Client Remote Support
   
Introducing Remote I.T. Services Connection / RISC
Over time we realized that many of our clients internal technical issues could be handled remotely, thereby saving them the cost of us treking to their facilites. It also made existing phone-based help ten times as effective when used together. Traditionally, to receive this type of assistance, one had to find an expensive computer consultant, or hire a random service tech from a national retailer. The problem that arose was that in the end, you were hiring some stranger, usually a kid that knew much more than you, and giving them complete access to your PC. Today, whether you know it or not, you store a lot of personal information on your computer. It only takes a few seconds for someone to put a USB thumb drive in and set a rootkit. Or in other words, it takes a few seconds for someone to take over your computer, completely and without your knowledge.

The Difference
The real key with our service is the trust we've built with our clients. Since we have a complete service base, most of our clients are also using us for print work, web work, or both. The *trust* is already there, and they know that when we are servicing their PC's or network, they have nothing to worry about. This is partly due to the fact that our main area of concern are Web Applications and Print Design. We already have our clients' credit card information on file and invoice monthly for a multitude of services. On the other hand, when your hire someone from a national chain, you need to remember every large employer inevitably hires bad seeds, people that are there for the sole purpose of stealing. Do you want some kid making minimum wage that was hired based on a basic application and interview having complete access to your PC?

The Advantage
We have a pretty unique service. Not only can we use RISC to help your staff with day to day operations, but we also provide routine maintenance. For example, we have plans that range from once per week, or once per month, where we log into your machines after-hours and give it a 17-point inspection. Here are just some of the maintenance operations we do:
  • Virus Scan
  • Root Kit Scan
  • Manual Error Log Inspection
  • Multiple Point Startup Inspection
  • Manual Inspection for New Progams Installed
  • Disk Health Check
  • Antivirus is Operational
  • Firewall is Operational
  • Windows Updates Installed



   Dangers
  • Keyloggers
  • Trojan Horses
  • Spyware
  • Malware
  • Unpatched Exploits
  • Viruses
  • Phishing
  • Unsecure Wifi
  • Root Kits

   Remote Tutorials
  • Microsoft Office
  • Adobe CS Applications
  • Email
  • Website Applications
  • Company Specific Applications





Contact Us
terms of service : authorized usage policy : © 1999 - 2014 gish network