SUPPORT DESK CLOSED - 25/12/24, 26/12/24 and 01/01/25 🎄📞

Frequently Asked Questions

IT Support

01

Do you offer tailored IT support?

At CT, we don’t believe in a ‘one size fits all’ approach to IT support. Elements of our tiered packages (Bronze, Silver, Gold and Platinum) can be tailored to you, your business and your budget. Your tailored IT support plan is aligned to your business demands; either fully or selectively outsourced, depending on what you need. We have expertise in a large range of sectors, so whatever your business challenges are – we can help you solve them!

02

How do I know the right level of IT support for my business?

We provide a collaborative approach to deliver tailored IT Support, Cloud, Cyber Security, and Telecoms solutions that drive meaningful change in your business. Our IT support packages are tiered with each offering a different level of IT support suited for you, your business and your budget. Our solutions work together to support your IT infrastructure, secure your data and keep your business connected.

03

Do you provide nationwide IT support?

Whilst we are headquartered in Chesterfield, we also have offices in Leicester and Dorset, providing nationwide IT support to customers across the UK. As a customer, you’ll be able to access to 24×7 support from our service desk by phone, email and online portal for 1st, 2nd and 3rd line support, as well as for remote assistance. Whilst we can manage most situations remotely, we also understand that having an onsite IT presence to call upon can be comforting for some businesses. With this in mind, we can provide scheduled and regular onsite engineers.

04

What is a strategic IT review?

A strategic IT review helps you identify IT needs for the short, medium, and long term, aligning with your business goals for a collaborative technology roadmap. Our Strategic IT Review is a 5-step process where we 1) understand, 2) analyse, 3) evaluate, 4) recommend and 5) plan to provide a technology roadmap of IT recommendations by the end of the process.

05

What’s included in the IT support onboarding process?

Our extensive and detailed onboarding process and Early Life Support applies to all new IT support customers. We have a 50+ point IT support onboarding process which ensures all information is gathered in readiness for the go-live date. You’ll meet with a designated onboarding team at different stages of the process to make the transition is as smooth as possible.

06

How do you manage the transition from our old IT provider?

We pride ourselves on the making the transition from your old IT provider as smooth as possible. Our professional management ensures a smooth process, minimising disruptions to your daily operations and mitigating unnecessary risks. Switching IT providers doesn’t mean downtime; we can ensure you have network protection and coverage throughout. Throughout the transition process from your old IT provider we’ll maintain regular check-ins to gather your feedback on performance and processes like our agreed SLAs.

07

What is user-awareness training?

User-awareness training is a type of education provided to employees of a business to help mitigate cyber security risks. By providing an understanding of cyber security risks, employees can spot possible vulnerabilities and implement best practices to ensure a secure cyber business environment. We provide user-awareness training as part of our IT support service you’ll be able to access CT Knowledge, our online learning hub, which has over 100 three-minute engaging training sessions which aim to help your team learn new skills such as cyber security best practices among other topics.

Cloud Services

01

What is cloud backup?

Cloud backup is a cost-effective security solution where data is transferred to the cloud and stored there as a reliable and immutable backup repository. By sending backups to a secure cloud repository, this eliminates the need to invest in and maintain off-site storage infrastructure. Our cloud solutions, powered by Veeam, offer built-in security features such as data encryption and secure transfer protocols to ensure that backups are protected while in transit and at rest. Being able to restore backups directly from the cloud repositoryData can be recovered quickly in case of a disaster as you are able to restore backups directly from the cloud repository.

02

Do you offer education-sector pricing for cloud backup?

As education backup specialists, we offer discounted Veeam Cloud backup to schools and colleges throughout the UK. You can get up to 15% off your storage and licensing costs with CT Secure Cloud Backup when using our exclusive online pricing tool for schools. And by choosing our CT Secure Cloud Backup for Microsoft 365 service, you can get up to 75% off your per user costs.

Cyber Security

01

Is information accessed in the cyber security review protected under NDA?

In accordance with our security protocols and ISO standards, we ensure that a mutual Non- Disclosure Agreement (NDA) is signed before commencing any work. This NDA guarantees the confidentiality of any accessed or presented information under an official, legally binding document. CT will provide a copy of the NDA prior to starting the service.

02

Do you require admin access for the review?

We would require ‘Temporary Admin Access’ to servers, hypervisors, routers and wireless to check existing configuration and global admin to Microsoft Office 365.

03

What tools are required to conduct a Cyber Security Review?

As part of the review process, we would expect to run 3 security tools: Network Detective Pro, internal/external vulnerability scanner and penetration test tool. All of our tools are none destructive to existing systems.

04

What are the objectives of a Cyber Security Review?

The key objectives of the security review is to look at the existing security, its effectiveness and any potential risks with the view of making enhancements and further protecting data and systems.

05

What systems are reviewed in the Cyber Security Review?

Our Cyber Security Review will assess and evaluate all servers, end-user devices, installed software, operating systems, network infrastructure, security measures and back-ups.

06

What is user-awareness training?

User-awareness training is a type of education provided to employees of a business to help mitigate cyber security risks. By providing an understanding of cyber security risks, employees can spot possible vulnerabilities and implement best practices to ensure a secure cyber business environment. We provide user-awareness training as part of our IT support service you’ll be able to access CT Knowledge, our online learning hub, which has over 100 three-minute engaging training sessions which aim to help your team learn new skills such as cyber security best practices among other topics.

07

What are best practices for email security?

Email security is vital for the cyber security of a business. Reading the contents of an email should be safe if you have the latest security patches, but email attachments can be harmful. Be sure to provide user-awareness training for all users in your business to ensure best practices are being followed. Some best practices for email security are: look out for potentially harmful file extensions, take note of anti-virus alerts, double-check the senders email address and most of all – stay aware!

08

Can I click on a link in an email?

Always be wary when clicking any links sent via email, user-awareness training is vital when it comes to the cyber security of your business.As part of our Email Security, we conduct real-time checks on email links before they land in your inbox. Safe sites are granted normal access, while suspicious ones are blocked, enhancing overall protection for users.

09

How do I recognise a phishing email?

Phishing emails have become one of the most common methods of cyber-attack. Scammers pose as a trustworthy business or service such as a bank in order to gain sensitive information from you. This is a human point of vulnerability, which is why it’s important for businesses to have regular training sessions for all staff. Email security is essential therefore if you do receive a suspicious email, don’t respond, and take immediate action. To prevent phishing, stay wary of unexpected emails, keep spam filters active, and review them regularly.

Communications

Accreditations that will enhance your business