Posts

Prevent Data Loss With IT You Can Trust

7Small business has changed dramatically within the last decade. No change has been more profound than our dependency on information technology (IT) systems to support critical day-to-day business functions.

In today’s increasingly competitive high-tech environment, it is critical that all business operations run smoothly and efficiently. Business momentum, employee productivity and customer service all depend on an IT infrastructure that must be both accessible and secure at all times. Constant network availability has become essential to most small and midsize businesses (SMBs) today.

This reliance on IT systems has also created a stronger link between data center accessibility and total cost of ownership (TCO). Even minimal amounts of unplanned downtime today will result in lost revenue, productivity and negatively impact overall brand reputation.

Preventing or rebounding from downtime was once deemed the IT team’s problem, however, this unprecedented modern day dependence on technology has made the frequency and costs of downtime more of a business problem. Prolonged or recurring downtime can cripple small businesses and requires the attention and understanding of C-suite management in order to be properly addressed.

Unfortunately, many executives at SMBs are still not as tuned into daily network operations as they need to be. For this reason, they lack a true awareness of the frequency of downtime. This lack of insight and visibility is regrettably putting far too many SMB sat an increased risk for downtime and the costs associated with it.

Prevent detrimental downtime. CLICK HERE for a free network assessment.

Consider More Than Email When Choosing a Cloud-Based Email Provider

When it comes to deciding on a cloud-based email provider, small-to-medium sized businesses have two primary choices – Google Apps or Microsoft Office 365. In talking with SMB owners or technology decision makers, we’ve found that many have pledged their allegiance to Google and don’t want to hear a pitch for Microsoft. Many are adamant that they have everything they need in the core offerings of Google Apps – Gmail, Docs/Drive, Hangouts, and Sites.

While these are undoubtedly solid offerings, they are more than individual products. How about comparing Google Apps and Microsoft Office 365 in regard to the collective experience as a whole? By looking at the sum of their respective parts, many may find that Google Apps is actually limiting them to a degree. Here are a few examples

  • Pricing – Google has a one-size fits all approach to pricing. This approach is contradictory to the biggest selling point o24f Cloud technology, which is to pay for what you use, just like your electric or gas utility bills. By comparison, Microsoft lets users pay for only what they need.
  • Google Drive Lacks Efficiency with MS Office Files – While the Google Drive cloud storage app is fairly adept at handling native files, MS Office files are treated like the plague and must be downloaded, edited, and re-uploaded into the Google Drive. From there, expect to see formatting inconsistencies such as missing text boxes, images, graphics, watermarks, charts and more. In comparison, Microsoft provides more uniformity from document to document whether it’s sourced from a desktop version of Office or any web browser via the cloud.
  • Google Hangout Is More for Friends than Business – Google Hangouts, Google’s video chat and group conferencing tool, is deeply rooted in their social network Google+. There is nothing inherently wrong with Google+ besides the fact that it’s still kind of new and lifeless in comparison to other social media sites. However, in order to participate in a Hangout, users must have a Google+ account. This means external users without any Google accounts are shut out of meetings. On top of that, Google Hangouts limits meetings to no more than ten participants. By comparison, Microsoft Lync is all-inclusive and is even available to those on Google and Apple platforms. With the ability to include 250 meeting participants, Lync can even replace GoToMeeting for online conferencing.

As you can see, choosing a cloud-based email provider involves a lot more than determining who can best solve your email problems today. SMBs must also factor in which provider will best address their business document storage and unified communications the best tomorrow. In this regard, Microsoft Office 365 may have more of an “It” factor than Google which seems to have adopted an “our way or the highway” mentality and is less supportive of anything outside of the Google bubble.

CLICK HERE for a free network assessment.

A Smarter Approach to Mobile Device Management – Five Questions to Consider

More people today use personal mobile devices like smartphones and tablets for business purposes. Such devices, coupled with greater Wi-Fi accessibility and cloud services, have empowered us with the ability to access data and do business from practically anywhere at any time. Needless to say, many small-to-medium sized business owners have embraced the BYOD (Bring-Your-Own-Device) revolution. The benefits are obvious; increased employee productivity, enhanced services to customers/clients, and better overall customer and employee satisfaction. But what about the potential consequences associated with this mobility revolution? Are small business owners doing enough preemptive planning to address potential risks that could arise with the use of BYOD devices?

