×

Tech Tuesday for September 28th

Z

Guides & Newsletters

Grab our growing library of business-related technical resources.



Tech Tuesday

We’ll be bringing you new and fascinating information every Tuesday in 2021. Don’t miss an episode!



Contact Us

Get in touch with us now.



Log in to Support

Log in to the Support Portal

Open a Support Ticket

Open a Support Ticket and get help.

Connecting to Support

Get help connecting to our remote support tool.

Have You Been Pwned?

Have your passwords been compromised?

Niagara Network and IT Support Logo
  • What’s New
  • About Us
    • We are Hiring
    • FAQs
    • Business Partners
  • Niagara Region
    • IT Services and Computer Repair in Welland
    • Computer Services for St Catharines
    • Computer Repair in St Catharines
    • IT Support in Port Colborne
    • Non-Profit Computer Support
  • Computer Service
    • On Demand Managed Services
    • Niagara UnManaged/On Demand IT Support
    • Office 365
      • Mailboxes, Aliases, Shared Mailboxes, Groups
    • Internet Services
      • Create Your Online Store
      • Web Site Repair
      • Power Hosting
  • Phone Systems
  • Support
Schedule a Chat

Tech Tuesday for September 28, 2021

Tech Tuesday

This Week

  • To Do Makes Your Life Easier
  • What You Need to Know about Security Testing
  • Septembers’ New eBook

Help Desk Support

  • Our “First-Time Fix” Rate For The Year 2021 Was 97%
  • Leveling Up: Help Desk Technician Tiers Explained
  • Our Customer Satisfaction Rate For August Was 100%
  • What Is An “SLA” And Why Are They Important?
  • Fixed Rate vs. Outsourced IT: How To Calculate The Value Of Your Support Contract
  • What Separates A “Great” Help Desk From The Rest?
Bowes IT Niagara IT Support Sept 2021 Technology Insider

Septembers' Technology Insider

If your IT Support Company is ALWAYS Fixing Your Technology

Septembers' Technology Guide

To Do Makes Your Life Easier

Half the battle of being productive is knowing what you need to do, by when.

 There’s a very powerful task manager that works with other Microsoft 365 applications. Here’s the lowdown on it.

This Months' Technology Insider

What repeat tasks could you automate?

Windows 11 launches in the next few months. Are your devices ready for it?

Finding information in Microsoft Teams.

Get it Now

This Months' Tech Guide

Is your IT support company always fixing your technology? These days most businesses prefer an IT partner who
proactively prevents problems from happening. Prevent your business from grinding to a halt and save a lot of money at the same time.

Get it Now

Email Hijack

What would you do if you returned from vacation to find that your business bank account had been robbed to the tune of $1200?  It’s not all that hard or uncommon for that matter. Learn the in and outs of protecting email in my new ebook, Email Hijack.

Click Here

What You Need to Know about Security Testing

You want to keep your IT in top shape. Your business technology supports both your productivity and profitability. You don’t want to be dealing with downtime. You also want to avoid running afoul of any industry regulations or standards. But how does a business gauge IT fitness? That’s where IT audits, security assessments and penetration testing come in.

First, understand that IT audits and security assessments are different, and both are important to your business and its risk management practices. Yet, they have distinct goals.

An IT audit evaluates if your business is meeting regulations or guidelines. A third party well versed in your industry’s technology best practices does the audit. It checks your technology processes, control systems, and data procedures and policies, and all against standards established by government or industry associations.  

Many industries need an external audit for certification. For example, merchants need to follow the Payment Card Industry Data Security Standard and a Report on Compliance (ROC) from an auditor details how cardholder data is protected.  

The IT auditors have deep knowledge of the guidelines. They are going to dig into the finer points of your IT environment. Their audit identifies any shortcomings and gives you recommendations on how to improve. Failing to meet standards in the audit, though, can lead to compliance issues. That’s why security assessments are a good idea too.

The Value of Security Assessments 

The security assessment can be done internally or with the help of an IT expert. Of course, where there are standards or regulations, there will be overlap. The security assessment determines what you are doing well and could be doing better.

This is a proactive step to identify and fix any deficiencies. Consistent security assessments provide benchmarks and prepare for the rigorous IT audit.

The assessment’s high-level look at security should follow any significant business change, and it can help determine if there are new risk factors. 

Other Security Services for SMBs  

You’ll also likely hear about vulnerability assessments and penetration testing, and these are two more security services that are often confused. Like the two above, though, they have differences.

The vulnerability assessment is a component of a security assessment, but the difference is that a vulnerability scan is automated, and a security assessment has parts that require manual investigation.

