|Mobile Residential Service Rates||Cost|
|Residential Service Basic (20 Mins of Less)||Any basic on-site service that is solved with best attempt effort within 20 minutes.||Get Quote|
|Standard Service Flat Rate||The majority of home based technical issues that require more than 20 mins.||Get Quote|
|Additonal Services (Add On)||If multiple issues need to be addressed the add-on issue can be addressed for half the cost on the same visit.||Get Quote|
|Mobile Business Service||Cost|
|First Hour||First hour of on-site support||Get Quote|
|Additional hours (Add On)||*Higher rates may apply for server, networking, and advanced consulting services||Get Quote|
|Item Pick Up||Let us pick up your malfunctioning device and diagnose it offsite.||Get Quote|
|Remote Online Support Services||Cost|
|Basic 30 Mins or Less||Get remote support over the internet without having to leave your desk! Many day to day issues can be solved by our professionals by obtaining remote access.||Get Quote|
|Standard Flat Rate||Flat rate to solve most remote issues that take more than 30 minutes.||Get Quote|
|Remote Support Membership||Access to unlimited remote tech support with easy click to access help from your desktop. Include Antivirus, tuneups and virus removal and discount if tech needs to go on site.||Get Quote|
|MSP – Managed Service Provider||
Proactive Management of your IT infrastructure.
We offer full scope MSP services to monitor, report, improve and maintain your infrastructure.
Includes 5 Onsite Hours.
Antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses.
|Network SEIM||Security Information and Event Management (SIEM) is an approach to security management that combines Security Information Management (SIM) and Security Event Management (SEM) functions into one security management system.||Get Quote|
|Virtual CIO (vCIO)||
Virtual Chief Information Officer (vCIO) can work with you to plan a technology roadmap, identify opportunities to use new technology tools.
If you don’t have an internal IT department or have a very limited IT staff, you may grant wider decision-making authority and technology deployment responsibilities to the vCIO.
The main difference between the vCIO function and other technical advisory services is that the vCIO takes a broader view, focusing more on business and IT alignment.
A password manager assists in generating and retrieving complex passwords, potentially storing such passwords in an encrypted database or calculating them on demand.
Paired with Multi-factor Authentication (MFA), this is the safest way to prevent passwords from falling into the wrong hands.
Take control of your network and network users. Pick what your staff can and cannot access, install, or even prohibit use of physical interfaces like USB ports.
Centralize your file storage to ease collaboration and secure access rights to sensitive files. This service also includes backup and versioning of all stored files to prevent file loss and corruption.
A penetration test, also known as a pen test or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system.
|Disaster Recovery Planning and Business Continuity||
If your business depends on an IT infrastructure, having any type of outage can be devastating to your bottom line and service delivery.
Get help planning to circumvent disasters and have a fully documented process and test scenarios.