There's a myriad of diverse technologies in the world, making it virtually impossible for anyone to stay abreast of them all.
To ensure that we consistently deliver top-tier, rapid, and exceptional service, we are unwavering in our commitment to helping our clients make the most of the technologies we are most passionate about.
We affectionately call this our "Recommended Technology Platform" or "RTP" for short.
Our goal is to have all our clients embrace as much of our RTP as possible.
We maintain an in-depth understanding and provide ongoing training on every aspect of our RTP to ensure that your IT infrastructure remains seamlessly integrated, swiftly supported, and truly world-class.
Furthermore, we practice what we preach by fully integrating every facet of the RTP into our own business operations!
Windows Devices
HP, Dell
Vendor Supported Warranty
Windows 10/11 Professional
Tech Guard Antivirus
Tech Guard End Point Backup
Tech Guard Monitor Service
Minimum Specifications:
Intel i5, 16GB RAM, 500GB Drive
Recommended Specifications:
Intel i7, 16GB RAM, 512 SSD
Apple Devices
Vendor Supported Warranty
MacOS High Sierra
Tech Guard Antivirus
Tech Guard End Point Backup
Tech Guard Monitor Service
Minimum Specifications:
Intel i5, 16GB RAM, 500GB Drive
Recommended Specifications:
Intel i7, 16GB RAM, 512 SSD
Windows Devices
HP, Asus, Toshiba, Lenovo – not limited too but most brands we will support
Vendor Supported Warranty
Windows 10/11 Professional
Tech Guard Antivirus
Tech Guard End Point Backup
Tech Guard Monitor Service
Minimum Specifications:
Intel i5, 8GB RAM, 500GB Drive
Recommended Specifications:
Intel i7, 16GB RAM, 512 SSD
Apple Devices
Vendor Supported Warranty
MacOS High Sierra
Tech Guard Antivirus
Tech Guard End Point Backup
Tech Guard Monitor Service
Minimum Specifications:
Intel i5, 16GB RAM, 500GB Drive
Recommended Specifications:
Intel i7, 16GB RAM, 512 SSD
Windows Devices
HP, Dell
Vendor Supported Warranty
Windows Server 2012,2016,2019
Tech Guard Antivirus
Tech Guard Server Backup
Tech Guard Monitor Service
Minimum Specifications:
Intel i7, 16GB RAM, 2 X 2TB Drive
Recommended Specifications:
Intel i7, 32GB RAM, 512 SSD, 2X 2TB Drive
Routers, Switches and Access Points
Fortinet, Sophos, Ubiquiti
Vendor Supported Warranty
Cabling
Cat 5E or better
Email and Collaboration
Office 365 Business Premium
Enterprise E3,
Exchange Online
Sharepoint/Teams
Files in One Drive
Chrome Web Browser
Cloud Hosting
AWS and VMCentral
Melbourne/Sydney Location
Vendor Supported SLA
Web Hosting
Tech Guard Hosting Platform
Managed WordPress
Vendor Supported SLA
1-4 Staff on Site
NBN 100MB
Unlimited Data
Less than 200:1 Contention Ratio
5-10 Staff on Site
NBN 100MB - 250MB
Unlimited Data
1:1 Contention Ratio
Vendor Supported SLA
10+ Staff on Site
Fibre or High-Speed Wireless Link
Unlimited Data
1:1 Contention Ratio
Vendor Supported SLA
In today's digital landscape, cybersecurity is not merely an option—it's an absolute necessity.
Protecting your organisation against the ever-evolving threat landscape requires a proactive approach and a set of minimum requirements.
Backups: Regular and comprehensive data backups are your safety net in the event of data loss due to cyberattacks, system failures, or natural disasters. They ensure that critical data can be restored, minimizing downtime and financial loss.
End Point Protection: Securing all devices and endpoints, from computers to mobile devices, is crucial. Endpoint protection solutions safeguard against malware, ransomware, and other threats that can infiltrate your network through various entry points.
Cyber Awareness Training: Your team can be your strongest defense or your weakest link. Cyber awareness training educates your employees about the latest threats, phishing tactics, and safe online practices, reducing the risk of human error leading to security breaches.
Email Protection: Email remains a common vector for cyberattacks. Robust email protection solutions detect and mitigate threats, such as phishing attempts and malware, before they reach your inbox, reducing the risk of falling victim to email-based threats.
These are our bare minimum requirements form the foundation of a strong cybersecurity strategy, helping your organisation to proactively defend against threats and minimise the impact of potential cyber incidents.
Cybersecurity is no longer a choice—it's a vital element of business continuity and client trust in the digital age.
So any clients we take on need to ensure these 5 pillars of Cyber Security are the bare mimimum they invest into their business. There are many more layers which we will go through in our Discovery Session and Cyber Risk Assessments for your business.
We are proud of our troubleshooting and communications skills and ability to solve diverse technical problems.
For a technology that is out of scope within our RTP, it may take us extra time to familiarise ourselves with managing and supporting them.
Usually, these issues can and are often supported by a 3rd party vendor, and we may help you liaise with the vendor directly on your behalf to get the problem solved effectively and quickly.
With purchasing out of scope 3rd Party Vendor products, we may be able to buy items subject to availability. If any unforeseen problems are encountered during setup or ongoing maintenance, we will need to invoice you for this time.
Areas We Serve
SUPPORT