Most common cyberthreats and how to avoid them

Most common cyberthreats and how to avoid them

As we know, there are many types of cyberthreats, all of which can be harmful to your business. Understanding the different types of threats and having the appropriate preventative and reactive measures in place is key for all businesses to mitigate risk.

Cyberthreats are caused by vulnerabilities. Most software will have a vulnerability – a security ‘fault’ or ‘hole’ – at some point in its life due to incompatibility with the operating system for example, or simply the way it’s built. It’s worth noting that the vulnerabilities themselves are not an issue, but it’s these that viruses take advantage of; vulnerabilities allow access to PCs and Servers.

Once cybercriminals have taken advantage of the vulnerabilities and gained access, the results can be wide ranging, from harvesting personal data, usernames, passwords and bank details, to encrypting data for blackmail purposes. Many viruses can run on a machine without the end user even knowing. Human error is typically the cause and starting point of the spread of the infection. Here’s what your end users can look out for to prevent the spread of infections.

Phishing emails

Phishing, or mass spamming, campaigns are emails that appear to be genuine that are sent to hundreds or thousands of different people. They’ll encourage you to click on an illegitimate link or download something that will then cause an infection. These emails are designed to look genuine so can be very difficult to spot. Users can click on the sender email address; if it doesn’t match the person signing the email, then you can safely delete the email.

Spear phishing

Spear phishing has the same aim as phishing – to get the user to open a link or download something which will cause a virus. In contrast to phishing, spear phishing uses personal information in order to create a targeted email. The information they use might be openly available on the web or social media accounts for example.

We’re increasingly sharing more and more of our lives publicly and on social media. Unfortunately, this makes it easier to find the information needed for spear phishing attacks. In a similar vein, each time there’s a data breach, personal information is leaked onto the web. For example, the information of every Yahoo account holder was leaked in 2016. Most of the accounts were dormant so many didn’t take much notice, however the information that was leaked included timeless security questions and their answers (where you were born, your mother’s maiden name etc.). Breaches like this make it easy to construct a convincing spear phishing message.

Ransomware

Last year, we witnessed many ransomware attacks including the WannaCry attack on the NHS. Ransomware encrypts users’ data and then demands a payment to decrypt it. The payment amount generally rises the longer the payment is left and if no ransom is paid, the data will be deleted. The payments are normally made using BitCoin, a virtual currency. When a payment is made, the data will typically be deleted and restored back to its original location, but there is no guarantee that that will be the case. The cybercriminals could demand further payments for example.

Solutions

There are many types of cyberthreats, but just a handful of protective measures can protect you against them all.

We offer IT Support Contracts. For one monthly charge we can provide and manage everything that you’ll need to keep your infrastructure safe. We proactively monitor your entire infrastructure for you, often dealing with issues before users even realise. As part of our IT Support Contracts, we use the following products:

ESET Endpoint Security – an antivirus solution that detects and eliminates all types of threats with low resource usage, and cross-platform protection.

Clunk Click Online Pro – backup your data to secure offsite datacentres. Data is encrypted at source, in transit, and at rest for complete security. Restore your data easily in the event of data loss.

Mako – a network router with a firewall controls the traffic that’s allowed in and out of your network. It allows you to access the internet safely with a low chance of spurious links and traffic.

Office 365 – Office 365 has inbuilt security features to keep your data safe, as well as additional products such as Advanced Threat Protection which detects and detonates any spurious links or attachments.

Why Ilkley IT Services?

We help small and medium-sized businesses who don’t have an in-house IT department maximise and maintain their business IT infrastructure.

We constantly monitor your PCs, network and other IT devices. We’ll often prevent problems from happening without users even knowing, meaning you and your staff continue to work uninterrupted.

On the rare occasions when things do go wrong, we’re ready to respond quickly and efficiently. With our vast experience and investment in the best tools, we are well equipped to get you back up and running in the quickest possible time.

Ilkley IT Services continue to provide us with excellent and prompt computer support. Knowing that any IT issues will be dealt with in a swift manner gives us peace of mind and keeps our busy office running smoothly.

