News & Vacancies

Welcome to the Microtechs information portal. Here you can see the latest news and read through our current vacancies.

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Login
    Login Login form
Recent blog posts

Posted by on in Latest Microtechs news posts

b2ap3_thumbnail_public-wifi.JPG

Public WiFi lets you work outside the office and provides a cheap alternative to mobile broadband. But it is vulnerable to hackers, so if you’re conducting business (or using it for sensitive personal communications) then you need to take precautions.

What exactly is the problem with public WiFi? Anyone connected to a WiFi network without a password can use a tool such as Wireshark to monitor traffic, allowing them to see any data sent “in the clear” (without encryption).

In the worst case, where a website is not using encrypted HTTPS, this could include passwords, credit card details and other sensitive information. There’s also the risk of connecting to a fake WiFi hotspot mimicking a real public WiFi network for the sole purpose of gathering data.

Many WiFi hotspots are also vulnerable to known exploits and could be remotely hacked over the internet.

How to stay safe on public WiFi

Although there are risks with using public WiFi you don’t need to avoid it completely. There are simple steps anyone can take to improve security when connecting to unknown networks.

Check the WiFi network name

This is really simple: check that the WiFi network SSID (Service Set Identifier – the network name) and password matches the details provided by the operator of the network exactly. If not it may be a honeypot and should be avoided.

Beware of devices auto-connecting to known networks

By default our computers and smartphones will automatically connect to previously used networks. But hackers have been known to create WiFi hotspots with very common names to capture large numbers of victims, many of whom may not notice they’re even connected to WiFi. If you want to allow automatic reconnections for convenience keep WiFi switched off until you need it, and always double check the details of a network when it’s activated.

Keep software and hardware up to date

It’s generally good practice to ensure all software and hardware is running with the latest updates to block known exploits.

Always use HTTPS for sensitive communications

If a web site is not secured with HTTPS your traffic is at risk of interception. If you’re logging in to a service, making a purchase or doing anything else which involves transmitting sensitive information you should always check that the site is protected by HTTPS – look for the green padlock next to the web site address.

Use a VPN (that you trust)

This is optional but highly recommended. A Virtual Private Network is a service which encrypts all internet traffic. This will completely block interception of data on the Wi-Fi network – all anyone will be able to see is a stream of scrambled data going to the VPN server.

But because you’re sending everything to the VPN you need to trust the operator of that service. Often a business will provide VPN access to employees, but if you’re handling this yourself it’s worth taking the time to research the options. There are free services, but these are generally not to be trusted. A paid subscription to a reputable provider such as Private Internet Access, AirVPN or NordVPN is worth the small asking price.

Matt Powell is editor at Broadband Genie

Original article: https://realbusiness.co.uk/real-business-broadband/2018/02/06/tips-for-using-public-wifi-safety/

Microtechs Specialist White label Wi-Fi Support

Supporting some of the largest Wi-Fi providers in the UK, Microtechs prides itself with the ability to adapt between end user and staff support. Constantly monitoring staffing levels, to ensure seasonal fluctuations do not affect our service levels. Available 24/7/365.

Some of our clients include major UK airports, hotel chains, holiday parks and shopping centres.

Manufacturers and distributors of Wi-Fi and other cloud based products, also use our helpdesk to provide support to a wide range of resellers.

Feel free to call our friendly solutions team, who will be happy to discuss further and help tailor a solution to you.

 

Call us now on 01483 407417

b2ap3_thumbnail_budget-2018.jpg

The 2018 ComputerWeekly/TechTarget IT Priorities survey found that for IT decision-makers, 2018 is the cusp of the big move to the cloud. Systems management tools are where many expect to be spending this year. System monitoring saw a 20%-plus jump from 2017 to 2018 in terms of priority.

The survey reported that enterprises across Europe are committed to upgrading and consolidating their datacentres for a mix of efficiency, performance and cloud-readiness improvements.

Of the 1,875 IT decision-makers from across Europe, the Middle East and Africa (Emea) who took part in the 2018 survey, about one-third (29%) said upgrading their datacentre infrastructure – including cooling systems, power supply and servers – is their top priority. This equates to a year-on-year rise of 44%.

Among the 243 IT professionals surveyed in the UK, the proportion that plan to deploy hyper-converged infrastructure (HCI) nearly trebled year on year from 9% to 22%.

Other areas that saw growth in the number of planned deployments in 2018 include flash arrays, with 9% planning to roll them out this year compared with 6% last year; and storage for virtual environments, which saw an increase in planned deployments from 11% in 2017 to 18% this year.

In terms of datacentre projects, the migration to Windows Server 2016 seems to be the biggest priority for IT managers, with more than 30% saying they would migrate in 2018.

Meanwhile, enterprise resource planning (ERP) and customer relationship management (CRM) remain the strongest categories for packaged business applications, with 53% of respondents naming these as priority areas for investment. But this figure represents a modest 3% growth for ERP and 2% for CRM, across Emea.

IT decision-makers are also starting to make strategic buying decisions around artificial intelligence and blockchain. AI leapt from 8% to 18% as a priority area in the UK, and from 8% to 16% in Emea. Blockchain went from 3% to 6% as an investment priority area in the UK, and from 5% to 10% in the Emea region.

Looking at IT security spending, data loss prevention (DLP) is the top security initiative across Europe, with 55% of organisations planning to implement it in 2018, more than double the previous year, according to the TechTarget IT Priorities survey.

DLP dropped from top spot in 2016 in the UK to 8th position in 2017. This is closely followed by email security, encryption and endpoint security, all of which are to be implemented by 52% of European organisations polled and are aimed at improved data protection.

Significantly, planned adoption of encryption – which is widely considered as essential to data protection at rest, in transit and in the cloud – is up 94% compared with 2017. Planned investment in endpoint security is up 68% compared with 2017, which is relatively high considering it was the top priority for most European firms in the past year.

Interestingly, security is one of the big drivers for businesses to upgrade from Windows 7 to Windows 10. With less than two years to go before Windows 7 support officially stops, 44% of businesses surveyed said they would migrate to Windows 10 this year.

Migration is one of the big projects for 2018, but beyond making sure applications run, experts advise IT departments to start using Windows 10 to change the way desktop IT operates. Windows 10 represents more than just another Windows upgrade. The operating system itself will remain up to date through Windows updates, which should mean there will no longer be a need for “big bang migrations” of Windows desktops. Some industry experts believe there is an opportunity for IT to relinquish overall responsibility for desktop systems.

