Let us be your IT department!
Call us Today! (703) 821-8200




Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 8 Questions Every Business Should Ask of Their Potential IT Provider

Tip of the Week: 8 Questions Every Business Should Ask of Their Potential IT Provider

It’s not unheard of for organizations to experience immense technological trouble that brings future potential problems into question. Surprises like these can spell trouble for businesses that are unprepared, especially considering the major damage it could cause to your budget. This forces you to ask yourself if you know what your current plan for IT covers, and what you want your provider to do to eliminate unexpected billing surprises.

To help you get the most out of your technology maintenance plan, we’ve put together a list of scenarios that you want to make sure is covered by your provider. This helps you avoid unnecessary payments that could pop-up on weekends, off-hours, or holidays.

What Your IT Provider Should Cover
IT providers determine how much service their clients get according to what’s called a service level agreement. This details what exactly is covered by your relationship with your managed service provider, but depending on their business model, it might be a bit more complicated than you initially think. You should always seek transparency with your IT provider, so be sure to reach out to them regarding any questions that you may have.

Listed below are questions that you want to ask your IT provider about regarding your service level agreement.

  • Can your workers submit support tickets without exceeding a predetermined IT budget?
  • How much are you charged for after hours, if at all, does this include weekends or holidays?
  • Is there a limit placed on how much support you can receive and what happens when you do exceed this limit?
  • Are you charged extra for data recovery when you need access to it during a disaster?
  • Will the number of workstations covered change in the future, and will you be charged for any changes?
  • Will you be charged for using backup solutions in virtual environments while your hardware is being replaced?
  • Will you be charged for expanding your data storage?
  • What kind of hardware maintenance agreement do you have, are there specific pieces of hardware that aren’t covered by your agreement?

What Services You Should Look For
Once you’ve ascertained which services you receive, you can ask your IT provider about which services you absolutely want. Here is a brief list that can help guide you in the right direction.

  • Unlimited remote and on-site support
  • Active Directory administration and maintenance
  • File, folder, and share administration
  • Security administration
  • Network policy enforcement and administration
  • Managed antivirus, spyware monitoring, maintenance, and removal
  • Data backups as often as every 15 minutes
  • Take backups of open documents without interruption
  • Rapid data restoration
  • Block inappropriate or dangerous web content in the workplace
  • Intrusion security

Which IT services do you receive from your service provider? If any of this sounds out of place, reach out to us at (703) 821-8200. Computerware will help your business maximize its potential.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 27 June 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Software Productivity Business Computing Backup Hackers Saving Money Hardware Data Business Malware Hosted Solutions IT Support IT Services Email Quick Tips Smartphones Gadgets Google Mobile Devices Efficiency Small Business Mobile Office Disaster Recovery Virtualization Business Continuity Microsoft Office Computer Network Server Miscellaneous Upgrade Social Media User Tips Network Security Windows 10 VoIP Mobile Device Management Unified Threat Management Innovation Windows Passwords Smartphone BYOD Communication Operating System WiFi Vendor Management Marketing The Internet of Things Apps Remote Computing Mobile Computing Ransomware Firewall Managed IT services Android Users History Holiday Collaboration Remote Monitoring Analytics Facebook Apple Alert IT Consultant Save Money Data Management Automation Content Filtering Big data Bring Your Own Device Office Health Lithium-ion Battery Hard Drives Hiring/Firing App Best Practice Going Green Windows 8 Wireless Technology Tech Support Outlook Outsourced IT Phishing Virus Gmail Productivity Browser Employer-Employee Relationship Phone System Information Technology BDR Spam IBM Internet of Things Budget Printer Search Save Time Proactive IT Managed IT Services Help Desk Money Computers Administration Maintenance Data storage Running Cable Bandwidth Saving Time Humor Customer Service Education Current Events Digital Payment IT Support Hard Drive Hacking Managed IT PowerPoint Office 365 Social Networking User Solid State Drive Antivirus Twitter Flexibility Artificial Intelligence Legal Government iPhone Recovery Business Intelligence Risk Management Document Management SaaS Mobile Device Hacker Hosted Solution Computer Repair Fax Server communications Tablet Intranet Two-factor Authentication Black Market Encryption Wireless Avoiding Downtime Update Travel Website Telephone Systems Networking Training Pain Points Chrome Settings Public Cloud Retail User Error Router Cybersecurity YouTube Excel Experience Computer Accessories Customer Relationship Management Comparison Politics End of Support Augmented Reality Gaming Console Automobile Law Enforcement Text Messaging Webcam VPN How To Safety Social Taxes Network Congestion Laptop DDoS Net Neutrality Uninterrupted Power Supply Paperless Office Office Tips Cybercrime Word Computing Co-managed IT Password Sports Cortana IT service Cost Management Robot Downtime Processors Lifestyle Cloud Computing USB Statistics Presentation Hack Company Culture Compliance Virtual Desktop Streaming Media Documents Programming Heating/Cooling Inbound Marketing Business Growth Monitors Keyboard Licensing Device Management Best Available Advertising Product Reviews Domains Digital Banking Botnet Google Wallet File Sharing eWaste Displays Read Upselling Webinar online Currency Shortcut Language Value Unified Communications Drones Disaster Access Business Metrics Troubleshooting Computer Malfunction Environment Mobility Staffing Competition Mouse Permissions Securty Spyware Chromebook Business Owner Motion Sickness Messenger Best Practives Tracking Writing switches GPS Application Windows 10 Work/Life Balance Web Server Microserver Download Specifications Books Workers Ebay 3D Start Menu Recycling Digital Signature Cryptocurrency Entertainment Google Docs Turn Key Microchip Reading Trojan Samsung Regulations Pirating Information IT consulting Adminstration Organize G Suite Cleaning Physical Security Analytic CIO Hacks Relocation Content Management Tablets Windows XP Public Speaking Data Protection Identity Theft Sync Society CCTV Micrsooft Notifications Reliable Computing Entrepreneur Google Maps Video Surveillance Saving ZTime Business Managemenet LinkedIn Corporate Profile Virtual Reality Trending HIPAA In Internet of Things Electronic Payment Emails Social Engineering Scalability Archive Bluetooth Debate Harddrive IP Address VoIP Computing Infrastructure Music Point of Contact Meetings Upgrades External Harddrive Human Resources Rental Service Cabling Memory Private Cloud LiFi Thin CLient Skype Electricity Wi-Fi Administrator Get More Done Supercomputer Deep Learning Smart Phones Telephony Printer Server Worker Flash Teamwork Machine Learning Visible Light Communication Leadership WannaCry Storage Distributed Denial of Service PDF Employer Employee Relationship

hp supplies medallionLarge2017