Services
Computer Support
Managed Technology Services
Business IT Support
Virtualization
Data Backup Disaster Recovery / Business Continuity
Network Security
Co-Managed IT Services
Web Design and Development
Resource Center
36-Point Problem Prevention Network Analysis
Does Your Current Tech Company Stack Up?
Take Our Vulnerability Test
YouTube Channel
Client Bill of Right
100% Guarantee
Tips for Safe Computer Practices
Recovery Time Calculator
Webinars
Executive Webinars
Educational Series
Past Webinars
What is my IP Address
Blog
Why TTechT
11 Things We Do Better
Contact Us
Referral Program
Get Support
Lima:
419-362-5343
Dayton:
419-216-9360
Services
Computer Support
Managed Technology Services
Business IT Support
Virtualization
Data Backup Disaster Recovery / Business Continuity
Network Security
Co-Managed IT Services
Web Design and Development
Resource Center
36-Point Problem Prevention Network Analysis
Does Your Current Tech Company Stack Up?
Take Our Vulnerability Test
YouTube Channel
Client Bill of Right
100% Guarantee
Tips for Safe Computer Practices
Recovery Time Calculator
Webinars
Executive Webinars
Educational Series
Past Webinars
What is my IP Address
Blog
Why TTechT
11 Things We Do Better
Contact Us
Referral Program
Get Support
Does Your Current Technology Company Stack Up?
Are you paying for substandard support?
Name
*
First
Last
Company
*
Your Email
*
1. Do they provide 82 step on-boarding project plan?
*
Yes
No
2. Do they provide a monthly maintenance check service?
*
Yes
No
3. Do they provide any guarantees on their services?
*
Yes
No
4. Do they arrive on time and dress professionally?
*
Yes
No
5. Do they have multiple qualified technicians on staff who are familiar with your network?
*
Yes
No
6. Do their technicians maintain current vendor certifications and participate in on-going training?
*
Yes
No
7. Do they do provide Security Assessments on a scheduled basis – It is important to establish a baseline and consistent revaluate - removing vulnerabilities as they appear
*
Yes
No
8. Do they provide eMail Services that are more than just hosting your email somewhere; services that include email delivery troubleshooting, domain name setup to validate your domain and email, hosted spam services with user friendly self-help features, true email archiving of record, and multi factor authentication, third party backup just in case something happens to that mailbox
*
Yes
No
9. Do they tend to your security policies for your network to make sure passwords are changed on a regular basis, passwords are complex, screens lock at a specified idle time?
*
Yes
No
10. Do they train your users and often! Teach them about data security and various kind of attacks, and your policies and procedures – providing web-based training and “done for you” security policies
*
Yes
No
11. Do they protect your computers and data from malware, viruses, and cyber-attacks with advanced endpoint security? Advanced endpoint security protects against file-less and script based threats and can even rollback ransomware attack.
*
Yes
No
12. Do they help you understand and enforce the utilization multi-factor authentication whenever you can for your network, banking, website and even social media?
*
Yes
No
13. Do they keep Microsoft, Adobe, and Java products up to date for better security? Providing “critical update” services via automation to protect computers from the latest known attacks as soon as released.
*
Yes
No
14. Do they keep real-time monitoring on what passwords and accounts have been posted on the Dark Web and notify you to be proactive in preventing a data breach? Scanning the Dark Web and taking action to protect businesses from stolen credentials that have been posted for sale is pertinent to staying one step ahead of the next hacker
*
Yes
No
15. Have they installed a firewall and turned on the intrusion detection and intrusion prevention features? Having someone reviewing these log files is what keeps you protected
*
Yes
No
16. Do they keep your Intellectual Property, Confidential Data encrypted at rest and in motion? What if a mobile device is lost or stolen, is their ability to wipe or ensure that it is encrypted
*
Yes
No
17. Do they backup local? Backup to the cloud? Have an offline backup for each month of the year? Test your backups on a daily basis? Are they obsessed about backups? If you are not 100% sure you need to be!
*
Yes
No
Comments
This field is for validation purposes and should be left unchanged.
Book a 10 Minute Consult with Lisa
Book a 10 Minute Consult with Lisa
First Name *
Last Name *
Company *
Email *
Phone *
I Agree That I Am An Artificial Being
Submit
X