Abbeyfield the Dales
Abbeyfield the DalesGwen

The insight and technical acumen which Warren and his team have brought to the table has been immensely valuable and they’ve made the process smooth and straight forward – highly recommended!

Secret Drawer
Secret DrawerRichard

Cloud Nine Hair is very pleased with the way in which Ilkley IT Services conducted themselves throughout our entire move to new offices and warehouse...We continue to work with Ilkley IT Services who provide us with excellent computer support and strongly recommend them to any future customers.

Cloud Nine Hair
Cloud Nine HairMartin

Ilkley IT have offered great support and advice over the years... Friendly people and a good service. We wouldn’t hesitate to recommend Ilkley IT Services.

Room To Grow
Room To GrowAnne

Like many businesses, we rely heavily on our IT set up to function. From taking orders to running the warehouse, our computer and information resources are central to how we work.

Harrison Bathrooms
Harrison BathroomsJames

When our IT equipment recently needed refreshing, Ilkley IT Services did an excellent job in providing the necessary materials for our team to perform... I have no hesitation in recommending Ilkley IT Services to other companies requiring professional IT support and consultation.

KineholmeDarren

I would like to express our sincere thanks to Ilkley IT for their excellent technical support, that has on a number of occasions been lifesaving. Computers in our Dental Surgeries are critical, and the fast repairs carried out by Ilkley IT has been vital to our being able to continue to offer a high level of care for our patients.

Ilkley Dental
Ilkley DentalLiz

How can we help?


 

Mako

Why you need a Cloud managed router and firewall

Last year we witnessed many huge scale cyberattacks and breaches, including on the NHS; the media was reporting cyberattacks and beaches constantly! Cyberattacks are happening every single day, even when the media isn’t reporting them. Businesses, large and small, the world over are falling victim to cyberattacks. Thankfully, organisations are recognising the importance of cybersecurity and cyberattack prevention more and more. A firewall router is a key method of preventing cyberattacks.

What are Mako Routers?

Mako provides business grade routers to business of all sizes. As well as providing a connection to the internet, they also provide a secure firewall to prevent intrusions into your network.

A firewall grants or rejects network access to traffic between an untrusted zone (the internet) and a trusted zone (your network). It works by analysing data in order to decide which traffic is safe and which isn’t. It’s essentially a ‘traffic cop’ that grants or denies access to different internet traffic. These decisions mean that you can access the internet safely with a very low chance of intrusions.

Firewalls can limit outgoing traffic as well. For example, if a user were to click on a spurious email link which caused spam mail to be sent to all contacts, the firewall could prevent the spam emails from being sent, protecting your contacts and the spread of the virus as well.

How are Mako’s different to other routers?

Unlike most other routers, MAKO routers are Cloud managed. This means that we can manage your router for you through a portal. This is ideal for our customers that have multiple sites, and for those that have a support contract with us. We can set you up, change settings for you, and manage your router easily and quickly. You can view the portal as well to keep track of everything.

The portal means that you can have a lot more control over settings and configurations. For example, you can choose to block certain types of content – adult, gambling sites etc. – you can get reports on how the internet is being used, and you can receive notifications for any potential network concerns as well. You’re also able to prioritise certain uses of the internet if there’s poor connection for example, meaning your most business critical jobs are prioritised.

A huge advantage of Mako over other routers is the automatic firmware updates. New firmware updates are pushed out automatically meaning that there’s no dependence on human interaction, so you’ll always be completely up to date and secure.

Mako is the only network router that is Payment Card Industry Data Security Standard (PCI DSS) compliant. PCI DSS is an important standard for organisations that handle card payments. Mako helps companies achieve PCI DSS compliance by having an entirely separate physical port for the internet traffic that handles card payment details. This is then routed only to the payment gateway resulting in a completely secure connection.