This may help IT to deliver on some of the areas regarded by industry experts as hot technologies, but which have seen little uptake. For instance, the IT Priorities survey found that only 14% of respondents said they would deploy cloud-based office productivity suites such as Office 365 or Google G Suite in 2018. And only 10% said they would deploy enterprise file synchronisation and sharing services.

Looking at software development, while most initiatives are down year on year, microservices have grown by 140% to appear in the top five for the first time. More than a quarter of UK IT decision-makers said they would be conducting API-based projects in 2018, which suggests organisations are beginning to see the opportunities of developing software around composable architectures that publish external APIs and make use of internal and external microservices.

Overall, the survey found IT budgets are increasing in 2018, with new spending going on cloud initiatives at the expense of on-premise IT. Those across Emea who said their budgets were decreasing expect to spend less on staff and consulting services.

By Cliff Saran

http://www.computerweekly.com/news/252434184/IT-Priorities-2018-Where-senior-IT-managers-plan-to-spend-their-budget

Picture credit: newsfirst.lk

Microtechs 24/7/365 White label Technical Helpdesk

In today's world, a rock-solid IT infrastructure is key to every successful business. At Microtechs we have the experience and resource to ensure your company has the support it needs 24 hours a day, 7 days a week, 365 days a year. We can provide an immediate response from our state of the art Technical Operations Centre which is based in the heart of Surrey.

With our rapidly expanding team, all specifically trained, working 24/7/365, we can provide excellent customer service and technical support. All our services are available completely white labelled, ensuring a seamless extension to your company.

Through our services you can extend your hours to 24/7 or simply use us as an over flow assistant during office hours. This is all tailored to your business needs.  

How does Outsourcing your help desk benefit your business?

1.       It reduces your staffing costs. Why hire another member of staff, if you can outsource all of your calls for less? We are normally between 25-50% cheaper than an in-house option.

2.       It expands your opening hours. We have a technical operations centre which is open 24/7/365.

3.       It will improve your customer experience. Are you taking multiple calls from clients, but can’t get back to them as quick as you would like? Well now you have a team of 30 staff taking your support calls for you. Have an important meeting? No problem, your help desk has your back.

We work with over 85 IT & Telecoms Businesses who trust us to deal day to day with their clients.

Feel free to call our friendly solutions team, who will be happy to discuss further and help tailor a solution to you.

 

Call us now on 01483 407417

b2ap3_thumbnail_full-office-blur-sepia.jpg

A help desk provides support for either employees or clients, or both. The help desks takes inbound phone calls and emails, addresses the person's concerns and tries to fix the problem. Help desks focus primarily on technical issues, such as problems with an employee's computer, or with an online ordering system. Some companies choose to outsource their help desk. Outsourcing has several advantages.

Flexible Hours

If your business runs on a traditional 9-to-5 schedule, you may not have employees to work the help desk during nonpeak times. Clients or other employees who call in for assistance after hours will go to a voice mail, which can lead to frustration and complaints. By outsourcing workers from different time zones, you can provide 24-hour support from a live representative.

Reduced Cost

Many companies that provide outsourcing teams offer these services at a reduced rate. Hiring a full staff from these companies may cost less than hiring an in-house staff. If you outsource you help desk on a contract basis, you will not have to provide the benefit packages or other perks in-house staff receives, further reducing costs.

Easier Management

If you outsource the help desk through a contracting company, it will do most of the work for you. The third-party company recruits and hires employees, reducing the stress on your in-house human resources department. When an employee leaves, the company will find a replacement, saving you in recruiting costs. The company will also manage the employees including tracking time worked, missed days or performance issues.

Higher Profits

When a company has an inadequate help desk, it creates customer dissatisfaction. A customer wants to be able to call in at any hour, speak to someone directly and resolve the problem quickly. By having a 24-hour fully trained help desk, you meet the client's needs. A happy client will stay with your company longer and may do more business with you, which will increase your profits.

by Amelia Jenkins

Original article: http://smallbusiness.chron.com/advantages-outsourcing-desk-15977.html

Microtechs 24/7/365 White label Technical Helpdesk

In today's world, a rock-solid IT infrastructure is key to every successful business. At Microtechs we have the experience and resource to ensure your company has the support it needs 24 hours a day, 7 days a week, 365 days a year. We can provide an immediate response from our state of the art Technical Operations Centre which is based in the heart of Surrey.

With our rapidly expanding team, all specifically trained, working 24/7/365, we can provide excellent customer service and technical support. All our services are available completely white labelled, ensuring a seamless extension to your company.

Through our services you can extend your hours to 24/7 or simply use us as an over flow assistant during office hours. This is all tailored to your business needs.  

How does Outsourcing your helpdesk benefit your business?

1.       It reduces your staffing costs. Why hire another member of staff, if you can outsource all of your calls for less? We are normally between 25-50% cheaper than an in-house option.

2.       It expands your opening hours. We have a technical operations centre which is open 24/7/365.

3.       It will improve your customer experience. Are you taking multiple calls from clients, but can’t get back to them as quick as you would like? Well now you have a team of 30 staff taking your support calls for you. Have an important meeting? No problem, your helpdesk has your back.

We work with over 85 IT & Telecoms Businesses who trust us to deal day to day with their clients.

Feel free to call our friendly solutions team, who will be happy to discuss further and help tailor a solution to you.

 

Call us now on 01483 407417

b2ap3_thumbnail_space-drone.JPG

Two UK-built spacecraft designed to latch on to ageing communication satellites and keep them in their assigned orbit, thereby extending their life, will be launched in 2020.

The announcement follows the signing of a $100m contract between UK-based Effective Space, which is developing the Space Drone spacecraft, and a major satellite operator.

Once launched, the spacecraft will be used to control the position and orientation of two communication satellites in Geosynchronous Earth Orbit, potentially extending their life by several years, according to Shahida Barick, head of satellite operations at Effective Space.

Most satellites are designed for 15 years’ service, at the end of which their hardware systems typically still work perfectly but their propulsion system can no longer control their position, said Barick.

“These multi-million pound satellites are decommissioned essentially because they run out of fuel,” she said. “It doesn’t make sense to decommission satellites that are otherwise healthy and providing services that are generating millions of pounds in revenue.”

The Space Drone spacecraft, which are capable of carrying out multiple missions within their 15-year lifespan, weigh less than 400kg. They are equipped with electric thrusters and a universal docking system that allows them to dock with almost all of the approximately 400 communications satellites in orbit.

“As [Space Drone] approaches the communications satellite it will deploy a set of four identical docking arms, which will latch onto the satellite’s launch interface ring,” she said.

This is an extremely tough part of the satellite, used to attach the spacecraft to their launch rocket.

