NetTec NSI
Frequently Asked Questions

How much does it cost to manage and secure a business network?

Business networks are made up of many different devices and components, all of which are designed to perform a specific function on the network. Simple networks with few devices and few manufacturers and few users and few configurations are less expensive and easier to manage and secure. When networks have many devices and many different manufacturers, the costs of managing and securing such networks get more expensive. So the real answer is it depends on these factors.

When we provide an estimate to help manage your network, we’re first learning everything we can about your business and your systems so that we can make the absolute best recommendations. Usually this is done with a Network Assessment. Our initial network assessment is free to qualified businesses and by qualified, we mean are you a business and do you seriously value your data and technology in that business. After our initial assessment is complete, we can make recommendations about what you need going forward and where there may be some issues that can be addressed without much pain or effort. If we recommend new hardware or software or subscriptions, we’re going to find you the best pricing on the best available technology and recommend what we know has worked in the past and what will provide you with the best value in terms of meeting your business needs. We may not be the cheapest IT services company, but do you want the cheapest? Our solutions aren’t cheap. They’re proven and trusted solutions that we’ve used for many businesses just like yours. They’re reasonably priced, but possibly not the cheapest.

You may be able to have your network managed and what some people would call “secured” for less money, but it won’t be the absolute best for your business and it won’t be from a company that’s been doing this as a trusted provider since 1995. We’ve actually been asked by some of our clients to come in behind another IT services company that was the cheapest and we’ve had to clean up the mess of malware, run away software installations, mismatched software versions, broken and unreliable hardware, undocumented equipment and network connections and poorly implemented security. That’s not how you want to run your business and believe it or not, your data is probably the single most important part of your business. In fact, studies have shown that 60% of businesses that have a data compromise are out of business within one year and 90% of businesses that have a catastrophic data loss are out of business within one year. You don’t want to be that company. You want to be able to focus on running your business and sleep well at night knowing that someone is watching out for your data. That’s what we do. We know it and care for it and protect and manage it for you. If you still want the cheapest, thanks for looking here, but we’re probably not for you and you’re not for us either. In the end if you do decide to choose us as your trusted IT services provider, you may find that you did get the cheapest solution in the long run because it saved you time and money and hassle and downtime and kept your network up and running with little or no complications and we protected your critical business data from malware and hacking that’s going on today. We like to call that the most profitable solution, but if you want to call it the cheapest, that’s ok too.

Before the introduction of the internet, computer networks were somewhat easy to secure. If the network was contained and not connected to any other networks, controlling access and knowing what was running on the network was easy. Now that almost every network is connected to the internet, the complexity in providing security is greater by many magnitudes. Some businesses connect their networks to the internet and think they’re safe because they have a firewall, but a firewall simply isn’t enough. The firewalls that you can buy at office supply stores or big-name electronics stores aren’t doing much of anything to protect your network. They might keep intruders out but once they’re in, there’s almost nothing on those kinds of firewalls to prevent everything from leaving your network. Our firewalls are designed to allow ONLY what you want going in and coming out of your network. Our firewalls are also designed to alert us if anything out of the ordinary is noticed in any traffic going across that firewall. If you want this level of security protecting your network, it will be more expensive than the system you can buy from your office supplies store, but it’s worth every penny of it. We’re not talking thousands of dollars more, but possibly a thousand dollars more up front and a few hundred per month to manage it and by managing it, we mean securing it too.

Securing a network is just one aspect of managing a network. At NetTec NSI, we offer managed services and with our managed services offerings, we many options of levels of security. For Desktop Care+ we have basic security with Webroot Endpoint Protection. This is a nice way to help prevent known malware and viruses from doing damage to a network. With our Help Desk services, we offer unlimited malware and virus removals so that if your systems become infected, we will help remove them and restore them to a clean state whenever an infection occurs and at no extra cost to you. We have solutions for managing systems that start at $25 per device per month and go up to $175 per server per month.

For businesses that want to have the ultimate in protecting their systems from zero-day attacks (malware that is not known by anti-malware and anti-virus systems) we offer additional protections with our Profile & Protect, Detect & Respond and additional Endpoint Protections. These services are available on a predictable monthly fee per device or user per month. The truth is that the cost of managing your network will depend on the numbers of systems and users you have, the complexity of your network and your security requirements. Some companies require a higher level of security for compliance. We’ve helped many companies meet their compliance requirements in HIPAA, NIST, PCI and other government and industry standards. Our security subscriptions start at $5 per user per month and go up to hundreds of dollars per month in highly secure and sensitive systems. What is right for your business is what’s important to us. We will find a solution that will secure everything you need to have secured and do it for a reasonable price. We don’t want you to have to pay a dime more for something you don’t need.

