Initial commit - 67 public docs
This commit is contained in:
commit
fb04734f8f
67 changed files with 4001 additions and 0 deletions
47
Administrative_Credentials.md
Normal file
47
Administrative_Credentials.md
Normal file
|
|
@ -0,0 +1,47 @@
|
|||
# Administrative Credentials
|
||||
|
||||
## tl;dr
|
||||
|
||||
Admin Credentials are highly restricted due to security risks; we recommend using our [PAM ](https://dbits.ca/docs/public/services-and-offerings/helpdesk-by-digibandit/pam/)offering or [tasking us](https://dbits.ca/ticket/) if you need to action something as an admin.
|
||||
|
||||
---
|
||||
|
||||
## Introduction
|
||||
|
||||
At DigiBandit IT Services in New Brunswick, Canada, we prioritize the security and integrity of your IT systems. This guide outlines our policy on managing administrative credentials for servers and workstations, emphasizing secure practices.
|
||||
|
||||
## Understanding the Risks
|
||||
|
||||
Administrative credentials, providing complete system control, are susceptible to risks like unauthorized access, compliance violations, and increased vulnerability to cyber-attacks if mismanaged.
|
||||
|
||||
## Our Approach to Admin Credentials
|
||||
|
||||
### Limited and Controlled Access
|
||||
|
||||
- We adhere to the **principle of least privilege**, granting necessary access only.
|
||||
|
||||
- Access requests are documented and require managerial approval for accountability.
|
||||
|
||||
### Utilizing AutoElevate for Secure Access
|
||||
|
||||
- We use [AutoElevate Privilege Access Management](https://dbits.ca/docs/public/services-and-offerings/helpdesk-by-digibandit/pam/) for controlled access requests.
|
||||
|
||||
- This tool allows the controlled elevation of privileges, ensuring secure and efficient performance of tasks requiring admin access.
|
||||
|
||||
- Clients are encouraged to utilize this service for secure access management.
|
||||
|
||||
### Compliance with Canadian Standards
|
||||
|
||||
Our policies align with Canadian privacy laws like PIPEDA, CCIRC guidelines, and international standards such as ISO/IEC 27001.
|
||||
|
||||
### Termination of Agreement
|
||||
|
||||
- Upon the termination of our service agreement, we will release a custom admin account credential.
|
||||
|
||||
- Credentials are provided via BitWarden Send or other encrypted methods within 24 hours of agreement termination.
|
||||
|
||||
## Conclusion
|
||||
|
||||
Our policy is designed to protect your organization from the risks associated with administrative credentials. We maintain a secure IT environment by using tools like AutoElevate and adhering to Canadian regulations.
|
||||
|
||||
For admin-level tasks or assistance, please get in touch with us. We’re committed to supporting you while ensuring a secure and compliant IT infrastructure.
|
||||
73
After_Hours_Support.md
Normal file
73
After_Hours_Support.md
Normal file
|
|
@ -0,0 +1,73 @@
|
|||
# After-Hours Support
|
||||
|
||||
## Hours of Operation
|
||||
|
||||
**Regular Business Hours:** Monday-Friday, 8:30 AM - 5:00 PM AST
|
||||
|
||||
**After-Hours:** Evenings, weekends, and statutory holidays
|
||||
|
||||
## MITS Emergency Support
|
||||
|
||||
digiBandit provides after-hours emergency support for Managed IT Services (MITS) clients experiencing critical system failures.
|
||||
|
||||
### What Qualifies as an Emergency
|
||||
|
||||
After-hours support is available for **Priority 1 emergencies only**:
|
||||
|
||||
- Complete network or internet outage affecting all users
|
||||
- Server failure preventing business operations
|
||||
- Active security breach or ransomware attack
|
||||
- Critical system failure affecting multiple users
|
||||
- Complete email system failure
|
||||
- Critical backup failure with imminent data loss risk
|
||||
|
||||
### What to Expect
|
||||
|
||||
- **Initial Response:** Within 30 minutes
|
||||
- **Remote Triage:** Within 1 hour
|
||||
- **On-site Dispatch:** Within 2 hours (if required)
|
||||
|
||||
### How to Request Emergency Support
|
||||
|
||||
1. **Call:** 1-506-988-9243
|
||||
2. **State:** "MITS emergency requiring after-hours support"