21

Mobile Device Management – Five Questions Every SMB Should Ask First, it is important that small business owners honestly assess whether their systems, networks, data, and overall infrastructure are ready for the use of an array of mobile devices. Once it is firmly established that both internal IT and components in the cloud are prepared for BYOD, solutions should then be put into practice that are concurrent with terms of use policies or any guidelines pertaining to remote/telecommute workers or the sharing of sensitive data. The following questions should be answered.

  1. What particular devices or applications are permissible for work use? Assuming security requirements are in place, not every device or application will meet those.
  2. Will anyone in the company be tasked with the daily management of BYOB strategies? What should BYOD policies cover and what kind of management solutions will be needed? Would a BYOD management tool that collects device information, deploys and monitors usage, and offers insight into compliance be helpful?
  3. Which costs will be the responsibility of the employee? This pertains to any fees associated with usage – from network plans, to the device itself, to software, accessories and maintenance costs.
  4. What data will be accessible? Will data encryption be necessary for certain information traveling through the personal devices of employees? Which employees will have read, write, update/delete privileges?
  5. What is the process when handling sensitive data stored on lost or stolen devices, or the personal devices of ex-employees? Does the company or organization have the right to wipe out the entire device or just corporate data and apps?

BYOD is here to stay as it affords smaller-sized companies the mobility of a corporate giant without a huge investment. But when it comes to ensuring that devices, applications and networks are safe from the variety of threats linked to greater mobility, small business owners may find it necessary to enlist the help of a managed service provider to adequately take on mobile management challenges and provide ongoing consultation.

CLICK HERE for a free technology assessment.

 

4 Essential Pieces to Any Small Business BYOD Strategy

Believe it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please.

We’ve come a long way.  Today, businesses really have no choice but to let employees use personal devices for work purposes.  Blurred lines now make it difficult to differentiate between what is professional and what is personal.  A company or organization may partially pay for an employee’s tablet computer or smartphone, but that same device is used to upload photos to Facebook or download torrents of this season of Game of Thrones.

Naturally, security and privacy issues are a concern since these devices synch to the company network.  Larger corporations may be able to hire IT support or produce sophisticated BYOD guidelines for employees to adhere to but smaller businesses have limited resources.

In fact, recent surveys suggest that the small business sector is doing very little to preemptively prepare for potential network security risks that could arise with the use of BYOD devices.  This could prove to be disastrous.

According to market stats from a survey conducted by Cisco in 2012, approximately 88% of employees are doing business on personal devices.     However, only 17% of companies currently have a BYOD security policy in place, and only 29% of companies have plans to implement a mobile device security plan in the near future.22

Implementing a comprehensive BYOD policy right now, rather than when it’s too late, is important.  We’ve compiled a list of four items that any business currently building a BYOD strategy must consider.

  1. It must clearly be outlined what specific devices are permitted for work use.
  2. The company/organization must have the ability to remotely delete company-sensitive data from mobile devices without the device owner’s permission.  Remote deletion capabilities are much more refined these days; simplifying the removal of enterprise-related data from devices, while leaving other content like personal photos, contacts, apps and music downloads intact.
  3. Written policies should be put into effect that correspond with terms of use policies and any guidelines pertaining to remote/telecommute workers or the sharing of sensitive data.   There should be clearly defined consequences for violating any or all policies.
  4. Employee privacy should be discussed within the BYOD policy since employees often use these devices to check personal email, browse or post to Facebook and Twitter feeds, instant message, and store personal documents, photos, music and movie downloads.   Employees must understand that employers still have access to the content stored on these devices.  Location tracking, which gives employers the ability to locate employees, is also something to discuss since many people don’t necessarily welcome that kind of surveillance.

It is understandable that BYOD and more mobile employees have some small business owners feeling anxious and nervous.  But mobile management tools, periodic conversation, security checks, and research will do wonders when it comes to keeping small businesses safe.

Maintain security and safe BYOD practices. CLICK HERE for a free network and technology assessment.

Achieving Hipaa Compliance & Data Security In The Cloud

Prioritizing Security & Privacy in Healthcare Sector

Physician offices, hospitals and health insurers take practical steps each day to protect private patient health information (PHI) and comply with HIPAA regulations. Anyone interacting with patients and regularly accessing or discussing confidential medical records is obligated to adhere to certain requirements to uphold privacy and security.