“Once we are latched onto the ring, we essentially become part of that satellite, and act as an external jet pack,” said Barick.

After docking with a satellite, the drones will use their electric thrusters, which are attached to another set of protruding arms, to keep the combined spacecraft in the correct position and orientation.

When the satellites are ready for decommissioning, the drones can simply use their thrusters to move them into a safe “graveyard orbit”.

The agreement is one of the first commercial contracts for in-orbit satellite servicing.

The Space Drone spacecraft could also be used for removing space debris, to support low-earth orbit or medium-earth-orbit constellations, and for in-space exploration, mining and manufacturing logistics.

By Helen Knight

Original article: https://www.theengineer.co.uk/spacecraft-satellites/

Microtechs 24/7/365 White label Technical Helpdesk

In today's world, a rock solid IT infrastructure is key to every successful business. At Microtechs we have the experience and resource to ensure your company has the support it needs 24 hours a day, 7 days a week, 365 days a year. We are able to provide an immediate response from our state of the art Technical Operations Centre which is based in the heart of Surrey.

With our rapidly expanding team, all specifically trained, working 24/7/365, we are able to provide excellent customer service and technical support. All of our services are available completely white labelled, ensuring a seamless extension to your company.

Through our services you are able to extend your hours to 24/7 or simply use us as an over flow assistant during office hours. This is all tailored to your business needs.  

How does Outsourcing your helpdesk benefit your business?

1.       It reduces your staffing costs. Why hire another member of staff, if you can outsource all of your calls for less? We are normally between 25-50% cheaper than an in-house option.

2.       It expands your opening hours. We have a technical operations centre which is open 24/7/365.

3.       It will improve your customer experience. Are you taking multiple calls from clients, but can’t get back to them as quick as you would like? Well now you have a team of 30 staff taking your support calls for you. Have an important meetings? No problem, your helpdesk has your back.

We work with over 60 IT & Telecoms Businesses who trust us to deal day to day with their clients.

Feel free to call our friendly solutions team, who will be happy to discuss further and help tailor a solution to you.

 

Call us now on 01483 407417

b2ap3_thumbnail_5G-blog.JPG

The Isle of Wight Council has applied for a government grant to install a 5G testbed on the island and become one of a handful of testbed locations across the UK.

New council papers on growth and regeneration note that: “An island bid to become a testbed for 5G mobile communications has been submitted in December 2017 and a bid for the UK government Local Full Fibre programme is being prepared for the end of January 2018 deadline.”

The bid follows recommendations from the island’s Infrastructure Task Force to improve infrastructure, public transport and mainland connectivity.

The Council held a conference in November, which saw more than 200 delegates providing input to shape the future digital strategy of the Isle of Wight and the wider Solent region, including the 5G bid.

5G for health and social care

An Isle of Wight Council spokesperson told 5G.co.uk: “Following the successful digital conference held in November 2017, the council has been supporting a consortium of organisations on the Isle of Wight to bid for funding from the government’s 5G testbed programme.”

They added: “If selected, the trials can support testing of a wide range of industry applications but will initially focus on how 5G services can enable better health and social care in a population of higher than average age. These services could include high quality, yet cost-saving services like video consultancy in remote locations and contribute to telehealth initiatives, where people can be treated in their own homes.”

An Isle of Wight digital preparedness roadmap and strategy is also scheduled to be commissioned in January 2018, for completion and launch in April 2018.

Government funding

In October, the UK government launched the “5G Testbeds and Trials” competition, offering grants of up to £5 million to new 5G test locations across the UK. The initiative is part of the government’s £740 million National Productivity Investment Fund (NPIF) which aims to support the next generation of digital infrastructure, including 5G and full fibre broadband.

In November it also launched a £190 million Local Full Fibre Network (LFFN) Challenge Fund to demonstrate approaches that attract and support private investment and make sustainable commercial deployments viable.

Other testbeds

While the Isle of Wight may end up having one of the UK’s first 5G testbeds, there are a few other locations that have already been approved for one and they all have their own areas of focus. These include Tyne and Wear, which will use the testbed to focus on energy, transport and healthcare.

Brighton meanwhile will use a testbed to help small businesses develop products and services that could benefit from 5G, the Midlands will look into commercial applications around cyber security, and Basingstoke will focus on a 5G step-out facility for start-ups to test apps.

By Sarah Wray

Image credit : Shutterstock

Original article:  https://5g.co.uk/news/isle-of-wight-5g-testbed/4258/

Microtechs 24/7/365 White label Technical Helpdesk

In today's world, a rock solid IT infrastructure is key to every successful business. At Microtechs we have the experience and resource to ensure your company has the support it needs 24 hours a day, 7 days a week, 365 days a year. We are able to provide an immediate response from our state of the art Technical Operations Centre which is based in the heart of Surrey.

With our rapidly expanding team, all specifically trained, working 24/7/365, we are able to provide excellent customer service and technical support. All of our services are available completely white labelled, ensuring a seamless extension to your company.

Through our services you are able to extend your hours to 24/7 or simply use us as an over flow assistant during office hours. This is all tailored to your business needs.  

How does Outsourcing your helpdesk benefit your business?

1.       It reduces your staffing costs. Why hire another member of staff, if you can outsource all of your calls for less? We are normally between 25-50% cheaper than an in-house option.

2.       It expands your opening hours. We have a technical operations centre which is open 24/7/365.

3.       It will improve your customer experience. Are you taking multiple calls from clients, but can’t get back to them as quick as you would like? Well now you have a team of 30 staff taking your support calls for you. Have an important meetings? No problem, your helpdesk has your back.

We work with over 60 IT & Telecoms Businesses who trust us to deal day to day with their clients.

Feel free to call our friendly solutions team, who will be happy to discuss further and help tailor a solution to you.

Call us now on 01483 407417

 

 

Posted by on in Latest Microtechs news posts

b2ap3_thumbnail_5G-image.JPG

Describing the 5G vision to be more prolific than initially realised, Lindsay Notwell, VP 5G Strategy at Cradlepoint, clarifies why both network and technology companies are excited to get a slice of the 5G pie.

Article and image via http://networkcommunicationsnews.co.uk/2017/12/5g-sparks-new-possibilities/

BY JESSICA FOREMAN

There is certainly huge hype around 5G. Billed by Qualcomm as a next generation network with the potential to be as transformative as electricity itself, both network operators and technology companies are excited to get a slice of the 5G pie.

