IT Support

Time Famine due to IT Support?

Time famine : “a term that first emerged in the scientific literature around 1999, refers to the universal feeling of having too much to do but not enough time to deal with those demands.”

Managing a company’s IT System can add a lot of things to the “To Do” list , here’s 10 points we do for our managed customers on a Monthly Basis:

  1. Deploy and Report on Windows Updates

  2. Check AntiVirus for the previous Alert History

  3. Check new Patches for Hardware, Drivers and Software Packages installed

  4. Check SLA’s on Tickets that have been breached and find out why to stop this reoccurring

  5. Check the Firewall and SOC Reports for any spurious Security activity

  6. Check a Backup Restore ( A Backup is only as good as a Restore ! ) and check Backup report for the previous history

  7. Renewals - Any Software Support or license renewals or Hardware coming out of Warranty

  8. Check over the monitoring system and find out any frequent issues that can be automated

  9. Check-in with Customer to make sure all is well and advice any new products which can help them streamline their workflow

  10. Run over our Internal Best Practices for systems such as Microsoft Office 365 and Microsoft Azure to make sure costs are minimized and security is Paramount

We also do much more!

So if you are an Office Manager currently balancing two jobs such as IT Support , or an InHouse IT Support Person who needs to get back on top of IT Support Analysis and Project work , drop us a line today to see how we can make your Time Famine disappear!

Network Access Control Systems and Solutions

Network access control systems are tools used for controlling and managing network access based on compliance with a network and its policies. These policies are devised based on various parameters like user identity, device location, device health, among others.

The same philosophy is someone requiring a username and password to connect to your Network remotely via VPN, or use a Wifi Password or Domain Credentials present some sort of  Network Access Control. But what happens when you look at the Physical layer , what happens when someone brings their home computer and plugs it into the network or even worse an attacker plugs in?

NAC systems present an authentication layer on the physical port so only devices with a working AntiVirus and Windows patches and correct credentials will be presented on the company network. You can even present a two factor authentication to this incase the user details get compromised. If any of these tests fail they will be redirected to the Guest Networks

Systems that help managed this are HP's Aruba ClearPass or Cisco's ISE

Contact us today if you need a quote for a NAC system or the supporting of an existing one