Computer Consultants Agency


Q: Can I get help on weekends and holidays?
A: Yes, as a client, you can get the support you need 365 days a year.

Q: How long is your response time for questions and problems?
A: Our response time is within 4 hours of your initial request.  Most  requests are solved within 24-48 hours. 

Q: What is the best way to contact you?
A: By clicking the contact us link on our web site, by email or by text to 404-740-3800

Q: Do you support all software, hardware and network platforms?
A: No, we support only Microsoft, Ethernet and IBM platforms.

Q: What is your on-line Virus Scan?
A: It's a free web based virus scan to protect your PC from virus attacks.  Our link will scan your computer for virus on-line and remove any infection found.


Q: What are administration support services?
A: We manage computer setup and networking, wireless networks, automated backups, security, hardware and software troubleshooting, system settings and file migrating, spy ware virus, and adware removal.

Q: Do your company provide support services for all computer platforms?
A: We only specialize in installing and administering windows-based systems in domain or stand-alone configurations.

Q: What Windows platforms do you support?
A: Currently we are providing support services for Windows Server family and Operating Systems, Windows NT, 2000-2008, XP, Vista, Windows 7, 8, and 10 (beta); Office suites 2003, 2007, 2010, 2013,and 365 subcriptions.

Q: Do you support all software, hardware and network platforms?
A: No, we support only Microsoft, Wireless and Ethernet networks and IBM hardware platforms.

Q: What is migration?
A: The process of either (1) upgrading to a new version of product by installing the product on a new computer and then transferring data and settings from the computer running the precious version of the product; or, (2) migrating an existing installation of Windows server software to a new computer.


Q: What are the programming services offered by your company?
A: Application and utility programming,  systems analysis, database management systems, Web Templates, Scripts, and SQL Programming.

Q: How do I pay for programming services?
A: We will initiate a contract for services stating a nonrefundable retainer of 1/2 the initial setup fee is due upon signing of the contract. The remaining balance will be due upon completion of the project.

Q: Is there a finance charge on programming services?
A: There will be a minimum finance charge of 1.5% imposed on accounts that are over 30 days past due.

Q: Do you support all software, hardware and network platforms?
A: No, we support only Microsoft, Wireless, Ethernet networks and IBM platforms.


Q: What are low-cost security improvements?
A: Document and publish what you expect your system support team and users to do. Establish baseline security configurations for all desktops and network infrastructure. Monitor log files from critical systems on a daily basis. Install antivirus and anti-spy ware software.

Q: Why are security consultations required?
A: Security consultations are used to discover information system and organizational weaknesses that can be exploited by hostile entities.

Q: What are the steps to take when responding to a security incident?
A: 1. Preparation, 2. Identification, 3. Containment, 4. Eradication, 5. Recovery, 6. Follow-up.

Q: What tools can I use to block network attacks from outside my infrastructure?
A: Intrusion Prevention Systems can recognize unique characteristics of attack traffic, and then blocks it. IPS analyze the content of network traffic and blocks the bad packets. Other tools that can be used to block an attack are Firewalls, Web Filtering, Intrusion Detection, Anti-Spy ware and Antivirus software.

Q: I need to provide low cost remote access to our corporate network. What can I use?
A: Virtual Private Networks enable users to access their corporate networks through low cost Internet connections and a web browser.

Q: What are the best practices for securing a home network?
A: Install antivirus and anti-spy ware software; use a Internet firewall; use strong passwords for your E-mail accounts; backup your files regularly to removable media or external drive; and configure the security options on your web browser by disabling Active X controls.