Managed IT services are delivered by a Managed Service Provider (MSP) – in effect you outsource the responsibility for your company’s on-going IT support and management of your company’s infrastructure to an expert partner, typically in return for a fixed monthly contract fee.
Outsourcing your IT services to a Managed Services Provider leaves you free to focus on your business goals rather than IT issues. You will have access to an expert team of IT professionals typically at a lower price than an in-house team would cost: and enjoy budgeting and accounting benefits by switching to a fixed cost model where more of your IT spend moves to Opex.
You will also have guaranteed service levels and availability as well as on-going threat monitoring, detection and, in our case, remediation. If you operate in a regulated sector, documented compliance with standards is also important and easy for an MSP like Epoq IT to provide. It is important to choose an IT partner that can satisfy your requirements as you grow and provide strategic consultancy and project services as required.
Disaster recovery is the process for re-establishing access to data, apps, and other critical IT resources in the event of an outage. It is a document with detailed instructions for your organisation’s response to unplanned incidents, from natural disasters to power cuts, cyber-attacks and similar disruptive events. Having an up-to-date disaster recovery and back-up plan that you can call on in a crisis ensures that disruption and costs to your business operations are minimised.
This is the process of making an additional copy of key business data. It is a protection against accidental deletion, malware or other malicious intervention, database corruption or something going wrong with a software upgrade. Even if your applications are in the cloud, it is important to back up your files.
Malware is short for ‘malicious software’, and it can infect machines in many different ways, including (but are not limited to):
· Viruses – Probably the most familiar and common form of malware. They are transmitted by making copies of themselves.
· Worms – These are very similar – they can replicate without human interaction, from one computer to another.
· Trojans – These are typically disguised as legitimate software, in the manner of the ancient myth about the Trojan horse.
· Spyware – This malware transmits personal information, including, for example, credit card details.
· Ransomware – This holds computer files hostage until you pay the hacker a fee. (It is also called scareware.)
Essentially, with this cybercrime, victims are emailed, phoned, or sent a text message. Someone poses as a legitimate organisation to persuade people to hand over sensitive information like passwords or banking or credit card details. Ultimately, phishing can lead to identity theft plus hefty financial loss, and it is vital to have the correct security measures in place to protect your business, your data and your staff.
Multi-factor authentication (MFA) is a security control that requires users to verify their identities by providing multiple pieces of evidence before gaining access to a device or application. We strongly recommend that businesses take advantage of this technology to help secure their business data and systems and protect their users.
Cyber Essentials is a UK Government certification scheme that helps small and medium sized businesses (SMEs) achieve a high level of cyber security by taking basic steps such as maintaining strong password protection, up-to-date software and firewalls, and anti-malware.
Cyber Essentials Certification demonstrates your commitment to cyber security – while keeping the approach simple, and the costs low – ensuring you have the right policies in place and that your systems will be protected from new and recurring threats over the longer term.
The scheme sets out five basic security controls to protect organisations against around 80% of common cyber attacks, allowing you to focus on your core business objectives.
Benefits of the Cyber Essentials scheme include reassuring customers that you take cyber security seriously as well as attracting new business with the assurance that you have cyber security measures in place.
Cyber Essentials is designed to help organisations of any size demonstrate their commitment to cyber security – all while keeping the approach simple and the costs low.
If you supply – or want to supply – larger organisations that manage their third-party risks properly, the independent verification of your security posture provided by certification offers assurance that you will not endanger the supply chain.
If you want to apply for government contracts, you will need Cyber Essentials certification.
The Ministry of Defence mandates Cyber Essentials for all its new suppliers and their relevant supply chains.
Cyber Essentials certification now includes cyber liability insurance for any UK organisation that certifies the whole organisation and has less than £20 million annual turnover (terms apply).
Organisations complete the IASME self-assessment questionnaire (SAQ). This must be verified and signed off by a member of the board or an equivalent signatory. It is then independently verified by a certification body trained and licensed to certify against the government’s Cyber Essentials scheme.
Cyber Essentials Plus provides a more advanced level of assurance and includes a technical audit of the systems that are in scope for Cyber Essentials. Organisations applying for Cyber Essentials Plus must also pass an on-site assessment and an internal vulnerability scan (these can be performed remotely in certain instances), plus an external vulnerability scan conducted by the certification body.
Managed Services can include a wide range of options, including managing your networks and infrastructure, managed security, managed support services, managed cloud infrastructure, and managed licensing, including subscription software like Microsoft 365.
Epoq IT also offers strategic business insights and planning services along with project services, including SharePoint and email migrations and office moves.
Costs vary depending on the range of services you require and the number of users that need support. For SMEs, we offer a basic business pack through to premium services for those that require enhanced security provision and need to prove regulatory compliance. We can provide a quote on these SME bundles rapidly on request.
We also offer bespoke solutions for larger enterprises and a range of consultancy bd project services.
According to founder Gary Swanwick, Epoq IT derives from the word ‘epoch’. When the company was founded in 2002, the name encapsulated the sense of a new era, and Epoq IT was soon at the forefront of offering Managed IT Services to proactively ensure the smooth operation of clients’ IT infrastructure as opposed to ad hoc reactive break/fix remedies.
Epoq IT serves many local businesses in Buckinghamshire and the Thames Valley region as well those further afield in the South East of England and North of London.
We provide a very wide range of support services based on established and new technologies. If you would like to discuss a particular technology, please get in touch and we will be happy to help.
Epoq IT’s ITIL and ISO20000 Service Desk takes care of your licensing and infrastructure, including:
· Service Levels to suit your business needs
· Fast response and proactive service 8.00 – 18.00
· Transparent ticket updates
· Out of hours, 24/7 IT support and on-site support options
· Qualified staff and expertise always on hand to offer the best advice
· Dedicated Service Manager to ensure the outstanding customer experience
Epoq IT’s opening hours are 8.00 -18.00 Monday- Friday. Out of hours and 24/7 options are available.
Yes, out-of-hours and 24/7 cover can be arranged as part of your IT Services contract.
SLAs or Service Level Agreements are your guarantee that service issues and requests will be dealt with in an agreed and timely timescale. At Epoq IT we offer SLAs based on your stated needs and using our proven processes for providing IT support.
When you log a ticket with us, we will prioritise the incident based according to our agreed SLAs. However, you can change a priority for an incident that may be more urgent if you require. We monitor response times continuously and ask for feedback on every call logged. 99% of customers rate our service as ‘Excellent’.
You can email firstname.lastname@example.org or call us on 01494 444065
Remote Monitoring and Management (RMM) provides for the proactive resolution of hardware and software faults. Tools include:
· Rapid take-over, remote access to support computers and servers.
· Scripted, automated fixes to common alerts e.g. low disk space, high processor utilisation, virus alerts, etc.
· Automated and manual software deployment, allowing proactive and rapid provisioning of business-critical software applications.
· Reporting on health, age, and effectiveness of computers and servers, amongst many other reports.