What is remote desktop?

Remote desktop services help businesses save money and secure their network by sharing processor, memory, and key parts of a computer from a central place. Most desktop computers are idle for most of the day. When they’re idle, they still use a lot of electricity just to stay powered on. In addition to the electricity that’s used unnecessarily, when the computers are decentralized they require hours of time from expensive IT people to maintain and more hardware to run; that means more dollars spent up front and more dollars spent every month.

At NetTec NSI, we’ve built our data centers so that your remote desktop is running on Fortune 500 level technology with redundancy, high availability and security in mind. That’s something that most small and medium business can’t afford to have and are sacrificing a lot for their critically important business data by not having. Because we’ve built our data center with remote desktop technology, we can share the costs of those expensive items and price the services in a subscription that is predictable and easily affordable for most businesses. Studies have proven that using remote desktop services significantly reduces the (TCO) total cost of ownership when adding the cost of managing the users, systems and data. The reasons for this may not be obvious. When looking at TCO, companies have to consider the hardware and software costs obviously. The additional areas of savings that a business may overlook include service costs if outsourced or labor if not outsourced, downtime and energy savings. The costs to manage a distributed and varied network of systems is significant in any business. If we have to manage a central set of servers where all of the hardware and software is carefully controlled, then we can do the job in less time and do it with more confidence. When we have to configure central servers to service distributed clients with different operating systems on different networks and with different configurations, things get much more complicated and our confidence drops. Remote desktops solve this because the data, the users and the servers are all on the same highly controlled network. By following this way of thinking, we can lower the complexity and lower the cost of managing almost any system. By following this way of thinking, we can also do a better job of securing data, users and systems.

When we setup remote desktop services, we have no single point of failure, so we make sure your remote desktop is never down. If you tried to build a computer that had no single point of failure and complete redundancy, it would cost more than double the cost of a single computer and would be more complicated and again cost many hours of expensive IT people to maintain. When we build redundancy and high availability into our remote desktops, those up front costs are spread out over many users and many months to keep it affordable and a great value to you.

A remote desktop looks very much like a regular Windows desktop. It has a Windows start button/menu. It has File Explorer, Internet Explorer and the same applications and apps that you’re used to using on your local desktop like Chrome and Adobe Acrobat. What you see in a remote desktop is very similar or nearly identical to what you see on your local Windows desktop too. The biggest difference is that in a remote desktop your applications, users, and data are in one place that you can access from anywhere an internet connection is available.

A remote desktop is a place where your applications, users and data are secured, monitored and backed up. A remote desktop is fully up to date with the latest security updates and operating systems and applications, so you don’t have to worry or spend money on that either. A remote desktop serves these benefits to businesses for a fixed price per user per month.

How much do your Managed Services cost?

We have several managed services to choose from and each has an easy to understand price and quantity discounts are available. The following are descriptions with list prices:

  • Desktop Care+: 24x7x365 monitoring, asset collecting/documentation, hardware and software audits, S.M.A.R.T disk monitoring, performance and preventive maintenance reports, automated optimization and management, automated patching with patch whitelisting service, antivirus management, desktop performance monitoring, remove/cleaning of temp files, administrative scripting, policy management, client communicator with self-help center, antivirus software and discounted service rates.

    $25 per device per month

  • Business Hours Help Desk - Everything in our Desktop Care+ plus: 8 AM - 6 PM US-based, unlimited end-user help desk support for Windows, Mac and mobile devices, administrative tasks, virus and malware removal, software installations.

    $60 per device per month

  • 24x7 Help Desk - Everything in Help Desk Business Hours plus 24x7x365 support, holiday support, weekend support, and after-hours support.

