Managed IT Services

  • What is the definition of IT managed services?

    When we use the term IT managed services, we’re referring to the practice of outsourcing the responsibility for maintaining and managing your IT systems and processes. It’s an efficient alternative to the old break/fix model, where you call in IT experts only when something has gone wrong.

  • What’s included in managed IT services?

    Our managed IT services are tailored IT support and solutions for your business. We understand that small-to-medium business owners need tailored IT support you can trust. As busy, in-demand people, you also want reliable experts to take the weight off your shoulders when it comes to IT. That’s where Datcom comes in.

  • What makes a good managed IT service provider?

    First of all, make sure your service provider is fully accredited. We have three ISO accreditations in Quality, Security and Service. Secondly, we recommend checking their service level agreement and asking who will be working on your account. Here at Datcom, we make sure you see the same friendly faces who really get to know your business. Thirdly, make sure your provider will proactively monitor your IT equipment – rather than sitting back and waiting for problems to crop up.

Cloud computing

  • Are there apps that use Cloud computing?

    Yes, many of the most popular apps that we all use every day use Cloud computing. For example, WhatsApp, Skype, Netflix and LinkedIn are all on the Cloud.

  • What are the main public Cloud providers?

    There are three main public Cloud providers: Microsoft, AWS and Google. They offer a range of pay-per-use services allowing businesses an operational finance model and scalability.

  • What are the types of Cloud computing?

    There are four main types of Cloud computing: private, public, hybrid and multiClouds. Each has its own set of builds and services – no two types are the same so it’s important to pick what’s right for your business.

  • What about the security of Cloud computing?

    Cloud computing is very secure. Cloud hosts are committed to staying up-to-date with threats and taking appropriate security measures. Servers are usually located in well-protected buildings that only a few authorised people can access. Also, files stored on Cloud servers are encrypted, so they’re much harder for hackers to access when compared with documents stored on the hard drives of your in-house computers.

  • Disadvantages of Cloud computing?

    There aren’t many disadvantages to Cloud computing and most of them are far outweighed by the positive benefits. Yes, it’s a service that you’ll have to pay for, but you have to pay to run in-house systems too and Cloud computing is likely to save you money in the long run. Yes, Cloud hosts sometimes have a problem that results in downtime, but they have the resources and infrastructure to get things fixed quickly – probably more quickly than if you had to fix a computer issue with your own in-house team. Finally, yes, there is a theoretical security risk. This is true because nobody anywhere can guarantee there is absolutely no risk of theft or hacking. But Cloud hosts have physical and digital security in place that is far more robust than any you would be likely to have locally.

  • What are the advantages of Cloud computing?

    There are so many advantages to Cloud computing that we could keep you reading all day. But here are just a few of the major benefits.

    Security.

    It’s the Cloud host’s responsibility to provide you with robust security, which is almost definitely going to be way better than any in-house system. You’re an expert in your company’s business – Cloud hosts are experts in security. 

    Flexibility.

    The Cloud offers greater flexibility when compared with hosting on a local server. If you need extra bandwidth, a Cloud computing service can flex with your needs immediately, with no time-consuming or expensive IT update at your end. The hosted systems we provide come complete with storage and processing power that can be easily changed, upgraded or downgraded.

    Better use of your time.

    If your current IT system takes up a lot of your time and energy, it’s eating into the time you could be dedicating to what you do best. Choosing a Cloud solution to take care of your IT hosting and infrastructure means you’ll have more hours in your day to look after areas of your business that need your personal expertise. 

    Mobility.

    Because you can access the Cloud remotely, your team can work seamlessly from any location where they can access the internet – home, on the road or from client offices.

    Cost.

    Cloud computing can have a positive impact on your bottom line. That’s because you can lower costs by running your infrastructure more effectively, scaling around any changes your business needs.

    Easy collaboration.

    Cloud computing enables team members to view and share information easily and securely – something that’s becoming increasingly important as more and more people work and collaborate with colleagues who aren’t in the same building.

  • What are the security risks of Cloud computing?

    The security risks of Cloud computing are very low. A reputable service provider will ensure that your data is secure both in the digital and physical worlds.

  • What is Cloud computing?

    Cloud computing means services that you access over the internet that are provided by someone else. In business terms, traditional IT services are provided in-house, usually by a physical server that is maintained by you or on your behalf. Cloud computing lets you take those services from the local server and place them into a secure external platform instead, removing your responsibility for the upkeep of the hardware.

Business broadband

  • Is Fibre to the Cabinet (FTTC) right for my business?

    FTTC is widely available and a low-cost option for business broadband making it a popular choice for small or medium businesses. Disadvantages of FTTC are that it’s less reliable and speeds can vary, depending on the distance from the local green street cabinet.

  • What is a leased line?

    A leased line gives you a fast, reliable and dedicated fibre connection. Unlike FTTP & FTTC, leased lines are not shared between premises meaning that internet speeds aren’t affected at peak times.

  • What are the 4 main types of business broadband?

    · Leased lines
    · Fibre to the Premises (FTTP)
    · Fibre to the Cabinet (FTTC)
    · Copper broadband (ADSL)

Remote IT support

  • Can you support us 24 hours a day?

    Yes, we can provide IT support to you and your business 24 hours a day. Standard IT support is from 8am to 6pm, Monday to Friday.

  • Will I get support on my mobile or tablet when I’m working away from the office?

    When you take out a support contract with Datcom, it’s your users who are supported, regardless of which device they’re using. We take care to make sure extra devices are secure and supported giving you and your team the freedom to work anywhere.

  • What’s the difference between remote and on-site support?