Mako and Managed Support

Here at Ilkley IT, we offer Managed IT Support. This means that we can supply and manage various products and services for your business. We can supply you with a Mako router, as well as proactively monitor and manage your network. You can be involved in this process, or you can leave it completely up to us – it’s your choice. If you’d like any more information about Mako routers or Managed Support, please get in touch.

 

Why Ilkley IT Services?

We help small and medium sized businesses who don’t have an in-house IT department maximise and maintain their business IT infrastructure.

We constantly monitor your PCs, network and other IT devices. We’ll often prevent problems from happening without users even knowing, meaning you and your staff continue to work uninterrupted.

On the rare occasions when things do go wrong we’re ready to respond quickly and efficiently. With our vast experience and investment in the best tools we are well equipped to get you back up and running in the quickest possible time.

How can we help?

Please complete the following information

2 + 4 = ?

 

What is Microsoft Teams?

What is Microsoft Teams?

Since Microsoft Teams was first released in 2017 it’s been adopted by over 200,000 users globally. With a host of functions and tools, Microsoft Teams aids collaboration and efficiency by acting as a central communications hub, pulling in information from other Office 365 products and resources.

A chat-centred workspace

Microsoft Teams is first and foremost a communication space. You’re able to chat easily to different groups of people (your ‘teams’) regardless of whether they are inside or outside your organisation. You might have a Marketing team for example, a Finance team, or a team with some of your external suppliers. The chat itself is an informal IM style with the availability of emojis, gifs, and stickers. This allows for easy communication to groups of your colleagues.

Easy team and channel creation

Creating and joining teams is easy. You can add both internal and external colleagues to your team with just an email address. You can add people after the conversation has started too with the ability to choose how much conversation history they can see – no history, the previous day, or all time.

In order to keep chat organised, users can create channels. These channels are usually topic based, but you can name them whatever you’d like. A new function in Teams is the ability to mute, hide or leave chats. This means that you can keep all your chats and teams relevant to you. If there’s a channel that you’re especially interested in, you can follow it to receive notifications about that chat.

App integration

Teams integrates with both Microsoft and third-party applications. These apps mean that you can present data to your colleagues, send them documents, and organise meetings etc. directly within the Teams space. Not only can you view data and documents, but you can edit them too. For example, if the team is sent an Excel document, you can open up and edit the document within the Teams workspace allowing for easy and efficient collaboration. Any documents shared within the team are automatically uploaded to SharePoint, so all your documents are stored in one, easy to find location.

A new feature within Teams is an app store. This will enable you to search for and integrate apps into your Teams sites quickly and easily. Microsoft are consistently increasing the number of apps that can integrate, so they’ll be something for everything you need!

Communication Hub

Teams is increasingly becoming a complete communication hub. It now has the functionality of Skype for Business integrated into its workspace, so you can make calls from within Teams to anyone regardless of whether they use Teams themselves. You can also receive calls to any Skype for Business enabled device. In addition to this, you can arrange, carry out, and record team meetings easily. Recordings of meetings are automatically uploaded and stored in Stream for future reference, or for those that missed the meeting for example. The integration of Skype for Business and other apps means that users are starting to carry out their entire work day within Teams.

Teams is available in most Office 365 plans for no extra cost. However, there is currently a 12-month free trial available to users that do not have access to Teams in their plan, and even for customers that don’t use Office 365 at all. If you’re interested in starting a free trial, or would like any more information on Teams, please feel free to give us a call.

 

Why Ilkley IT Services?

We help small and medium sized businesses who don’t have an in-house IT department maximise and maintain their business IT infrastructure.

We constantly monitor your PCs, network and other IT devices. We’ll often prevent problems from happening without users even knowing, meaning you and your staff continue to work uninterrupted.

On the rare occasions when things do go wrong we’re ready to respond quickly and efficiently. With our vast experience and investment in the best tools we are well equipped to get you back up and running in the quickest possible time.

How can we help?

Please complete the following information

0 + 6 = ?

 

ESET antivirus

Why do you need business grade antivirus?

We all know that the internet can be a dangerous and unsafe place. Unfortunately, anybody can fall victim to malware attacks – even the most tech-savvy of us – which is why it’s so important to have a secure IT infrastructure in place. A fundamental element of this is antivirus. Here at Ilkley IT Services, we only endorse products that we believe to be the industry’s best, and for antivirus that’s ESET Endpoint Security.

With this in mind, today we thought we’d share the top business benefits of having a professional antivirus solution.

  1. Complete network security

Let’s not overlook the obvious: an antivirus solution protects your network from viruses and other threats. Antivirus solutions will block viruses that would otherwise enter your network by clicking on a spurious link or entering a malicious site for example. Viruses can cause a whole host of different problems if they get onto your PC. They could make your PC run slowly, delete your data, record your usernames and passwords, and cause irreparable damage too.

Viruses can self-replicate and spread throughout your entire network as well. Protecting every machine in the network is really important and will prevent your network falling victim to a viral attack.

ESET Endpoint Security eliminates all types of threats including spyware, worms, rootkits, and viruses, so your machine and network has got protection online and off. ESET uses a reputation database to live scan objects and see whether they’re known to be malicious. The database is utilised through the Cloud-powered scanning functionality, ensuring quicker scanning speeds and fewer false positives.

  1. Keep your data safe

Typically, the main aim of viruses and malware is to collect data – hackers want personal details, credit card details, passwords, and confidential documents. The hackers might then sell this on the Dark Web for example. A professional antivirus solution will protect your data from intruders, keeping it safe. ESET has a Host-based Intrusion Prevention System (HIPS) which provides protection from tampering but also protects system registry, processes, applications, and files from unauthorised modification. You can customise the system behaviour down to a granular level and also detect unknown threats purely from suspicious behaviour.

  1. Prolong the life of your hardware

Viruses and malware can gradually deteriorate your computer (especially if they’re not dealt with), making even the simplest of tasks impossible to perform. A slow sluggish computer can be frustrating and hinder productivity. This can cause you to update your hardware much sooner than you’d need if you’d prevented viruses with an antivirus solution. This means that you’ll be getting the most out of your hardware investment as well.

  1. You’re in control

Professional antivirus solutions will provide you with the ability to customise your solution, select policies, and most importantly manage your antivirus easily. ESET Endpoint Security has an intuitive user interface that is customisable meaning that you can easily manage aspects of the solution yourself, or you can leave it completely to us to manage. ESET also has an auto scan of removeable media, removing the risk of autorun or other removeable threats. However, you can customise the parameters for media and devices, giving you complete control of whether your machine will read/write, read, or block devices.

Why ESET Endpoint Security?

ESET’s Endpoint Security has an unmatched record for stopping in-the-wild viruses in VB100 tests. It also has the lowest impact on memory usage and system performance amongst all leading antivirus solutions. This means that you can continue working as normal without the lag that other antivirus solutions can cause. ESET Endpoint Security protects across different platforms too: you’ll be protected regardless of whether you’re interacting with Windows, Mac, or Linux machines.

 

 

Why Ilkley IT Services?

We help small and medium sized businesses who don’t have an in-house IT department maximise and maintain their business IT infrastructure.

We constantly monitor your PCs, network and other IT devices. We’ll often prevent problems from happening without users even knowing, meaning you and your staff continue to work uninterrupted.

On the rare occasions when things do go wrong we’re ready to respond quickly and efficiently. With our vast experience and investment in the best tools we are well equipped to get you back up and running in the quickest possible time.

How can we help?

Please complete the following information

7 + 0 = ?

 

What is Mobile Device Management?

What is Mobile Device Management?

Mobile Device Management (MDM) is the use of software to monitor, secure, manage and support mobile devices in the workplace, regardless of whether they are corporate or user owned.

Whether it’s via a smartphone, tablet, laptop or desktop, employees can access company data from anywhere more easily than ever. Whilst this is great for productivity it also raises security issues that if unaddressed could jeopardise the entire network and impact business data/operations.

MDM keeps your corporate information safe by allowing administrators to push out policies to devices, remotely wipe devices if they are lost or stolen, as well as block certain web/app content.

