May 23, 2016

IT Services

Consulting Services

We help design and implement computer and network solutions. Our knowledgeable network staff is available to:

  • Analyze your IT and software needs
  • Design and configure computer networks including:
    • Local Area Networks
    • Wide Area Networks
    • Peer to Peer Networks
    • Multiple Platform Networks
  • Troubleshoot problems with existing networks
  • Install application software
  • Perform off-site network management and administration services.

Backups

Ensuring the integrity of your data files is paramount for the seamless operation of your daily business activities. A comprehensive backup strategy is essential to safeguard your crucial files, mitigate the risk of data loss, and avoid the need to reinstall software or rebuild your entire system.

A thorough and regular backup strategy guarantees that no important data is lost and eliminates the need to recreate or retype old data. This saves you from the stress that happens when you find out a hacker breached your system or important data was inadvertently deleted.

Maintaining a complete backup also serves as a contingency plan for unforeseen events such as server or workstation failures, hard drive malfunctions, lightning strikes, theft, or the all-too-common Ransomware you hear about in the news! Even in such unfortunate scenarios, swift recovery with a complete backup is possible, significantly reducing downtime and stress.

Industry best practice advises, and we strongly recommend, performing backups daily (or more often) AND keeping those backups off site (such as online/Internet backups). That way, if you experience a fire, tornado, flood, or any other catastrophe, your valuable information can be retrieved to another computer via an online restore function.

Multiple layers of protection for backups (local and online) are also critical to ensure you are fully protected. It is also imperative to periodically verify backup accuracy as regular checks ensure that your software is being backed up correctly and a comprehensive backup is being obtained.

We have the right tools and know how to accomplish these tasks and monitor your backups remotely. If you're unsure if and how well your current backups are managed, or you simply want to take advantage of our expertise in managing backups, please reach out to us! Our experts can conduct assessments to verify the functionality of your backup systems, address any issues, and give recommendations on the most effective backup strategy for your organization.

Remember it's much more difficult (and costly) to replace lost data than having effective backup solutions and a good strategy in place.

Our mantra is… “Three things in life are certain... death, taxes, and data loss... Back up often!!!

Email Management and Security

Email and Email Security is a critical and very complicated function of any company. If email is down for even a short amount of time, the cost of lost production or revenue can be dramatic. It is important to have a solid Email system in place with appropriate Email Security to keep your business running smoothly.

We have the products and expertise to make your Email system more productive and secure. We can install, secure and manage your Email system utilizing the following products and services:

  • Microsoft 365 & Gmail Business (Google Workspace)
  • MFA/2FA (multifactor authentication/2 factor authentication)
  • Spam Defense with built-in Email anti-virus security
  • Click-Protect Security - (protects users from accidentally clicking on a link in an email that could infect their device)
  • Email Continuity - access to your email even when your email server is down
  • Email message auditing, policy review, and reporting

Security, Virus/EDR, and Threat Management

We know the ever-increasing need of Internet security for your business. The best approach to security is a multi-level approach. While no single solution can provide you complete protection, several solutions working together can reduce your exposure to security threats.

Our technical staff is trained and ready to evaluate your Internet and network security and discuss your security concerns. We work with you to determine the security solution that best fits your business needs.

Anti-Virus & EDR

In the past, standard anti-virus protection was a must to secure your workstations from potential viruses. Today, with more sophisticated ways of compromising computers, the new standard is EDR (Endpoint Detection and Response).

EDR is an integrated endpoint security solution that combines real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities. Basically, EDR is Anti-Virus on steroids! EDR is now the new standard in local device protection and is often required to get Cyber Insurance. EDR is not a replacement for Anti-Virus, it's an essential addition to the built in Anti-Virus solution that comes with your PC.

If you do not have an effective and comprehensive Anti-virus & EDR solution in place, once a device is infected, the infection can spread throughout your network very quickly and can cause severe disruption to your business.

Firewall with Content Filtering and Intrusion Prevention

If you are concerned that the outside world has access to your in-house network, a Firewall is an industrial strength lock that will protect your valuable network. No protection is foolproof, but with a properly installed Firewall, the chance of outside intrusion is greatly reduced.