It is the vision for this new 5G world – a combination of various technologies that will create the next generation wide area network (WAN) needed to support the world’s growing connectivity needs. The GSMA, which tracks the number of mobile devices worldwide, estimates that there are more than 5 billion mobile devices being used by people around the world. This represents 93% compound annual growth rate (CAGR) since mobile phones were introduced in the early 1980s.  By the end of 2017, Gartner predicts the number of connected ‘things’ globally will reach 8.4 billion, projecting 21 billion by the year 2020.

The next generation WAN will have all the features of 4G, plus capacity for massive mobile data. It will offer the voice, video and mobile data features of 3G. It will include Wi-Fi spectrum, and offer 2G-like for Internet of Things (IoT) connectivity and long battery life. With virtually zero latency and gigabit throughput, these features will together form the next generation 5G WAN.

Work in progress

As this vision becomes clearer, so does the realisation that it will be some time before this technology becomes a full reality.  We are still in a pre-standards phase for 5G.  But whilst an agreed specification is not expected until 2019, network operators are already conducting 5G trials today using pre-standard architecture – in the hopes of driving the full standard, and being first to market.

One new technology being used is ‘millimetre wave’ spectrum, a very high frequency spectrum ranging from 6 to 100GHz – which is most effective for point-to-point wireless communication. The spectrum effectively carries data, but is inadequate in its quest to penetrate solid objects. Once specification is set, operators are being able to combine millimetre wave spectrum with sub-6GHz spectrum, which is what all Long-Term Evolution (4G LTE) and Wi-Fi are deployed in today.  Whilst this carries less data, it is much better for penetrating buildings and provides standards for cell-site handoff.

Operators now test pre- specification; however, this is only a temporary solution with a few restrictions. The current 5G trials include no interoperability between carriers and no mobility – so it’s good for Fixed Wireless Access, but widespread 5G device adoption is still a long way off.  The potential benefits of 5G technology, nevertheless, are huge: less latency with more throughput, connection density, spectrum efficiency, traffic capacity, and network efficiency — all of which is achievable within the next couple of years.

Bigger, better, faster

The ultra-low latency requirements of 5G will cause operators to re-architect current networks, distributing their centralised routing engines to the network edge.  In addition, the IoT industry, which primarily occupies the low bitrate range, is expecting new standards such as NB-IoT, CAT-M1 and CAT1, enabling lower cost devices with longer battery life and further reach.

To manage the next generation network, companies will need to consider the value of hardware combined with software-defined networking (SDN) technology. Enabling this on the next generation 5G WAN will be a fundamental framework that securely connects all of the people and IoT devices around the world, while providing the capacity to process the huge volumes of data being generated.

Many organisations are already deploying SDN to increase bandwidth and lower costs in their corporate networks. This fundamentally changes not just how networks are built and managed, but how they evolve. It makes networks more agile and efficient, enabling new functionality to be deployed on a much more agile basis, rather than on a hardware-constrained timeline.

This will be crucial in delivering the vision of 5G, which has the potential to make a real impact in life-saving areas and applications. The reduced latency will transform areas such as remote surgery, where remote controlled robotics can be controlled wirelessly in real-time. These applications are currently limited to a wired environment; 5G will extend high-performance connectivity to a wide array of devices. 5G will be more than just higher speeds and lower latency; it will offer the higher connection density central to IoT maturity.

For IoT to reach its fullest potential, intelligence, processing power and communication capabilities need to travel quickly and effortless across networks, mobile devices and connected sensors. But new, software-based networks will be needed to handle 5G’s throughput capabilities and massive scalability.

The information superhighway

The amount of data being generated by IoT devices is already growing significantly faster than the ability of the network to process it.  5G will only make this problem exponentially worse.

The cloud is a vital part of the IoT ecosystem for its ability to store, process and analyse data at a massive scale, but the substantial increase in data generation from IoT poses both infrastructure and economic problems. Rather than trying to move all this data to the cloud, we need to find ways of moving data processing intelligence to the source of the data – before it hits the cloud. Edge Computing – otherwise known as Fog Computing – will pay a key role here.  This brings some of the processing to where the data is generated, rather than moving all of the data to the cloud to be processed.

Bringing computing power to the Edge of the network helps address the challenge of data build-up, mostly in closed IoT systems. The ultimate goal is to minimise cost and latency, and to control network bandwidth. A major benefit is the reduction of data needing to be stored in the cloud. It costs around £3,000 per petabyte for long-term cloud storage and around 10 times that for real-time access storage. Being able to use a technology to reduce these costs is a real benefit for businesses.

This also reduces the lag that can occur between data transmission, processing, and the action required at the end. For example, since cloud data centres can be hundreds – if not thousands – of miles away from a connected device, this round-trip latency can be tens to hundreds of milliseconds. For IoT use cases like robotic control, autonomous vehicles and precision manufacturing, increased latency at these levels can be a relative lifetime. Bringing computing power to the Edge of the network can reduce the cycle to just a few milliseconds.

A wide reach

For IoT to reach its full potential, intelligence, processing power and communication capabilities need to travel quickly and effortless across networks, mobile devices and connected sensors.

 

While there are many components, 5G will be a central part of this solution. It could be the light at the end of the tunnel for unlimited wireless network bandwidth and performance. While the specification is yet to come, the vision for 5G is set, and it will likely be more prolific than anything we’ve seen before.

Microtechs 24/7/365 White label Technical Helpdesk

In today's world, a rock solid IT infrastructure is key to every successful business. At Microtechs we have the experience and resource to ensure your company has the support it needs 24 hours a day, 7 days a week, 365 days a year. We are able to provide an immediate response from our state of the art Technical Operations Centre which is based in the heart of Surrey.

With our rapidly expanding team, all specifically trained, working 24/7/365, we are able to provide excellent customer service and technical support. All of our services are available completely white labelled, ensuring a seamless extension to your company.

Through our services you are able to extend your hours to 24/7 or simply use us as an over flow assistant during office hours. This is all tailored to your business needs.   

How does Outsourcing your helpdesk benefit your business?

1.       It reduces your staffing costs. Why hire another member of staff, if you can outsource all of your calls for less? We are normally between 25-50% cheaper than an in-house option.

2.       It expands your opening hours. We have a technical operations centre which is open 24/7/365.

3.       It will improve your customer experience. Are you taking multiple calls from clients, but can’t get back to them as quick as you would like? Well now you have a team of 30 staff taking your support calls for you. Have an important meetings? No problem, your helpdesk has your back.

We work with over 60 IT & Telecoms Businesses who trust us to deal day to day with their clients. 

Feel free to call our friendly solutions team, who will be happy to discuss further and help tailor a solution to you.

