Q |
: |
|
Ans |
: |
Nowadays, most of our work is related to computer. It is important to keep our computer working smoothly and keep the network secure. If your computer or server is having problem, daily operation will be affect. It may need to take a higher cost to recover your system to work normal. For more seriously, some important data may be lost. That may cause losing company image or losing your business.>
It is important to have an IT department to maintain and monitor your computer system. In worst case, IT department can help you recover your system within an acceptable time and acceptable data loss. For company that does not have IT department, it is better to outsourcing their IT service to IT service provider. Our IT service will keep monitoring their server status, workstation status, network security and backup operation. We will also provide guideline and policy to teach your staff how to protect their computer and server system in order to reduce the risk of hacking and system fault. |
Q |
: |
|
Ans |
: |
Honesty, we CANNOT 100% prevent you from "Hacking", "Virus", "Ransomware", "Spam" etc. We can only reduce the risk as low as possible. We will keep your anti-virus software and Windows OS up-to-date, but there are no anti-virus software can ensure that it can 100% protect from virus, ransomware, spam etc.
Secondly, most of the SMB do not have enough budget on IT resource to prevent hacking. We balance between cost, efficient and security to offer our IT service, our goal is to reduce the risk of being hacked and infected by virus. For worst case, we can recover your server from backup with acceptable data loss. Thirdly, your staff must follow computer usage guideline in order to reduce computer risk, such as don't download not approved software, don't visit unknown web site, carefully check email validity etc. Since, most of the problem is caused by improper use of computer by internal staff. Fourthly, we will monitor your backup status in order to ensure your backup data is up-to-date. But you must responsible for replace offsite copy of backup disk. If your computer hacked by hacker or infected with virus or ransomware, your backup storage which connect to the server may be infected too. Offsite storage of backup data is important in this case, since it will be the only source of your company data. If you do not have any offsite copy of data, your company data will be totally lost. In order to reduce the data loss, we will suggest you to take the offsite copy as frequent as possible. Or join our offsite backup service to copy data to our data center automatically. |
Q |
: |
|
Ans |
: |
Our IT service divided into two parts of services. One is monitoring services, the second is routine task.
For monitoring service, we will keep monitor your server and network status by our in-house monitoring system, following will be monitored : - Server monitoring e.g. disk usage monitor, CPU and RAM usage monitor, backup status. - Network monitor e.g. analysis network traffic, internet access analysis (if firewall supported) - Service status monitoring e.g. Web site, email, DNS. - Mailbox usage monitor (it only support Exchange Online or Exchange server.) For routine service task, it will reduce your service hour. Following will be included : - Workstation checking, check anti-virus status, change backup disk, install application on workstation - Administrative task e.g. create user, create mailbox, change mailbox setting - Workstation trouble shooting. - Wifi, server, mobile device connectivity problem. For other services such as server application installation, re-installation of server / server recovery, firewall or network reconfiguration, server setting reconfiguration will not be included in IT maintenance service. But we can provide that kind of services with additional charge. |
Q |
: |
|
Ans |
: |
We can provide limit support old version of software. For example, we can install Windows 7 into workstation, if the workstation supported. But if you want to install a software which cannot support Windows 7, we cannot do it.
Secondary, for using old version of software, it may cause security issue, since it kind of software will not receive update from manufacture. Some bug or security hole will not be fixed. We suggest our clients to upgrade their system as soon as possible and do not suggest user to use. But in reality, user may need to continue using that kind of software to support their daily operation. We can provide limit support on it. |
Q |
: |
|
Ans |
: |
If your server is down, we will inspect the cause of the problem and try to fix it as soon as possible. If it is cause by hardware issue. You need to contact hardware vendor to fix the hardware problem. If it is cause by software, we may need to contact related software provider to solve the problem. we will help you to identify the problem and communicate with them to solve the problem.
If your server is infected with virus or ransomware, we will first identify the source of the virus and ransomware. Then we will shutdown the infected device or workstation. Secondary, we will inspect server to check whether it needs to re-install or not. It will need extra service charge. Depend on the storage and data size, it may need a few days to re-install the server and resume your operation to normal. |
Q |
: |
|
Ans |
: |
Yes, you need to purchase hardware maintenance service. Our IT service only support server monitor and trouble shooting. We do not provide any hardware replacement and maintenance. If your server down due to hardware failure, you need to contact hardware support to fix the hardware problem or we can contact their support on behalf of you.
|
Q |
: |
|
Ans |
: |
Today, most of the company need to connect to internet. Firewall is used to protect you internal network from internet attack. Firewall is different from router, it provide more security control, monitoring and prevent attack feature.
For example, by using a firewall you can monitor traffic usage of different device, is there any data send out to internet, or any device is using email to send out file etc. Secondary, firewall provide better performance than router, router is used to support small scale of device to access internet, more the devices connected, its performance will be drop or cause the network unstable. Thirdly, firewall can create rule to block external traffic, such as some PnP traffic which enabled by default in most of the router, it will cause security risk in internal network. But in firewall same feature will be control by access rule, it can reduce the security risk in network and let the traffic under monitor. |
Q |
: |
|
Ans |
: |
Yes, you should if your company do not have IT department. You company will have workstation or notebook that for your staff to work on. You need to check whether these workstation is working properly and not infected with virus or hacked by hacker. Secondly, your company's file or document need to be saved in NAS or on the cloud. You need a person to manage that kind of things. Thirdly, backup of data is a must for a company whether or not the data is in the server or on the cloud. You need to know whether the backup can be run successfully.
|
Q |
: |
|
Ans |
: |
UPS is used to protect server from power failure. As server running, it is keeping read and write data to hard disk whether users is accessing server or not. when power failure occur, server may not have enough time to finish data writing and cause data lost. In worst case, it may corrupt OS section of server and cause server cannot start up again. Beside data loss, power failure may also cause some hardware damage.
UPS is important in power failure, since it will keep server powered during power failure. then UPS will send signal to ask server to shutdown. Server will have enough time to save its data to disk in order to protect server from unexpected shutdown. |
Q |
: |
|
Ans |
: |
Yes, you should. Many people said that cloud service provide many feature and security control to protect their customer. We are totally agreed that. It is because when migrated to cloud service, your staffs can access the service and anytime and anywhere. At the same time, it applied to hacker too, they can hacking your cloud service at anytime and anywhere too.
Cloud service provider have built a number of security feature and control, but most of them will be disabled by default. You need to have a person to enable and setup these feature in order to suitable for your company. For example, two muti-factor authentication (MFA), conditional access, audit log, you need to setup and monitor the security log. Otherwise, if you service is under problem, nobody will receive the alert or log, therefore, you CANNOT fix the problem. Cloud service provider will not inform you or fix the problem for you. Actually, manage cloud service is more challenging than manage on-premise server. It is because,, we can manage all feature at the on-premise server, moreover, we can install monitor agent on the server to monitor network traffic or event log. Moreover, most of the on-premise server can only access from internal network. But for cloud service, we need to depend on the monitor and security log provided by cloud service to inspect, identify and monitor. For example, if user cannot receive a email, we can very easy to check or fix the problem at on-premise server. But for cloud service, we can check the log in cloud service to identify the problem, but we may not be allowed to fix it, because it may be blocked by some server security setting and which we cannot control, or need special setup to work around the problem. |
Q |
: |
|
Ans |
: |
Answer
|
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |