Computer One inspire a relationship built on trust. They have served us for 8 years and we trust their staff, their integrity and their technical knowledge. They support our critical business systems and play an important role in shaping our competitive advantage. Their expertise is something I don’t think we would get if we hired 2 or 3 people directly. I'm pleased to recommend them.
We are the kind of company that simply cannot afford to have our computers down; so we are prepared to pay for top class service, and that’s exactly what we get from Computer One. Whenever I have the slightest problem I make a call and they fix the issue fast.
One of our most recent projects was to create an accelerated and high performing Wide Area Network, capable of delivering voice and data over a combination of ADSL, Satellite and Cellular networks at remote locations around the country.
From the briefing in Brisbane to powering up the completed network on-site took just 14 days and it was a seamless experience. Our client came to us with a requirement, and we matched the technology and implemented a solution.
They said their previous IT consultancy, a globally-recognised Tier One provider, couldn’t even have completed its quote in that time. Now we provide a Managed IT Service to ensure that their ongoing IT requirements are catered for, without interruption.
We have the same skill sets and the same vendor relationships as a Tier One IT Consulting Company.
The difference with us is that you will engage directly with the person who can actually solve your problem.
As reported in IT News, malware that has a very specific purpose has been found lurking in the Google Play store. It’s called Overseer, and it’s designed to target business travellers going overseas. It steals lots of information for a very specific purpose. Once installed on a user’s Android device, Overseer collects and sends home […]
In IT Security, two industry terms deserve a bit of explaining. They are: Attack Vector Attack Surface An “Attack Vector” is the industry’s term for describing the path that a hacker or a malware application might follow to compromise your data. In the case of the Target credit card breach from 2013, the hackers gained […]
Headlines keep saying that the Internet of Things, billions of web-enabled devices that share information via cloud services, is coming. The fact is, it’s already here. From mining companies using thousands of sensors on plant and machinery to refine their maintenance schedules through to the IP camera that your business just installed beside the front […]