Computer Support Services

The increasing complexity of today's computer networks, have many Professional Organizations finding that it is no longer cost-effective to maintain a full Information Technology (IT) staff within their organization. Contracting support and maintenance needs, allows these organizations to eliminate the expenses for training and equipping an IT professional, and avoid the overhead of additional full-time employees

Network Performance Analysis

Is your network running slow? We have the tools to do a network performance analysis and give you a plan to fix the problem

Network Service Programs

This is a pre-scheduled monthly appointment and Highlights:

Monthly Network Service Appointments

  • Verify operation of network backup system (reinstate files)
  • Update and verify anti-virus software operation
  • Review of network server(s) error logs
  • Check file and disk organization and capacity
  • Update patches on workstations
  • Verify CPU and memory utilization
  • In house Network Engineer available to handle complicated questions by phone
  • Emergency response to network issues
  • Two hour response on critical server failure or total network down
  • Two hour response to multiple critical workstation network functions This service will keep your systems running at optimal performance.
  • Installation and Troubleshooting

  • Redundancy for data protection
  • Windows 2000, Windows XP
  • Active Directory implementation
  • Exchange solutions
  • VPN remote connectivity to your network
  • Disaster recovery is your data safe
  • Antivirus cleaning and updates
  • Remote access management
  • Training if needed
  • VPN and Remote Access

    A virtual private network (VPN) is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. A virtual private network can be contrasted with a system of owned or leased lines that can only be used by one company. The idea of the VPN is to give the company the same capabilities at much lower cost by using the shared public infrastructure rather than a private one. Phone companies have provided secure shared resources for voice messages. A virtual private network makes it possible to have the same secure sharing of public resources for data. Companies today are looking at using a private virtual network for both extranets and wide-area intranets.

    Using a virtual private network involves encrypting data before sending it through the public network and decrypting it at the receiving end. An additional level of security involves encrypting not only the data but also the originating and receiving network addresses. Microsoft, 3Com, and several other companies have developed the Point-to-Point Tunneling Protocol (PPTP) and Microsoft has extended Windows NT to support it. VPN software is typically installed as part of a company's firewall server.

    Security Audits and Implementation

    Through the years we have seen many security loop holes in their networks, from internal to external security issues. Let us show you the way to protect your data.

    In business, a security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.