Call us now on 01483 407417

b2ap3_thumbnail_new-job.jpg

One third (32%) of IT professionals in a new survey plan to find a new employer in 2018.

According to Spiceworks’ 2018 IT Career Outlook, 75% of those planning to switch jobs are seeking a better salary, 70% are looking to advance their skills and 39% want to work for a company that makes IT more of a priority.

In terms of the tech skills necessary to be successful next year, 81% of respondents said it’s critical to have cybersecurity expertise. At least 75% of IT professionals also said it’s critical to have expertise in networking, infrastructure hardware, end-user devices, and storage and backup.

However, when asked to rate their expertise in each area, only 19% of IT pros reported having advanced cybersecurity knowledge. When comparing generations, the results show 15% of millennials reported having advanced cybersecurity skills compared to 22% of Gen X and 26% of baby boomers.

The results also show that 7% of IT professionals plan to start working as a consultant, 5% plan to leave the IT industry altogether and 2% plan to retire in 2018. Additionally, 51% of respondents expect a raise from their current employer next year, while one-fifth (21%) also expect a promotion.

About a quarter (24%) of IT professionals aren’t expecting any career changes or a raise next year.

When examining the data by generation, the results show 36% of millennial IT professionals plan to search for or take a new job next year, compared to 32% of Gen X and 23% of baby boomers. In comparison to older generations, the survey shows that millennial IT professionals are more likely to leave their current employer to find a better salary, advance their skills, work for a more talented team and receive better employee perks. Conversely, Gen X IT professionals are more likely to seek a better work-life balance, while baby boomers are more likely to leave their employer due to burnout.

Interestingly, the survey shows 70% of IT professionals are satisfied with their current jobs, but 63% believe they’re underpaid. This rate is even higher among millennials. About 68% of millennial IT professionals feel underpaid, compared to 60% of Gen X and 61% of baby boomers.

Despite feeling underpaid, IT professionals have a positive outlook on the job market next year, leading many to search for new opportunities. In fact, 36% of IT professionals believe the IT job market will improve in 2018, while 51% believe it will stay the same and only 13% believe it will get worse.

In terms of how much IT professionals are paid, the results show millennials are paid a median income of $50,000 per year, while Gen X IT professionals are paid $65,000 and baby boomers are paid $70,000. However, millennial IT professionals have an average of seven years of experience compared to 17 years among Gen X and 25 years among baby boomers.

“Although the majority of IT professionals are satisfied with their jobs, many also believe they should be making more money, and will take the initiative to find an employer who is willing to pay them what they’re worth in 2018,” said Peter Tsai, senior technology analyst at Spiceworks. “Many IT professionals are also motivated to change jobs to advance their skills, particularly in cybersecurity. As data breaches and ransomware outbreaks continue to haunt businesses, IT professionals recognize there is high demand for skilled security professionals now, and in the years to come.”

By Tara Seals US/North America News Reporter, Infosecurity Magazine

https://www.infosecurity-magazine.com/news/onethird-of-it-pros-plan-to-switch/

Picture credit – Getty Images

Microtechs 24/7 helpdesk services

The festive season is fast approaching and this means two things!

1. Trying to cover your Helpdesk to provide support for your clients when you or others in your team need to take time off with the family!
2. Statistically the end of the year is when the most people hand in their notice to move onto pastures new.

Microtechs is here to help, we can:

1. Provide an overflow support to work in conduction with your current team.
2. Extend your opening hours to full 24/7 support
3. Take on the first and second line tasks to allow your team to focus on projects which bring in extra revenue.

We are trusted by more than 100 different technology companies, big to small, to support their clients from our 24/7/365 Helpdesk based in Guildford, Surrey and prices start from £500 per month.

  • *      24/7 or office hours available – packages available from £500 per month
  • *      A great value alternative to recruiting or expanding internally
  • *      NOC facilities and proactive monitoring available 15 minute SLA
  • *      Fully white labelled to your business name
  • *      Various models to meet all business needs

If you would like to find out more, please contact us on 01483 407417.

 

 

b2ap3_thumbnail_hotel-wifi.jpg

With increasing UK cities providing free gigabit Wi-Fi, can hotels still justify charging guests for substandard Wi-Fi Services?

Research has found that many UK hotels are buckling under the pressure to cope with the number of devices connecting to a singular network. Produced by Zyxel, wireless communication experts, research found 9 out of 10 UK hotels believe that delivering Wi-Fi services to guests should still be chargeable, regardless of how fast the service.

With the inherent demand for instant connection and constant accessibility being an ever-prevalent attitude amongst society, it may come as a surprise that 18% of UK hotels (the highest figure in Europe) are still limiting and or charging for Wi-Fi access. On that statistic alone a question of whether European guests (particularly those that travel for business) are at risk of being disappointed by the UK hotel industry.

The study consisted of 405 hoteliers in 10 European markets, showing that a quarter of UK hotels installed Wi-Fi to make themselves more attractive to international guests, more than any other region surveyed. In spite of this, 41% of UK hotels admit they still struggle to cope with the number of connected devices, second only to Italy at 65%.

These figures come from Zyxel’s Connected Hospitality Report: Europe, which investigates how the hospitality sector in Western Europe is using Wi-Fi to support guests’ increasingly connected lifestyles.

UK hotels in particular had a high proportion of hotel guests staying over for business purposes, with 75% of hotels saying this group made up at least half of their customer base. Notably, business customers often need Wi-Fi for critical use cases and extended periods, meaning poor connections or usage caps are bound to cause frustration.

Jannik Hargaard, president of Europe at Zyxel, comments, “In a world where hotel bookings are directly related to scores on TripAdvisor, small frustrations can have a significant impact on revenue over time. Almost all guests now expect free Wi-Fi for everything from uploading holiday snaps to sending emails, making these services essential. In an attempt to squeeze out extra revenue through charging for connectivity, hotels could be shooting themselves in the foot as competitors provide a better service.”

Of all the regions surveyed, the UK has the highest proportion of hoteliers that are using Wi-Fi as an additional revenue source, or considering to do so at 38% – well above the European average of 23%. The UK also has the highest rate of hotels looking to provide free Wi-Fi in the future (27%), a personalised mobile app (20%), or an upgrade to their website (36%).

Jannik continues, “When looking to monetise Wi-Fi networks, it’s important that hotels think about the bigger picture before charging for usage. Free Wi-Fi allows hotels to communicate deals with their guests, opens up the market to business customers and allows up-selling of media services and travel packages. Importantly, providing personalised services and a great experience drives guest loyalty.”

