaranteed response times.

· Better pricing on hardware/software.

· Flexible product tailored to your business needs.

· You are our number one priority.

CJN IT Solutions provides a complete IT solution which encompasses all your IT needs, including;

  • IT maintenance.
  • IT support.
  • Backup solutions.
  • Disaster recovery plans.
  • Data recovery.
  • Network design and implementation.
  • Office 365.
  • Repairs of hardware and software.
  • Internet connections, domain, website and email hosting.
  • Hardware and software upgrades.
  • Removal of viruses and malware.
  • Server support, deployment and related services.

IT Maintenance

3 months ago

How sure are you that your IT systems are being maintained effectively, or even at all?

Do you want to prevent computer problems before they happen?

Contact CJN IT Solutions today at sonja@cjn-it.co.za, for a free no obligation consultation.

CJN IT Solutions provides businesses with proactive IT maintenance services, which ensures your business computer systems run at optimal levels as well as minimizing potential downtime. Our IT outsourcing services are provided at a fixed monthly fee and has been designed with a focus on the SME sector.

Our SLA (service level agreement) combines both reactive and proactive IT services, combined into a unique offering, which aims to ensure a trouble-free IT environment for your business. The service we provide will allow you to focus on your business, instead of wasting costly time trying to resolve IT problems.

What is IT maintenance?

IT systems are maintained by performing certain essential tasks at regular intervals. Each customer has unique requirements, although there are some tasks which most customers require to ensure their systems are running securely and efficiently. Automated systems and procedures are implemented which ensure that most of these tasks are done with minimal or no user intervention, ensuring for instance, that antivirus and Windows security updates are performed regularly.

When essential maintenance is performed regularly, the amount of computer downtime is greatly reduced, ensuring productivity levels are not hampered by unforeseen computer problems which should have been prevented by regular maintenance.

Why is IT Maintenance important for a business?

Most businesses in today’s technology focused world rely on their IT systems for effective operation. Even the simplest tasks, such as sending a quotation or printing an invoice are done on a computer, which means any downtime on your IT systems could bring your business to a grinding halt. Keeping your IT systems properly maintained can no longer be overlooked, since IT systems are an integral part of your everyday business processes.

Types of maintenance

There are primarily two types of maintenance which we focus on, proactive- and reactive maintenance.

Proactive maintenance

The most important type of maintenance – prevent problems from happening by implementing processes and systems which minimise computer downtime and optimise efficiency of IT systems.

Reactive maintenance

No matter how well regular maintenance is performed, there will always be a need for reactive maintenance. Reactive maintenance is to fix a problem or find a solution to a problem that has already occurred. Email not working? Can’t print? These problems do occur and can be easily rectified should you have an SLA in place.

Advantage of our IT maintenance SLA

With CJN IT Solutions you rely on a team for support instead of an individual. When starting a new SLA, we do an analysis of the IT systems in place and acquire in-depth knowledge and understanding of your IT systems. The information gathered is made available to our team of technicians, ensuring that there is an entire team of support staff with knowledge of your IT systems. Our familiarity with your IT systems will ensure problems are resolved faster, since we already know how to fix problems specific to your environment, should they occur.

Let us work with you to ensure your systems are running at optimal levels.

Did you know that we at CJN IT Solutions provides a fixed cost SLA model to the SME sector which includes the following services at no additional charge?

CJN IT Solutions Flat fee service contract details

8 months ago

 

What IS Covered

 

Deliverables

 

A detailed system inventory of hardware, software and network configuration.

 

Unlimited Telephone Support

 

You will receive a return call within 1 hour in most cases during regular business hours.

 

Unlimited Remote Access Support

 

Remote Access Support revolutionizes the way we deliver technical help to our customers. When you call in for assistance, we can take control of your computer to provide you with fast, easy and secure support services.

Note: As with any remote service, security is a factor. All communications between us and your network are authenticated and encrypted. This allows for safe and effective monitoring to take place without any compromise in the safety and security of your network. We will install the necessary software on your PCs to allow us to remotely access your individual PCs and servers securely.

 

Unlimited On-Site Support

 

We will come to your location in accordance with the urgency of the problem. On-site support is provided after remote and telephone support services are unsuccessful. If a problem cannot be resolved remotely, we will come to your location. Do be aware that our response time for on-site support will be prioritized based on the nature of the problem.

 

Proactive Maintenance

 

Ongoing maintenance will be done to ensure that the network is running correctly and to fix any low level issues your network may be having.

 

Microsoft Security Patch Management

 

With the importance of computer security, nothing is more important than maintaining up to date security patches from Microsoft for both the Windows operating system and Microsoft Office software. We will monitor and maintain the patch update process from a centrally managed platform.

 

Computer System Tune-Up

 

Are any of your PCs acting sluggish? Do you have to reboot your computer because of errors and lockups? We will perform a checkup and various diagnostics to tweak your systems and get them running at peak performance again.

 

File Sharing Permission and Administration

 

We will work with you to determine the correct file structure for your organization. This will include helping you develop a file storage system and enabling end user access rights. We assist end users in administering this system and ensuring critical corporate data is protected.

 

Diagnostics/Health Monitoring

 

Our computer diagnostics software diagnoses key points of your computer health and provides a detailed report of your computer to us. This report includes information about the computer's hardware (processor, memory, hard drives, CD/DVD drives, floppy drives, monitor, video card, network card, modem, sound cards, keyboard, mouse, serial ports, USB, PCI, system board devices) so that we can provide you with support tailored to your specific computer.

 

Anti-Virus Monitoring, Management, and Update

 

We'll monitor and manage all aspects of the desktop and server anti-virus software, which will keep your computers protected from the latest Internet risks so that you can feel assured about the safety and integrity of your information. Should a virus be detected on one of your desktops, we will ensure that the issue is resolved.

 

Backup Monitoring and Administration

 

Your knowledge and corporate history are one of your biggest assets. We will assess your backup needs and make recommendations on how to best protect your business. With a robust backup regimen in place we will monitor and maintain your backup on a daily basis. We will ensure that daily jobs are running and will monitor logs and investigate critical errors. We perform monthly tests of the backups at our premises to ensure the integrity of the backup.

 

User Account Administration

 

Adding or removing users from your network resources is a snap. Just call us and we'll take care of it for you.

 

ISP Management

 

Problems with your Internet services? We'll fight the layers of customer support bureaucracy on your behalf so you don't have to. We also offer a full range of internet related products, such as ADSL, domain & web hosting, as well as a full range of cloud based services, focused on the Office 365 platform from Microsoft.

 

Virtual CIO

 

Periodically we meet with the business owner to understand the functional requirements of the business and help develop tactical and strategic technology plans to meet those requirements.

 

 

 

What IS NOT Covered

 

On-Site Support – outside of Gauteng

 

For locations outside of Gauteng, we make use of approved partners if we are unable to remotely resolve a problem. Additional costs will be for the customer’s account.

 

New System Development

 

We can develop new software and systems for you using the latest open source development tools. Such development is NOT included in our flat rate support plan. What IS included, however, as indicated about in our "Virtual CIO" paragraph, is consultation about new systems you may need or desire.

 

Hardware and Software

 

We will charge for any spare parts or commercial software required. If a repair requires the supplier or 3rd party to affect a repair this cost will apply. Much of the software we use is either open source, freeware or under a license permitting its use for small numbers of systems. If you need software which does not fit in those categories, we will research the most cost-effective commercial software to meet your needs.

 

Training

 

Training is excluded from this program. We can and do, however, make suggestions to your end users about how to use their systems more effectively in the normal course of providing support.

 

Printers and Network Devices Repair Under Warranty or Contract

 

Printers and network devices such as copiers, routers, firewalls etc. which require service often must be serviced by authorized repair centers. We will forward these devices to authorized repair centers upon request or coordinate with authorized repair personnel on behalf of the client if desired. Any costs incurred by us related to these repairs will be charged to the client. Our normal charges may apply to the diagnosis and transport of any such devices.

 

New Technology Roll Outs or Large Installations

 

Examples: system wide installations of new printers, deployment of new software across all desktops, or structured cabling of a building or office. The particulars of this type of service will be agreed upon before any work is begun. At our discretion, a preliminary analysis may be provided free of charge as part of our "Virtual CIO" component of our flat rate support program. In some cases, we can perform these services within our flat rate support program, but we will decide that on a case-by-case basis.