Which software do we recommend?

At Ilkley IT Services, our chosen Mobile Device Management solution is provided by ESET. Below we discuss the many benefits of adopting ESET MDM for your business.

What are the benefits of ESET MDM?

1. Remote management of users and devices

ESET’s Remote Administrator allows admins to view and manage all devices from a single point. The ability to push out policies in batches and adjust settings remotely is a huge time saver – admins won’t have to go onto every device in the organisation to make changes.

2. Anti-theft protection – Lock, unlock or delete all corporate data on any device

Lost or stolen company devices can contain sensitive information. With anti-theft protection you can remotely lock or unlock devices, or if needed, completely wipe all corporate data from the device, keeping your data secure even if a device is lost or stolen.

3. Application control

Administrators have control over apps too. Apps can be blocked on an individual basis, by type (gaming for example), or by permissions (if they require access to contact lists for example). To add further control, admins can whitelist apps too. Similar rules can be applied to web content as well – block certain types of content (adult sites for example) or specific URLs.

4. Regulatory compliance

With GDPR now in affect it’s never been more important to be in control of your network integrity. Should an unauthorised device compromise or deceive your business’s security your business could face fines for not correctly protecting business information. With ESET Mobile Device Management’s reporting capabilities, remote management, security and permission restrictions this massively boosts network integrity and mitigates risk of data breaches.

5. Controlled Device Updates

Making sure that all systems are up-to-date and patched is a vital component of IT security. With Mobile Device Management, updates can be centrally controlled and audited. This not only protects your devices and data, but is also a requirement for compliance regulations, such as HIPAA, SOX, and PCI.

6. Supports bring your own device (BYOD)

Historically it’s always been a risk to allow external devices into your corporate network and to access information outside of the office. With MDM you can embrace BYOD and allow external devices to access business information on the go knowing that it won’t compromise security. Have a more productive workforce that can work on the move, improve productivity and help you save on hardware if employees would rather work from their own devices.

Does it matter what operating system we’re using?

ESET has an MDM solution for both Android and Apple Devices. The licensing for both solutions is easy – you can add and remove licenses to ensure you’re only paying for what you’re using. You can also migrate seats from one device to another, regardless of the operating system. For example, if a user switches from an Android to Apple device, you can switch the licence over easily.

Both products, like all ESET products, have low resource usage meaning that it will have a minimal effect on battery and will not cause lagging, both products have a single pane of glass making management easy regardless of OS, and both products benefit from a simple monthly payment model as well.

Why Ilkley IT Services?

We help small and medium sized businesses who don’t have an in-house IT department maximise and maintain their business IT infrastructure.

We constantly monitor your PCs, network and other IT devices. We’ll often prevent problems from happening without users even knowing, meaning you and your staff continue to work uninterrupted.

On the rare occasions when things do go wrong we’re ready to respond quickly and efficiently. With our vast experience and investment in the best tools we are well equipped to get you back up and running in the quickest possible time.

How can we help?

Please complete the following information

5 + 2 = ?

 

Backup vs Disaster Recovery

Backup vs Disaster Recovery

Backup is necessary for all businesses. Backup ensures that in an event of data loss, you can restore your data and continue with minimal business downtime. However, in a situation where you’ve lost what you need to restore your data to, you’ll need a full system recovery solution. This blog will explain the difference between backup and disaster recovery.

What is backup?

The backup software we use is Clunk Click Online Pro. This software takes a copy of your files and stores it in our datacentre. The backups are scheduled so happen automatically, meaning no human intervention is required. You choose which data you want to backup and how often.

The backup software scans for three types of data: data that existed during the last backup but has changed, data that existed during the last backup and is the same, and data that is new. Only the new data and changed data are backed up. This is called incremental backup meaning there’s no duplication of data ensuring that you’re getting the most from your storage. This also minimises bandwidth so your backups don’t interfere with your working day.

Clunk Click Online Pro is able to backup all types of data including transactional databases. It also stores previous backups meaning that you can restore backups that aren’t just the most recent one. For example, if a virus goes undetected you’re able to restore data from a time prior to infection – without this feature you’d be restoring the virus back onto your machine.