The underlying reasons for many Wi-Fi issues are made apparent by the fact almost half (49%) of the hoteliers questioned either did not have, or did not know if they had, a site survey prior to installation. Figures also highlighted that 15%of installations were completed by the hotel manager or another member of staff, rather than an IT professional.

“Every hotel is different and each presents particular challenges to the deployment of an effective Wi-Fi network, “says Jannik. “Common problems include distance from access points, the thickness of walls and so on. Hoteliers are clearly not installing Wi-Fi that fits the needs of their building environment, or their guests, which is why they’re struggling with demand.”

BY JESSICA FOREMAN

http://networkcommunicationsnews.co.uk/2017/11/struggling-substandard-wi-fi-services/

picture credit: thebudgettraveller.org

Microtechs Specialist White label Wi-Fi Support

Supporting some of the largest Wi-Fi providers in the UK, Microtechs prides itself with the ability to adapt between end user and staff support. Constantly monitoring staffing levels, to ensure seasonal fluctuations do not affect our service levels.

Some of our clients include major UK airports, hotel chains, holiday parks and shopping centres.

Manufacturers and distributors of Wi-Fi and other cloud based products, also use our helpdesk to provide support to a wide range of resellers.

Feel free to call our friendly solutions team, who will be happy to discuss further and help tailor a solution to you.

 

Call us now on 01483 407417

b2ap3_thumbnail_vpn_20171128-090247_1.jpg

Fully remove a VPN and clean up afterwards on your Windows PC

Most VPN providers make big claims about their ‘no logging’ policy, and how they don't maintain the slightest trace of anything you do online.

What these companies don't always explain is that VPNs (including free VPNs) can keep detailed logs on your PC, often including account details, session connect and disconnect times, and the names of any servers you've accessed.

Often there's no automated way to remove this information. Even uninstalling the VPN will usually leave at least some traces behind, and there are plenty more clues to your activities in Windows' various network histories. Most could remain on your system for years.

Whether this is any kind of privacy risk depends on your situation. If others have access to your PC, or maybe you're running a VPN on a work computer, maybe; if it's your own system, probably not.

Whatever your circumstances, it's interesting to see what a PC might hold regarding your VPN history. Deleting ancient network remnants brings benefits of its own, too, freeing up resources, simplifying your network settings and maybe reducing the chance of problems occurring with other networking software.

Bear in mind that there are risks involved with this kind of low-level clean-up. Accidentally deleting something important could cripple your PC. Be very careful, and don't wipe anything unless your system is fully backed up, and you've got the tools and experience to recover the computer if anything goes wrong.

So, let’s look in detail at how to go about uninstalling your VPN software and subsequently cleaning up after that process. Note that you don’t have to follow all these steps, at least beyond the first and primary uninstallation process. You can be as thorough – or not – as you like.

And if you’re not confident with some of the more involved elements – like editing the Registry – then it’s probably best to skip these steps. Furthermore, some of the latter steps will only really apply to those who are extremely privacy-conscious, as you’ll see when you read through.

Uninstall VPN clients

The first step in removing a VPN is to clear away its client.

Start by finding where the program files are stored on your hard drive. Open a client window, press Ctrl+Shift+Esc to launch Task Manager, right-click the app name and select Open File Location. Make a note of the folder name – you'll need it later.

Close the client completely (don't just minimize it), then try to uninstall it from the regular Control Panel applet (Control Panel > Programs and Features > Uninstall a Program).

The installed programs list might also include a TAP driver (a virtual network adapter) for your VPN provider. If the list is sorted alphabetically, scroll to the T's and look for items beginning 'TAP-' (our test system included TAP-NordVPN and TAP-ProtonVPN). Remove these by right-clicking and selecting Uninstall.

If you don't find anything, search your system for the VPN name and look for an Uninstall shortcut.

Once you've run the regular uninstaller and removed any associated TAP files, reboot your PC to make sure Windows is able to delete locked program files.

Remove local logs

Uninstalling a VPN won't necessarily remove all of its files. There are often plenty of leftovers, ranging from stray DLLs to detailed logs of all your recent VPN connections.

Open the client folder you noted in the previous step, if it still exists, and search your system for folders with similar names. Investigate these to see what's left, and whether the folders can safely be deleted.

You could also manually browse for files in the most likely locations: \Program Files, \Program Files (x86), \ProgramData, \Users\<username>\AppData\Local, \Users\<username>\AppData\Roaming.

If you don't see the ProgramData or AppData folders, launch Control Panel, go to File Explorer Options and make sure 'Show hidden files, folders and drives' is selected.

Depending on your setup, you might have a separate installation of OpenVPN, the open source client used by many pieces of VPN software to manage their connections.  Look for a \Users\[Username]\OpenVPN\Log folder and delete any log files you don't need. Which can be all of them, if you like – the files are just for troubleshooting, and it's safe to remove them.

Registry references

Windows VPN clients often store at least some of their settings in the Windows Registry. At least some of these may survive the uninstaller, and they can sometimes give away details of your account or connection history.

Another quick warning here: always be very careful when editing the Registry.

To begin, launch REGEDIT and browse to HKEY_LOCAL_MACHINE\SOFTWARE and HKEY_CURRENT_USER\SOFTWARE. Scroll through each set of keys, looking for anything relating to VPNs that you have uninstalled.

Typically you won't find very much. Our test system had leftover keys relating to ExpressVPN, IPVanish, IVPN, ProtonVPN, SecureVPN and VyprVPN (Golden Frog), but these were all either empty or contained nothing of interest.

Others may be more significant. NordVPN had some IP addresses, Windscribe left all our settings and the last external IP address, and FrootVPN and Anonine left data including our usernames and encrypted password.

Whatever you find, if you're sure it's no longer necessary then you can remove it by right-clicking the key in the left-hand pane and selecting Delete. As we already mentioned, when editing the Registry, be cautious – accidentally deleting the wrong item could cause all kinds of problems.

Network adapters

Windows VPN clients work by setting up virtual network adapters for your other applications to use. These are often left behind when you uninstall a VPN, unfortunately, cluttering your network settings and occasionally conflicting with other software.

Launch Device Manager (press Win+R, type devmgmt.msc and press Enter) and click the arrow to the left of 'Network adapters' to display everything installed on your system.

VPN-related adapters usually include TAP in the name (a virtual network adapter standard) and the service name, which makes them easy to spot. Our test system had 'ibVPN Tap Adapter', 'SwitchVPN Tap Adapter' and 'TAP-NordVPN Windows Adapter V9', for instance.

Our system also had the more vaguely named 'VPN Client Adapter - VPN'. If you're not sure where a network adapter has come from, double-click it, choose the Driver tab and look at the Driver Provider and Digital Signer items. These typically show the name of the service and the company behind it.

