top of page

Our support

Discover why more companies rely on PHITELCO as a trusted IT company and an extension of their core team.

General Policies and Practices

  • We maintain detailed documentation of your computing equipment, facilities, and network, which enhances our ability to respond quickly to day-to-day issues and is a vital part of disaster recovery preparedness.

​

  • We respond to your time-sensitive requests. within 4 business hours, urgent requests sooner.

​

  • Customer accessible work order system.

​

  • We prioritize outages and disaster recovery calls first. Routine service requests are served on a first-come first-served basis. You may be asked to re-schedule a routine service call in the event of an outage or disaster at another client site. We appreciate your understanding. In these rare events you realize that your urgent calls will also supersede regularly schedule work for other clients.

​

​

Support center

Contact:
Mobile: 09702994274

VIber no. 09702994274

Whatsapp no. 09702994274

Skype:
phitelco.helpdesk

Maintenance proactive vs reactive approach

How do you like to take care of your car? Do you wait for things to break before you take your it into the mechanic or do you prefer regular oil changes and tuneups? Do you wait for the roof to leak on your home, or do you get the roof replaced every 10-20 years whether it “needs it” or not? The same principles apply to your network, servers and computer workstations. We can be as proactive or reactive in our approach as you prefer us to be.

2

Typical Business Technologies We Install, Maintain, and Support

  • Back-up systems to save your vital business data and enable faster disaster recovery.

  • Virtual Private Network (VPN) which is used for accessing your business network from home or travels.

  • Windows Server/Small Business Server.

  • Server Virtualization.

  • Linux based servers and workstations.

  • Windows XP/Vista/7/8/10 workstations.

  • Macintosh OS X Servers (Unix based).

3

Our managed service provider 

  • User support (“helpdesk”) services either by telephone, e-mail, remote computer access, or on-site.

  • Installation of software upgrades and operating system security patches.

  • Troubleshooting and repair of hardware and software when problems arise.

  • Unbiased advice regarding the purchase of new equipment and/or software applications.

  • Server, firewall, and network infrastructure monitoring from operational and security standpoints.

  • Spam (unsolicited e-mail) control measures and monitoring.

  • Server hardware, software, and operating system upgrade projects.

  • Disaster preparedness planning.

  • Disaster recovery related repairs.

4

Cyber security service provider 

  • Cyber Security preparedness and audits.

  • Disaster recovery audit (to determine time and expense required to get back up and running in the event of a disaster affecting your computing installation.)

  • One-on-one user training or courses for groups.

bottom of page