 

Third Party Expenses

 

Any expenses incurred by us to third parties in the process of providing our flat rate services to you will be charged back to you, or, in the case of expenses impacting our cash flow in our opinion, must be paid in advance or directly by you to the third party as appropriate.

 

 * It is almost impossible to create an exhaustive list that will cover every eventuality or every situation. It is our intent to take an inclusive approach to IT Support – to try and cover off the regular, ongoing issues and problems that arise in a business environment through normal use. However, situations that clearly are outside of the cost scope of a Flat Fee Service Contract will be billed separately and in addition to the contracted fee.

CJN IT Solutions - The smart choice

2016/08/29

 

Choose CJN IT Solutions to assist you with your IT needs. This is why we are a leading IT support provider:

We have been in the IT industry for over 13 years and have developed a unique support product for our clients, resulting in a near 100% retention rate for our contracted customers.

 

*     Unlimited onsite & remote support at a fixed monthly fee.

 

*     Enhanced productivity by ensuring IT systems functional at optimal levels.

 

*     Guaranteed same day response.

 

*     Fast turnaround times varying between 10 minutes to 4 hours.

 

*     Proactive system maintenance and problem prevention.

 

*     Test and store backups at our premises to prevent data loss. Backups are essential for any organization. Upon the infection of your company PC's, ransomware is likely to start encrypting files that are essential to the daily operation of a business.

 

*     We educate our customers since a ransomware infection happens due to a lack of knowledge about common cyber threats and the methods criminals use to infect their victims.

 

*     We implement reliable security solutions tailored to customer requirements.

 

*     We have knowledgeable staff with a wide variety of knowledge available working as a team to provide you with the best solution possible.

 

Please contact me Sonja Nagel at sonja@cjn-it.co.za if you are interested in an IT solution that is more cost-effective, efficient and reliable for your business.

 

CJN IT Solutions - The smart choice. 

Our services:

* IT Maintenance & support contracts

* Cloud computing

* Repairs

* Internet

* Network design & cabling

* Upgrades

* Date recovery

* Removal of viruses & spyware

* Backup Solutions

* Software

Hardware products:
* Desktops
* Laptops
* Tablets
* Printers
* Servers
* And many more


Software products:
* Cloud Computing
* Acronis Backup & recovery
* Trend micro antivirus
* All Microsoft software


All major Brands:
* HP
* Dell
*Acer
* Toshiba
* Lenovo
* Brother
* Lexmark
* and many more

 

Articles

10 mistakes small businesses make

one month ago

10 tech mistakes small businesses make (and how CJN IT Solutions can help you avoid them)

Small businesses must concentrate their time and energy on knowing their own industry — and that often means that effective technology practices get overlooked.

In today’s microwave society — in which just-in-time manufacturing models, heightened customer expectations, and 24×7 accessibility demands burden both manufacturers and service providers — little time remains for much else. Small businesses often don’t have the resources or inclination to track the latest computer news, security threats, or even common break/fix tips. And not all small business owners are adept at maintaining best technology practices.

As a result, small businesses frequently make certain technology mistakes. Here’s a look at these mistakes, along with specific steps CJN IT Solutions can take to assist small businesses in correcting these common failures.

Contact us at 0861 211 212 / sonja@cjn-it.co.za if one or more of the following mistakes are happening to you?

#1: Insufficient technical support

Many organizations go without technical support, relying instead upon an employee whose love of Warcraft may make him or her the local office “computer guru.” Other organizations may depend upon a staffer’s friend or relative (who’s “interested in computers”) to provide technology advice or assistance when critical systems fail or slow unacceptably.

Some turn to their hardware manufacturer’s telephone support line for help, only to be disappointed when the solution to many problems proves to be performing a reinstallation (thereby resulting in the loss of all the business owner’s data). Some rely upon a big box electronic store’s service arm, never receiving the same (novice, often undereducated, and inexperienced) technician twice. And still others locate a student or individual who provides computer support “on the side.”

These support methods are not cost-efficient. Nor are they effective information technology investment, troubleshooting, or administration options.

Small businesses need knowledgeable, trusted technology partners who are proficient with current technologies and willing to help learn their industry’s operations requirements. Once a qualified technology expert is familiar with a client’s needs, appropriate services and solutions can be recommended and deployed. The result is almost always more cost-effective, more efficient, more profitable operations for the client.

#2: Hardware/software issues

Smart organizations set PC service lives at three or four years. There’s a reason.

“When you look at costs — particularly around a four- to six-year lifecycle — it may seem like you are saving money,” says Info-Tech Research Group analyst Darin Stahl. “But really it’s costing you.” That’s because support expenses increase. Retaining PCs longer than three or four years often results in repair and support costs that meet or exceed the price of new systems.

This is the second common tech mistake businesses make: They fail to standardize hardware components and software applications, where possible. The result is a mishmash of components that complicate troubleshooting, repair, and deployment and require companies to support a variety of programs with different license terms and renewal dates. Incompatibilities often result.

Worse, older and obsolete hardware is less efficient, increases downtime likelihood, feeds staff and customer frustration, endangers sales, and threatens other lost opportunities.

Small businesses can overcome common hardware and software issues by:

  • Retiring equipment at proper lifecycles, typically three to four years.
  • Standardizing hardware components.
  • Standardizing software applications.
  • Working with an IT consultant to leverage vendor relationships and reduce costs/negotiate more attractive pricing.

#3: Insufficient power protection

A single power outage, surge, or spike can damage expensive electronic components and result in critical data loss. Consistent surges and brownouts, meanwhile, shorten the lifespan of computers, printers, network components, and other equipment.

Many businesses deploy simple power strips. Others continue depending upon surge suppressors deployed five and even 10 years earlier. When thunderstorms, electrical outages, and other disasters strike, the damaged systems and corrupted or lost data — not to mention downtime — resulting from insufficient power protection prove costly.

Organizations should deploy quality battery backup devices (with built-in surge suppression) for all critical desktop PCs. Further, technology professionals should connect all servers to uninterruptible power supplies and test them regularly to confirm adequate failover protection is in place.

When deploying battery backups, businesses should properly install and configure corresponding cables and communications software. Network protections should be leveraged whenever possible, as well, in attempts to remediate cable modem, DSL, and other surge sources that can destroy telecommunications and computing equipment.

Since surge suppressor quality varies, organizations should purchase such equipment from trusted vendors. And since surge suppressors (and batteries) wear over time, businesses should replace them regularly.

Simple power strips should be avoided whenever any computer, server, network device, or other important component is present.

#4: Illegal software

Possessing illegal software may be the easiest trap into which many organizations fall. The issue is widespread (the Business Software Alliance estimates 22 percent of all south african software is unlicensed), making it our fourth common tech mistake plaguing small businesses.

Certainly, licensing issues quickly prove perplexing. The differences between OEM, retail, and open license software escapes the understanding of many business owners. Yet manufacturers are becoming more aggressive in locking down licenses (via product activation technologies) and prosecuting offenders (often via the BSA, which has collected more than $81 million in settlements).

Many organizations don’t recognize they do not “own” software, since programs and applications are commonly licensed. Worse, some firms use “borrowed” applications or pirated programs. Problems arise either in the form of audits and penalties or challenging delays (due to product activation conflicts and other licensing issues) when returning failed systems to operation.

Businesses must understand there are no shortcuts to running legitimate operations. All software, applications, and programs must be properly licensed.

With more manufacturers implementing product activation features, in which software programs report their installation and usage back to the manufacturer, overuse or outright piracy is becoming more difficult or impossible, anyway. But violations still occur.

Businesses can protect against licensing errors and penalties, and help ensure the fastest recovery times when failures occur, by carefully documenting and tracking all software license purchases and deployments.

Further, software licenses (including for operating systems, business line, and office productivity applications, accounting programs, security tools, and other utilities) should be purchased only from reputable technology partners. License sales on eBay that look too good to be true are.

Finally, when installing new programs, organizations should pay close attention to the license agreements they accept.

#5: Insufficient training

Mention software training in most any conference room, and you’re likely to hear groans. Boredom, bad classroom experiences, lack of interest, or complexity all contribute to employees’ resistance to learning new applications. But that doesn’t change the fact that insufficient training ranks as the fifth common tech mistake impacting small businesses.

How bad is it?

It’s estimated that office staff understand less than 20% of the available features in the software applications they use. That means 80% of the features, time-saving capabilities, and cost-reducing functions remain unused.

