Services Customized to Client’s Needs
At RufusTech we have discovered that clients vary greatly in their approach to computing and technology within their businesses. This holds true from both budgetary and operational standpoints. Asking our clients to conform to a predefined “service plan” is a poor value. Instead, our focus is to provide our time and expertise scaled in the way that best suits each individual client. We have a detailed client questionnaire which we use to create the customized service plan.
- Some of our clients call us with questions very often and expect regular and proactive follow-up service.
- Some of our clients have very strict budgetary requirements and prefer to save up a list of issues and schedule service calls “on demand.”
- Some of our clients have server computer(s) that provide their business with mission-critical e-mail communications, business-specific applications, and file storage. Clearly, these clients depend on us to keep their vital infrastructure running smoothly and reliably.
Maintenance: Proactive versus Reactive Approach
How do you like to take care of your car? Do you wait for things to break before you take your it into the mechanic or do you prefer regular oil changes and tuneups? Do you wait for the roof to leak on your home, or do you get the roof replaced every 10-20 years whether it “needs it” or not? The same principles apply to your network, servers and computer workstations. We can be as proactive or reactive in our approach as you prefer us to be.
Our Typical Business Services
- User support (“helpdesk”) services either by telephone, e-mail, remote computer access, or on-site.
- Installation of software upgrades and operating system security patches.
- Troubleshooting and repair of hardware and software when problems arise.
- Unbiased advice regarding the purchase of new equipment and/or software applications.
- Server, firewall, and network infrastructure monitoring from operational and security standpoints.
- Spam (unsolicited e-mail) control measures and monitoring.
- Server hardware, software, and operating system upgrade projects.
- Disaster preparedness planning.
- Disaster recovery related repairs.
- Cyber Security preparedness and audits.
- Disaster recovery audit (to determine time and expense required to get back up and running in the event of a disaster affecting your computing installation.)
- One-on-one user training or courses for groups.
Typical Business Technologies We Install, Maintain, and Support
- Back-up systems to save your vital business data and enable faster disaster recovery.
- Virtual Private Network (VPN) which is used for accessing your business network from home or travels.
- Windows Server/Small Business Server.
- Server Virtualization.
- Linux based servers and workstations.
- Windows XP/Vista/7/8/10 workstations.
- Macintosh OS X Servers (Unix based).
- Mac OS workstations. Leopard, Snow Leopard, Lion, Mountain Lion, Mavericks, Yosemite, El Capitan, Sierra. (OS X version 10.5, 10.6, 10.7, 10.8, 10.9, 10.10, 10.11, 10.12)
General Policies and Practices
- We maintain detailed documentation of your computing equipment, facilities, and network, which enhances our ability to respond quickly to day-to-day issues and is a vital part of disaster recovery preparedness.
- We respond to your time-sensitive requests within 4 business hours, urgent requests sooner.
- Customer accessible workorder system.
- We prioritize outages and disaster recovery calls first. Routine service requests are served on a first-come first-served basis. You may be asked to re-schedule a routine service call in the event of an outage or disaster at another client site. We appreciate your understanding. In these rare events you realize that your urgent calls will also supersede regularly schedule work for other clients.
- For full details, see our Business Policies Page.
References and Testimonials
See our References & Testimonials page.