A vulnerability assessment scans the business network for any security weaknesses. The best results let you know what vulnerabilities are the highest priority.

Penetration testing takes this to another level. Professionals experienced in circumventing security defences do this testing, attempting to exploit the vulnerability assessment’s weaknesses. This lets your business see where it is genuinely at risk of unauthorized network access. 

Typically, the vulnerability assessment is done more often, and penetration testing is more likely an annual event. The good thing about the latter is that you’ll also get a report with recommended remediations.

Get a broader and deeper understanding of your business technology. Any of these security services can help. Our IT experts can review your current setup. We’ll also recommend the best next steps to bolster your cyber security. Call us now at 289-479-5606.

 

The Devil You Know: Insider Threats to Business Cybersecurity

Insider Threat Risk is on the Rise: Detect and Prevent 

The frequency of insider threat incidents is on the rise. Between 2018 and 2020, they spiked by 47%, according to the Ponemon Institute. 

Our latest ebook — The Devil You Know: Insider Threats to Business Cyber Security — shares essential information you need to detect and prevent insider threats. 

This informative guide covers:  

  • What an insider threat is
  • Who can be an insider
  • Who is at risk of insider attack
  • What are consequences of insider attacks
  • How to detect insider threats
  • How to prevent insider attacks and threats
  • You’ll also learn how work from home complicates things as far as insider risks too.

Get it Now

Help Desk Support

01

Our “First-Time Fix” Rate For The Year 2021 Was 97%

The number of tickets that are resolved on the very first contact attempt have a direct impact on the overall satisfaction of customers. Escalation typically leads to longer wait times and thus less productive users.

Field Service Glossary: Definition of First Time Fix Rate (freshdesk.com)

02

Leveling Up: Help Desk Technician Tiers Explained 

While we know that all Help Desk Technicians are not created equal, customers are not always that understanding. They often get frustrated when tickets are transferred to different people for various reasons and can barely discern the difference between Level 1, 2, and 3.

IT Support Levels Clearly Explained: L1, L2, L3 & More – BMC Software | Blogs

03

Our Customer Satisfaction Rate For August Was 100%

For most Help Desks, customer satisfaction rates are the ultimate metric. These are often measured through post-resolution surveys and used to measure individual technicians and teams as a whole.

Using Customer Satisfaction (CSAT) as a Service Desk Metric – BMC Software | Blogs

04

What Is An “SLA” And Why Are They Important? 

While customer satisfaction is an important measurement, it is ultimately subjective. Just because your Help Desk was able to achieve satisfaction from the end-user, doesn’t mean that you fully met your contractual obligation to them. This is where SLAs come in, as they look to measure your team’s performance against a set of agreed-upon criteria.

What is an SLA? Best practices for service-level agreements | CIO

05

Fixed Rate vs. Outsourced IT: How To Calculate The Value Of Your Support Contract

As the industry has moved away from Time & Material contracts and towards a flat rate, customers often look to compare the difference. This helps you to understand the cost and whether or not the transition to fixed rate was in your best interest.

Best fit IT pricing models with mutual benefits for service providers and customers. (mindtree.com)

06

What Separates A “Great” Help Desk From The Rest?  

​

Help Desks can sometimes be a thankless operation. It seems as though no matter how above and beyond your team goes, you eventually start to diminish returns. This is one of the reasons why it is easy to offer average service and why many do.

5 Characteristics of an Excellent Help Desk (motherg.com)

Book Your Discovery Call

Would you like to see if Bowes IT Solutions is a good fit for your growing business? Book a discovery call now so we can learn more about each others’ business.

Book My Free Discovery Call
Glen Bowes, Niagara Computer Support

Niagara’s Tech Support Services

We approach IT with a simple principle – Keep IT Simple without scrimping on features. We’ve built a proven process that gets IT right every time. Like a Tim Hortons coffee or a MacDonald’s Big Mac. Give your staff the tools they need to succeed.

Enabling only the features you need on technology that grows with your business makes troubleshooting and maintenance a breeze. When you need a new feature, our technology isn’t crippled. We turn it on, document it, monitor it, and your business grows effortlessly.

Don’t leave a critical business component to chance. Talk to us today.

Confidential Information and Password Management Policy

What’s New

How concerned should you be about cyber attacks?

How concerned should you be about cyber attacks?

by Glen | May 5, 2025 | Tech News

« Older Entries

Follow Us

  • Follow
  • Follow

Address

38 Dorothy St.
Welland ON L3B 3V7

Email Us

info@bowesit.com

Call Us

(289) 479-5606