Frequently Asked Questions
Being highly experience IT experts, we are here to answer any of your technical questions, whether it be about the equipment we supply or the services we offer.
If you have further questions that we haven’t covered below, feel free to get in touch with one of our team members today!
End of Service Life
What is third party maintenance?
Third party maintenance is hardware support for server, storage and network equipment. This type of maintenance is an ideal and cost-effective alternative to OEM (original equipment manufacturer) warranty support.
What is technical support?
Technical support is a service provided by a company which offers registered users with help and advice about their purchased products.
IT Asset Disposal
Why is data destruction important?
Data destruction is vital because most data held by businesses is private and confidential, which could be maliciously used if it falls into the wrong hands. Data destruction is a method of ensuring that sensitive data is permanently destroyed to enable GDPR and data compliance and minimise potential risks.
Do you buy used IT equipment?
Yes, we do buy used IT equipment, more specifically hardware and servers, we buy a range of multi-vendor equipment including HPE, Dell, IBM and Oracle.
What is meant by the Circular Economy?
The circular economy is an economic model of production and consumption, created to tackle environmental issues like global change, waste and pollution. This model involves sharing, leasing, reusing, repairing, refurbishing and recycling existing materials and products. This system can be applied to IT equipment when purchasing refurbished hardware.
Should I migrate to the cloud?
There are many positive reasons to move to cloud computing, some of which include:
- Increased team productivity
- Flexible, scalable and customisable solutions
- Accessible from anywhere with internet connection
- Enhanced data security
- Cost effective
Is TaaS Service scalable?
Tech as a Service is a flexible solution to modern IT problems, it enables your business to adapt to today’s changing environment, giving you the flexibility to manage your IT budgets in an agile, scalable and cost effective way.
What is malware?
Malware is a type of application that can carry out a variety of malicious attacks. Certain types of malware are designed to provide persistent access to a network, some are designed to temporarily spy on the user to obtain credentials or other valuable data, while some are simply designed to cause disruption to hinder a service.
A widely known malware is Ransomware, which is a program designed to encrypt the target’s files and then ask them to pay a ransom in order to get the decryption key.
What is phishing?
Phishing is where a cybercriminal attempts to convince a victim to hand over valuable information, such as passwords or credit card details. A phishing attack is most likely to arrive in email form, and is the most popular type of cyber attack as it is so easy to carry out.
What is spyware?
Spyware is a malicious software that is installed to a victim’s computer or a network to gather data about you and your habits, then forward this information onto a third-party without your permission.
How does proactive monitoring work?
Our monitoring software allows us to deploy agents seamlessly onto your network, including servers, workstations and any device with an IP address, allowing us to see information regarding performance, errors and even identify service improvements. Therefore, effectively managing your IT endpoints and identifying issues remotely, consistently and immediately.
Why is proactive monitoring needed?
Any IT system requires regular patching and upgrades to ensure it always runs smoothly, it also needs continuous maintenance to ensure all the elements are integrated correctly, securely, and function as they are expected to. Proactive monitoring covers all of this, so you don’t have to.