    $75 per device per month

  • Elite Server Care - We keep tabs on your network activity around the clock, and when a system or function fails, our support teams immediately jump in to investigate. Once the problem is identified, we’ll work to fix it — in many cases before you’ve even realized there’s an issue. Our Network Operations Center (NOC) monitors all your servers, and our expert NOC technicians will call you – day or night – when critical issues arise. Remote restart minimizes down-time and reduces after-hours call volume. In addition to creating alerts and tickets, we leverage our extensive knowledgebase to provide tips and information for remediation and resolution. We ensure that AV software is up-to-date, preventing security breaches and providing peace of mind. We whitelist Microsoft security patches, so that when patches are deployed you can be confident that they won’t disrupt workflow or create extra problems. Our NOC technicians will troubleshoot and proactively address issues on monitored servers, and independently resolve alerts and tickets for you – further minimizing downtime for your business. Our AV management is expanded – we proactively update definitions and reinstall AV software as necessary, keeping you and your servers secure with the knowledge that they are always protected. The NOC team will delete unwanted logs or clean up disks as needed, so you and your servers will never miss a beat. We can create and assign issue-based tickets to our NOC technicians for full problem resolution. Time-consuming routine maintenance tasks can also be outsourced to the NOC team, freeing you to focus on growing your business. NOC will reboot any server identified as offline, regardless of alert or issue.

    $175 per server per month

How much does Office 365 cost?

We’re Microsoft Cloud Solutions Partners and we help many different sizes and kinds of businesses with Office 365. Basic plans for Exchange Online and Business Premium start at $5 and $12.50 per user per month respectively. We have many additional options for Office 365 subscriptions including Advanced Threat Protection (ATP), Enterprise subscriptions E3 and E5, Academic pricing and subscriptions, Government pricing and subscriptions, and Dynamics 365. Please contact us with your needs and we’ll match the subscriptions and get you the absolute best pricing and services. Those prices cover the subscription services only. We offer migration and support services to help your business get to Office 365 and get the most out of it. Please let us know about your project and we’ll get you the absolute best service and support.

How do I protect my computer?

For many years, we’ve helped our clients understand how to keep their data and computers safe. We build systems that are safe by default. Here are some links to presentations we’ve done:

Some things you can do to protect your computers:

  • Lock down your login: Your usernames and passwords are not enough to protect key accounts like email, banking and social media. Strengthen online accounts and use strong authentication tools like a unique, one-time code through an app on your mobile device and multi-factor authentication (MFA).

  • Keep a clean machine: Keep all software on internet-connected devices – including personal computers, smartphones and tablets – current to reduce risk of infection from ransomware and malware.

  • When in doubt, throw it out: Links in email, tweets, posts and online advertising are often how cybercriminals try to compromise your information. If it looks suspicious, even if you know the source, it’s best to delete or, if appropriate, mark as junk.

  • Back it up: Protect your valuable work, music, photos and other digital information by making an electronic copy and storing it safely. If you have a copy of your data and your device falls victim to ransomware or other cyber threats, you will be able to restore the data from a backup.

  • Personal information is like money. Value it. Protect it.: Be thoughtful about who gets that information and how it is collected.

We don’t have a big budget for Cyber Security. How can we protect our small business?

America thrives with small businesses in society. There are numerous opportunities for small businesses to fill needed niches within the industry. However, many small businesses may not have all the resources they need to have a strong cybersecurity posture. By implementing simple cybersecurity practices throughout the organizations, small business can safeguard their information and data for increased profits.

DID YOU KNOW?

  • 44 percent of small businesses reported being the victim of a cyber attack, with an average cost of approximately $9,000 per attack. 1

  • Nearly 59 percent of U.S. small and medium-sized businesses do not have a contingency plan that outlines procedures for responding to and reporting data breach losses. 2

SIMPLE TIPS

  1. Make sure all of your organization’s computers are equipped with antivirus software and antispyware. This software should be updated regularly.

  2. Secure your Internet connection by using a firewall, encrypt information, and hide your Wi- Fi network.

  3. Establish security practices and policies to protect sensitive information.

  4. Educate employees about cyber threats and how to protect your organization’s data. Hold employees accountable to the Internet security policies and procedures.

  5. Require employees to use strong passwords and to change them often.

  6. Invest in data loss protection software, use encryption technologies to protect data in transit, and use two-factor authentication where possible.

  7. Protect all pages on your public-facing websites, not just the checkout and sign-up pages.

1 2013 Small Business Technology Survey, National Small Business Association

2 www.staysafeonline.org/about-us/news/new-survey-shows-us-small-business-owners-not-concerned-about­

Do you have any Quick Tips for How to Secure Printers?

