Below is a partial list of the technical services I can provide to you or your business or home. Please contact me for any additional service requirements or questions you may have.
Virus, Hacking, Root kits ...
The exposure to security threats can leave you, your company and others exposed to different levels of identity theft, fraud, extortion, and even ongoing extraction of your intellectual property. If your firewall, Wi-Fi, VPN access, password and network policy usage are not configured correctly, you are exposed to some or all of the issues mentioned above.
The sophistication and techniques used to gain access to your information has grown exponentially over the last several years. What was considered secure two or three years ago, probably leaves you exposed today.
I will work with you to implement the level of security required to meet the needs of your organization, take corrective actions if issues are found, and provide guidelines that will help keep you better protected in the future.
Software installation, migration, upgrades ...
Software installation should be a painless process. In some cases it isn't. Network based programs, operating system upgrades, or migration of existing business applications to a different machine can be very frustrating or create outages in you business workflow. I can assess the requirements, provide a project plan and work with you and your vendor to make the transition as smooth and painless as possible.
Wi-Fi installation or improvements...
A single Wi-Fi router can easily be installed by most people. Installations for segregated or multi-zone access can make this far more challenging than you expected. Location specific problems like interior / exterior building materials, disruptive signals from adjoining buildings, wireless phone systems and other electronic interference can create a partial or failed installation.
You may already have an existing Wi-Fi setup that isn't reliable or provide the coverage you had hoped for. In many cases, this can be corrected with adjustments to location, configuration changes, or an additional device like a network bridge.
Problems ranging from virus, malicious software, intentional destruction, failed hard disk drives or corrupted backups . Each origin of failure has its own unique set of steps required to successfully recover the data from an affected storage device. Physically damaged hard drives usually have to go into a data recovery center which can be very cost prohibitive. Backups are your best defense against this devastating problem.
Your data is far too valuable to bring into a retail shop only to hear that your data is unrecoverable and "we will have to reload your system".