|
||||
3. **Provide:**
|
||||
- Your company name
|
||||
- Number of affected users
|
||||
- Brief description of the issue
|
||||
- Callback number for the decision maker
|
||||
|
||||
### After-Hours Rates
|
||||
|
||||
| Service Type | Rate |
|
||||
|--------------|------|
|
||||
| Remote Support | $195/hour |
|
||||
| On-site Support | $260/hour |
|
||||
| Minimum Billing | 1 hour |
|
||||
|
||||
**Note:** MITS clients receive the first 2 hours per month of P1 emergency response included in their agreement.
|
||||
|
||||
## Non-Emergency Requests
|
||||
|
||||
For issues that are not emergencies:
|
||||
|
||||
- Submit a ticket via **hey@dbits.ca**
|
||||
- Your request will be addressed the next business day
|
||||
- Subject line: "MITS - [Your Company] - [Brief Issue]"
|
||||
|
||||
### Not Covered After-Hours
|
||||
|
||||
The following are addressed during regular business hours:
|
||||
|
||||
- Single workstation issues
|
||||
- Printer problems
|
||||
- Password resets
|
||||
- Software installation requests
|
||||
- Performance issues
|
||||
- Non-critical updates
|
||||
|
||||
## Questions?
|
||||
|
||||
Contact us during business hours at **1-506-404-0055** or email **hey@dbits.ca** to discuss your support coverage.
|
||||
|
||||
<!-- dbits-9600 -->
|
||||
39
BYOD_Bring_Your_Own_Device.md
Normal file
39
BYOD_Bring_Your_Own_Device.md
Normal file
|
|
@ -0,0 +1,39 @@
|
|||
# BYOD (Bring Your Own Device)
|
||||
|
||||
> For the complete policy details, see [BYOD Policy](./BYOD_Policy.md).
|
||||
|
||||
## **Purpose**
|
||||
|
||||
Ensure the security and confidentiality of company data in alignment with the Personal Information Protection and Electronic Documents Act (PIPEDA) when accessing company resources via personal devices.
|
||||
|
||||
## **Scope**
|
||||
|
||||
Applicable to all clients and their employees of DigiBandit IT Services intending to access company resources (e.g., email, files, applications) on personal devices like cell phones, laptops, or tablets.
|
||||
|
||||
## **Policy Highlights**
|
||||
|
||||
- **Device Registration and Approval:** Employees must gain approval and register their devices with DigiBandit IT Services' IT management system before accessing company resources.
|
||||
|
||||
- **Security Requirements:** Mandates up-to-date antivirus software and security patches on personal devices, alongside strong passcodes or biometric locks and enabled device encryption.
|
||||
|
||||
- **Data Access and Storage:** Enforces controlled access to sensitive data and prohibits unencrypted company data storage on personal devices. Cloud storage must comply with PIPEDA and company policies.
|
||||
|
||||
- **Remote Wipe and Device Management:** Authorizes DigiBandit IT Services to wipe company data from personal devices remotely under specific conditions to protect sensitive information.
|
||||
|
||||
- **Compliance and Monitoring:** Stipulates device usage monitoring for policy compliance, with potential revocation of company resource access for non-compliance.
|
||||
|
||||
## **Procedure Overview**
|
||||
|
||||
- **Request for Access:** Employees must submit a request to managers and IT administrators for personal device access to company resources.
|
||||
|
||||
- **Device Assessment and Registration:** IT administrators will assess device security compliance before registration in the IT management system.
|
||||
|
||||
- **Security Setup:** Administrators will assist employees in implementing necessary security measures, such as encryption and passcodes.
|
||||
|
||||
- **Access Provisioning:** Based on roles and needs, limited access to company resources is granted, with training provided on secure data handling.
|
||||
|
||||
- **Ongoing Monitoring and Compliance:** Regular audits and periodic policy reminders are included to ensure continuous compliance.
|
||||
|
||||
## **Acknowledgment**
|
||||
|
||||
Employees must acknowledge understanding and agreement to adhere to the policy.
|
||||
81
BYOD_Policy.md
Normal file
81
BYOD_Policy.md
Normal file
|
|
@ -0,0 +1,81 @@
|
|||
# BYOD Policy
|
||||
|
||||
## 1. Purpose
|
||||
|
||||
The purpose of this policy is to ensure the security and confidentiality of company data in accordance with the Personal Information Protection and Electronic Documents Act (PIPEDA) when accessing company resources from personal devices.
|
||||
|
||||
## 2. Scope
|
||||
|
||||
This policy applies to all clients of DigiBandit IT Services and their employees who wish to access company resources (including email, files, and applications) on personal devices such as cell phones, laptops, or tablets.
|
||||
|
||||
## 3. Policy
|
||||
|
||||
### 3.1. Device Registration and Approval
|
||||
|
||||
- Employees must seek approval from their respective managers or IT administrators before accessing company resources on their personal devices.
|
||||
|
||||
- Approved devices must be registered with DigiBandit IT Services’ IT management system.
|
||||
|
||||
### 3.2. Security Requirements
|
||||
|
||||
- All personal devices used to access company resources must have up-to-date antivirus software and security patches.
|
||||
|
||||
- Devices must be equipped with strong passcodes or biometric locks.
|
||||
|
||||
- Device encryption must be enabled to protect stored data.
|
||||
|
||||
- Lost or stolen devices must be reported immediately to IT administrators.
|
||||
|
||||
- A device policy will be installed to provide IT administrators access to lock or wipe the device remotely.
|
||||
|
||||
### 3.3. Data Access and Storage
|
||||
|
||||
- Access to sensitive or confidential data from personal devices is strictly controlled and monitored.
|
||||
|
||||
- Storing company data on personal devices is prohibited unless encrypted and approved by IT administrators.
|
||||
|
||||
- Use of cloud services to store or share company data must comply with PIPEDA regulations and company policies.
|
||||
|
||||
### 3.4. Remote Wipe and Device Management
|
||||
|
||||
- DigiBandit IT Services reserves the right to remotely wipe company data from personal devices if they are lost, stolen, or if the employee leaves the company.
|
||||
|
||||
- The remote wipe will be focused on company data and will strive to avoid personal data; however, employees should be aware of the potential risk of data loss.
|
||||
|
||||
### 3.5. Compliance and Monitoring
|
||||
|
||||
- Device usage may be monitored to ensure compliance with this policy.
|
||||
|
||||
- Non-compliance may result in revoking the privilege of accessing company resources from personal devices.
|
||||
|
||||
## 4. Procedure
|
||||
|
||||
### 4.1. Request for Access
|
||||
|
||||
- Employees submit a written request to their manager and IT administrator for access to company resources on a personal device.
|
||||
|
||||
### 4.2. Device Assessment and Registration
|
||||
|
||||
- IT administrators assess the device for security compliance.
|
||||
|
||||
- Upon approval, the device is registered in the IT management system.
|
||||
|
||||
### 4.3. Security Setup
|
||||
|
||||
- IT administrators guide employees through setting up necessary security measures like encryption and passcodes.
|
||||
|
||||
### 4.4. Access Provisioning
|
||||
|
||||
- Limited access to company resources is provisioned based on employee roles and needs.
|
||||
|
||||
- Employees are trained on how to access and handle company data securely.
|
||||
|
||||
### 4.5. Ongoing Monitoring and Compliance
|
||||
|
||||
- Regular audits are conducted to ensure ongoing compliance.
|
||||
|
||||
- Employees are reminded periodically about the policy and any updates.
|
||||
|
||||
## 5. Acknowledgment
|
||||
|
||||
Employees are required to sign an acknowledgment form stating that they have read, understood, and agreed to abide by this policy*.*
|
||||
54
Backup_and_Recovery_Policy.md
Normal file
54
Backup_and_Recovery_Policy.md
Normal file
|
|
@ -0,0 +1,54 @@
|
|||
# Backup & Recovery Policy
|
||||
|
||||
## Compliance
|
||||
|
||||
The policy aligns with ISO/IEC 27031:2011 and ISO 22301:2019 standards for business continuity and resilience management.
|
||||
|
||||
## Backup Overview
|
||||
|
||||
- All backups use DigiBandit's **dataBack** software
|
||||
- Data uploads to cloud storage (additional fees apply)
|
||||
|
||||
## System Requirements
|
||||
|
||||
### Hardware
|
||||
- CPU: Minimum 1.4 GHz 64-bit
|
||||
- RAM: 512 MB or more
|
||||
- Disk Space: Minimum 100 MB free
|
||||
- Internet connection required
|
||||
|
||||
### Software
|
||||
- Windows 7/8/10/11+ or Windows Server 2008-2022+
|
||||
- Microsoft .NET Framework 4.5.2 or higher
|
||||
|
||||
## Backup Schedule
|
||||
|
||||
**Data storage calculation:** (Data to Backup × Recurrence) × Retention
|
||||
|
||||
### Hourly Files Backup
|
||||
- Frequency: ~24 backups/day
|
||||
- Retention: 1 week
|
||||
- Type: Pointed files
|
||||
- Maximum data loss: ~1 hour
|
||||
|
||||
### Nightly Image Backup
|
||||
- Frequency: 1 backup/day (8 PM – midnight)
|
||||
- Retention: 7 days
|
||||
- Type: System partition images
|
||||
- Maximum data loss: ~24 hours
|
||||
|
||||
### Daily User Files Backup
|
||||
- Frequency: 1 backup/day (6 PM – midnight)
|
||||
- Retention: 7 days
|
||||
- Type: C:/Users snapshot
|
||||
- Maximum data loss: ~24 hours
|
||||
|
||||
## Recovery Procedures
|
||||
|
||||
**Full System Recovery:** Uses the latest system image to restore operational state, followed by incremental backups.
|
||||
|
||||
**Individual File Recovery:** Restores specific files using the latest incremental backup.
|
||||
|
||||
## Testing & Verification
|
||||
|
||||
DigiBandit performs quarterly tests including full system recovery and individual file restoration, with checksum verification to ensure data integrity.
|
||||
75
BitWarden_Password_Manager.md
Normal file
75
BitWarden_Password_Manager.md
Normal file
|
|
@ -0,0 +1,75 @@
|
|||
# BitWarden Password Manager
|
||||
|
||||
Bitwarden is a cloud-based password management tool that enhances digital security for businesses through various features, such as centralized administration, user access controls, two-factor authentication, and secure credential sharing. Ideal for individual, team, or business use across various platforms, Bitwarden promises reduced risk of data breaches and improved productivity.
|
||||
|
||||
---
|
||||
|
||||
## Key Features
|
||||
|
||||
- **Centralized Administration**: Manage all user accounts and security policies from one dashboard.
|
||||
|
||||
- **User Access Controls**: Set permissions and access levels for users and groups.
|
||||
|
||||
- **Two-Factor Authentication (2FA/MFA)**: Enhance security by requiring a second form of identification beyond just a password.
|
||||
|
||||
- **Group Management**: Organize users into groups for simplified access management.
|
||||
|
||||
- **Cross-Platform Accessibility**: Access your credentials from any device using browser extensions, mobile apps, and desktop clients.
|
||||
|
||||
## Getting Started with Bitwarden
|
||||
|
||||
### Account Creation and Setup
|
||||
|
||||
- **Onboarding**: You will receive an invitation email to join your organization’s Bitwarden account.
|
||||
|
||||
- **Set Up Your Account**: Follow the link in the email to create your Bitwarden account. Choose a strong master password for access.
|
||||
|
||||
### Installing Bitwarden
|
||||
|
||||
- **Browser Extensions**: [Install Bitwarden on your preferred browser ](https://bitwarden.com/help/getting-started-browserext/)to access your passwords easily.
|
||||
|
||||
- **Mobile and Desktop Apps**: Download the Bitwarden app on your [mobile devices](https://bitwarden.com/help/getting-started-mobile/) and [desktop](https://bitwarden.com/help/getting-started-desktop/) for seamless synchronization across devices.
|
||||
|
||||
### Navigating Bitwarden
|
||||
|
||||
- **Dashboard**: The central hub where you can manage your vault, view shared items, and adjust settings.
|
||||
|
||||
- **Adding Items to Your Vault**: Securely store passwords, credit card information, notes, and more in your vault.
|
||||
|
||||
- **Generating Strong Passwords**: Use Bitwarden’s password generator to create robust and secure passwords.
|
||||
|
||||
### Sharing Credentials
|
||||
|
||||
- **Secure Sharing**: Share passwords and notes with team members without exposing the actual content.
|
||||
|
||||
- **Organization Collections**: Group-related items for shared access among designated users.
|
||||
|
||||
## Two-Factor Authentication Setup
|
||||
|
||||
- **Enable 2FA**: Go to your account settings and enable two-factor authentication for added security.
|
||||
|
||||
- **Choose 2FA Method**: Select from various 2FA methods like TOTP, YubiKey, or email.
|
||||
|
||||
## Managing Groups and Users
|
||||
|
||||
- **User Management**: As an admin, you can add or remove users, and manage their access to shared collections.
|
||||
|
||||
- **Group Management**: Organize users into groups based on department or role for easier management.
|
||||
|
||||
## Security Best Practices
|
||||
|
||||
- **Use Strong, Unique Passwords**: Use Bitwarden’s password generator to create secure passwords.
|
||||
|
||||
- **Beware of Phishing Attacks**: Always verify the legitimacy of requests for your credentials.
|
||||
|
||||
## Support and Assistance
|
||||
|
||||
- **Help and Support**: For assistance with Bitwarden, contact our support team.
|
||||
|
||||
- **User Documentation**: Access detailed user guides and FAQs on the Bitwarden website for more information.
|
||||
|
||||
## Conclusion
|
||||
|
||||
Bitwarden is an integral tool for enhancing your organization’s digital security. By managing and securing your passwords and sensitive information effectively, you can significantly reduce the risk of data breaches and improve overall productivity.
|
||||
|
||||
Further details, guides, videos and more are available on the [BitWarden Help Center](https://bitwarden.com/help/)
|
||||
3
Business_IT.md
Normal file
3
Business_IT.md
Normal file
|
|
@ -0,0 +1,3 @@
|
|||
# Business IT
|
||||
|
||||
DigiBandit’s Business IT Services provide foundational solutions to support and streamline your organization’s day-to-day operations. From core productivity tools like Google Workspace to comprehensive account management, this suite of services ensures that your business has everything it needs to operate efficiently and securely. Each service is designed to enhance productivity, foster collaboration, and maintain security.
|
||||
61
Business_Specific_Software_Management.md
Normal file
61
Business_Specific_Software_Management.md
Normal file
|
|
@ -0,0 +1,61 @@
|
|||
# Business Specific Software Management
|
||||
|
||||
## Keep Your Software Up-to-Date and Secure
|
||||
|
||||
### What We Offer
|
||||
|
||||
Our Business-Specific Software Management service ensures your essential business applications are always current, secure, and running smoothly. From accounting software like QuickBooks and Sage to everyday tools like Google Chrome, Google Drive, and PDF editors, we take care of updates so you can stay focused on what matters most—your business.
|
||||
|
||||
### Service Details
|
||||
|
||||
**Automated Updates**
|
||||
We use advanced tools to automate software updates whenever possible. These updates happen seamlessly, ensuring you experience minimal disruptions while keeping your software current and secure.
|
||||
|
||||
**Manual Updates for Specialized Software**
|
||||
For applications that require manual updates or specialized handling, like financial, legal, manufacturing, or medical software, our technicians step in to provide expert support. We handle complex updates, custom configurations, and anything that needs manual intervention—always optimizing for your business needs.
|
||||
|
||||
### Key Benefits
|
||||
|
||||
- **Reduced Downtime**
|
||||
|
||||
Stay protected from security vulnerabilities and avoid functional issues with always up-to-date software.
|
||||
|
||||
- **Cost-Effective Automation**
|
||||
|
||||
Automated updates keep costs low, with no surprises.
|
||||
|
||||
- **Expert Technical Support**
|
||||
|
||||
Our experienced technicians ensure your software runs smoothly and is always optimized for your business.
|
||||
|
||||
### Pricing
|
||||
|
||||
- **Free**
|
||||
|
||||
Automated updates are provided at no cost.
|
||||
|
||||
- **Hourly**
|
||||
|
||||
Manual updates for specialized software are billed transparently, with no hidden fees.
|
||||
|
||||
### How It Works
|
||||
|
||||
- **Assessment**
|
||||
|
||||
We evaluate your software to determine which updates can be automated and which require manual intervention.
|
||||
|
||||
- **Setup**
|
||||
|
||||
Our technicians configure automation and custom workflows tailored to your specific needs.
|
||||
|
||||
- **Ongoing Management**
|
||||
|
||||
We apply software updates regularly to minimize disruption to your workflow.
|
||||
|
||||
- **Support**
|
||||
|
||||
Our support team is always available to assist you with any software-related questions or concerns.
|
||||
|
||||
### Get Started Today
|
||||
|
||||
Let us simplify your software management so you can focus on growing your business. Contact us today, and let our team handle the updates while you concentrate on what matters.
|
||||
25
CCTV.md
Normal file
25
CCTV.md
Normal file
|
|
@ -0,0 +1,25 @@
|
|||
# CCTV
|
||||
|
||||
**Protect Your Business with Cutting-Edge CCTV Solutions**
|
||||
|
||||
Are you seeking a security system to safeguard your assets and ensure peace of mind? At DigiBandit IT Services, we offer top-tier managed CCTV installations using industry-leading Tp-Link, UNV, and HikVision equipment.
|
||||
|
||||
**Why Choose Us?**
|
||||
|
||||
- **Advanced Technology**
|
||||
|
||||
Our CCTV solutions feature the latest UNV and HikVision cameras, delivering crystal-clear video quality and reliable performance.
|
||||
|
||||
- **Comprehensive Coverage**
|
||||
|
||||
We design and install systems tailored to your needs, ensuring complete property coverage with intelligent, scalable solutions.
|
||||
|
||||
- **Managed Services**
|
||||
|
||||
Our team handles everything from installation to ongoing support. Enjoy seamless monitoring, remote access, and prompt maintenance.
|
||||
|
||||
- **Peace of Mind**
|
||||
|
||||
With our state-of-the-art technology and expert support, you can rest easy knowing your business is protected 24/7.
|
||||
|
||||
**Ready to enhance your security? Contact us today for a consultation, and let us help you secure your future.**
|
||||
7
Circuit_Sippy_Our_Signature_Coffee.md
Normal file
7
Circuit_Sippy_Our_Signature_Coffee.md
Normal file
|
|
@ -0,0 +1,7 @@
|
|||
# Circuit Sippy – Our Signature Coffee
|
||||
|
||||
Locally roasted by **Down East Coffee Roasters**, this exclusive DigiBandit blend is included in our subscriptions and available in-store. It’s not just coffee — it’s **mental fuel for makers, gamers, and techies**.
|
||||
|
||||
## Circuit Sippy Premium Coffee 227g – **$14.98**
|
||||
|
||||
***$5 off per bag for monthly subscribers!***
|
||||
27
Cloud_Storage_Backblaze_B2.md
Normal file
27
Cloud_Storage_Backblaze_B2.md
Normal file
|
|
@ -0,0 +1,27 @@
|
|||
# Cloud Storage via BackBlaze B2
|
||||
|
||||
## Overview
|
||||
|
||||
DigiBandit IT Services offers managed cloud storage solutions using BackBlaze B2, an enterprise-grade platform designed for businesses of all sizes. The service helps organizations securely store, access, and share company data from anywhere with internet connectivity.
|
||||
|
||||
## Key Benefits
|
||||
|
||||
**Scalability**
|
||||
Quickly expand storage capacity as your business grows without hardware limitations or maintenance concerns.
|
||||
|
||||
**Accessibility**
|
||||
Access data from anywhere with internet connectivity, enabling remote collaboration and flexible work arrangements.
|
||||
|
||||
**Disaster Recovery**
|
||||
Automatic backup and recovery features ensure critical business data remains safe and recoverable following unexpected incidents.
|
||||
|
||||
**Cost Effectiveness**
|
||||
Eliminates expensive hardware investments and ongoing maintenance costs through a cloud-based approach.
|
||||
|
||||
## Security & Features
|
||||
|
||||
The platform provides industry-leading security and encryption to protect company data. DigiBandit's experienced technicians design customized storage solutions tailored to specific business needs and budgets.
|
||||
|
||||
## Getting Started
|
||||
|
||||
Organizations interested in implementing managed cloud storage can contact DigiBandit IT Services to discuss how BackBlaze B2 can support business growth and data protection objectives.
|
||||
42
Contact.md
Normal file
42
Contact.md
Normal file
|
|
@ -0,0 +1,42 @@
|
|||
# Contact
|
||||
|
||||
## Overview
|
||||
|
||||
digiBandit offers multiple contact methods, with the ticketing system being the preferred option for fastest response times.
|
||||
|
||||
## Availability by Method
|
||||
|
||||
**Break/Fix (Repair Services)**
|
||||
- Storefront & Walk-in: Mon–Sat, 9 AM–5 PM
|
||||
- After-hours support available via custom agreement
|
||||
|
||||
## Contact Methods
|
||||
|
||||
### Ticketing System (Recommended)
|
||||
- Platforms: dbits.ca/ticket, portal.dbits.ca, digiBandit Tray Utility
|
||||
- Submit requests through forms and track status on customer portal
|
||||
- Ideal for: tickets, service requests, planning
|
||||
- Includes access to internal documentation
|
||||
- Hours: Mon–Sat, 9 AM–5 PM
|
||||
|
||||
### Phone: (506) 988-9243
|
||||
- Redirects to Google Voice auto attendant at (506) 248-8023
|
||||
- Hours: Mon–Sat, 9 AM–5 PM
|
||||
- System includes welcome message, special announcements, ring group distribution to staff, and voicemail
|
||||
|
||||
### Email
|
||||
- Address: hey@dbits.ca
|
||||
- Include detailed information for faster resolution
|
||||
- Best for: tickets, service requests, planning
|
||||
|
||||
### Live Chat
|
||||
- Integrated in support software tray menu
|
||||
- Real-time communication with representatives
|
||||
- Best for: quick questions and support walkthroughs
|
||||
- Hours: Mon–Sat, 9 AM–5 PM
|
||||
|
||||
### In-Person Meetings
|
||||
- Book at dbits.ca/contact
|
||||
- Location: 607 St George Blvd, Suite 103, Moncton, NB E1E 2C2
|
||||
- Best for: consultations, assessments, special projects
|
||||
- By request based on type, duration, and agreement
|
||||
87
Cyber_Insurance_Compliance_Assistance.md
Normal file
87
Cyber_Insurance_Compliance_Assistance.md
Normal file
|
|
@ -0,0 +1,87 @@
|
|||
# Cyber Insurance Compliance Assistance
|
||||
|
||||
## Intro
|
||||
|
||||
At DigiBandit, we prioritize our clients’ security and protection against cyber threats. We strongly recommend that all our clients carry cyber insurance to safeguard against financial losses caused by cyber incidents.
|
||||
|
||||
We’ve compiled a checklist of essential security measures to help our clients meet cyber insurance requirements. Our services can help you comply with these requirements, boost your cybersecurity defences, and reduce the risk of cyber-related financial losses.
|
||||
|
||||
By meeting these compliance standards, not only will you qualify for cyber insurance coverage, but you’ll also fortify your overall security. We’re committed to supporting your cybersecurity needs with our industry-leading solutions.
