Why should I buy the monthly unlimited support per PC rather than ad hoc?
With an unlimited support contract, you have greater control over cashflow as you know how much money is being spent each month. Our URS include remote monitoring and maintenance which actively optimise your computers, update software, can devices for malware which all keep your systems running smoothly. Hourly based, reactive support for a small business customer is typically unstable. Average out the cost of hourly support long-term, taking into account both the quiet months and busy ones, and the average monthly costs should actually make life easier for us and for you. Win-Win!
You say you’re proactively monitoring my computers for problems before they happen. What does that actually mean?
What we are talking about here is the difference between reactive support – when the client can “see” a problem and asks for assistance and pro-active support – when the IT company has installed monitoring functionality which alerts them to a potential problem *before* the customer experiences it. This reduces downtime and more importantly pre-empts really serious problems (failed disk in the server, a virus that could encrypt vital data).
I have AV and my email provider blocks most spam. Why do I need email filtering and web filtering?
The methods of attack via email and websites have become ever more sophisticated. “Zero-day” exploits (new viruses that have never been seen before) can easily be undetected by AV and the more rudimentary email filters. Relying on your workforce to never ever click on a suspicious email or accidentally browse to a dodgy website that may encrypt your data and network is a risk that has huge repercussions – loss of time and money. Can you afford it?
By pointing your office’s router at our web filtering engine, any attempt to browse or be redirected to a website with malicious code can be stopped dead in its tracks. (you can also specify by topics such as gambling or adult content).
Email providers do block a significant amount of spam. By using a dedicated email “washing” service, all incoming email can be checked for spam and viruses *before* they get to your email server. This service is can perform far more rigorous filtering that Microsoft or Google as this is all they do.
Why should I back up my email? It’s in the cloud anyway. And how does email backup work?
Having your email in the cloud will certainly safeguard against lost email if you simply lose or break your device. But what about accidental deletion, or worse, deliberate deletion?
Working with our tech partners at Acronis, your Office 365 or G Suite mailboxes are backed directly within the mail server environment and are stored within a private cloud solely located in the UK. Any issues regarding data compliance due to data location should be assuaged by this. In the event of email loss, we can quickly identify the missing email or entire mail store and recover at your request.
Why is cloud backup so much more expensive that File syncing services (like Dropbox)?
While Dropbox is useful for file syncing and collaboration, it should not be considered as an adequate backup for your key data. Our cloud backup solution allows you to take backups at points in time (ultimately back to zero) and also to be able to restore them. What can it do that Dropbox can’t? Backup at points in time: Many organisations have onerous data retention requirements that mean they must keep data for several years – architects have to keep data for 15! Dropbox does not give you the ability to restore data from a point in time years ago. It is secure: All data stored is fully encrypted. If you lose your encryption key you have lost your data forever!
Where does the data reside?
(Location)Virtual 1’s data centres solely reside within the UK. So even with Brexit, data should be compliant with most data regulation and requirements.
Macs do not get viruses/malware. Why should I buy AV software?
Oh yes, they do! Ransomware viruses, for example, that infect Macs do exist. Admittedly, they are still less vulnerable than Windows PCs – having a laissez-faire approach to workstation security (on whatever platform) is inherently risky. For example, in an environment with a mix of Macs and PCs – the Macs may be a “carrier” – exhibiting no ill-effects themselves – can target Windows devices which definitely do show signs of attack.