Frequently Asked Questions
Have a question? Below you’ll find the answers to some of the most common queries about unfamiliar IT terms and concepts, our services, what to do if you’re experiencing a security incident, and more.
If the answer you’re looking for isn’t on this page, let us know! You can always reach out to us directly via our contact page.
-
Both! We’re happy to help you with repair or maintenance on personal devices, including warranty work, just like we do with companies, school systems, and even governments across our region.
-
Two-factor authentication verifies your identity using two of three factors: something you know (like a password), something you have (like a key), and something you are (like a fingerprint). We’d be happy to help you navigate your options, including Microsoft Authenticator, Cisco Duo and Fortinet Multifactor Authentication (FortiToken), and choose the one that’s the best fit.
-
Yes. We handle all kinds of repairs and updates, including on laptops. We have extensive experience with Windows systems and Microsoft software products, and we are a Lenovo Premier Service Provider and HP Preferred Service Provider.
We can handle:
- Equipment repair and servicing
- Software updates and troubleshooting
- Device installation and setup
- Warranty repair and maintenance
-
Yes. We provide hardware repairs and maintenance covered under warranty for both individuals and companies, specializing in HP and Lenovo products. When you drop off your device, we will verify coverage, including any upgrades to your warranty like accidental damage protection, and handle the work quickly and locally.
-
Yes! There are public and private clouds, as well as hybrid cloud solutions. Public clouds like Microsoft Azure can give you unlimited scalability and excellent reliability while private clouds like HPE GreenLake offer more control and privacy. Hybrid solutions are designed to optimize performance by distributing your workloads across cloud and on-premises storage and computing capacity. If you aren’t sure what cloud solution would be best for you, don’t hesitate to reach out.
-
In short, yes. Security is a factor in your cloud storage, but there are several methods we recommend to address these concerns:
- Cloud firewalls. Much like traditional firewalls, cloud firewalls manage the flow of information between outside domains and your internal system. Sometimes also referred to as “Next-Generation Firewalls”, these systems tackle today's advanced threats and protect your operation's data.
- Cloud backups. You should plan to create archival copies of company data in cloud storage (AWS, Google, Azure, IBM Cloud and Kubernetes) as well as your SaaS data (M365, Teams, and Salesforce).
-
We sure can! We have cybersecurity personnel on staff who can help you with the application or questionnaire.
-
Digital Forensics and Incident Response (DFIR) is an approach to IT security that involves planning for and responding to data breaches, intellectual property theft, financially-motivated crime, and other security incidents.
We plan ahead using compromise assessments, threat intelligence, advanced computer and network forensics, and Incident Response Plans (IRPs) and reviews. If an incident does take place, it can also involve working with vendors, insurers, and cybersecurity law firms. In these cases, we often act as incident command to give our clients a more cohesive experience of response and recovery.
-
We try to respond within 60 minutes. Our team is very hands-on and we oftent have long-standing relationships with clients, and we aim to get back to them in under an hour when they have a service or support request, as well as in case of a malware attack or other security incident.
-
Absolutely. To keep your data safe from Threat Actors, we design and execute a series of highly sophisticated, authorized attack simulations. These tests allow us to detect and exploit all weak points so we understand the likelihood of attackers gaining unauthorized access to sensitive information. Pen testing helps us evaluate your level of risk and determine the adequacy of existing detection and defensive measures.