Big company services scaled for the small business.
Supporting you through the entire cycle...
...from finding the right product mix
through implementation and training
...all the way to the end of the road with ecologically sound recycling and destruction. I can help you.
Equipment Sales
You need reliable equipment that won't break the bank. The desktop computers and entry level servers I build have an average useful life of 7+ years! The laptop computers we prefer are typically replaced in their 5th year and require one battery replacement during that span of time. This is definitely bucking the industry's "best practice" of refreshing hardware every 2-3 years. My customers appreciate the ROI, performance and reliability.
I focus on components and equipment built for business which are not usually found in the local store. Durability, security, servicability, suitability affordability are my key criteria.
Diagnosis and Repair
- desktop computers
- servers
- laptops
I also address the human component - sometimes a new perspective is in order.
Responsible Recyling & Data Destuction
Your electronics should be recycled in an ecologically responsible manner. All data storage devices should be securely erased then recycled or destroyed (depending on the requirements of your industry). I can facilitate both objectives or you can contact Natural Evolution, Inc. directly - Tulsa's only certified eRecyler.
Proficiencies
- Microsoft 365 Premium
- Microsoft Office 365 E3
- Microsoft Windows (Desktop and Server)
- Ubuntu Server
- Centos 7 Server
- Intuit QuickBooks multiuser
- ERPNext Free & Open Source ERP System
Network Equipment
All cables, switches, and routers are not created equal. Poorly installed cable will cause drops, lag and crosstalk. Routers meant for the home can't handle the number of connections needed for multiple employees - especially if your business uses Microsoft 365 or Office 365. Cheap, unmanaged switches are simple but can't help you isolate a hijacked computer.
VoIP
I can probably lower your telephone bill substantially. Take a look at your monthly call log. Add up the total minutes and divide that into what you pay. If it is more than 3 cents/minute you are paying too much. I champion a service that charges based upon actual usage - you'll be surprised at the rich feature set and low price.
Maintain Ownership of Your Data
- Maintain complete, current backups of all data offline
- Ensure your data is replicated to multiple physical locations
- Enforce 'Need to Know' access for all users
- Retrain users so that Passwords are never shared, never reused and always very, very long
Risk Assessments
Every person in your business sphere is a link in your business' chain of armor. Recent research revealed that employees are 85% more likely to leak data compared to pre-Covid times!
We need to be cognizant of:
- Insider Threats: people with access to your data maliciously or unintentionally using it to harm your business. Mitigation focuses on restricting and monitoring access to data by people.
- Insider Risks: data exposure potentially jeopardizes the business, its employees, customers, and partners. Mitigation focuses on creating barriers, typically with technology.
- External Threats: employee response to random/falsified/misleading interactions across all modalities (phone, mail, email, text, social media)
You should have a means of knowing when and how inappropriate access occurs so that you can take the appropriate action and prevent recurrance. Unusual activity needs to be rapidly recognized and investigated. The most dangerous thieves lurk in plain sight.