As a cross-check, select the Events tab and scroll to the bottom of the list. If the last event was a long time ago this might indicate that the adapter is no longer used, although this isn't guaranteed.

If you're confident an adapter is no longer necessary, and you're also happy you know how to fix the problem if you're wrong (reinstall it, use a system restore point, or something else), right-click it, select Uninstall Device and check the box to 'Delete the driver software for this device.'

Event logs

The Windows event logs typically record a vast amount of detail on your PC activities, and these can include basic details of a VPN session: connect and disconnect times, and the VPN server you accessed.

This only applies to native Windows VPN protocols – IKEv2, L2TP, PPTP, SSTP – and the OpenVPN connections used by most VPN clients won't be covered.  Anything that is logged will be overwritten after a few days, too, as new Windows events overwrite the old ones. Still, if you're looking to maintain maximum privacy it might be worth checking what's being recorded on your system.

Launch Event Viewer (press Win+R, type eventvwr.msc and press Enter) to begin.

In Windows 10, click Action > Create Custom View. Expand the Event Logs list, then Windows Logs, and check the Application and System boxes.

Expand the Event Sources list and check the RasClient, Rasman and RasSstp boxes.

Click OK, give the filter a name of Connection Events and click OK.

Event Viewer should now add your Connection Events view to the Custom Views section in the left-hand pane, and display all events from the RasMan, RasClient and RasSstp sources.

Now scroll down the list and look at the details of each event.

There aren't any details? Click View and make sure the Preview Pane option is selected.

In some cases you will see RasMan events recording connect and disconnect times for named VPNs over the past few days. RasClient events may go further, including the name of the VPN server you're accessing.

Does this matter? If you're using your own computer, and no-one else has access to it, probably not. But if you're looking for maximum privacy, you can delete this history by right-clicking the Application and System logs and selecting Clear Log.

Event logs

The Windows event logs typically record a vast amount of detail on your PC activities, and these can include basic details of a VPN session: connect and disconnect times, and the VPN server you accessed.

This only applies to native Windows VPN protocols – IKEv2, L2TP, PPTP, SSTP – and the OpenVPN connections used by most VPN clients won't be covered.  Anything that is logged will be overwritten after a few days, too, as new Windows events overwrite the old ones. Still, if you're looking to maintain maximum privacy it might be worth checking what's being recorded on your system.

Launch Event Viewer (press Win+R, type eventvwr.msc and press Enter) to begin.

In Windows 10, click Action > Create Custom View. Expand the Event Logs list, then Windows Logs, and check the Application and System boxes.

Expand the Event Sources list and check the RasClient, Rasman and RasSstp boxes.

Click OK, give the filter a name of Connection Events and click OK.

Event Viewer should now add your Connection Events view to the Custom Views section in the left-hand pane, and display all events from the RasMan, RasClient and RasSstp sources.

Now scroll down the list and look at the details of each event.

There aren't any details? Click View and make sure the Preview Pane option is selected.

In some cases you will see RasMan events recording connect and disconnect times for named VPNs over the past few days. RasClient events may go further, including the name of the VPN server you're accessing.

Does this matter? If you're using your own computer, and no-one else has access to it, probably not. But if you're looking for maximum privacy, you can delete this history by right-clicking the Application and System logs and selecting Clear Log.

Windows network profiles

Windows maintains profiles of some of the networks you access, optionally including your logon details, making it easier to reconnect later.

The privacy impact of this is small, but it could allow snoopers to see which VPNs you've used and when, months or even years after any client was uninstalled.

On Windows 10, press Win+I to open the Settings dialog and click 'Network & Internet'. (If you're on an earlier version of Windows, you can also view your network profiles from the Control Panel 'Internet Options' applet.)

Click VPN in the left-hand pane to view any VPN profiles. These only list basic L2TP and PPTP connections, and as most VPNs use OpenVPN there's a chance you'll see nothing at all.

Most profiles will be easy to recognize. Our test system listed 'IPVanish VPN (L2TP)' and 'IPVanish VPN (PPTP)', for instance, clearly left over from a previous IPVanish installation.

If you're unsure how a profile is used, select it and click Advanced Options. This displays properties including the server name, and optionally the username and password, which may give you some clues.

If you've found a profile which you'd like to delete, click it and select Remove.

This article is about cleaning up VPN records, but you can apply the same principle to remove stored wireless network profiles. If you're interested, click Wi-Fi in the left-hand pane (on Windows 10) and click Manage Known Networks to view and delete stored profiles.

System drivers

Set up a VPN on a PC and it will often install one or more system drivers. Uninstalling the VPN won't necessarily remove the drivers, though, so it could be worth checking out your computer for any leftovers.

Launch the System Information applet (press Win+R, type msinfo32.exe, press Enter), expand Software Environment and click System Drivers to see the installed drivers on your system. Scroll down the driver descriptions, looking for anything that relates to a VPN you've tried before but subsequently uninstalled.

Examples of leftovers on our test system included 'Astrill SSL VPN Adapter' and 'Phantom TAP-Windows Adapter V9'.

If you find anything, check its values in the Started and State columns. If these show the driver has started and is in the running state, that suggests the VPN has an installed device and perhaps other software. Check our earlier instructions to make sure you have removed any clients and virtual network adapters.

If the table tells you the driver is in the 'Stopped' state, and hasn't started, then that indicates it's not being used right now. The safest option is still to leave it alone, but you can try to remove a driver if you're sure it won't be needed again.

First, open an elevated command line (search for Command, right-click Command Prompt, select Run as Administrator).

Type PNPUTIL -e and press Enter to display all the third-party drivers installed on your system.

Browse the list looking for package providers which match the drivers you noticed earlier, then look for their 'published name'. On our test system, the package provider 'Phanton TAP-Windows Provider V9' had a published name of oem103.inf.

To remove a driver, use the pnputil command with its delete-driver option and the published name. For our example, that meant typing:

pnputil /delete-driver oem103.inf /uninstall

Replace oem103.inf with the published name of your driver, then reboot and check the results.

Network history

Windows records some basic details on every network you access, even if it's via a VPN. There's not much recorded – a name, the first and most recent connection dates – and having this information around won't cause you any technical issues. Still, it could tell others a lot about how the system has been used, and if you're really concerned about privacy you might want to clear it away.

Launch REGEDIT, browse to Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles and scroll through the subkeys in the left-hand pane.