|
||||
|
||||
For more information about cyber insurance or our services, please contact us or read on!
|
||||
|
||||
## What Is Cyber Insurance?
|
||||
|
||||
Cyber insurance is a type of insurance coverage that protects businesses and individuals from losses resulting from cyber attacks, data breaches, and other cyber-related incidents. The coverage typically includes financial compensation for expenses related to the investigation, recovery, and resolution of the cyber event, compensation for income loss, and the cost of restoring or replacing any damaged data or systems.
|
||||
|
||||
Some cyber insurance policies also provide legal and public relations support to help manage the aftermath of a cyber event. The specific coverage offered by a cyber insurance policy can vary, so it’s important to carefully review the policy details and understand exactly what is covered and excluded.
|
||||
|
||||
## Does DigiBandit require its clients to carry Cyber Insurance?
|
||||
|
||||
Not yet, but we may soon. We recommend that all our clients have at least the minimum coverage their insurance will provide. Still, we recommend that you speak with your insurance company about your cyber policy.
|
||||
|
||||
## Do I Need Cyber Insurance?
|
||||
|
||||
Whether you need cyber insurance depends on several factors, including the size and type of your business, the types of data you store and process, and the potential consequences of a data breach or cyber attack.
|
||||
|
||||
Cyber insurance can help protect your business against financial losses caused by cyber-related incidents, such as data breaches, theft of sensitive information, and unauthorized access to computer systems. Cyber insurance may be essential if you process or store sensitive data, such as personal or financial data.
|
||||
|
||||
Additionally, if your business relies on technology for its operations, it may be vulnerable to cyber-attacks or technical malfunctions that can cause downtime, lost revenue, and other financial losses. Cyber insurance can help protect your business against these types of losses.
|
||||
|
||||
Ultimately, purchasing cyber insurance is a risk management decision that should be based on a thorough assessment of your business’s unique needs and risk factors. It’s always a good idea to consult a professional insurance broker or advisor to determine if cyber insurance suits you.
|
||||
|
||||
## My insurance company is asking for a copy of your insurance
|
||||
|
||||
Fantastic! We have two versions available; one is for General Liability, and the other is for Professional Liability and Cyber Policy.
|
||||
|
||||
Please let us know (via email or ticket) that you need a copy of the certificate of insurance document you need, and we will be happy to send you one!
|
||||
|
||||
---
|
||||
|
||||
## Compliance Checklist
|
||||
|
||||
Please be aware that the checklist below is for reference only. Contact us for a personalized cybersecurity assessment.
|
||||
|
||||
- *Staff cyber training and anti-phishing training. *
|
||||
|
||||
**DigiBandit’s “Security Awareness Training” Service officially launching 15 Jan ’24**
|
||||
|
||||
- *A recovery plan wherein all data required for mission-critical, revenue-generating purposes or personally identifiable records is regularly backed up on a (tested) disconnected, off-site or cloud location. *
|
||||
|
||||
[**dataBack by DigiBandit (Business Continuity & Disaster Recovery)**](https://dbits.ca/docs/public/services-and-offerings/helpdesk-by-digibandit/databack/)
|
||||
|
||||
- *Multi-factor authentication for email account access and all remote access to your network.*
|
||||
|
||||
[**BitWarden Password Manager**](https://dbits.ca/docs/public/services-and-offerings/bitwarden-password-manager/)
|
||||
|
||||
- [**JumpCloud – Cloud Directory**](https://dbits.ca/docs/public/services-and-offerings/helpdesk-by-digibandit/jumpcloud-cloud-directory/)
|
||||
|
||||
- *Do not allow remote access into your environment without a VPN (Virtual Private Network).*
|
||||
|
||||
[**Tailscale VPN**](https://dbits.ca/docs/public/services-and-offerings/helpdesk-by-digibandit/tailscale-vpn/)
|
||||
|
||||
- *Implement critical patches and update systems as soon as updates and patches become available. Do not use any EOL/unsupported software. *
|
||||
|
||||
[**Patch Management**](https://dbits.ca/docs/public/services-and-offerings/helpdesk-by-digibandit/patch-management/)
|
||||
|
||||
- *Scan incoming emails for malicious attachments and links.*
|
||||
|
||||
[**Google Workspace – Understanding Gmail’s spam filters**](https://workspace.google.com/blog/identity-and-security/an-overview-of-gmails-spam-filters)
|
||||
|
||||
- *You protect your devices with anti-virus, anti-malware, and endpoint protection software. *
|
||||
|
||||
[**Huntress**](https://dbits.ca/docs/public/services-and-offerings/helpdesk-by-digibandit/av-edr/huntress-edr/)
|
||||
|
||||
- *You encrypt data, control access, regularly change your passwords, and cancel any accounts you suspect have been compromised on your Electronic Communications System. *
|
||||
|
||||
[**Windows – Standard Policy Management Options**](https://dbits.ca/docs/public/services-and-offerings/helpdesk-by-digibandit/device-management/windows/)
|
||||
|
||||
- *You sign written contracts with Service Providers (e.g. Amazon Web Services).*
|
||||
|
||||
**[Assumed](https://dbits.ca/docs/public/mits-onboarding-timeline/)**
|
||||
|
||||
- You adhere to the Data Breach Law.