For example, employees must be mindful of what is said aloud pertaining to an individual patient. Doors must be closed when patient conditions, treatments and procedures are discussed in person or over the phone. Staff should never leave voice mails with specifics about patient health conditions or test results. Even simple acts like summoning patients from the waiting room must be carried out with patient discretion in mind.

Failure to do this can result in a reported HIPAA breach that can be accompanied by potentially heavy monetary fines and often-irreparable reputation damage. The industry’s need to prioritize the integrity of patient data is even more pronounced in this time of flux within the healthcare sector.

Transitioning to the Electronic Age

Healthcare service providers today are in the process of converting all paper medical records to electronic health records (EHRs) or electronic medical records (EMRs) to meet the meaningful use requirements outlined in the American Recovery and Reinvestment Act of 2009 (ARRA). The ARRA incentivizes the healthcare sector to accelerate the adoption of enterprise-wide electronic medical data by 2015 or face possible penalties.

We are entering a period in our history where volumes of confidential patient health information (PHI) will be stored, shared, and accessed electronically for the very first time ever. There has never been a more critical time for healthcare service providers to ensure that patient rights are protected, confidential information is safeguarded, and this transition from the immovable locked file cabinets to today’s electronic-system is completely HIPAA compliant and secure.

How HIPAA Breaches Most Commonly Happen

The U.S. Department of Health’s Office of Civil Rights found that there have been 21 million HIPAA security breaches since 2009. These breaches have resulted in an average of 2,769 records being lost or stolen per breach. Among them:

  • 48% were stolen medical files
  • 48% were stolen billing and insurance records
  • 20% were stolen prescription details
  • 13% were stolen monthly statements
  • 24% were stolen patient billing/payment details
  • 19% were stolen payment details

During this period, 66 percent of the reported large-scale HIPPA violations were due to the physical loss or theft of electronic equipment or storage media such as a laptop or flash drive that held unencrypted PHI. Another 8 percent of the large-scale HIPAA breach incidents were the result of hacking and cybercrime.

Physical Theft

Based on the above findings alone, one can come to the obvious conclusion that storing such unencrypted data on a physical hard drive or any portable storage media device elevates the risk of an HIPAA breach. Therefore, eliminating the need to store or transfer this data on equipment such as laptops or flash drives should significantly minimize the risk of many of the HIPAA violations reported today.

Cybercrime

Cybercrime is a growing threat within the healthcare sector since the industry has been slow to adopt new technology. According to the Identity Theft Resource Center, there were 17 reported financial industry data breaches in 2012 compared to a reported 154 healthcare industry breaches during the same time frame. The aging technology commonly used by healthcare service providers is rife with software and security flaws making it susceptible to data breaches resulting from hacking and other cyber-attacks.

Data thieves view private medical records as a high valued commodity – a gateway to identity theft. Safeguarding this data is challenging. With the shift to electronic records, data thieves have upped their game, finding new ways to gain unauthorized access to patient data by exposing vulnerabilities.

Defending against cybercrime requires constant monitoring for intrusion attempts and security upgrades. In this era where the volume of stored data is increasing, new cyber threats seemingly surface every day, and there is continuous demand to comply with regulations; healthcare service providers securing their own infrastructure will inevitably become overburdened and more vulnerable to attacks and HIPAA breaches.

 

The Case for Moving Data to the Cloud

Although many healthcare service providers have shown a reluctance to abandon their in-house IT infrastructure and security measures, on premise data center attacks are proving to be more prevalent, costly, and difficult to rebound from.

Healthcare providers who have resisted the cloud due to privacy and security concerns could be making a grave mistake. Increasing evidence suggests that the cloud can actually enhance data security. It does this while also freeing up manpower and budget dollars that can be better allocated toward the principle objective of improving patient care.

Proactive Remote Monitoring

Leading cloud-service providers offer an around-the-clock remote monitoring service that maximizes uptime while monitoring each node in the cloud infrastructure, each access point, and the data center platform as a whole. This is an extremely important function that detects and addresses potential issues before they become serious breach incidents. Metrics are collected and alerts are triggered whenever faulty conditions such as a data backup failure or an authorized attempt to access data are detected.

CLICK HERE for a free network assessment and see how your sensitive information can remain secure in the cloud.

Cloud and HIPAA – Questions You Should Ask

What to Ask Your Cloud-Service Provider

Cloud is establishing a foothold in the industry as the data management system of choice for many healthcare service providers. This means cloud security continues to evolve for the better. However, you must still choose a cloud-service provider wisely and ensure that patient data is secure at all levels of workflow.