Look at the Description value to identify each item. On our test system, some of these represented system network adapters ('Local Area Connection'), others were hotspots we had had accessed ('Premier Inn Ultimate Wi-Fi'), but others clearly belonged to VPNs ('GooseVPN', 'PureVPN', 'IPVanish VPN').

If you see a profile representing a VPN or network you're sure you'll never use again, you can remove it by right-clicking the profile in the left-hand pane and selecting Delete.

A related list at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures\Unmanaged provides more details on the same networks. Scroll it to see everything you've accessed, check the descriptions, and delete any keys you no longer need.

A final Connections key at HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections records basic connection settings for your regular network adapters and any virtual adapters (VPNs) you might have installed.

It's safe to delete keys for VPNs you no longer use, but be sure to leave the system connections alone. On our test system, these included DefaultConnectionSettings, LAN Connection and SavedLegacySettings, but you may have others, and it's very important they remain untouched.

Check out the best VPN services of 2017 and visit thebestvpnfor.me to get the best VPN deals on the market

http://www.techradar.com/how-to/how-to-uninstall-a-vpn-the-correct-way

Written by Mike Williams

Picture credit: webopedia.com

Microtechs 24/7/365 White label Technical Helpdesk

In today's world, a rock solid IT infrastructure is key to every successful business. At Microtechs we have the experience and resource to ensure your company has the support it needs 24 hours a day, 7 days a week, 365 days a year. We are able to provide an immediate response from our state of the art Technical Operations Centre which is based in the heart of Surrey.

With our rapidly expanding team, all specifically trained, working 24/7/365, we are able to provide excellent customer service and technical support. All of our services are available completely white labelled, ensuring a seamless extension to your company.

Through our services you are able to extend your hours to 24/7 or simply use us as an over flow assistant during office hours. This is all tailored to your business needs.  

How does Outsourcing your help desk benefit your business?

1.       It reduces your staffing costs. Why hire another member of staff, if you can outsource all of your calls for less? We are normally between 25-50% cheaper than an in-house option.

2.       It expands your opening hours. We have a technical operations centre which is open 24/7/365.

3.       It will improve your customer experience. Are you taking multiple calls from clients, but can’t get back to them as quick as you would like? Well now you have a team of 30 staff taking your support calls for you. Have an important meetings? No problem, your help desk has your back.

We work with over 60 IT & Telecoms Businesses who trust us to deal day to day with their clients.

 

Feel free to call our friendly solutions team, who will be happy to discuss further and help tailor a solution to you.

 

Call us now on 01483 407417

b2ap3_thumbnail_data-theft.jpg

The number of High Court cases in which sensitive corporate data has been stolen by employees has increased by 25% in a year, according to a London law firm.

EMW senior solicitor, Felix Dodd, claimed that an increase in staff turnover could be the cause of the rise, from 40 cases in 2015 to 50 last year.

In other words, malicious insiders are deliberately taking customer databases, sensitive financial information and the like with them to help with their new roles.

He added that the ubiquity of smartphones and cloud storage platforms has made the process far simpler without raising suspicion.

In the financial services sector, firms need to guard their proprietary algorithms with care, while recruiters and estate agents are more likely to be affected by the loss of client databases, said Dodd.

“Theft of confidential data has become such a widespread concern for firms in the City that many of them ban their employees from sending work emails to their personal accounts, and some now even disable some functions on their employees’ smartphones,” he explained.

“Bigger businesses should have the systems in place to be able to monitor activity like this effectively, but a lot of smaller businesses might not have the budget or skills to track what their employees are doing with sensitive data.”

This year a former employee of aviation cleaning company, OCS Group UK, was jailed after sending confidential information to his personal email address, breaking the terms of a court order. Meanwhile, investment management firm, Marathon Asset Management, won a case against two former employees who breached their contracts by copying and retaining key files.

Head of employment at Lennons, Leah Waller, argued that the increase in High Court cases could be down to the fact that firms can now apply for compensation by way of damages rather than being forced to bring a criminal action for theft.

“With technology advancing at an incredible speed, and the majority of information now being stored electronically with easy access, the instances of employees, especially those that leave on bad terms, taking confidential information is likely to continue to increase and as such the number of claims in the High Court will continue to rise,” she added.

David Emm, principal security researcher at Kaspersky Lab, argued that the insider threat is one of the biggest challenges facing businesses.

“Employees rank at the very top of the list of threats to data and systems,” he added.

“Their motivations are often hard to predict and anticipate, ranging from a desire for financial gain to disaffection, coercion and simple carelessness. When insider-assisted attacks do occur, the impact of such attacks can be devastating as they provide a direct route to the most valuable information – customer data.”

To mitigate the threat, Emm recommended a combination of staff education, threat intelligence services, restricted access to key systems and regular security audits.

Written by Phil Muncaster UK / EMEA News Reporter , Infosecurity Magazine

https://www.infosecurity-magazine.com/news/insider-data-theft-court-cases/

Picture credit: http://www.channeltimes.com

Microtechs 24/7/365 White label Technical Helpdesk

In today's world, a rock-solid IT infrastructure is key to every successful business. At Microtechs we have the experience and resource to ensure your company has the support it needs 24 hours a day, 7 days a week, 365 days a year. We are able to provide an immediate response from our state of the art Technical Operations Centre which is based in the heart of Surrey.

With our rapidly expanding team, all specifically trained, working 24/7/365, we are able to provide excellent customer service and technical support. All of our services are available completely white labelled, ensuring a seamless extension to your company.

Through our services you are able to extend your hours to 24/7 or simply use us as an over flow assistant during office hours. This is all tailored to your business needs.  

How does Outsourcing your helpdesk benefit your business?

1.       It reduces your staffing costs. Why hire another member of staff, if you can outsource all of your calls for less? We are normally between 25-50% cheaper than an in-house option.

2.       It expands your opening hours. We have a technical operations centre which is open 24/7/365.

3.       It will improve your customer experience. Are you taking multiple calls from clients, but can’t get back to them as quick as you would like? Well now you have a team of 30 staff taking your support calls for you. Have an important meeting? No problem, your help desk has your back. 

We work with over 60 IT & Telecoms Businesses who trust us to deal day to day with their clients.

Feel free to call our friendly solutions team, who will be happy to discuss further and help tailor a solution to you.

 

Call us now on 01483 407417

CONTACT US

Our business truly is 24/7, We operate entirely out of this office using our own staff.

Microtechs Head Office

Microtechs Ltd
Sussex House
11 The Pines
Broad Street
Guildford
GU3 3BH  

T: +44 (0) 1483 407400
Einfo@microtechs.co.uk

Alternatively, please use our Contact Us Form

 

WE'RE TWEETING