Gross inefficiencies result. As a consequence, many processes — including repetitive data entry, complicated calculations, and automated data selection and reporting — are completed manually, which introduces a greater likelihood of errors entering the process.

Tasks that could be completed in moments often consume exponentially more time. Considering that many of those tasks are repeated each business day by multiple workers, it’s easy to see how the costs quickly become significant.

Most small businesses don’t employ full-time trainers. Therefore it’s imperative that small businesses identify technology partners, training centers, or other programs that assist staff in maximizing software applications.

Even when training resources are present, there’s no guarantee staff skills will improve. For that to happen, businesses must make computer and software training a priority. Tap technology partners or other consultants to conduct regular lunch-and-learn sessions. The business can spring for lunch and, for a few hours of consultant’s fees, expose entire departments to important new features and capabilities.

An organization’s technology training commitment can be reinforced using performance reviews. Businesses can add specific course, off-site training, and even certification requirements to staff education programs and performance review objectives. When partnering with a local training center, businesses can create customized instructional programs or select prepackaged modules.

Organizations with limited budgets, meanwhile, can leverage self-paced instruction manuals and computer-based training aids to assist employees in improving their skills after hours or in their own homes.

#6: Security failures

Small businesses frequently fail to accommodate security issues. Organizations either don’t recognize the risks or don’t take them seriously.

The costs are staggering. Large U.S. organizations lose some 2.2% of their annual income due to security attacks, according to an Infonetics Research “Costs of Network Security Attacks” report. That’s expensive. The FBI estimates such computer crime costs U.S. industry in excess of $400 billion.

Organizations don’t need to have a high-profile to become a target, either. Hackers have created innumerable automated programs that scour the Internet 24 hours a day, 365 days a year, seeking poorly secured systems, servers, PCs, and networks to infect and exploit.

Unfortunately, businesses everywhere are falling victim to compromised systems, robotic attacks, identity and data theft, and more. Organizations that fail to properly secure client and customer data often find themselves in the middle of security crises that result in bad press, lost sales, and forfeited customer trust.

Fortunately, completing simple steps assists small businesses in preventing security failures. Here are several best practices all organizations should adopt:

  • Implement and enforce strong password security policies for all PCs, servers, network equipment, and software applications.
  • Regularly update operating systems, network equipment firmware, and applications with the latest security patches.
  • Deploy business-class firewalls in all locations; connect no systems directly to the Internet.
  • Secure all wireless networks.
  • Disable guest accounts.
  • Implement Internet and e-mail usage policies that preclude personal use of those technologies.
  • Prohibit file-sharing programs.
  • Deploy proven antivirus, anti-spyware, and anti-rootkit applications and update them regularly.
  • Regularly perform security audits and correct all deficiencies.

#7: Poor backup strategies

Despite numerous choices, methods, and options, many organizations fail to adequately back up data — a mistake that can be unrecoverable.

Statistics reveal there is a 50% chance an organization will cease operations immediately when critical data is lost. Worse, an organization’s odds of failure rocket to 90% within two years when critical data is lost. Data losses cost an average of 19 days’ productivity. Recovering data from damaged disks, meanwhile, is incredibly expensive.

Even organizations that believe their data is properly protected may find themselves at risk. Occasionally, incorrect data (as in the wrong data) is backed up. In other cases, tape backups prove unreliable. (Gartner Group estimates only half of all tape backups restore successfully.) Fortunately, small businesses can follow simple steps to securely protect their data.

Since data backups are so critical to an organization’s livelihood, small businesses should work with proficient IT consultants or technology partners to ensure the right data is being backed up and that it’s being backed up as frequently as required. In addition, technology professionals should regularly test backup sets to confirm the data can be recovered in its entirety.

Consultants can work with small businesses to determine what data, files, and information should be backed up, how often to create the data sets, where to locate the backups, and how often to test the sets’ integrity. Consultants also prove invaluable in updating backup routines when software upgrades, migrations, and other updates change critical file locations. Further, technology professionals can ensure business data remains secure, which is a critical concern for physicians, financial institutions, and even retail outlets.

#8: Virus exposure

Viruses not only remain a major threat, but their dangers are increasing. The BBC reports that unprotected PCs become infected within eight seconds of being connected to the Internet.

Infections are proving expensive, too. In the book The Dark Side of the Internet, author Paul Bocij estimates the average virus incident costs organizations R42 000 in remediation and data recovery expenses. A report by ICSA Labs places businesses’ costs even higher (at R1.6 mil per incident).

And the numbers, varieties, and types of threats only increase. Malware programs are evolving at such a clip that many security software vendors have eliminated daily updates in favor of distributing patches every four hours.

Often, businesses and users simply fail to implement protection. A survey conducted by the National Cyber Security Alliance revealed that 67% of the respondents did not have up-to-date antivirus software. Worse, some 15 percent had no antivirus application installed.

#9: Spyware exposure

Before we address virus solutions, let’s visit spyware, which is an equal threat — and potentially even more daunting.

Spyware differs from viruses in its nature (spyware typically aims to track user behavior, collect user information or sensitive data, and display unwanted advertisements, whereas viruses often destroy data, corrupt systems, or enable hackers to remotely control a system). But spyware’s business impact has reached epidemic levels.

The respected trade group CompTIA estimates spyware infections require two-and-a-half days to resolve and cost small and medium-size businesses R135 078 a year, which doesn’t factor lost revenue. As evidence businesses aren’t doing enough to protect themselves from the threat, CompTIA pointed to the information its research recently uncovered. More than a quarter of business users reported their productivity suffered as the result of a recent spyware infection, and more than a third reported being infected multiple times within the last six months, with some reporting being infected as many as 10 times!

No virus or spyware strategy is foolproof, but most technology consultants recommend the following steps:

  • Install reputable antivirus and anti-spyware applications.
  • In high-risk environments, a second standalone anti-spyware application is warranted.
  • Regularly update antivirus and anti-spyware programs.
  • Do not let antivirus and anti-spyware program licenses expire.
  • Perform regular automated antivirus and anti-spyware scans.
  • Regularly review security program log files to confirm proper operation.

Further, businesses should avoid deploying “free” security products in businesses. These products are often deployed in violation of the license agreements (which require licensing the software in businesses, academic facilities, and nonprofit organizations) and don’t support frequent updates, real-time protection, or automated scans.

#10: Unsolicited E-mail

Most every business and user is familiar with the problem of unsolicited e-mail, also known as spam. Spam messages have become a serious issue, particularly for small businesses that often misunderstand the problem and fail to take effective countermeasures.

The Radicatti Research Group estimates spam costs businesses more than R336 billion a year. Further, almost half of all e-mail is estimated to be spam.

Thus, small businesses are investing valuable time, money, and system resources processing, delivering, and even storing these unsolicited e-mail messages. In addition to lowering productivity (staff must regularly sift through hundreds or more junk mail messages, deleting the spam, in search of legitimate e-mail), spam takes a toll on an organization’s servers and workstations, which often must dedicate processor cycles, disk space, and backup media to untold gigabytes of unwanted mail.

Technology consultants wield several weapons in the war on spam. In addition to network filtering software, consultants can deploy server-based spam protection. Some organizations choose to outsource e-mail processing to a vendor that can monitor e-mail streams and filter out unwanted messages.

But such filters can generate false positives. And they’re not cheap. Therefore, it’s often a good idea to begin by adopting effective methods for managing unsolicited e-mail messages. Here are several first steps all e-mail users and small business owners may take to minimize spam:

  • Do not publish e-mail addresses in plain text on Web sites; instead use form-based tools that prevent robotic harvesting.
  • Avoid forwarding chain e-mail messages.
  • Ignore credit repair, get-rich-quick, and other common e-mail solicitations.
  • Use reputable e-mail filters (such as those included in Microsoft Outlook, Google Gmail, and other programs).
  • Read all terms before ever submitting your e-mail address to another party.
  • Review privacy policies before ever providing an e-mail address.
  • Consider creating a free e-mail account (Yahoo, Hotmail, Gmail, etc.) for submitting to third parties.

CJN IT Solutions Computer Cleaning Tips Week 2 Of 2

5 months ago

 

CJN IT Solutions Computer Cleaning Tips Week 2 Of 2
 
Headphones Cleaning.

 

Why it is important.

Why? Headphones used by different people may need to be frequently cleaned to help prevent the spreading of germs and head lice.