Quick Tips for Copier/Printer/Fax Security:

Digital copiers, printers and fax machines are computers too.

  • Ensure devices have encryption and overwriting

  • Take advantage of all the security features offered

  • Secure/wipe the hard drive before disposing of an old device

  • Change the default password to a strong and unique passphrase

Learn More: https://www.ftc.gov/tips-advice/business-center/guidance/digital-copier-data-security-guide-businesses

Do you have any quick tips on how to secure email?

Quick tips for email security: When in doubt, thow it out, be extra cautious when it comes to email.

  • Require strong, unique passphrases on email accounts

  • Turn on two-factor authentication

  • Do not use personal email accounts for company business

  • Train employees to know not to open suspicious links in email, tweets, posts, online ads, messages or attachments – even if they know the source. Train employees about your company’s spam filters and how to use them to prevent unwanted, harmful email

Learn More: https://www.ic3.gov/media/2017/170504.aspx

Do you have any quick tips for file sharing?

Quick tips for file sharing. Sharing is caring, only when done securely.

  • Restrict the locations to which work files containing sensitive information can be saved or copied

  • If possible, use application-level encryption to protect the information in your files

  • Use file-naming conventions that don’t disclose the types of information a file contains

  • Monitor networks for sensitive information, either directly or by using a third-party service provider

  • Free services do not provide the legal protection appropriate for securing sensitive information

Learn More: https://www.ftc.gov/tips-advice/business-center/guidance/peer-peer-file-sharing-guide-business

Do you have any quick tips for protecting my mobile phones?

Quick tips for mobile devices. Keep a clean machine for on the go devices.

  • Update security software regularly. Go ahead, update your mobile software now.

  • Delete unneeded apps and update existing apps regularly.

  • Always download apps from a trusted source and check reviews prior to downloading.

  • Secure devices with passcodes or other strong authentication, such as fingerprint recognition .

  • Turn off Discovery Mode.

  • Activate “find device” and “remote wipe”.

  • Configure app permissions immediately after downloading.

Learn More: https://www.stopthinkconnect.org/resources/preview/tip-sheet-stay-cyberaware-while-on-the-go-safety-tips-for-mobile-devices

Do you have any quick tips for point of sale systems?

Quick Tips for Point of Sale Systems (POS). Hackers are often financially motivated. Don’t make it an easy payday.

  • Create unique, strong passphrases.

  • Separate user and administrative accounts.

  • Keep a clean machine: Update software regularly.

  • Avoid web browsing on POS terminals.

  • Use antivirus protection.

Learn More: https://www.pcisecuritystandards.org/merchants/

How do I protect my network?

How do I protect my email?

How do I protect my phone?

How do I protect my router?

Why does Microsoft keep updating their software?

Why does Apple keep updating their software?

Why does Google keep updating their software?

Why does QuickBooks keep updating their software?

Why isn’t the internet safe?

Why do criminals try to steal my identity?

Why do criminals try to steal my data?

Why do criminals try to steal my password?

Why do criminals try to steal my credentials?

Why does my computer bluescreen?

Why is my computer running slow?

Why is printing slow in my remote desktop?

Why is my remote desktop slow?

Why does my remote desktop keep disconnecting?

Why can’t I update or install software in my remote desktop?

Why are things so locked down in my remote desktop?

What is this error in Word, Excel or Microsoft Office about macros?

Why can’t I get to this website?

Why do you lock down our computers so much?

Why is video or CAD slow in my remote desktop?

What does the NetTec NSI help desk service do or cover?

Why do you charge so much per hour?

My website got hacked. What can I do?

I got ransomware on my computer. What can I do?

I have Office 365, why do I need to backup my email, OneDrive and Sharepoint with a separate backup service? https://www.youtube.com/watch?v=dmPF3QvzG_Y


How often do you backup my files in my remote desktop?

How long does Microsoft keep backups in Office 365?

How do I make my servers run with high availability?

How can I keep my computers up to date and free from malware?

What is a security audit?

What is a network assessment?

What kinds of things do you do to help protect our Office 365 accounts?

How can I protect my users from phishing?

Why do I need DNS protection?

Why do I need security awareness training?

What is malware?

What do you recommend for a new computer?

How can we train our people?

What does ransomware do?

What happens if we are hacked?