We’ve compiled a list of several things you should ask your cloud-service provider regarding EHRs and PHI data.

  1. Who has access to this data and the systems supporting it?

Any cloud service provider should be able to tell you who has access to the physical storage facility, the hardware, operating systems and data.

  1. Is there an audit trail and can unauthorized access to patient data be easily verified?

Is there an auditing mechanism in place tracking all PHI-related system activities, warnings and failures? Any unusual system activity such as suspected unauthorized access should be easily detectable.

  1. Is the data password-protected and accessible to only those authorized?

Are users prompted to enter a unique username and password with each log on? Do active logged-in sessions time out after periods of inactivity?

  1. Is the data encrypted? Is it only viewable to those with proper authentication or accessing it through an application?

Is SSL-based encryption performed at the application level when healthcare sites and the data center communicate? This ensures end-to-end protection from the service access point to the data center and prevents any unauthorized network provider employee from accessing the data. Data also can’t be read while in transit to an end user’s viewing software over the Internet.

  1. What kinds of backup processes are in place to ensure business continuity?

How often is data backed up and what is the method of backup to reduce data loss? Are copies made on removable media and stored off-site if a disaster impacts the data center? Are the two copies continuously synchronized? What authentication processes are in place to ensure data integrity?

  1. How are the threats of viruses and Trojans handled?

Is there anti-virus software running every time files and disks are scanned or accessed? Is the anti-virus software frequently updated with the latest virus signature databases?

  1. What Kind of Physical Security Exists at the Data Center?

Is security at the data center manned 24-hours with appropriate identification required and recorded with each visit? Are security cameras, motion detectors or alarms present throughout the facility?

The necessary investment to buy and maintain physical equipment, hardware and software, and supply personnel with the continuous training they need to deliver top-level data security is unaffordable and overtaxes the resources of smaller healthcare entities. Converting to cloud-based services enable practices and companies of any size to achieve industry-leading HIPAA compliant data security while benefiting from a slew of cost-efficient benefits that liberate them from security problems – bringing them back to caring for patients, not patient technology.

If you’re interested in a cloud-service provider who follows the administrative simplifications referenced under HIPAA, and can satisfactorily assure the safeguarding of electronic patient health information, contact us today.

Call (214)377-4884 or CLICK HERE for a free network assessment.

The Basic Services of an MSP

18Your peers are finding new technology innovations like virtualization and the cloud as a way to save money. Virtualization and cloud computing are a cost-effective means to move the contents of entire servers into one offsite virtual server or software bundle – this includes all applications, data, operating systems and patches. The need for fewer physical servers reduces hardware and energy costs, data size requirements and makes overall IT management and backup/recovery easier.

According to series of studies compiled by VMWare (a US-based cloud and virtualization software and services company), businesses that have implemented virtualization have reduced total cost of ownership in IT operations by up to 67%.

While there has been much attention called to the positives of these new innovations, SMBs owners and managers have little to no visibility to the new set of risks and the incremental costs that accompany this new technology.

This new technology, while highly productive, also has the potential to be disruptive given the increased risk for security breaches in the cloud and the learning curve of team members adapting to new technology and software applications. The life of a system administrator also becomes more complex given the demands of always-on employees/customers and the greater need to backup data and recover immediately in the event of an unplanned outage.

The reality is many of the headaches that come with new technology aren’t fully realized until months, if not years, into their implementation – and this may be too late.

 

Management today needs more visibility to the real risks at hand, along with new solutions and methodologies. Partnering with a managed services provider (MSP) is one new approach being used by many of your peers today. Experienced MSPs have access to newer tools that reduce costs by automating many routine in-house labor intensive processes. Break-fix is labor intensive, and labor is one of the most expensive operating costs within your IT infrastructure. These innovative tools generate real productivity increases and mitigate the risk of network failure, downtime or data loss from human error.

MSPs deliver a trusted foundation for your team and your customers – some of the services and tasks offered include:

  • Remote Desktop Management and Support
  • Predictable Management of Critical Patches and Software Updates
  • Fractional Resource Availability of Best-In-Class Expertise – scaled to your needs
  • Implementing and Testing Backup and Disaster Recovery Processes
  • Performance of Inventory and Audits of Computer/Network/Software
  • Enforcement of Network/Security Policy
  • Mobile Data Management and Monitoring
  • Monitoring of Network/Operating System and Alerts
  • Updating Anti-Virus Software and Detecting Spyware

Alert Monitoring – MSP automation of this task has led to an 80% reduction of in-house monitoring that delivers visibility to risks that were previously unidentifiable.