Procedure: If the headphones being used are plastic or vinyl, moisten a cloth with warm water. Then rub the head and earpieces of the headphones. 

Headphones that are being used for a library or school, do not use any disinfectant or cleaning solvent. Since some people / children can have allergic reactions to the chemicals they contain. 
Headphones that have cushions also have the availability of having the cushions replaced. Replacing these cushions can also help keep the headphones clean. 

Finally, regarding headphones spreading head lice. If many different students use the same headphones, consider having the students using their own headphones. Place bags over the headphones, or using headphones that can be wiped with warm water after each use.

 

 

Desktop keyboard Cleaning.
These steps are for desktop keyboard cleaning. 

Dust, dirt and bacteria:
Desktop keyboard cleaning is usually the most germ infected items in your business. It may even contain more bacteria than your toilet seat. Cleaning it helps remove any dangerous bacteria and keeps the keyboard working properly.

 

Procedure: Before cleaning the keyboard first turn off the computer or if you are using a USB keyboard unplug it. Not unplugging the keyboard can cause other computer problems. You may press keys that cause the computer to perform a task you do not want it to do.

Many people clean the keyboard by turning it upside down and shaking. A more efficient method is to use compressed air. Compressed air is pressurized air contained in a can with a very long nozzle. Aim the air between the keys and blow away all of the dust and debris that has gathered there. A vacuum cleaner can also be used. Just make sure the keyboard does not have loose "pop off" keys that can be sucked up by the vacuum.

If you want to clean the keyboard more extensively remove the keys from the keyboard.

After the dust, dirt and hair has been removed, spray a disinfectant onto a cloth or use disinfectant cloths. Rub each of the keys on the keyboard. Never spray any liquid onto the keyboard. 

Substance spilt into the keyboard:

If the keyboard has anything spilt into it (e.g. Coke, Beer, Wine, Coffee or milk), not taking the proper steps can destroy the keyboard.


Procedure: Below are a few recommendations that can help prevent a keyboard from becoming bad after something has spilt into the keys. 

If anything is spilt onto the keyboard turn the computer off immediately or at the very least disconnect the keyboard from the computer. Once done flip the keyboard over to prevent the substance from penetrating circuits. While still upside down, use a cloth to start cleaning the keys. After cleaned, leave the keyboard upside down for at least one night allowing it to dry. Once dry, continue cleaning the keyboard with any remaining substance.

If after cleaning the keyboard and you have keys that stick, remove the keys and clean below the keys and the bottom portion for the key.


If after doing all the steps the keyboard still does not work, we recommend buying a new keyboard.

How to remove the keys on a keyboard:

Note: This document is for traditional computer keyboards and not laptop keyboards. 

Caution: Before removing any of the keyboard keys, unplug it from the computer of turn off the computer. We also suggest not removing the space bar key unless absolutely necessary, since many keyboards use a retention spring that can be very difficult or impossible to put back into place.

Many people need to do this when they need to clean the key itself or get below the key to clean it. This is often necessary especially when a drink is spilt in the keyboard.

Removing a standard keyboard key is simple. Start by pressing down on the key in front of the key you want to remove and insert a flat object such as a car key or a small flathead screw driver below the key. Once below the key twist it or push down until the key pops off. If you want to remove more than one key, repeat this process until all keys are removed. (take a picture of the keyboard so you know where all the keys should be if you remove more than one key) 

Once the key has been removed you'll notice the hair, dust, dirt and food particles under the key. This substance can be removed with compressed air, damp cloth or cotton swabs.

If you're removing the key because a drink was spilt into the keyboard, make sure to not only clean below the key but also the shaft that holds the key and the bottom of the key.

Once everything has been cleaned position the key back into the normal position and snap it back into place by pressing in on the key.

 

Contact Sonja Nagel at sonja@cjn-it.co.za when you want to upgrade your computer hardware or software, our prices are very competitive. Just let us quote you and you will see for yourself.

CJN IT Solutions - The smart choice.

CJN IT Solutions Computer Cleaning Tips Week 1 Of 2

5 months ago

LCD Monitor Cleaning.

How and why you should clean your LCD Monitor?

Why? Dirt, dust and fingerprints can cause the computer screen to be difficult to read.

Procedure: Unlike a computer monitor, the LCD or flat-panel display is not glass and requires special cleaning procedures.

When cleaning the LCD monitor it is important to remember to not spray any liquids onto the LCD directly, press gently while cleaning and do not use a paper towel since it scratches the LCD.

To clean the LCD screen, use a non-rugged microfiber cloth, soft cotton cloth or a Swiffer duster. If a dry cloth does not completely clean the screen, you can apply rubbing alcohol to the cloth and wipe the screen with a damp cloth.
Rubbing alcohol is used to clean the LCD before it leaves the factory.


Disc Cleaning.
Why and how: 

Why it is important? Dirty CD's can cause read errors or cause CD's to not work at all.

Procedure: Use a cleaning kit or damp clean cotton cloth to clean CD's, DVD's and other discs. When cleaning a disc, wipe against the tracks, starting from the middle of the CD or DVD and wiping towards the outer side. Never wipe with the tracks; doing so may put more scratches on the disc.

Tip: If the substance on a CD cannot be removed using water, pure alcohol can also be used.

Next week in week 2 of 2 of computer cleaning tips we will cover Headphone and Desktop keyboard cleaning.


Contact Sonja Nagel at sonja@cjn-it.co.za when you want to upgrade your computer hardware or software, our prices are very competitive. Just let us quote you and you will see for yourself.

CJN IT Solutions - The smart choice.

CJN IT Solutions Flat fee service contract details

8 months ago

 

What IS Covered

 

Deliverables

 

A detailed system inventory of hardware, software and network configuration.

 

Unlimited Telephone Support

 

You will receive a return call within 1 hour in most cases during regular business hours.

 

Unlimited Remote Access Support

 

Remote Access Support revolutionizes the way we deliver technical help to our customers. When you call in for assistance, we can take control of your computer to provide you with fast, easy and secure support services.

Note: As with any remote service, security is a factor. All communications between us and your network are authenticated and encrypted. This allows for safe and effective monitoring to take place without any compromise in the safety and security of your network. We will install the necessary software on your PCs to allow us to remotely access your individual PCs and servers securely.

 

Unlimited On-Site Support

 

We will come to your location in accordance with the urgency of the problem. On-site support is provided after remote and telephone support services are unsuccessful. If a problem cannot be resolved remotely, we will come to your location. Do be aware that our response time for on-site support will be prioritized based on the nature of the problem.

 

Proactive Maintenance

 

Ongoing maintenance will be done to ensure that the network is running correctly and to fix any low level issues your network may be having.

 

Microsoft Security Patch Management

 

With the importance of computer security, nothing is more important than maintaining up to date security patches from Microsoft for both the Windows operating system and Microsoft Office software. We will monitor and maintain the patch update process from a centrally managed platform.

 

Computer System Tune-Up

 

Are any of your PCs acting sluggish? Do you have to reboot your computer because of errors and lockups? We will perform a checkup and various diagnostics to tweak your systems and get them running at peak performance again.

 

File Sharing Permission and Administration

 

We will work with you to determine the correct file structure for your organization. This will include helping you develop a file storage system and enabling end user access rights. We assist end users in administering this system and ensuring critical corporate data is protected.

 

Diagnostics/Health Monitoring

 

Our computer diagnostics software diagnoses key points of your computer health and provides a detailed report of your computer to us. This report includes information about the computer's hardware (processor, memory, hard drives, CD/DVD drives, floppy drives, monitor, video card, network card, modem, sound cards, keyboard, mouse, serial ports, USB, PCI, system board devices) so that we can provide you with support tailored to your specific computer.

 

Anti-Virus Monitoring, Management, and Update

 

We'll monitor and manage all aspects of the desktop and server anti-virus software, which will keep your computers protected from the latest Internet risks so that you can feel assured about the safety and integrity of your information. Should a virus be detected on one of your desktops, we will ensure that the issue is resolved.

 

Backup Monitoring and Administration

 

Your knowledge and corporate history are one of your biggest assets. We will assess your backup needs and make recommendations on how to best protect your business. With a robust backup regimen in place we will monitor and maintain your backup on a daily basis. We will ensure that daily jobs are running and will monitor logs and investigate critical errors. We perform monthly tests of the backups at our premises to ensure the integrity of the backup.

 

User Account Administration

 

Adding or removing users from your network resources is a snap. Just call us and we'll take care of it for you.

