Let us be your IT department!
Call us Today! (703) 821-8200


Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 8 Questions Every Business Should Ask of Their Potential IT Provider

Tip of the Week: 8 Questions Every Business Should Ask of Their Potential IT Provider

It’s not unheard of for organizations to experience immense technological trouble that brings future potential problems into question. Surprises like these can spell trouble for businesses that are unprepared, especially considering the major damage it could cause to your budget. This forces you to ask yourself if you know what your current plan for IT covers, and what you want your provider to do to eliminate unexpected billing surprises.

To help you get the most out of your technology maintenance plan, we’ve put together a list of scenarios that you want to make sure is covered by your provider. This helps you avoid unnecessary payments that could pop-up on weekends, off-hours, or holidays.

What Your IT Provider Should Cover
IT providers determine how much service their clients get according to what’s called a service level agreement. This details what exactly is covered by your relationship with your managed service provider, but depending on their business model, it might be a bit more complicated than you initially think. You should always seek transparency with your IT provider, so be sure to reach out to them regarding any questions that you may have.

Listed below are questions that you want to ask your IT provider about regarding your service level agreement.

  • Can your workers submit support tickets without exceeding a predetermined IT budget?
  • How much are you charged for after hours, if at all, does this include weekends or holidays?
  • Is there a limit placed on how much support you can receive and what happens when you do exceed this limit?
  • Are you charged extra for data recovery when you need access to it during a disaster?
  • Will the number of workstations covered change in the future, and will you be charged for any changes?
  • Will you be charged for using backup solutions in virtual environments while your hardware is being replaced?
  • Will you be charged for expanding your data storage?
  • What kind of hardware maintenance agreement do you have, are there specific pieces of hardware that aren’t covered by your agreement?

What Services You Should Look For
Once you’ve ascertained which services you receive, you can ask your IT provider about which services you absolutely want. Here is a brief list that can help guide you in the right direction.

  • Unlimited remote and on-site support
  • Active Directory administration and maintenance
  • File, folder, and share administration
  • Security administration
  • Network policy enforcement and administration
  • Managed antivirus, spyware monitoring, maintenance, and removal
  • Data backups as often as every 15 minutes
  • Take backups of open documents without interruption
  • Rapid data restoration
  • Block inappropriate or dangerous web content in the workplace
  • Intrusion security

Which IT services do you receive from your service provider? If any of this sounds out of place, reach out to us at (703) 821-8200. Computerware will help your business maximize its potential.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 23 August 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Productivity Software Backup Business Computing Hackers Saving Money Hardware Data Business Malware IT Support IT Services Email Hosted Solutions Google Quick Tips Smartphones Efficiency Gadgets Mobile Devices Business Continuity Small Business Mobile Office Disaster Recovery Virtualization User Tips Microsoft Office Network Computer Server Windows 10 Miscellaneous Upgrade VoIP Social Media Network Security Windows Unified Threat Management Mobile Device Management Innovation Smartphone Operating System Remote Computing BYOD Communication Ransomware WiFi Vendor Management Passwords Mobile Computing Apps Android The Internet of Things Marketing Facebook Users Remote Monitoring Managed IT services Firewall History Holiday Apple Collaboration Analytics Save Money IT Consultant Alert Data Management Big data Outsourced IT Health Content Filtering Bring Your Own Device Automation Office Virus App Lithium-ion Battery Hard Drives Windows 8 Tech Support Best Practice BDR Spam Going Green Managed IT Services Phishing Hiring/Firing Wireless Technology Search Recovery Browser Internet of Things Employer-Employee Relationship Phone System Budget Help Desk Antivirus Printer Information Technology IBM Outlook Productivity Gmail SaaS Bandwidth Encryption communications Proactive IT Computers Customer Service Humor Education Managed IT Data storage Save Time Money Saving Time Running Cable Administration Maintenance Government Hosted Solution Update Word Risk Management Password Digital Payment Black Market Hacker Tablet PowerPoint Networking Social Networking Fax Server Data Backup Telephone Systems Two-factor Authentication Twitter Training Wireless Travel Website Artificial Intelligence It Management iPhone Avoiding Downtime Securty Business Intelligence IT Support Hard Drive Solid State Drive Hacking Current Events Flexibility Mobile Device Document Management Office 365 Computer Repair Legal User Intranet Computing Streaming Media Uninterrupted Power Supply Inbound Marketing Data Recovery Robot Cybercrime IT service Chrome Compliance Cortana Router Cost Management Computer Accessories Comparison Downtime Cloud Computing Customer Relationship Management Processors Co-managed IT Hack USB Augmented Reality Business Growth Presentation Company Culture Telephony Monitors Virtual Desktop Lifestyle Text Messaging VPN YouTube Documents Programming Settings Heating/Cooling End of Support Public Cloud Net Neutrality Retail Cybersecurity Law Enforcement Experience Politics Mobility Pain Points Automobile Excel User Error Trending Laptop How To Statistics Gaming Console Office Tips Safety Social Paperless Office Taxes Webcam Network Congestion DDoS Sports G Suite Microserver Relocation Spyware Identity Theft Physical Security Analytic Notifications Tablets Leadership Sync Turn Key Reliable Computing Data Protection cache Device Management Virtual Reality CCTV Music Public Speaking Trojan Social Engineering Google Maps Upgrades Organize Bluetooth In Internet of Things LiFi Entrepreneur Corporate Profile Assessment Business Managemenet Computing Infrastructure Emails online Currency HIPAA Electronic Payment Rental Service Deep Learning Scalability Memory Visible Light Communication VoIP Consultation Mouse Wi-Fi Meetings IP Address Cabling Private Cloud Human Resources Flash Administrator GPS Advertising Skype Supercomputer Harddrive Google Wallet Worker Displays Machine Learning Distributed Denial of Service 3D External Harddrive Unified Communications Teamwork Ebay Google Drive Recycling Banking Employer Employee Relationship Drones Disaster Storage PDF File Sharing Licensing Language Botnet Adminstration Smart Phones Permissions Keyboard Get More Done Best Available Electricity Pirating Information Product Reviews Business Metrics Domains Printer Server switches eWaste Read Writing Computer Malfunction Shortcut Content Management Value WannaCry Troubleshooting Time Management Chromebook Staffing Environment Messenger Video Surveillance Work/Life Balance Motion Sickness Cryptocurrency Competition LinkedIn Business Owner Touchscreen Download Tracking Saving ZTime Upselling Google Docs Webinar IT consulting Books Windows 10 Digital Debate Web Server Cleaning Application Archive Specifications Websites Microchip Workers CIO Windows XP Point of Contact Reading Start Menu Regulations Access Society Best Practives Digital Signature Entertainment Software as a Service Hacks Samsung Thin CLient Micrsooft Capital Productuvuty CrashOverride 3D Printing

hp supplies medallionLarge2017