In an event of data loss, you can access a file through:

  • InstantData allowing you to instantly view your data in a web browser;
  • Single file restoration allowing you to restore a single file; or
  • Multiple file restoration allowing you to restore multiple files, or even all your data, onto your server.

What is Disaster Recovery (DR)?

If your computer or server is inaccessible, you’ll need a different location to restore your data to. This might be your previous server if it’s available, a spare server (if you’re fortunate enough to have one lying around!), or a Virtual Machine in a datacentre. A new server, whether physical or virtual, will require time for configuration and set up. This is where Disaster Recovery comes in.

Disaster Recovery means that we’ll take a copy of your server’s settings and configurations when you initiate DR with us, and install these onto a Virtual Machine (VM) in our datacentre. In a disaster scenario or if your server is physically damaged, you’ll have a pre-configured server ready for data restoration.

There’s two types of Disaster Recovery: Warm State and Hot State.

Warm State Disaster Recovery means that we’ll turn on your pre-configured VM in a DR scenario when you need to restore data.

Hot State Disaster Recovery means that the pre-configured VM is running continuously. After every backup a copy will be placed onto your VM, so when it comes to restoration your data is on your VM ready to go. This essentially shortens the restorative process, thereby reducing business downtime.

What are the costs?

For Clunk Click Backup you simply pay for your storage amount.

For Warm State DR you would pay your backup storage amount and a small retainer fee for the target VM. Your VM will be configured, set up and ready to use, but turned off. If you needed to use your DR solution, you would pay for the use of the VM (CPU/Disk/RAM).

With Hot State Disaster, you pay for your backup storage as well as the costs of running the VM (CPU/Disk/RAM).

Post-disaster, you can keep your VM as a permanent replacement and we’ll set up a new DR VM, or you can move your data back down to a physical machine.

Why Ilkley IT Services?

We help small and medium sized businesses who don’t have an in-house IT department maximise and maintain their business IT infrastructure.

We constantly monitor your PCs, network and other IT devices. We’ll often prevent problems from happening without users even knowing, meaning you and your staff continue to work uninterrupted.

On the rare occasions when things do go wrong we’re ready to respond quickly and efficiently. With our vast experience and investment in the best tools we are well equipped to get you back up and running in the quickest possible time.

How can we help?

Please complete the following information

0 + 5 = ?

 

Five uses of OneNote you need to know

‘Quick Notes’

Why not try these handy features from OneNote to save you valuable time:
Windows+N opens a ‘quick note’ without opening the programme itself
Windows + shift +S allows you to screenshot any area of the screen

Shortcut Musts

Ctrl+alt+1 (2 or 3) create new headings
Ctrl+1 create new checklist
Ctrl+2 create a custom tag
Ctrl+ . create a quick bullet point
Ctrl+K insert a link

Embed (almost) anything

One of the most impressive features of OneNote is its ability to embed almost anything, including remotely recording audio and video from desktop. So don’t be shy with the insert menu, be adventurous!

Change the view

Selecting ‘Normal View’ gives you full toolbar access, ‘Full Page View (F11)’ maximises the workspace by limiting distracting tabs and pages, whilst ‘Dock to Desktop’ mode enables side-by-side browsing and note making.

Microsoft Office Integration

Seamlessly embed excel tables into OneNote and edit Excel spreadsheets within OneNote. Flag text in OneNote to create a task in Outlook and easily email entire pages from OneNote instantly without damaging the page formatting.

Why upgrading your software is important

With the news that Microsoft is stopping support for Windows XP on the 8th April 2014 many businesses are wondering what this means for them. Going forward it means they will need to upgrade their operating systems before support is pulled. If they don’t they may not face immediate problems but, should something go wrong further down the line, they may have to make fast and costly decisions to ensure that the business can keep functioning efficiently.