 

ISP Management

 

Problems with your Internet services? We'll fight the layers of customer support bureaucracy on your behalf so you don't have to. We also offer a full range of internet related products, such as ADSL, domain & web hosting, as well as a full range of cloud based services, focused on the Office 365 platform from Microsoft.

 

Virtual CIO

 

Periodically we meet with the business owner to understand the functional requirements of the business and help develop tactical and strategic technology plans to meet those requirements.

 

 

 

What IS NOT Covered

 

On-Site Support – outside of Gauteng

 

For locations outside of Gauteng, we make use of approved partners if we are unable to remotely resolve a problem. Additional costs will be for the customer’s account.

 

New System Development

 

We can develop new software and systems for you using the latest open source development tools. Such development is NOT included in our flat rate support plan. What IS included, however, as indicated about in our "Virtual CIO" paragraph, is consultation about new systems you may need or desire.

 

Hardware and Software

 

We will charge for any spare parts or commercial software required. If a repair requires the supplier or 3rd party to affect a repair this cost will apply. Much of the software we use is either open source, freeware or under a license permitting its use for small numbers of systems. If you need software which does not fit in those categories, we will research the most cost-effective commercial software to meet your needs.

 

Training

 

Training is excluded from this program. We can and do, however, make suggestions to your end users about how to use their systems more effectively in the normal course of providing support.

 

Printers and Network Devices Repair Under Warranty or Contract

 

Printers and network devices such as copiers, routers, firewalls etc. which require service often must be serviced by authorized repair centers. We will forward these devices to authorized repair centers upon request or coordinate with authorized repair personnel on behalf of the client if desired. Any costs incurred by us related to these repairs will be charged to the client. Our normal charges may apply to the diagnosis and transport of any such devices.

 

New Technology Roll Outs or Large Installations

 

Examples: system wide installations of new printers, deployment of new software across all desktops, or structured cabling of a building or office. The particulars of this type of service will be agreed upon before any work is begun. At our discretion, a preliminary analysis may be provided free of charge as part of our "Virtual CIO" component of our flat rate support program. In some cases, we can perform these services within our flat rate support program, but we will decide that on a case-by-case basis.

 

Third Party Expenses

 

Any expenses incurred by us to third parties in the process of providing our flat rate services to you will be charged back to you, or, in the case of expenses impacting our cash flow in our opinion, must be paid in advance or directly by you to the third party as appropriate.

 

 * It is almost impossible to create an exhaustive list that will cover every eventuality or every situation. It is our intent to take an inclusive approach to IT Support – to try and cover off the regular, ongoing issues and problems that arise in a business environment through normal use. However, situations that clearly are outside of the cost scope of a Flat Fee Service Contract will be billed separately and in addition to the contracted fee.

A simple guide to IT support

8 months ago

9 Questions to ask when considering an IT services provider

 

In making your final decision regarding the appointment of an IT services provider to manage your IT environment, we suggest considering the following questions, and consider the impact the answers will make on the value of the service provided, and ultimately the value added to your business.

 

1. How and when will I be charged?
Fixed monthly amount or per incident? Fixed price is a better option for budgeting purposes. Per incident options can lead to confusion and disputes. This can also be made to look like a fixed-price agreement by selling a fixed amount of hours.
However, this may exclude things like work on-site or certain work hours only, thus charging you extra for these services.

TIP: Check that the pricing is transparent and watch out for any hidden extras.

 

2. What is the primary factor to take into account when deciding on an IT service provider?
You should identify exactly what it is that you are looking for.
TIP: Go for a one-stop shop that offers hardware, software, networking and support. This will avoid the need for multiple suppliers and often the blame shifting that occurs between them.

 

3. Does bigger mean better? 
Many larger companies do not offer the personalized service SME businesses require, you are mostly just another “number” to them. Their support processes are often over complicated, increasing time for problem resolution. You end up talking to a different support agent every time, many times starting the entire troubleshooting process from scratch. In contrast, small support businesses with one or two employees, often a business where only one person offers support, are usually much cheaper and lacks the skills and reliability of larger companies.
TIP: Go for a small - medium-sized supplier that offers breadth and depth of skills as well as personalized service with familiar points of contact.

 

4. Is a service-level agreement (SLA) important? 
There should be an SLA, and it should clearly state the deliverables which are expected from both parties. For instance, response times for problem management and resolution. Some service providers may not react to a problem as quickly as they could because their SLA states they have 24 hours in which to respond.

 

5. What contract length should I go for? 
There is no reason at all why you should get pushed into a long-term contract. However, if you prefer a longer timeframe, ask what benefits will come from signing a longer contract, such as a price reduction.
TIP: Go for a service provider that is looking to build long-term relationships instead of long term contracts.

 

6. What about dedicated account managers? 
These are important, as you need someone that understands your business and knows what you are aiming for in terms of growth plans and company direction.
TIP: Having an account manager will provide a familiar single point of contact.

 

 7. Is the service provider proactive? 
The key to good IT support is preventing problems before they arise. However, the supplier is not only there to stop problems and should also plan for IT changes in advance. A good provider will regularly visit their clients to help identify how they currently utilize their IT infrastructure and what improvements can be made.
TIP: Avoid the "fixer." They will only offer problem fixing, rather than trying to avoid them in the first place.

 

8. Does the provider offer remote management and monitoring? 
This is a fundamental part. With today's remote management tools, service providers should be monitoring all of your PCs and servers, and installing upgrades and packages remotely.
TIP: Remote management & monitoring offer you support without impacting your productivity or disrupting the business.

 

9. What is the customer retention rate over the last 7 years? 
How long has the service providers average client stayed with them, especially over the past 7 years. The bottom line is, if the IT Support company that you are considering is really good, their customers will stay with them. Of course there are always issues and problems with any computer network, but if the company is good, they will resolve these issues in a timely manner and within a reasonable time frame.

 

Advantages of using CJN IT Solutions to support your IT infrastructure

 

· Maintenance of your entire IT infrastructure

 

· Continuous improvement of your computing systems

 

· Minimal downtime by providing telephonic, on-site and remote support

 

· Enhancements to current IT infrastructure

 

· Economical solutions for your working environment

 

· Guaranteed same day response with fast turnaround times

 

· Proactive system maintenance and problem prevention

 

· Test backups to prevent disasters

 

· Fixed cost IT support

 

CJN IT Solutions easy 3 step process:

 

1. Analysis of computer infrastructure

 

2. Provide feedback

 

3. Take action

Is your business save Crypto-ransomware attacks to hit thousands of users.

2016/08/29

Is your business save?

 

Crypto-ransomware attacks to hit thousands of users.
Don't be one of the victims.

 

The number of users infected by ransomware is soaring, with the latest variants encrypting your files, rendering them inaccessible. It has become so widespread that it could easily be called an epidemic.

What does this malware infection do, and how do you get the data back?

So called “crypto-ransomware” tricks a user into executing a malicious file, mostly from a fraudulent email. Once the file is executed it downloads the malware in the background, then proceeds to encrypt the files on the computer, rendering them inaccessible. The decryption key can only be obtained by paying the criminals a substantial amount. Many times even after the ransom is paid an encryption key is never provided or does not work.

Crypto-ransomware is one of the most dangerous types of malware ever created, and the consequences of it can be very severe to your organisation. You need to protect your company against this treat, by implementing regular backups, using a proven security solution and keeping your staff informed about current cybersecurity risks.

Don't be one of the victims, make sure your data is secure and reliable. Choose CJN IT Solutions to assist you with your IT needs. This is why we are a leading IT support provider:

We have been in the IT industry for over 13 years and have developed a unique support product for our clients, resulting in a near 100% retention rate for our contracted customers.

 

*     Unlimited onsite & remote support at a fixed monthly fee.

 

*     Enhanced productivity by ensuring IT systems functional at optimal levels.

 

*     Guaranteed same day response.

 

*     Fast turnaround times varying between 10 minutes to 4 hours.

 

*     Proactive system maintenance and problem prevention.

 

*     Test and store backups at our premises to prevent data loss. Backups are essential for any organization. Upon the infection of your company PC's, ransomware is likely to start encrypting files that are essential to the daily operation of a business.

 

*     We educate our customers since a ransomware infection happens due to a lack of knowledge about common cyber threats and the methods criminals use to infect their victims.

 

*     We implement reliable security solutions tailored to customer requirements.

