FAQ'S
Browse our FAQs to find answers to issues you’re currently experiencing or to find out about our services, pricing, and more. These FAQs are based on our most frequently asked questions we hear from clients.
However, if you don’t find the answer you need just give us a call and we’ll be happy to help out.
Common FAQ's
Outsourcing your IT to a Managed Service Provider (MSP) offers proactive, ongoing IT support and maintenance for a flat monthly fee. This includes services like Remote Monitoring and Management (RMM), Helpdesk support, Antivirus (AV) solutions and much more. You benefit from in-depth knowledge across a wide range of products and the collective support of a dedicated team. Learn more >
We provide tailored Cyber Security awareness training. Our system assesses individual needs through a GAP analysis, automatically delivering relevant online courses at scheduled intervals.
In addition to using security solutions, businesses should implement strong password policies, Multifactor Authentication, conduct regular security training for employees, keep software up to date, and perform security audits and assessments. Learn more >
Microsoft 365 and SharePoint are valuable for your company because they provide a seamless way to manage emails and store documents securely. With Microsoft 365, your team can access emails and collaborate on documents from anywhere, using familiar tools like Outlook and Word. SharePoint enhances this by organising documents in a centralised location, making it easy to share and collaborate on files in real-time. Learn more >
Compliance
Compliance refers to adhering to laws, regulations, and industry standards relevant to your business operations. It's crucial for avoiding legal penalties, protecting sensitive data, and maintaining trust with customers.
3PS can help you achieve CE and CE+ compliance.
CE and CE+ ensures your business meets regulations, reducing legal risks, and boosting trust in your businesses ability to manage data securely.
CE and CE+ are not mandatory, but they offer invaluable benefits to your business. By implementing these solutions, you gain a competitive edge through streamlined compliance processes, reduced legal risks, and enhanced trust with customers.
We recommend conducting assessments at least annually, or more frequently if there are significant changes in regulations, business operations, or technology.
Pricing
Our pricing model is pay-as-you-go and based on consumption. You only pay for the licenses you use each month, allowing you to adjust your consumption as needed.
Our pricing model is pay-as-you-go and based on consumption. You only pay for the products & services that you use each month, allowing you to adjust your consumption as needed.
We review pricing annually and may adjust in line with any vendor increases.
Absolutely, we're always open to discussing your specific needs and customizing our service to build a lasting relationship. Let's talk!
Yes, our services are fully customizable, like an à la carte menu. You choose only the products you need, tailoring the solution to fit your requirements.
We happily collaborate with your internal IT team to complement their existing skills.
We collect payment by direct debit each month, adjusting based on your consumption. This makes the process hassle-free for you, ensuring seamless and convenient billing each month.
You only need to give 30 days notice to cancel most services; there's no tie-in period. For products like Microsoft 365 with annual commitment licenses, cancellation is possible at the end of the commitment.
Certainly! We're happy to discuss discounts for larger companies with a substantial number of users or licenses. Let's talk about your specific needs.
Data Backup
We prioritize the safety of your data through daily cloud backups for servers and real-time backups for email, SharePoint, and OneDrive. This ensures that your valuable information is securely stored and readily accessible, minimizing any potential data risks.
Data backup ensures that your business-critical information is securely stored and can be recovered in case of accidental deletion, hardware failure, cyber attacks, or natural disasters.
It's crucial to back up all types of data essential for your business operations, including documents, databases, emails, customer records, and system configurations.
We can assess and enhance your cybersecurity posture with a penetration test and a vulnerability check to ensure your readiness against potential breaches.
The frequency of data backups depends on factors like data volatility and business requirements. We recommend regular backups, with some businesses opting for daily or even real-time backups for mission-critical data.
Your data is securely stored in an offsite data centre equipped with robust security measures and redundancy protocols to ensure its safety and availability.
Our data backup solutions are designed for swift data recovery. The time to recover depends on factors like the volume of data and the chosen recovery method.
Your data is highly secure during the backup process. We utilize industry-standard encryption methods and secure data transfer protocols to ensure the confidentiality and integrity of your information.
User Support
We offer comprehensive user support services, including help desk support, remote assistance, software troubleshooting, hardware maintenance, and user training. Learn more >
We prioritize prompt responses to support requests. We typically specify response times based on the severity of the issue, with critical issues receiving immediate attention.
Absolutely, our user support team can help with software installations, updates, patches, and upgrades to ensure that your systems are running the latest software versions with optimal performance and security.
Yes, we offer user training sessions to help your employees become proficient in using software applications, operating systems, and other technologies. Learn more >
We offer both on-site and remote support options based on your needs and location. Our goal is to provide flexible solutions that best suit your requirements and ensure efficient problem resolution.
Security
Yes, mobile devices need antivirus protection to safeguard against malware, phishing, and other security threats. With increasing mobile usage for sensitive activities like banking and shopping, antivirus apps help protect personal data and ensure device security.
Businesses face various cybersecurity threats, including malware, phishing attacks, ransomware, insider threats, and DDoS attacks. These threats can compromise sensitive data, disrupt operations, and damage reputation. Learn more >
Our security solutions employ advanced technologies such as firewalls, antivirus software, intrusion detection systems, and encryption to safeguard your network, devices, and data against cyber threats. Learn more >
In addition to using security solutions, businesses should implement strong password policies, Multifactor Authentication, conduct regular security training for employees, keep software up to date, and perform security audits and assessments. Learn more >
In addition to using security solutions, businesses should implement strong password policies, Multifactor Authentication, conduct regular security training for employees, keep software up to date, and perform security audits and assessments.
Yes, we offer cybersecurity monitoring services to detect and respond to threats in real time. Our team continuously monitors your network for suspicious activities and takes proactive measures to mitigate risks. Learn more >
Contact your IT support as soon as possible and alert them to the potential breach. They should provide you with clear instructions on how to proceed. Learn more >
We provide tailored Cyber Security awareness training. Our system assesses individual needs through a GAP analysis, automatically delivering relevant online courses at scheduled intervals. Learn more >
Ready to transform your business?
Contact us today and let's take the next step together.