    The majority of IT issues can be resolved remotely, but Datcom’s additional on-site support means that no matter what the IT problem is, you’ve got it covered. If the issue can’t be resolved remotely, for whatever reason, our engineers come to site.

  • What is remote user support?

    Using remote access software, we can support your employees as if we were sitting next to them. We can securely take control and investigate issues to quickly get to the bottom of things with minimal disruption.

Cyber security

  • We’re not sure if we’re secure or not. Is there an independent survey available?

    It’s the famous phrase – you don’t know what you don’t know! Quite often you’re unaware of security gaps or backups that are failing. Verifying and assessing your security set-up is a great idea. It can provide reassurance that everything is working as you’d expect, or you establish what can be done better. We provide security surveys to any business and our report outlines any recommendations using an easy traffic light system, so it’s clear what’s a priority and what can wait.

  • What’s the difference between Cyber Essentials and Cyber Essentials Plus?

    Cyber Essentials is a self-assessment. A list of questions about the business IT security set-up. You’ll need to know things such as firewall rules, who has admin access, Cloud applications and if software and devices are up to date. Cyber Essentials Plus requires an IASME certified body to conduct a more in-depth audit and verify those answers.

    https://datcom.co.uk/en/news/tech/show-youre-serious-about-security-with-cyber-essentials

  • How much does Cyber Essentials cost?

    The cost of the accreditation depends on how large your business is. https://iasme.co.uk/cyber-blog/price-change-and-updates-to-cyber-essentials/

    For businesses with 10-49 employees it costs £400+VAT. For organisations with 50-249 team members it costs £450+VAT. This cost does not include remedial work.

  • Why is cyber security important?

    The security of your organisation’s files and data is paramount to your ongoing success. Your systems could be breached by malicious hackers, bringing your whole business to a standstill. You could have patented or proprietary data stolen and copied. You could put the personal and financial details of staff and customers at risk. You could fall victim to a cyber ransom demand. There are, unfortunately, an endless number of ways that criminals and sinister groups can attack your IT infrastructure. That’s why staying up-to-date with cyber security is a must for every business.

  • Can you recommend some good cyber security courses or training?

    In today’s digital world, educating your employees on cyber security is essential. With cyber criminals finding new ways to scam and hack into networks every day, it’s important to be aware of trends and the latest methods being used. Regular security awareness training, alongside managed phishing assessments will provide you with knowledge to empower your people to keep your data safe. When you work with Datcom, we’re always happy to help you find new ways to keep on top of your cyber security.

  • What are the main 4 types of vulnerability in cyber security?

    There are many kinds of cyber attack but these are some of the most common. Password attacks are one way for hackers or thieves to access your data and files. Malware attacks are when your network is breached and your files are damaged or stolen using worms, viruses, file infectors, spyware, trojans or ransomware. Phishing attacks usually arrive in an email or text message. They may seem to be from a trusted source but will often ask you to click on a link or attachment that opens the door to malware or a request for personal information. Drive-by attacks happen when a criminal plants malicious bits of script on a website. If you click on the script you’ll be directed to a site controlled by the attacker that then installs malware on your computer.

  • What is cyber security?

    Cyber security is how organisations reduce the risk of cyber attack. It’s how we protect, for example, our laptops, tablets, computers and the services we use from theft or damage. It also covers how we protect our data and files from being accessed by unauthorised – and sometimes malicious – people or groups.

Outsourced IT support

  • All our employees work remotely. Can you still support us?

    We can provide the same expert level of support to you and your business whether you’re in an office or at home.

  • Our offices are spread nationally. Does that impact support?

    Outsourced support means it doesn’t matter where your offices are. We support businesses all over the UK.

  • We need help developing our IT strategy. Is this something that can be outsourced?

    Let us help you decipher the best long-term IT strategy for your business. Listening to your needs and future goals, we can help manage the IT strategy, while you look after the smaller steps.

  • We need support on the day-to-day management of IT. Is this something we can outsource?

    Sometimes it’s the day-to-day tasks that take up your time, when you need your people focused on the bigger picture. Our engineers can take the weight of daily tasks for you.

  • We already have one person looking after our IT but they need help from time to time. Can we outsource IT support as and when we need it without a support contract?

    Sometimes you just need one-off expert help. A group of support tickets can be purchased at once to dip into as and when you need it.

  • Is there a minimum or maximum number of users you can support?

    The minimum number of users we support is 10. There is no maximum – the largest business we currently look after has 400 employees.

  • Will I need multiple contracts if I outsource our IT?

    Our Fully Managed IT support provides one monthly subscription that covers everything your IT network needs to be secure and efficient.

  • Should we outsource our IT or recruit internally for an IT Manager?

    An IT Manager is just one person. Outsourcing your IT means you have access to a raft of experience among multiple experts. From password changes and cyber security, to a future IT strategy, our team of specialists can help with a wide variety of things.

  • We already outsource our IT. How easy is it to switch IT providers?

    Switching providers can seem daunting, but it’s something we do all the time, so we have the process finely tuned. We follow a procedure that takes around 2-4 weeks. We do most of the work, so you can carry on doing what you do best.

  • What are the benefits of outsourcing IT services?

    Outsourcing your IT can save a lot of time, money and stress. Because we’re experts in what we do, we’ll get to the heart of your IT issues quickly. We’ll often solve problems you didn’t know you had, improving the efficiency of your business. In terms of budget, you’ll benefit from the combined decades of experience of our team, with no need for you to recruit, train or pay salaries. Plus, you can sleep easy knowing that your systems, data and files are in safe hands – leaving you free to get on with running your business.