If you are worried your employees are wasting time on the Internet during business hours, consider installing a Firewall with Content Filtering and Intrusion Prevention. Content Filtering allows you to restrict access to certain kinds of sites (porn, shopping, sports, etc....), without making the entire Internet off limits. Intrusion Prevention blocks hackers and intruders BEFORE they reach your network.

VPN

Any remote user that has or needs access to your network should be required to use a VPN (Virtual Private Network) connection through a Firewall. Information sent over the Internet without a VPN connection is vulnerable and can be a large security risk to your company. A Firewall with a VPN connection allows you to securely transfer data via the Internet: data is encrypted, sent over the Internet, then decrypted once it reaches its destination, giving you the peace of mind knowing your information is protected from hackers and intruders.

MFA/2FA

MFA/2FA (Multi-factor Authentication or 2 Factor Authentication) is a multi-step procedure for logging into an account, requiring users to provide additional information beyond just a password.

MFA is critical to data security in today’s world, where both businesses and users rely on remote access and online storage of sensitive information. When digital information is compromised or misused, this poses real problems, including financial theft, business disruption, and privacy infringement.

While passwords have long been a primary way to safeguard digital assets, they are no longer sufficient on their own. Skilled cybercriminals actively seek to uncover passwords, and the discovery of one password may lead to unauthorized access across multiple accounts, especially if the same password is used for multiple accounts.

With MFA, users are prompted to answer a security question or input a code sent at least one of several ways including:

  • authentication app on their smart phone
  • SMS/Text
  • email
  • phone call

Requiring a secondary authentication method adds a layer of security, deterring some from trying and thwarting those who do try to gain unauthorized access especially when a password is compromised. This approach is particularly crucial for businesses, as MFA validates user identities AND ensures swift and convenient access for authorized users.

In addition, increasingly Cyber Insurance companies require the use of MFA on email and remote access to receive insurance.

Equipment Installation

Our staff will design and implement computer and network systems to meet the connectivity needs of your business. Our staff has more than 100 years of combined experience in designing and installing networks.

We provide support services for single-user and multi-user systems running the following products:

  • Microsoft Windows Windows 8, Windows 10, Windows 11
  • Microsoft Windows Server 2012 R2, 2019, 2022 (including Virtual Hosts and Virtual Machines)
  • Full Cloud hosted Virtual Machines and Virtual Networks
  • Colo (Colocation - Hosting your server(s) in a secure Data Center)

System Management

We know that no matter what software you use, keeping your software in good working condition is critical to the operations of your business. If you automated your business to respond to your customers more effectively, make your employees more efficient or to have important information available at your fingertips, you want to avoid unnecessary down time.

Job Cost Inc provides you with the highest quality service available for your investment in IT.

We also offer special services related to:

  • Data conversion
  • Media conversion
  • Network support
  • Cross platform connectivity

Full IT Management Services

A Full IT Managed Services On-Site Management Contract is the best way to keep your network equipment and all your computers up and running with the least amount of down time. Customers covered under this contract receive the highest priority service with GUARANTEED response times. This contract also includes (but is not limited to) the following:

  • No Hassle - All Labor (Remote & On-Site) and Travel Included
  • Real-Time Server, Workstation, and Network Device Monitoring
  • Installation of Operating System and Software Service Packs and Updates
  • Maintain user logins, passwords, and security
  • Equipment loaners - in the unlikely event of extended down time, a loaner can be provided
  • Troubleshoot issues, including Internet Connection, Email, workstations, printers, infections and most other problems
  • Regular verification of backup media and Disaster Recovery Solutions and procedures
  • Upgrade advice
  • Install new equipment (providing new equipment is added to contract)
  • Highest priority call - when you call with an IT problem, you are put on the highest priority list and receive highest priority response over all other types of services that we offer to our customers
  • 10% discount on-site services not already covered, such as new installations, moving, or overtime

Time and Material Maintenance Services are also offered. These services are available during regular office hours and are scheduled on a first-come, first-served basis. We can travel to your office to pickup, deliver, and/or repair the equipment on site, or you can deliver the equipment to our facility in Naperville.

Call now