Let us be your IT department!
Call us Today! (703) 821-8200




Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 8 Questions Every Business Should Ask of Their Potential IT Provider

Tip of the Week: 8 Questions Every Business Should Ask of Their Potential IT Provider

It’s not unheard of for organizations to experience immense technological trouble that brings future potential problems into question. Surprises like these can spell trouble for businesses that are unprepared, especially considering the major damage it could cause to your budget. This forces you to ask yourself if you know what your current plan for IT covers, and what you want your provider to do to eliminate unexpected billing surprises.

To help you get the most out of your technology maintenance plan, we’ve put together a list of scenarios that you want to make sure is covered by your provider. This helps you avoid unnecessary payments that could pop-up on weekends, off-hours, or holidays.

What Your IT Provider Should Cover
IT providers determine how much service their clients get according to what’s called a service level agreement. This details what exactly is covered by your relationship with your managed service provider, but depending on their business model, it might be a bit more complicated than you initially think. You should always seek transparency with your IT provider, so be sure to reach out to them regarding any questions that you may have.

Listed below are questions that you want to ask your IT provider about regarding your service level agreement.

  • Can your workers submit support tickets without exceeding a predetermined IT budget?
  • How much are you charged for after hours, if at all, does this include weekends or holidays?
  • Is there a limit placed on how much support you can receive and what happens when you do exceed this limit?
  • Are you charged extra for data recovery when you need access to it during a disaster?
  • Will the number of workstations covered change in the future, and will you be charged for any changes?
  • Will you be charged for using backup solutions in virtual environments while your hardware is being replaced?
  • Will you be charged for expanding your data storage?
  • What kind of hardware maintenance agreement do you have, are there specific pieces of hardware that aren’t covered by your agreement?

What Services You Should Look For
Once you’ve ascertained which services you receive, you can ask your IT provider about which services you absolutely want. Here is a brief list that can help guide you in the right direction.

  • Unlimited remote and on-site support
  • Active Directory administration and maintenance
  • File, folder, and share administration
  • Security administration
  • Network policy enforcement and administration
  • Managed antivirus, spyware monitoring, maintenance, and removal
  • Data backups as often as every 15 minutes
  • Take backups of open documents without interruption
  • Rapid data restoration
  • Block inappropriate or dangerous web content in the workplace
  • Intrusion security

Which IT services do you receive from your service provider? If any of this sounds out of place, reach out to us at (703) 821-8200. Computerware will help your business maximize its potential.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 23 May 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Microsoft Business Management Managed Service Provider Workplace Tips Productivity Software Business Computing Hackers Backup Saving Money Hardware Business Data Malware Hosted Solutions Email IT Support IT Services Quick Tips Gadgets Smartphones Google Mobile Devices Small Business Mobile Office Disaster Recovery Business Continuity Efficiency Virtualization Computer Microsoft Office Network User Tips Miscellaneous Upgrade Social Media Server Windows 10 VoIP Unified Threat Management Network Security Mobile Device Management Windows Innovation Operating System Communication WiFi Passwords Smartphone BYOD Remote Computing Mobile Computing Apps Vendor Management Marketing The Internet of Things Users Ransomware Android Firewall History Holiday Managed IT services Apple Facebook Remote Monitoring IT Consultant Collaboration Alert Analytics Save Money Health Content Filtering Data Management Bring Your Own Device Automation Office Big data Windows 8 Lithium-ion Battery Hard Drives Tech Support Best Practice Going Green Hiring/Firing Wireless Technology Phone System Browser Employer-Employee Relationship Internet of Things Printer Budget Information Technology Outlook Spam IBM Phishing Virus App Search Gmail Humor Proactive IT Help Desk Bandwidth Computers Customer Service Education BDR Save Time Money Maintenance Saving Time Running Cable Data storage Legal Government Update Recovery Productivity Risk Management Digital Payment Fax Server Hacker Hosted Solution communications PowerPoint Social Networking Two-factor Authentication Avoiding Downtime Antivirus Wireless Twitter Black Market Encryption Website Artificial Intelligence Travel Current Events Telephone Systems Networking Training iPhone Business Intelligence Hacking Document Management Mobile Device Outsourced IT Office 365 Administration Managed IT Computer Repair User Solid State Drive Intranet Flexibility Streaming Media Inbound Marketing Cybercrime Co-managed IT Paperless Office Taxes Chrome Office Tips Cortana Password Computing Router Cost Management Lifestyle Computer Accessories Sports IT service Customer Relationship Management SaaS Processors Comparison Downtime USB Augmented Reality Presentation Tablet Robot Company Culture Text Messaging Virtual Desktop Compliance VPN Cloud Computing Hack Documents Programming Heating/Cooling Pain Points Excel Business Growth User Error Net Neutrality Retail Experience Gaming Console Public Cloud Webcam Cybersecurity Politics End of Support Hard Drive Law Enforcement Safety Statistics Automobile Social DDoS Network Congestion Web Server Cryptocurrency Microchip Workers Google Docs Laptop IT consulting Reading Analytic Start Menu Regulations Leadership Cleaning Word Public Speaking Hacks Device Management Samsung CIO Windows XP Relocation Uninterrupted Power Supply G Suite Identity Theft Physical Security Society Entrepreneur online Currency HIPAA Notifications Harddrive Business Managemenet Tablets Micrsooft Sync Electronic Payment Reliable Computing Data Protection Virtual Reality External Harddrive CCTV IP Address Social Engineering Mouse Google Maps Bluetooth In Internet of Things Human Resources Scalability Corporate Profile Computing Infrastructure Smart Phones Emails Music Get More Done GPS Rental Service Skype Upgrades Printer Server Memory LiFi Teamwork Wi-Fi Ebay Meetings 3D Storage Telephony Recycling Cabling Deep Learning Private Cloud Flash Administrator Visible Light Communication PDF Best Available Pirating Information Supercomputer Adminstration Keyboard Domains Upselling Product Reviews Worker Monitors Webinar Machine Learning Settings Distributed Denial of Service Advertising eWaste Read Content Management Value Banking Employer Employee Relationship Google Wallet Shortcut YouTube Troubleshooting File Sharing Licensing Displays Language Botnet Unified Communications Staffing Environment Business Metrics Video Surveillance Drones Best Practives Disaster Competition LinkedIn Business Owner Trending IT Support Saving ZTime Microserver Computer Malfunction Permissions Archive Chromebook Debate Mobility Securty Application switches Specifications Messenger Managed IT Services Writing Work/Life Balance Turn Key Motion Sickness Point of Contact Digital Signature Download Tracking Trojan Entertainment Books Windows 10 Organize Thin CLient How To

hp supplies medallionLarge2017