Company Name
Top Slogan

Security (Prevent Viruses, Hackers and ID theft)

computer-securityEveryone sooner or later has computer troubles... Computer has slow boot or won't boot? : It runs too slowly? : Can't get online? : Ran out of hard Drive space? : Want a DVD or CD burner drive? : Need a faster processor or memory? : Hard Drive Crash? : Viruses or spyware issues? : Browser Hijacked? : Internet Problems?

There's no need to get upset and frustrated, we'll fix it!



Standard Package $99

 



•    Includes a free firewall installation/activation for a whole year
•    Includes antivirus/antispyware removal
•    Configuration of firewall
•    Password encrypt computer to prevent unauthorized access to personal files/folders

•    Full system dusting and clog prevention to allow system ventilation to maximize performance

•    Multiple account configuration in case you allow others to access your computer.  Prevents others from seeing your private info like your pictures of files although they are on your computer.

 



Advance Package $139

 



•    Includes a free firewall installation/activation for a whole year.
•    Includes antivirus/antispyware removal.
•    Configuration of firewall.
•    Password encrypt computer to prevent unauthorized access to personal files/folders.
•    Internet security configuration so you can surf the internet and open emails with confidence.
•    2-level layer password computer encryption to prevent unauthorized access to computer hard    drive, personal files/folders.
•    Creation of a restoration CD (in the event of a virus attack, you can easily restore your computer)

•    Full system dusting and clog prevention to allow system ventilation to maximize performance

•    Multiple account configuration in case you allow others to access your computer.  Prevents others from seeing your private info like your pictures of files although they are on your computer.

 



Premium Package $169

 

 



**Includes a family protection package
  -
•    Child protection service, which protects children from predatory online activities, X-rated images, and certain Adult-rated websites and games
•    Will configure child monitoring capability (enables parents/guardians to monitor incoming/outgoing email and websites visited from their child’s email account)**
•    Includes a free firewall installation/activation for a whole year.
•    Includes antivirus/antispyware removal.
•    Configuration of firewall.
•    Password encrypt computer to prevent unauthorized access to personal files/folders.
•    Internet security configuration so you can surf the internet and open emails with confidence.
•    3-level layer password computer encryption to prevent unauthorized access to computer hard drive, personal files/folders.
•    Creation of a restoration CD (in the event of a virus attack, you can easily restore your computer)

 


**please note, computer must be equipped with Microsoft Vista and Microsoft Outlook as the email software. Configuration of Microsoft Outlook is free of charge. A valid email address account is required.



Knowledge

KNOWLEDGE IS POWER!



The online security problems facing home users and small businesses are different from those facing larger companies and corporations. Here’s a list of threats you may encounter:

    * Malware: Is the generic name for all malicious software. Some people also talk of greyware which refers to software that’s annoying rather than dangerous.
    * Virus: A small program designed to automatically copy itself from one computer to another. Viruses are attached to other pieces of software or hidden inside images, games and music files. They usually travel from machine to machine by email, instant messaging or file transfers. Although some viruses are harmless, most are disruptive, the worst can stop a PC from working.
    * Worm: Also a self-replicating program, but unlike viruses, worms can automatically travel from machine to machine without being attached to other pieces of software. This means in addition to any other damage they slow networks because they can consume bandwidth.
    * Trojan: The name given to a program which looks harmless, but has an unexpected malicious purpose. Some start their mischief immediately they are loaded, others may wait for a period of time, possibly collecting data without the computer owner’s knowledge.
    * Spyware: A program designed to collect information about a computer and its user that the spyware author can use to make money. Typically spyware may monitor your web browsing and target pop-up advertising at you or divert you to other web sites.
    * Rootkit: A program designed to modify a computer’s operating system to hide the behaviour of other malware.
    * Keylogger: Software that collects keyboard input – possibly to collect passwords or important account information. Keyloggers can then send this information back to criminals allowing them to impersonate users and, for example, robbing their online banking accounts.
    * Botnet: Programs used to control, update or trigger activity in previously infected systems.
    * Backdoor: A way of getting undetected access to a computer system.
    * Zombie: A computer being controlled by another user to perform some malicious online tasks.
    * Spam: Unwanted email, instant messages or other form of electronic communication. Spam clogs email inboxes and the sheer volume of spam (as much as 95% of all email traffic) slows networks.
    * Phishing: is when someone fraudulently tries to get hold of important information such as passwords and bank account details by pretending to be a trustworthy source. Phishers may send authentic-looking emails asking for the data or with links to a fake web site.
    * Adware: Strictly speaking this isn’t a threat, but an annoyance. It refers to any software that bombards you with unwanted advertising