Service Costs
We offer two basic service models to our clients:
On-demand:
We provide technical support and project services to your company based on what services you request from us. You can access and start using our On-demand services immediately, with no initial requirement to assess your systems and no long term contract requirement.
All our work is billed by the hour on a Net 30 basis.
Proactive:
Ben Franklin’s famous quote “An ounce of prevention is worth a pound of cure” applies especially well when it comes to technology.
Proactive services help avoid technology problems, before they can occur. Avoiding problems before they can occur is the focus of our Proactive service models.
Our Proactive service model begins with an assessment of your systems that provides recommendations and cost ranges to bring your systems up to a proper operating condition for your industry.
After your system assessment is completed, we work with you as your technology partner to improve your use of technology year after year within a cost framework that you approve in advance, before costs are incurred.
Interested in more detail? Please check out our Technology Risk Assessment (RSR) page. Asking us to complete an Risk Assessment for your company is the first step toward understanding the costs and opportunities of developing and maintaining your systems in a what that would meet Ben Franklin’s approval.
Budget Friendly Options:
We offer a range of options to help clients manage their IT support costs, here are a few highlights:
-
If requested in advance and in writing by a client, we will work on an hourly basis for non-project costs within a service cost that you approve in advance per month. If more hours are needed, we will stop work and request additional hours to complete additional tasks. Projects you may approve have their own separate NTE budgets that are billed outside the monthly service budget described above. Please contact us for more details on service costs.
-
We can provide your service billing data in various electronic formats, including details that provide important insghts,m such as: by user, by location / branch - or even the type of work that was performed.
-
What is malware?Malware is a type of cyber threat and is a catch all term for dangerous software programs that can harm or steal your data, or even damage the software configuration of your computer systems. Malware programs become resident in a wide range of methods and they almost always have some type of nefarious purpose. The purpose of any particular piece of malware is normally referred to as the “payload”; like the warhead on a missile. Typical malware payloads include: - ransomware - enablement of remote access to your systems or data by a hostile party - data theft tools designed to allow identity theft of individual persons, customers or employee related data that may reside on your systems. Some forms of Malware depend on users to unwittingly open an infected e-mail attachment, others may enter your system by way of a security weakness in your system from an infected website that you might visit. Even very popular websites such as the DrudgeReport.com have been infected with and acted as a distribution point for spyware in the past. Often a site’s owner is unaware his site has been compromised and is being used to distribute malware.
-
How can I avoid getting malware?There is no “complete solution” on how to avoid malware but here are few basic tips that will help you avoid most of it: Know what devices are accessing your data. If you don't maintain a current inventory of your systems, it is difficult to assure they are all adequately protected against threats such as malware. > Bayside Networks offers a free of cost automated inventory system using a product known as Atera that solves this issue for all our clients Run current anti-virus software on all your PC's and make sure automatic security are setup to automatically download and install on your workstations (Windows Updates, Acrobat Updates, and Java Updates). These two simple steps can help avoid most (but not all) Malware infections in the first place. > High quality anti virus software should cost in the range of about $40/yr device or a little less. Bayside Networks normally recommends Microsoft Defender or Webroot for our clients. > If you use multiple computers (just about every business does), malware detection events should be reported to a centralized console that is professionally monitored. Bayside Networks offers this type of monitoring for anti-malware solutions that we recommend. Never open email attachments that don’t “look right” to you. Never open any attachment from a person or company that you do not know. Also, if an email looks odd to you, even from someone that you do know, call that person and ask if they sent it to you. Never agree to install anything from a pop-up message on the Internet –unless it is from a trusted site, for a program that you know you wish to install. Use an Internet access filtration service at your home or office, cloud based filtration services are best. Check out www.opendns.com for one possible option, especially the free level of their service. Google the terms “how to avoid malware” and become an expert!
-
What are some of the problems that Malware can cause?Stability problems with your computer, such as: loss of internet access, system freeze ups, partial or complete data loss, or other types of malfunctions Potential for your data to be accessed by an unauthorized outside party An potentially set you up as a distribution point for spam, such that your office gets “tagged” as a spammer, possibly jeopardizing the stability of your Internet connection.
-
How do I get rid of Malware it if I have it?First, give us a call here at Bayside Networks. We can always provide some initial advice on how to address your particular support need at no cost. Malware can be difficult to remove but there are a wide range of specialized removal tools along with an active “community” on the Internet that helps research and document removal methods for each type of Malware as it comes out. Here are a few facts and caveats about Malware removal: New Malware comes out all the time and there is often a period of time where the exact steps necessary to remove a new piece of Malware are unknown. We can sometimes still remove new Malware using basic removal steps that are rather universal in nature but it can be an inexact and time consuming process. Some Malware is designed to present an initial impression that it has been removed successfully, only to return after a period of time – sometimes several days. Some Malware damages the software programming on a computer to an extent that a machine may need to be reloaded. Reloading a machine is a time consuming, expensive and disruptive process. A full reload normally involves: Blanking out your computer’s storage space Reloading your operating system and programs All told, the above can take several hours to complete, potentially costing more than it would cost to replace your computer!