 

*     We have knowledgeable staff with a wide variety of knowledge available working as a team to provide you with the best solution possible.

 

Please contact me Sonja Nagel at sonja@cjn-it.co.za, if you are interested in an IT solution that is more cost-effective, efficient and reliable for your business.

CJN IT Solutions - The smart choice.

Do you know how to customize your tiles on Windows 8

2015/02/05

  • Click on any tile and drag the tile to where you want to position it. When you move a tile to the bottom or top of the screen the screen will zoom out and you will get a larger view of the Start screen.
  • Resize your tiles by right-clicking the tile - choose from small to large.
  • Scroll left to right through your tiles by using your mouse wheel.
  • Pin any program to the start screen by right-clicking the icon - choose PIN TO START.
  • Pin any tile to the taskbar by right-clicking - choose PIN TO TASKBAR.
  • When you right click on the start screen you can name your group of tiles, this can be useful if you have a group of related tiles (e.g. movies). You can also click and drag a group to organize your tile groups by clicking on this symbol - on the bottom right of the screen.
  • To create a new group just move a tile to the far left or right.
  • To access your apps on the start screen just click on the down arrow on the bottom left of your screen.

 

Cooperation

SME businesses in Gauteng

one month ago

Looking for small to medium businesses in Gauteng to offer IT solutions at a fixed monthly fee.

We provide IT support services to SME companies. We know that SME companies face similar challenges in their IT environments and have developed solutions specifically to address those problems.

CJN IT Solutions offers fixed SLA's with unlimited telephonic, onsite & remote support. Guarantee same-day response, from 10 min - 4 hours depending on the urgency of the problem. Fast turnaround times. Guarantee minimal downtime. Test backups to prevent disasters. Proactive system maintenance and problem prevention.

Get in contact with us at CJN IT Solutions if you want a IT solution that is more cost-effective, efficient and reliable.

0861 211 212 / sonja@cjn-it.co.za / www.cjn-it.co.za

Small and medium businesses

8 months ago

Looking for small and medium businesses, sizes from 5 - 250 computer users to become there IT support partner.

We can offer you IT support at a predefined fixed monthly fee.

Get in contract with us today at 0861 211 212 or sonja@cjn-it.co.za

Small and medium businesses

2016/08/29

Looking for small and medium businesses (5 - 250 computer users) We want to be your IT support provider. 

We offer fixed contacts.

Flat fee service contract details

 

What IS Covered

 

Deliverables

 

A detailed system inventory of hardware, software and network configuration.

 

Unlimited Telephone Support

 

You will receive a return call within 1 hour in most cases during regular business hours.

 

Unlimited Remote Access Support

 

Remote Access Support revolutionizes the way we deliver technical help to our customers. When you call in for assistance, we can take control of your computer to provide you with fast, easy and secure support services.

Note: As with any remote service, security is a factor. All communications between us and your network are authenticated and encrypted. This allows for safe and effective monitoring to take place without any compromise in the safety and security of your network. We will install the necessary software on your PCs to allow us to remotely access your individual PCs and servers securely.

 

Unlimited On-Site Support

 

We will come to your location in accordance with the urgency of the problem. On-site support is provided after remote and telephone support services are unsuccessful. If a problem cannot be resolved remotely, we will come to your location. Do be aware that our response time for on-site support will be prioritized based on the nature of the problem.

 

Proactive Maintenance

 

Ongoing maintenance will be done to ensure that the network is running correctly and to fix any low level issues your network may be having.

 

Microsoft Security Patch Management

 

With the importance of computer security, nothing is more important than maintaining up to date security patches from Microsoft for both the Windows operating system and Microsoft Office software. We will monitor and maintain the patch update process from a centrally managed platform.

 

Diagnostics/Health Monitoring

 

Our computer diagnostics software diagnoses key points of your computer health and provides a detailed report of your computer to us. This report includes information about the computer's hardware (processor, memory, hard drives, CD/DVD drives, floppy drives, monitor, video card, network card, modem, sound cards, keyboard, mouse, serial ports, USB, PCI, system board devices) so that we can provide you with support tailored to your specific computer.

 

Computer System Tune-Up

 

Are any of your PCs acting sluggish? Do you have to reboot your computer because of errors and lockups? We will perform a checkup and various diagnostics to tweak your systems and get them running at peak performance again.

 

Anti-Virus Monitoring, Management, and Update

 

We'll monitor and manage all aspects of the desktop and server anti-virus software, which will keep your computers protected from the latest Internet risks so that you can feel assured about the safety and integrity of your information. Should a virus be detected on one of your desktops, we will ensure that the issue is resolved.

 

Backup Monitoring and Administration

 

Your knowledge and corporate history are one of your biggest assets. We will assess your backup needs and make recommendations on how to best protect your business. With a robust backup regimen in place we will monitor and maintain your backup on a daily basis. We will ensure that daily jobs are running and will monitor logs and investigate critical errors. We perform monthly tests of the backups at our premises to ensure the integrity of the backup.

 

User Account Administration

 

Adding or removing users from your network resources is a snap. Just call us and we'll take care of it for you.

 

File Sharing Permission and Administration

 

We will work with you to determine the correct file structure for your organization. This will include helping you develop a file storage system and enabling end user access rights. We assist end users in administering this system and ensuring critical corporate data is protected.

 

ISP Management

 

Problems with your Internet services? We'll fight the layers of customer support bureaucracy on your behalf so you don't have to. We also offer a full range of internet related products, such as ADSL, domain & web hosting, as well as a full range of cloud based services, focused on the Office 365 platform from Microsoft.

 

Virtual CIO

 

Periodically we meet with the business owner to understand the functional requirements of the business and help develop tactical and strategic technology plans to meet those requirements.

 

 

What IS NOT Covered

 

On-Site Support – outside of Gauteng

 

For locations outside of Gauteng, we make use of approved partners if we are unable to remotely resolve a problem. Additional costs will be for the customer’s account.

 

Hardware and Software

 

We will charge for any spare parts or commercial software required. If a repair requires the supplier or 3rd party to affect a repair this cost will apply. Much of the software we use is either open source, freeware or under a license permitting its use for small numbers of systems. If you need software which does not fit in those categories, we will research the most cost-effective commercial software to meet your needs.

 

New System Development

 

We can develop new software and systems for you using the latest open source development tools. Such development is NOT included in our flat rate support plan. What IS included, however, as indicated about in our "Virtual CIO" paragraph, is consultation about new systems you may need or desire.

 

Training

 

Training is excluded from this program. We can and do, however, make suggestions to your end users about how to use their systems more effectively in the normal course of providing support.
 

Printers and Network Devices Repair Under Warranty or Contract

 

Printers and network devices such as copiers, routers, firewalls etc. which require service often must be serviced by authorized repair centers. We will forward these devices to authorized repair centers upon request or coordinate with authorized repair personnel on behalf of the client if desired. Any costs incurred by us related to these repairs will be charged to the client. Our normal charges may apply to the diagnosis and transport of any such devices.

 

New Technology Roll Outs or Large Installations

 

Examples: system wide installations of new printers, deployment of new software across all desktops, or structured cabling of a building or office. The particulars of this type of service will be agreed upon before any work is begun. At our discretion, a preliminary analysis may be provided free of charge as part of our "Virtual CIO" component of our flat rate support program. In some cases, we can perform these services within our flat rate support program, but we will decide that on a case-by-case basis.

 

Third Party Expenses

 

Any expenses incurred by us to third parties in the process of providing our flat rate services to you will be charged back to you, or, in the case of expenses impacting our cash flow in our opinion, must be paid in advance or directly by you to the third party as appropriate.

* It is almost impossible to create an exhaustive list that will cover every eventuality or every situation. It is our intent to take an inclusive approach to IT Support – to try and cover off the regular, ongoing issues and problems that arise in a business environment through normal use. However, situations that clearly are outside of the cost scope of a Flat Fee Service Contract will be billed separately and in addition to the contracted fee.

Small and medium businesses

2016/08/29

Looking for small and medium businesses (5 - 250 computer users) We want to be your IT support provider. 

We offer fixed contacts.

Flat fee service contract details

 

What IS Covered

 

Deliverables

 

A detailed system inventory of hardware, software and network configuration.

 

Unlimited Telephone Support

 

You will receive a return call within 1 hour in most cases during regular business hours.

