Who we are!
Our firm is dedicated to the people and buisiness we serve. Our goal is to provide you with a level of service not commonly found in our industry. We value integrity and aim to be as transparent as possible while not overwhelming you with the technical details.
Computer repair, data recovery, and backup.
We offer on-site repair and consulting services, so that our clients don't need to take time out of their busy days to haul a computer in to our workshop. This is the single biggest frustration we have seen among small business owners needing computer help. Much of our diagnostic equipment is portable, and we will remove a PC to our workshop only when the problem requires more detailed diagnosis or repair. We will also offer free pick-up and delivery of PCs needing repair. We will also offer extended maintenance contracts, so that business clients can deal with technical support and repair needs as a single line-item expense, rather than having to plan for unexpected crashes and problems with a rainy-day fund they may never use.
Hourly - Short term assignment helping a your company solve a software or hardware related problem. Includes both emergency and non-emergency technical assistance.
Retainer - This can include regular system maintenance, software and hardware upgrades, and network administration.
Project - Consultation on major purchases, system/network installation , and major disaster recovery.
Web Hosting and Design
Get an affordable website built for your business. Work with our experts to get a website designed for your small business, a targeted online marketing program, and real-time tracking of the results.
Managed Antivirus and Security Auditing
A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria.
We take care of installing the antivirus software on computers and other devices, and will then manage the solution. We will also ensure that virus scanners are up-to-date and scans are scheduled for a convenient time, thus protecting computers. This includes periodic scaning to ensure that no unmanaged systems have been added to your network either by an employee or third party.