Service Tasks/Help Desk Requests or Ticketing – MSP automation of these tasks have led to a 30% reduction of in-house support ticket- related efforts – saving countless hours of paying for employees and team members to stand idle

Reporting – MSP service-level management tools and dynamic dashboards have led to complete automation of reporting and business communication efforts. Network trust increased and fear of unknown risks reduced so management can sleep at night?

 

Erase any misconception that MSPs are nothing more than “outsourced” tech help priced to displace your in-house IT technician or team. The new MSP has defined effective processes; methodologies and technology partnerships to offer valuable preventive services that proactively identify and eliminate threats before a bigger problem arises.

Whether an MSP assumes full responsibility for IT operations or acts as an ally to an in-house IT technician or team, the toolsets and education they provide to SMBs are invaluable. An MSP’s expertise and availability is what sets them apart from the “fireman-like” break-fix provider.

In an increasingly competitive environment where technology evolves at a rapid pace, businesses must fully leverage innovation to better meet the needs of their employees and the expectations of their customers. Much of this hinges on an organization’s ability to increase system reliability for their business continuity, team productivity and customer satisfaction.

CLICK HERE for a free network assessment, and choose Cognoscape as your trusted MSP.

Technology and SMBs

16Contrary to what you may read, IT costs don’t necessarily have to skyrocket as your business grows. Small and medium sized businesses (SMBs) just have to be more cognizant of where their technology investments are going and what they’re truly getting as return on their investment. As businesses rely more than ever on technology for day-to-day functions, managers realize that they simply cannot afford the lost productivity, lost revenue and the negative impact on business reputation that comes with a downed system or network. At the same time, many businesses can’t justify the costs of employing any full or part-time IT support given today’s economy. In fact, many small-to-medium sized businesses choose to pay for on-site support on an as-needed basis as opposed to having one or several dedicated IT employees on payroll.

With the recent buzz about the potential benefits and cost savings of virtualization software and cloud computing, many SMB executive teams are rethinking how their technology investments are currently allocated. Two things you’ll find many technology dependent peers focusing on today are a greater return on investment (ROI) and a lower total cost of ownership (TCO).

ROI is calculated by dividing the cost reduction and avoidance realized over a period of time by the total amount invested over that same time span.

Total Cost of Ownership (TCO) is most commonly related with four categories in the business/tech world.17

  • Downtime – Smart executives ask themselves “What does it cost my business when my employees, extended teams and/or our customers can’t get to the data they need.” Downtime includes ALL costs linked to server downtime – both planned and unplanned – along with mostly hidden soft costs that aren’t necessarily easy to quantify such as lost employee productivity and business as a result of downtime.
  • Hardware and Software – The price of the server, hardware and software purchases, contracted tech support and maintenance, training services, upgrades, and backup and virus protection software.
  • IT Operations – Network and storage infrastructure, server deployment and configuration, data center power and cooling, and other system-related administrative tasks.
  • Business Administration – All costs related to business processes like labor costs, purchase approvals, vendor contract negotiation and procurement process tracking.

As referenced earlier, small-to-medium size companies can be severely understaffed when it comes to IT support. With so many technology changes emerging in recent years, this puts your businesses at an increased risk for network failure, data loss and security threats – all of which can be enough to put an ill-prepared company out of business.

CLICK HERE for a free network assessment.

Cognoscape, a Managed Service IT Provider – The Basics

15The Concept of Managed Services

Managed Services Providers – or MSPs – are often recommended as a cost-effective IT solution for small businesses. For a minimal monthly fee, MSPs provide a reasonably priced solution to the complex technology pains of small businesses. Sometimes an MSP will enter the picture to support an overworked IT support person or staff. They can also assume complete responsibility of all IT and network operations if need be.

MSPs can decrease the overall IT support costs by as much as 30% to 50%. Rather than stressing about technology, business owners can instead get back to focusing on growing their business. All while enjoying the benefit of a team of highly-trained IT experts boosting their network’s reliability and performance.