 

Unlimited Remote Access Support

 

Remote Access Support revolutionizes the way we deliver technical help to our customers. When you call in for assistance, we can take control of your computer to provide you with fast, easy and secure support services.

Note: As with any remote service, security is a factor. All communications between us and your network are authenticated and encrypted. This allows for safe and effective monitoring to take place without any compromise in the safety and security of your network. We will install the necessary software on your PCs to allow us to remotely access your individual PCs and servers securely.

 

Unlimited On-Site Support

 

We will come to your location in accordance with the urgency of the problem. On-site support is provided after remote and telephone support services are unsuccessful. If a problem cannot be resolved remotely, we will come to your location. Do be aware that our response time for on-site support will be prioritized based on the nature of the problem.

 

Proactive Maintenance

 

Ongoing maintenance will be done to ensure that the network is running correctly and to fix any low level issues your network may be having.

 

Microsoft Security Patch Management

 

With the importance of computer security, nothing is more important than maintaining up to date security patches from Microsoft for both the Windows operating system and Microsoft Office software. We will monitor and maintain the patch update process from a centrally managed platform.

 

Diagnostics/Health Monitoring

 

Our computer diagnostics software diagnoses key points of your computer health and provides a detailed report of your computer to us. This report includes information about the computer's hardware (processor, memory, hard drives, CD/DVD drives, floppy drives, monitor, video card, network card, modem, sound cards, keyboard, mouse, serial ports, USB, PCI, system board devices) so that we can provide you with support tailored to your specific computer.

 

Computer System Tune-Up

 

Are any of your PCs acting sluggish? Do you have to reboot your computer because of errors and lockups? We will perform a checkup and various diagnostics to tweak your systems and get them running at peak performance again.

 

Anti-Virus Monitoring, Management, and Update

 

We'll monitor and manage all aspects of the desktop and server anti-virus software, which will keep your computers protected from the latest Internet risks so that you can feel assured about the safety and integrity of your information. Should a virus be detected on one of your desktops, we will ensure that the issue is resolved.

 

Backup Monitoring and Administration

 

Your knowledge and corporate history are one of your biggest assets. We will assess your backup needs and make recommendations on how to best protect your business. With a robust backup regimen in place we will monitor and maintain your backup on a daily basis. We will ensure that daily jobs are running and will monitor logs and investigate critical errors. We perform monthly tests of the backups at our premises to ensure the integrity of the backup.

 

User Account Administration

 

Adding or removing users from your network resources is a snap. Just call us and we'll take care of it for you.

 

File Sharing Permission and Administration

 

We will work with you to determine the correct file structure for your organization. This will include helping you develop a file storage system and enabling end user access rights. We assist end users in administering this system and ensuring critical corporate data is protected.

 

ISP Management

 

Problems with your Internet services? We'll fight the layers of customer support bureaucracy on your behalf so you don't have to. We also offer a full range of internet related products, such as ADSL, domain & web hosting, as well as a full range of cloud based services, focused on the Office 365 platform from Microsoft.

 

Virtual CIO

 

Periodically we meet with the business owner to understand the functional requirements of the business and help develop tactical and strategic technology plans to meet those requirements.

 

 

What IS NOT Covered

 

On-Site Support – outside of Gauteng

 

For locations outside of Gauteng, we make use of approved partners if we are unable to remotely resolve a problem. Additional costs will be for the customer’s account.

 

Hardware and Software

 

We will charge for any spare parts or commercial software required. If a repair requires the supplier or 3rd party to affect a repair this cost will apply. Much of the software we use is either open source, freeware or under a license permitting its use for small numbers of systems. If you need software which does not fit in those categories, we will research the most cost-effective commercial software to meet your needs.

 

New System Development

 

We can develop new software and systems for you using the latest open source development tools. Such development is NOT included in our flat rate support plan. What IS included, however, as indicated about in our "Virtual CIO" paragraph, is consultation about new systems you may need or desire.

 

Training

 

Training is excluded from this program. We can and do, however, make suggestions to your end users about how to use their systems more effectively in the normal course of providing support.
 

Printers and Network Devices Repair Under Warranty or Contract

 

Printers and network devices such as copiers, routers, firewalls etc. which require service often must be serviced by authorized repair centers. We will forward these devices to authorized repair centers upon request or coordinate with authorized repair personnel on behalf of the client if desired. Any costs incurred by us related to these repairs will be charged to the client. Our normal charges may apply to the diagnosis and transport of any such devices.

 

New Technology Roll Outs or Large Installations

 

Examples: system wide installations of new printers, deployment of new software across all desktops, or structured cabling of a building or office. The particulars of this type of service will be agreed upon before any work is begun. At our discretion, a preliminary analysis may be provided free of charge as part of our "Virtual CIO" component of our flat rate support program. In some cases, we can perform these services within our flat rate support program, but we will decide that on a case-by-case basis.

 

Third Party Expenses

 

Any expenses incurred by us to third parties in the process of providing our flat rate services to you will be charged back to you, or, in the case of expenses impacting our cash flow in our opinion, must be paid in advance or directly by you to the third party as appropriate.

* It is almost impossible to create an exhaustive list that will cover every eventuality or every situation. It is our intent to take an inclusive approach to IT Support – to try and cover off the regular, ongoing issues and problems that arise in a business environment through normal use. However, situations that clearly are outside of the cost scope of a Flat Fee Service Contract will be billed separately and in addition to the contracted fee.

Small and medium businesses

2016/08/29

Looking for small and medium businesses (5 - 250 computer users) We want to be your IT support provider. 

We offer fixed contacts.

Flat fee service contract details

 

What IS Covered

 

Deliverables

 

A detailed system inventory of hardware, software and network configuration.

 

Unlimited Telephone Support

 

You will receive a return call within 1 hour in most cases during regular business hours.

 

Unlimited Remote Access Support

 

Remote Access Support revolutionizes the way we deliver technical help to our customers. When you call in for assistance, we can take control of your computer to provide you with fast, easy and secure support services.

Note: As with any remote service, security is a factor. All communications between us and your network are authenticated and encrypted. This allows for safe and effective monitoring to take place without any compromise in the safety and security of your network. We will install the necessary software on your PCs to allow us to remotely access your individual PCs and servers securely.

 

Unlimited On-Site Support

 

We will come to your location in accordance with the urgency of the problem. On-site support is provided after remote and telephone support services are unsuccessful. If a problem cannot be resolved remotely, we will come to your location. Do be aware that our response time for on-site support will be prioritized based on the nature of the problem.

 

Proactive Maintenance

 

Ongoing maintenance will be done to ensure that the network is running correctly and to fix any low level issues your network may be having.

 

Microsoft Security Patch Management

 

With the importance of computer security, nothing is more important than maintaining up to date security patches from Microsoft for both the Windows operating system and Microsoft Office software. We will monitor and maintain the patch update process from a centrally managed platform.

 

Diagnostics/Health Monitoring

 

Our computer diagnostics software diagnoses key points of your computer health and provides a detailed report of your computer to us. This report includes information about the computer's hardware (processor, memory, hard drives, CD/DVD drives, floppy drives, monitor, video card, network card, modem, sound cards, keyboard, mouse, serial ports, USB, PCI, system board devices) so that we can provide you with support tailored to your specific computer.

 

Computer System Tune-Up

 

Are any of your PCs acting sluggish? Do you have to reboot your computer because of errors and lockups? We will perform a checkup and various diagnostics to tweak your systems and get them running at peak performance again.

 

Anti-Virus Monitoring, Management, and Update

 

We'll monitor and manage all aspects of the desktop and server anti-virus software, which will keep your computers protected from the latest Internet risks so that you can feel assured about the safety and integrity of your information. Should a virus be detected on one of your desktops, we will ensure that the issue is resolved.

 

Backup Monitoring and Administration

 

Your knowledge and corporate history are one of your biggest assets. We will assess your backup needs and make recommendations on how to best protect your business. With a robust backup regimen in place we will monitor and maintain your backup on a daily basis. We will ensure that daily jobs are running and will monitor logs and investigate critical errors. We perform monthly tests of the backups at our premises to ensure the integrity of the backup.

 

User Account Administration

 

Adding or removing users from your network resources is a snap. Just call us and we'll take care of it for you.

 

File Sharing Permission and Administration

 

We will work with you to determine the correct file structure for your organization. This will include helping you develop a file storage system and enabling end user access rights. We assist end users in administering this system and ensuring critical corporate data is protected.

