
- Design, install, and maintain PC-based computer systems including desktops, laptops, and servers
- Design, install, and maintain secure Local Area Networks (LANs), Wide Area Networks (WANs), and Wireless Local Area Networks (WLANs)
- Design, install, monitor, and maintain Internet security systems
- Design, install, monitor, and maintain anti-virus/anti-spyware/anti-spam systems
- Design, install, monitor, and maintain backup systems and strategies
- Design and implement data retention strategies
- Design and implement business continuity plans
- Design and implement secure remote access strategies
- Design and implement data security and integrity strategies
- Install printers and implement printing strategies
- Monitor and install software and security patches
- Clean and repair problems caused by viruses, spyware, and other malware
- Design and implement regulatory compliance strategies
- Provide consultation in asset tracking and software licensing compliance
- Design and implement Internet presence strategies (websites, domain names, etc)
- Integrate Macintosh solutions with Microsoft Windows environments
- Act as liaison with other vendors for hardware and software purchasing, Internet services, copier services, etc.
- Emergency and after hours response
- Data recovery and restoration
- Data forensics and discovery
- Discounted rates negotiable for Non-Profit Businesses
- . . . and much, much more!