QUESTIONS?

Info

What forms of payment do we accept?


At this time, we are glad to accept Visa, MasterCard, American Express, and Discover credit cards as forms of payment for our services. We also accept Checks drawn on a US bank, in US dollars with proper ID. We are unable to process any other forms of payment.




How can FIDUCIAM help my organization?


FIDUCIAM knows and understands your organization’s technology needs. With the IT landscape rapidly and constantly changing, your need to implement the best solution for your company today and future-proof it for tomorrow is paramount. We research the competing offerings and bring you the optimum value based business solution. Our experienced team members can assist you to plan, negotiate pricing, purchase, configure, maintain and support your personal or company’s Information Systems.




Why use FIDUCIAM instead of my own in-house IT staff?


FIDUCIAM is there to supplement your in-house staff, not replace it. Our Team can assist with needs assessment, research valid solutions, help with project management, timely implementation, user training and ongoing support. We are there to help with those projects that you either do not have the time or bandwidth to accomplish.





Services

Proactive Defence against Petya Ransomware


Petya Ransomware is different from the other popular ransomware these days. Instead of encrypting files one by one, it denies access to the full system by attacking low-level structures on the disk.

  • Disable Admin privileges on primary user account.
  • Run Windows Update to get the latest software updates.
  • Make sure any anti-virus product is up to date and scan your computer for any malicious programs. It's also worth setting up regular auto-scans.
  • Back up important data on your computer so it can be recovered if it's held for ransom.
Contact us @ 972-505-2728 to perform a Windows Security Audit.




Protect your (Home/Business) Wi-Fi Network


Online criminals often exploit your poor Wi-Fi security measures and “listen” to your traffic in order to retrieve sensitive information or take advantage of your network to launch malicious attacks.

  • Your wireless router comes pre-set with a default admin password such as “admin” and “password” which are easy for a malicious hacker to break into. Change the default password with a strong and unique one.
  • Disable Remote Access. Cybercriminals won’t be able access to your router’s private settings remotely.
  • Keep your router’s firmware up-to-date. Updates can sometimes be a chore but unpatched software functions as an open invitation for cybercriminals who know how to exploit those vulnerabilities.
Contact us @ 972-505-2728 to perform a WiFi Security Audit & secure your networks.




Secure your Privacy and Data on your iPhone/iPad


Security is at perpetual war with convenience. The faster and easier it is for us to get to our stuff, the faster and easier it is for someone else to try and break in. Make it tougher for the Cyber Criminals!

  • Enable Find My iPhone. If your iPhone does get stolen, Find My iPhone may be the way you get it back.
  • Increase the strength of the passcode by choosing an alphanumeric passcode instead of the numeric passcodes.
  • Disable lock screen options
  • Turn on two-step verification for Apple ID and iCloud
Contact us @ 972-505-2728 to perform a Mobile Device Security Audit.




Why you NEED a reliable Data Backup Solution


Someone once said, “It’s not a question if your hard drive will fail, but WHEN.” While there is a certain amount of humor in this statement, the unfortunate reality is that hard drive failure and other similar problems are more common than many people realize.

  • Whether you accidentally spilled coffee on your laptop’s keyboard, you failed to update your virus protection or you simply pressed the “delete” key at the wrong time, you are human and you will make mistakes on occasion.
  • Your Laptop or PC might get lost or stolen (in house or while travelling)
  • Power Failures, Spikes and Storage Media failure or corruption
  • Protection against Malware and Ransomware
This is not something you can afford to keep pushing back! Contact us @ 972-505-2728 to explore local and cloud backup solutions.




Identify Internet of Things (IoT) Vulnerabilities


The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement. The constraints and security challenges posed by IoT connected devices are alarming and is predicted to grow exponentially by 2020 A clear emphasis on security from day one is always a good thing, especially when dealing with immature technologies and underdeveloped markets. Securing as much data as possible and rendering compromised data useless without wrecking your IoT infrastructure. It is also necessary to educate customers, employees and everyone else involved in the process about the risks of such breaches. Instruct them in what to do in case of a breach, and what to do to avoid one. Contact us @ 972-505-2728 to help in early identification of (IoT) Vulnerabilities





  • Facebook Social Icon
  • Twitter Social Icon
  • LinkedIn Social Icon
  • Yelp Social Icon

© 2017 Designed by FIDUCIAM TECHNOLOGY SOLUTIONS LLC