All businesses rely on technology heavily. Unfortunately the majority of them don’t make the investment in upgrading the software that is the linchpin of their business until forced by the software companies. Even then many do not upgrade until something goes fundamentally wrong with their IT set up.

This unplanned approach costs time and money that many organisations can ill afford. Many business leaders, particularly in smaller organisations, can struggle to see the benefits of ensuring that they are using up to date software. They’ll replace plant equipment, company vehicles and other essential business equipment but somehow software isn’t given the same priority. Why take the risk on something that your business needs to function?

Five reasons that upgrading your software is crucial for your business:

  1. It can save you money in the long run – prevention is better than cure so they say; by investing rather than reacting you will be saving on cost in the long run. You can plan for the cost to your business and you won’t have to find call out fees and unnecessary upgrade costs.
  2. Your workforce will be more effective – if you are using accounting, graphic design or other specialist software then it’s always good for business if your team has the latest version to support them in their roles. It can also keep your clients happy if you are providing them with a service which heavily involves the use of these software packages.
  3. Software leads skills – Keeping on the subject of specialist software; in creative industries it’s the developments in software functionality that shape the skills needed to provide 5* service to your clients.
  4. It reduces stress – If, like many SME’s, you leave upgrading your key software packages, operating systems etc… until something goes wrong then there is a lot of stress involved. You may struggle to get IT support immediately, you will have to find the money to cover costs that weren’t budgeted for and you will have downtime that could mean getting behind on servicing your clients
  5. Less risk of downtime – in the case of using out of date operating systems such as the soon to be unsupported Windows XP if the system fails after the 8th April 2014 then the business may struggle to function.

So our advice is to ensure that you place the same level of importance on keeping your IT systems up to date as you would any other business equipment. It can save a lot of inconvenience in the long run.

About Ilkley IT Services

Ilkley IT services have been providing local businesses and home users in the Wharfedale area with reliable and cost effective IT and computer support since 2005. Our aim is to ensure that you IT systems perform to the highest standards possible through our call out and support contract services.

We also offer online data backup, antivirus and Microsoft Cloud Email set up and support.

Over 95% of our new business comes via recommendation and we are proud of our client list which includes big and small businesses alike.

To discuss your IT support contact us on 01943 601601 for a no obligation discussion.

Reduce stress – outsource your IT support

Many SME’s don’t have the resources or a need to employ an internal IT department but neither do they have a contract in place to ensure that their systems are running effectively. It’s understandable that sometimes business owners don’t see the value or realise the importance of having an IT support contract in place; especially if their IT system seems to be in perfect working order.

The thing with hardware and software though is that problems, when they occur, tend to have an instant impact on a business. This impact is often experienced in the form of downtime, missed deadlines and a panic to bring in someone to rectify the problem, especially if systems haven’t been upgraded, or relevant helpdesks are unable to identify or rectify the problem over the phone.

Not only is this approach costly but it can cause unnecessary stress for business owners and managers. By investing in an ongoing contract with a local computer support organisation such as Ilkley IT Services, not only will they get to know your systems inside out making them more effective when you do have an IT crisis but they can also perform the updates and upgrades required to ensure that breakdowns (the IT system’s and Business Manager’s!) happen less often.

In Summary

No IT support contract =

  • Unnecessary Stress
  • Business and staff downtime
  • Lost income
  • Missed deadlines and unhappy clients 

Investing in an IT support contact =

  • Peace of mind
  • More cost effective in the long run
  • Increased up time
  • Offering the best service to clients
  • A relationship with a company that understands your businesses IT needs and systems making any call outs and repairs quick and effective – getting your business back on track fast!

About Ilkley IT Services

Ilkley IT services have been providing local businesses and home users in the Wharfedale area with reliable and cost effective IT and computer support since 2005. Our aim is to ensure that you IT systems perform to the highest standards possible through our call out and support contract services.

We also offer online data backup, antivirus and Microsoft Cloud Email set up and support.

Over 95% of our new business comes via recommendation and we are proud of our client list which includes big and small businesses alike.

To discuss your IT support contact us on 01943 601601 for a no obligation discussion.