Standard Maintenance

Keep your system running at max performance with general maintenance.

A physical maintenance will involve a physical cleaning of the system and its peripherals, as well as cable organization (and extension if necessary).

A system maintenance consists of:
Malware Scan
Basic Malware Removal (when the anti-malware can easily remove the malware first try)
Updates Check
Check of startup processes
Check of installed programs
Check of any errors logged by the system

  • Assures proper system function
  • Keeps security and stability high

Malware Removal

It's absolutely best to prevent malware before it strikes, but should your system get infected, we can usually get you cleaned up and running in no time.

There are various types of malwares with various severities. A virus is just one type of malicious software, that specifically can replicate itself.

If you believe your system has malware, we recommend isolating it from the network and doing a malware scan immediately. Our choice is Malware Bytes (free for on-demand scanning & removal, paid for automatic scanning and live protection).

Please note: There are many types of malwares that can replicate itself over your network, onto other devices. Caution should always be exercised, especially in business.

Also note that below are general descriptions of malware types. Each individual code could be different and have different or multiple effects on a system, and could be easier or harder to remedy then normal.


  • Adware
  • Low severity
  • Often easy to remove, but sometimes requiring finding and removing a parent program.
  • Displays advertisements wherever it can, usually through pop ups. These ads may also contain malicious code.
  • Often changes home pages and default search engines.
  • Often used to gain money through ad revenue.

  • Keyloggers
  • High severity
  • Can be easy to remove
  • Monitors keystrokes.
  • Often used to record typed usernames, passwords, credit card information.

  • Ransomware
  • Severe
  • Can be impossible to remove without data loss
  • Often encrypts all data in such a way it is inaccessible, until you pay the ransom.
  • Will block access to your system.
  • Often used to gain money through ransom.

  • Spyware
  • High severity
  • Can be easy to remove
  • Will collect user activity and information.
  • Often silent and hard to detect without malware detection.
  • Often used to gain money through credit card theft.

  • Wiper Malware
  • Severe
  • Often wipes all data

  • Rootkits
  • High severity
  • Can be difficult to detect and remove.
  • Gives unauthorized users (or hackers) remote access to the device.

  • Trojans
  • High severity
  • Can often be easy to remove
  • This is any type of malware that disguises itself as something good, such as a malware or virus removal program.

  • Worms
  • Severe
  • Could be tricky to catch
  • Malware that spreads through a network by replicating itself.

Social Engineering

Since we're talking about malware, let's talk about social engineering.

Social Engineering (often used by scammers, and against businesses large and small) is when someone does something malicious (such as stealing data) by manipulating (or tricking) someone.

Everyone should be aware of scammers, but businesses should be especially careful as they are often targeted, weather a large company for its revenue, or small company for the ease of a likely untrained end-user.

Bear in mind, these attacks can come from phone calls, emails, texts, in person, or anyway you interact with others.


  • Phishing
  • The most common type of attack, the attacker tricks the user into giving them information.
  • This could be anything from saying "I'm from Microsoft you have a virus" to get your credit card information, or have you install remote access software, to sending you an email with a "fake link" to what looks like a legitimate login page (but is actually their own replica to record what you enter).

  • Baiting
  • Similar to phishing, but with the promise of a good or item.
  • An example would be you won some money, and they just need your debit card info to deposit the funds.

  • Quid Pro Quo
  • Baiting but with a service instead of an item.
  • Sign up for cheap "and meet single house wives in your area". And yes, I have seen scam emails that actually said that. On websites, they may have ads that use your IP address to even specify a near-by town.

  • Tailgating
  • This is when someone unauthorized follows someone authorized into a restricted area.
  • This is not always as simple as someone sneaking in behind you, in larger companies this is often someone enters the building (through the restricted door) behind you but makes themself know. They appear to belong there, may thank you for holding the door for them, and often carry confidence. This doesn't mean that they can't then say "Oh where is the spare desk? First time in this office". An employee may then point a hacker right towards a spare terminal on your network to use.

  • Pretexting
  • Attackers will often impersonate someone known or trusted and create a fabricated scenario to gain your trust and ask you for information.
  • Examples range from "Hey I'm from I.T., your user account is having an issue, what's your password so we can try something?" to messaging you about something like a suspicious money transfer.
  • Not only will they attempt to gain your trust, they will often pressure you by creating a sense of urgency and/or fear, such as the classic "There is a $1000 pending charge for a new iPhone from amazon" scam call.