IT SupportManaged IT System and Security Services

Information Security
& HIPPA Compliance

Identify Your Risks

  • Vulnerability Assessment / Analysis (Network Scanning, Workstation Scanning, Port Scanning)
  • Vulnerability Reporting
  • Risk Assessment / Analysis

Mitigate Your Risks

  • Information Classification
  • Implementing Access Control
  • Internet Access Control
  • Preventive, Detective, Deterrent and Corrective Measures
  • Media Disposal Policies and Procedures
  • Object Reuse Policies and Procedures
  • Unique User Identification Procedure
  • Workstation Security
  • Devices and Peripherals Security
  • Local and Group Policy Deployment
  • Backups and Recovery
  • Data Encryption
  • Emergency Access Procedure
  • Physical Security

Workstation management

Our technicians can connect and set up your new computer so you will be up and running in no time. We can also move your existing computer to another room or location depending on your needs.

Diagnostics and Troubleshooting

Have a computer problem, but don't know exactly what it could be? A technician will run hardware and software testing to diagnose the problem. Our tests involve checking the hard drive, memory, processor, motherboard and other hardware for errors. Also, we scan for spyware and virus infection. Once we have diagnosed the problem(s), additional services may be required.

Hardware and Software Installation

Looking to upgrade your computer with new hardware or software? Our trained technicians will install a wide variety of computer components (hard drives, video/sound cards, optical drives, etc.) and any requested programs.

Spyware and Virus Removal

Common symptoms of an infected computer: computer running and starting up slowly, constant pop-ups, slow Internet connection, homepage hijacking, Windows crashing and rebooting, abnormal computer activity. If possible, we will remove all forms of spyware and viruses from your computer. At your request, we can also provide virus and spyware protection for the future.

Networking

We can set up a secure wired and/or wireless network in your home or small business. The advantages of a network are the abilities to share system resources (files and programs), internet services, printers, etc. Wireless networks enable you to surf the Internet and access files on other computers from any wireless enabled device without having to be physically connected to the network.

Peripheral Installation

A technician will connect and install any computer peripherals, including printers, external hard drives, displays, webcams, digital cameras and bar code readers, finder print device.

Server Installation and Maintenance

  • Active Directory setup for centralized administration
  • User, Groups and OUs provisioning
  • Installation, configuring and troubleshooting DNS and DHCP Server
  • Installation, configuring and troubleshooting Microsoft Share Point Server
  • Installation, configuring and troubleshooting Microsoft File and Print Server
  • Installation, configuring and troubleshooting DFS Server
  • Group Policy Implementation
  • Installation for CureMD Application and Database Server
  • Setting up backups on SAN and NAS for disaster recovery
  • Disk Defragmentation/Clean Up
  • Critical Updates, patches and hotfixes
  • Service Pack installation.
  • Server Health checks
  • RAID configuration
Code
Services
 
Servers
SR-01
Server OS Installation
SR-02
Server OS Troubleshooting
SR-03
Server Hardware Troubleshooting
SR-04
Server End point Protection
SR-05
Server Disk Defragmentation
SR-06
Server Disk Clean Up
SR-07
Share Point Portal Services
SR-08
Share Point Portal New Site Request
SR-09
DNS Server
SR-10
DHCP Server
SR-11
DFS Server
SR-12
File and Print Services
SR-13
Domain Setup
SR-14
User Provisioning
SR-15
Group Provisioning
SR-16
OU Provisioning
SR-17
Server OS Installation
SR-18
Server OS Troubleshooting
SR-19
GPO setup
SR-20
New Hardware
SR-21
GPO setup
SR-22
Server Backup Setup
SR-23
NAS Setup
SR-24
SAN Setup
SR-25
SQL Server
SR-26
IIS Web Server
SR-27
Server Health Check
SR-28
Network Mapped Drives
SR-29
Critical Update and Hotfixes
SR-30
Service Pack Installation
SR-31
Server Restore
 
Network
NS-01
Router Setup and Configuration
NS-02
Wireless AP Setup and Configuration
NS-03
VPN setup and Configuration
Code
Services
 
Workstations
WS-01
Workstation OS Installation
WS-02
Workstation Troubleshooting
WS-03
Workstation Maintenance
WS-04
Anti-Virus Installation
WS-05
End point Protection
WS-06
New Software Installation
WS-07
Printer Setup and Configuration
WS-08
Scanner Setup and Configuration
WS-09
Firewall Setup and Configuration
WS-10
Router Setup and Configuration
WS-11
Network Switch Setup and Configuration
WS-12
Disk Clean Up
WS-13
Disk Defragmentation
WS-14
Virus and Malware Clean Up
WS-15
Hardware Component Replacement
WS-16
New Hardware Component Setup
WS-17
Device Connectivity with Wireless
WS-18
Device Connectivity with Printers
WS-19
Device Connectivity with Scanners
WS-20
Workstation data move
WS-21
Backups setup and Configuration
WS-22
Workstation Restore
WS-23
Device Connectivity with Wireless
WS-24
Fixing IE Issues
 
Information Security
IS-01
Information Security Services
IS-02
Vulnerability Assessment
IS-03
Penetration Testing
IS-04
Risk Analysis
IS-05
Security Process and Procedure
IS-06
Block USB and Storage Devices
IS-07
Internet Access Control