 

ISP Management

 

Problems with your Internet services? We'll fight the layers of customer support bureaucracy on your behalf so you don't have to. We also offer a full range of internet related products, such as ADSL, domain & web hosting, as well as a full range of cloud based services, focused on the Office 365 platform from Microsoft.

 

Virtual CIO

 

Periodically we meet with the business owner to understand the functional requirements of the business and help develop tactical and strategic technology plans to meet those requirements.

 

 

What IS NOT Covered

 

On-Site Support – outside of Gauteng

 

For locations outside of Gauteng, we make use of approved partners if we are unable to remotely resolve a problem. Additional costs will be for the customer’s account.

 

Hardware and Software

 

We will charge for any spare parts or commercial software required. If a repair requires the supplier or 3rd party to affect a repair this cost will apply. Much of the software we use is either open source, freeware or under a license permitting its use for small numbers of systems. If you need software which does not fit in those categories, we will research the most cost-effective commercial software to meet your needs.

 

New System Development

 

We can develop new software and systems for you using the latest open source development tools. Such development is NOT included in our flat rate support plan. What IS included, however, as indicated about in our "Virtual CIO" paragraph, is consultation about new systems you may need or desire.

 

Training

 

Training is excluded from this program. We can and do, however, make suggestions to your end users about how to use their systems more effectively in the normal course of providing support.
 

Printers and Network Devices Repair Under Warranty or Contract

 

Printers and network devices such as copiers, routers, firewalls etc. which require service often must be serviced by authorized repair centers. We will forward these devices to authorized repair centers upon request or coordinate with authorized repair personnel on behalf of the client if desired. Any costs incurred by us related to these repairs will be charged to the client. Our normal charges may apply to the diagnosis and transport of any such devices.

 

New Technology Roll Outs or Large Installations

 

Examples: system wide installations of new printers, deployment of new software across all desktops, or structured cabling of a building or office. The particulars of this type of service will be agreed upon before any work is begun. At our discretion, a preliminary analysis may be provided free of charge as part of our "Virtual CIO" component of our flat rate support program. In some cases, we can perform these services within our flat rate support program, but we will decide that on a case-by-case basis.

 

Third Party Expenses

 

Any expenses incurred by us to third parties in the process of providing our flat rate services to you will be charged back to you, or, in the case of expenses impacting our cash flow in our opinion, must be paid in advance or directly by you to the third party as appropriate.

* It is almost impossible to create an exhaustive list that will cover every eventuality or every situation. It is our intent to take an inclusive approach to IT Support – to try and cover off the regular, ongoing issues and problems that arise in a business environment through normal use. However, situations that clearly are outside of the cost scope of a Flat Fee Service Contract will be billed separately and in addition to the contracted fee.

Small and medium businesses

2016/08/29

Looking for small and medium businesses (5 - 250 computer users) We want to be your IT support provider. 

We offer fixed contacts.

Flat fee service contract details

 

What IS Covered

 

Deliverables

 

A detailed system inventory of hardware, software and network configuration.

 

Unlimited Telephone Support

 

You will receive a return call within 1 hour in most cases during regular business hours.

 

Unlimited Remote Access Support

 

Remote Access Support revolutionizes the way we deliver technical help to our customers. When you call in for assistance, we can take control of your computer to provide you with fast, easy and secure support services.

Note: As with any remote service, security is a factor. All communications between us and your network are authenticated and encrypted. This allows for safe and effective monitoring to take place without any compromise in the safety and security of your network. We will install the necessary software on your PCs to allow us to remotely access your individual PCs and servers securely.

 

Unlimited On-Site Support

 

We will come to your location in accordance with the urgency of the problem. On-site support is provided after remote and telephone support services are unsuccessful. If a problem cannot be resolved remotely, we will come to your location. Do be aware that our response time for on-site support will be prioritized based on the nature of the problem.

 

Proactive Maintenance

 

Ongoing maintenance will be done to ensure that the network is running correctly and to fix any low level issues your network may be having.

 

Microsoft Security Patch Management

 

With the importance of computer security, nothing is more important than maintaining up to date security patches from Microsoft for both the Windows operating system and Microsoft Office software. We will monitor and maintain the patch update process from a centrally managed platform.

 

Diagnostics/Health Monitoring

 

Our computer diagnostics software diagnoses key points of your computer health and provides a detailed report of your computer to us. This report includes information about the computer's hardware (processor, memory, hard drives, CD/DVD drives, floppy drives, monitor, video card, network card, modem, sound cards, keyboard, mouse, serial ports, USB, PCI, system board devices) so that we can provide you with support tailored to your specific computer.

 

Computer System Tune-Up

 

Are any of your PCs acting sluggish? Do you have to reboot your computer because of errors and lockups? We will perform a checkup and various diagnostics to tweak your systems and get them running at peak performance again.

 

Anti-Virus Monitoring, Management, and Update

 

We'll monitor and manage all aspects of the desktop and server anti-virus software, which will keep your computers protected from the latest Internet risks so that you can feel assured about the safety and integrity of your information. Should a virus be detected on one of your desktops, we will ensure that the issue is resolved.

 

Backup Monitoring and Administration

 

Your knowledge and corporate history are one of your biggest assets. We will assess your backup needs and make recommendations on how to best protect your business. With a robust backup regimen in place we will monitor and maintain your backup on a daily basis. We will ensure that daily jobs are running and will monitor logs and investigate critical errors. We perform monthly tests of the backups at our premises to ensure the integrity of the backup.

 

User Account Administration

 

Adding or removing users from your network resources is a snap. Just call us and we'll take care of it for you.

 

File Sharing Permission and Administration

 

We will work with you to determine the correct file structure for your organization. This will include helping you develop a file storage system and enabling end user access rights. We assist end users in administering this system and ensuring critical corporate data is protected.

 

ISP Management

 

Problems with your Internet services? We'll fight the layers of customer support bureaucracy on your behalf so you don't have to. We also offer a full range of internet related products, such as ADSL, domain & web hosting, as well as a full range of cloud based services, focused on the Office 365 platform from Microsoft.

 

Virtual CIO

 

Periodically we meet with the business owner to understand the functional requirements of the business and help develop tactical and strategic technology plans to meet those requirements.

 

 

What IS NOT Covered

 

On-Site Support – outside of Gauteng

 

For locations outside of Gauteng, we make use of approved partners if we are unable to remotely resolve a problem. Additional costs will be for the customer’s account.

 

Hardware and Software

 

We will charge for any spare parts or commercial software required. If a repair requires the supplier or 3rd party to affect a repair this cost will apply. Much of the software we use is either open source, freeware or under a license permitting its use for small numbers of systems. If you need software which does not fit in those categories, we will research the most cost-effective commercial software to meet your needs.

 

New System Development

 

We can develop new software and systems for you using the latest open source development tools. Such development is NOT included in our flat rate support plan. What IS included, however, as indicated about in our "Virtual CIO" paragraph, is consultation about new systems you may need or desire.

 

Training

 

Training is excluded from this program. We can and do, however, make suggestions to your end users about how to use their systems more effectively in the normal course of providing support.
 

Printers and Network Devices Repair Under Warranty or Contract

 

Printers and network devices such as copiers, routers, firewalls etc. which require service often must be serviced by authorized repair centers. We will forward these devices to authorized repair centers upon request or coordinate with authorized repair personnel on behalf of the client if desired. Any costs incurred by us related to these repairs will be charged to the client. Our normal charges may apply to the diagnosis and transport of any such devices.

 

New Technology Roll Outs or Large Installations

 

Examples: system wide installations of new printers, deployment of new software across all desktops, or structured cabling of a building or office. The particulars of this type of service will be agreed upon before any work is begun. At our discretion, a preliminary analysis may be provided free of charge as part of our "Virtual CIO" component of our flat rate support program. In some cases, we can perform these services within our flat rate support program, but we will decide that on a case-by-case basis.

 

Third Party Expenses

 

Any expenses incurred by us to third parties in the process of providing our flat rate services to you will be charged back to you, or, in the case of expenses impacting our cash flow in our opinion, must be paid in advance or directly by you to the third party as appropriate.

* It is almost impossible to create an exhaustive list that will cover every eventuality or every situation. It is our intent to take an inclusive approach to IT Support – to try and cover off the regular, ongoing issues and problems that arise in a business environment through normal use. However, situations that clearly are outside of the cost scope of a Flat Fee Service Contract will be billed separately and in addition to the contracted fee.