The Benefits of a Managed Services Provider

  • Freed-Up Resources and a Renewed Emphasis on Core Business – Most pricey repairs and recovery costs are the result of a lack of consistent monitoring and maintenance. While these activities are absolutely critical to day-to-day business operations, they are also repetitive, monotonous and “a time kill” for any IT support on payroll. Both business owners and internal IT staff would much rather focus on revenue enhancing tasks like product development or the creation of cutting-edge applications/services. This is one reason routine monitoring and maintenance tasks are often neglected by an internal IT person or team, which always proves to be detrimental much later. Often misportrayed as a “threat” to an internal IT person or staff, MSPs can instead alleviate internal staff of mundane network operations maintenance, repetitious monitoring of server and storage infrastructure, and day-to-day operations and help desk duties.
  • A True Partner Sharing Risks And Responsibilities – Earlier we alluded to a mistrust of IT consultants who profit from your technological misery. In comparison, the goal of an MSP is to deliver on contracted services, measure, report, analyze, and optimize IT service operations, and truly become an irreplaceable catalyst for business growth. MSPs not only assume leadership roles, they mitigate risks, enhance efficiency and change the culture by introducing internal IT operations to new technologies and processes.

 14

  • Access to Expertise, Best Practices and World – Class Tools and Technologies – MSPs has worked with a variety of businesses and organizations. Since each client presents a completely unique set of business and technology needs, there isn’t a “one-size-fits-all” method to what they do. That said, they’ve likely seen it all, and the benefit of an experienced MSP undoubtedly adds value to your business. MSPs can keep your business relevant and on track with continually evolving technology, support, and productivity demands. Let’s face it – no small or medium-sized business can afford to fall behind with technology trends in today’s business world.
  • The Benefit of a Full – Time Fully Staffed IT Department at a Fraction of the Cost – Most small business owners live and die by proactive management. They just haven’t had the budget, resources or access to on-demand expertise to be proactive with information technology management. An MSP gives business owners and overwhelmed internal IT staff affordable computer and server support, remote monitoring of critical network components like servers and firewalls, data backup and disaster recovery, network security, custom software solutions, and technology evaluation and planning. Freeing them from expensive computer problems, security threats like spyware and spam, and the repercussions of prolonged downtime. All without being “nickel-and-dimed” by on-call IT firms.

CLICK HERE for a free network assessment. Choose Cognoscape for your managed services and IT needs.

The Technology Pains of Small Business

Small business owners are faced with quite the dilemma these days. While a reliable and secure network is a critical component to success, business owners are also being forced to scale back on costs and overhead as a means of basic survival in today’s economy.

Having a fully staffed IT department simply isn’t a viable option for a majority of small business owners. Many small businesses either have one full-time employee devoted to IT services or none at all. Both scenarios are recipes for disaster in an increasingly complex high-tech society.

One IT person, even a very small team, will likely be overworked and burdened by too many responsibilities. This can make a company’s business infrastructure increasingly vulnerable to breakdown, not from technology, but from human error.

13A recent study conducted by Gartner projected that through 2015, people – not technology, will be responsible for up to 80% of technology failure. This number coincides with findings reported in the IT Process Institute’s Visible Ops Handbook stating that 80% of unexpected outages are due to poorly planned changes implemented by administrators and developers.

The forecast is even stormier for businesses with absolutely no IT support on payroll. These business owners have subscribed to the break/fix model of technology management. While this model can sometimes be out of necessity due to budget restraints, it can also stem from a state of ignorance or denial that their business is truly susceptible to technology failure. The overall health and profitability of their business is directly affected by the performance, reliability and security of its technology systems.

With the break/fix model, there is absolutely no proactive monitoring or management of their network. The only emergency plan for data loss or downtime is to call upon an IT specialist in an emergency 9-1-1 situation.

On average, these IT consultants charge $100 an hour. This doesn’t even factor in trip fees, surcharges, and standard repair costs in the range of $500 to $1000, or the costs of hardware and software upgrades. This method also results in more downtime, lost productivity, lost revenue, and a loss in overall customer satisfaction. Major network repairs require a minimum of 8-24 hours on average and most on-call IT consultants cannot get on site for up to 24-48 hours.

One has to also wonder if these consultants truly have the business owners’ best interest in mind. After all, they make their money when technology breaks down. Are they truly motivated to keep a client’s network running optimally and efficiently?

Well Cognocape is. CLICK HERE for a free network assessment.