What forms of payment do we accept?
At this time, we are glad to accept Visa, MasterCard, American Express, and Discover credit cards as forms of payment for our services. We also accept Checks drawn on a US bank, in US dollars with proper ID. We are unable to process any other forms of payment.
How can FIDUCIAM help my organization?
FIDUCIAM knows and understands your organization’s technology needs. With the IT landscape rapidly and constantly changing, your need to implement the best solution for your company today and future-proof it for tomorrow is paramount. We research the competing offerings and bring you the optimum value based business solution. Our experienced team members can assist you to plan, negotiate pricing, purchase, configure, maintain and support your personal or company’s Information Systems.
Why use FIDUCIAM instead of my own in-house IT staff?
FIDUCIAM is there to supplement your in-house staff, not replace it. Our Team can assist with needs assessment, research valid solutions, help with project management, timely implementation, user training and ongoing support. We are there to help with those projects that you either do not have the time or bandwidth to accomplish.
Proactive Defence against Petya Ransomware
Petya Ransomware is different from the other popular ransomware these days. Instead of encrypting files one by one, it denies access to the full system by attacking low-level structures on the disk.
Disable Admin privileges on primary user account.
Run Windows Update to get the latest software updates.
Make sure any anti-virus product is up to date and scan your computer for any malicious programs. It's also worth setting up regular auto-scans.
Back up important data on your computer so it can be recovered if it's held for ransom.
Protect your (Home/Business) Wi-Fi Network
Online criminals often exploit your poor Wi-Fi security measures and “listen” to your traffic in order to retrieve sensitive information or take advantage of your network to launch malicious attacks.
Your wireless router comes pre-set with a default admin password such as “admin” and “password” which are easy for a malicious hacker to break into. Change the default password with a strong and unique one.
Disable Remote Access. Cybercriminals won’t be able access to your router’s private settings remotely.
Keep your router’s firmware up-to-date. Updates can sometimes be a chore but unpatched software functions as an open invitation for cybercriminals who know how to exploit those vulnerabilities.
Secure your Privacy and Data on your iPhone/iPad
Security is at perpetual war with convenience. The faster and easier it is for us to get to our stuff, the faster and easier it is for someone else to try and break in. Make it tougher for the Cyber Criminals!
Enable Find My iPhone. If your iPhone does get stolen, Find My iPhone may be the way you get it back.
Increase the strength of the passcode by choosing an alphanumeric passcode instead of the numeric passcodes.
Disable lock screen options
Turn on two-step verification for Apple ID and iCloud
Why you NEED a reliable Data Backup Solution
Someone once said, “It’s not a question if your hard drive will fail, but WHEN.” While there is a certain amount of humor in this statement, the unfortunate reality is that hard drive failure and other similar problems are more common than many people realize.
Whether you accidentally spilled coffee on your laptop’s keyboard, you failed to update your virus protection or you simply pressed the “delete” key at the wrong time, you are human and you will make mistakes on occasion.
Your Laptop or PC might get lost or stolen (in house or while travelling)
Power Failures, Spikes and Storage Media failure or corruption
Protection against Malware and Ransomware
Identify Internet of Things (IoT) Vulnerabilities
The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement. The constraints and security challenges posed by IoT connected devices are alarming and is predicted to grow exponentially by 2020