|
||||
|
||||
[**Right to Information and Protection of Privacy Act, SNB **](https://www2.gnb.ca/content/gnb/en/departments/finance/office_of_the_chief_information_officer/content/rti.html)
|
||||
|
||||
- **2009 c R-10.6; Personal Information Protection and Electronic Documents Act, SC 2000 c 5**
|
||||
9
Data_Recovery.md
Normal file
9
Data_Recovery.md
Normal file
|
|
@ -0,0 +1,9 @@
|
|||
# Data Recovery
|
||||
|
||||
This is an overview page for digiBandit's Data Recovery service.
|
||||
|
||||
For detailed information about data recovery services, visit [dbits.ca/recover](https://dbits.ca/recover).
|
||||
|
||||
## Related Documentation
|
||||
|
||||
- [Recover File Selection Guide](Recover_File_Selection_Guide.md) - Guide for selecting files during recovery
|
||||
161
Device_Management.md
Normal file
161
Device_Management.md
Normal file
|
|
@ -0,0 +1,161 @@
|
|||
# Device Management
|
||||
|
||||
# Device Management
|
||||
|
||||
At the core of our services is a commitment to keeping your computers and devices in prime condition. Our Device Management services ensure peace of mind, knowing that every aspect of your technological infrastructure is under the vigilant eye of digiBandit.
|
||||
|
||||
## Service Tiers
|
||||
|
||||
We offer three levels of device management to match your needs:
|
||||
|
||||
Tier
|
||||
What’s Included
|
||||
|
||||
**Basic**
|
||||
Monitoring, alerts, endpoint detection (Huntress EDR)
|
||||
|
||||
**Standard**
|
||||
Basic + patching, policies, hardening, compliance
|
||||
|
||||
**Fully Managed**
|
||||
Standard + complete lifecycle management, priority response
|
||||
|
||||
[View pricing and bundling options](https://dbits.ca/manage)
|
||||
|
||||
---
|
||||
|
||||
## What’s Included
|
||||
|
||||
- **Managed Software and OS Updates:** Stay current with the latest features and security patches.
|
||||
|
||||
- **Performance Optimization:** We fine-tune your devices for peak performance.
|
||||
|
||||
- **Drive Monitoring:** Proactive drive health checks to catch issues before they become failures.
|
||||
|
||||
- **Uptime Monitoring:** Real-time monitoring to minimize downtime.
|
||||
|
||||
- **Remote Support:** Direct access to our team for troubleshooting and assistance.
|
||||
|
||||
- **Security Stack:** Endpoint detection, privilege management, and DNS filtering working together to protect your systems.
|
||||
|
||||
---
|
||||
|
||||
## How Device Management Works
|
||||
|
||||
When you subscribe to managed services, we install a set of tools on your devices that allow us to keep them secure, updated, and running smoothly.
|
||||
|
||||
We support **Windows, macOS, and Linux** devices.
|
||||
|
||||
For a complete list of the software we install and where your data is stored, see **[Tools We Use](https://dbits.ca/tools-we-use/)**.
|
||||
|
||||
### What You’ll See
|
||||
|
||||
- **dbits Tray:** A small system tray icon that gives you quick access to our support portal and lets you request remote assistance.
|
||||
|
||||
- **Google Sign-In (GCPW):** If your organization uses Google Workspace, you’ll sign into Windows with your Google account. One password for everything.
|
||||
|
||||
- **AutoElevate Prompts:** When you need to install software or make changes that require admin rights, you’ll see an approval prompt instead of being blocked.
|
||||
|
||||
---
|
||||
|
||||
## What Access We Have
|
||||
|
||||
Full administrative access to managed devices. This is required to:
|
||||
|
||||
- Install and update software
|
||||
|
||||
- Apply security patches
|
||||
|
||||
- Respond to threats in real-time
|
||||
|
||||
- Troubleshoot issues remotely
|
||||
|
||||
- Enforce security policies
|
||||
|
||||
This is industry standard for managed IT services. Without administrative access, we cannot keep your devices secure or supported.
|
||||
|
||||
### What We Do
|
||||
|
||||
- Automated patching and updates
|
||||
|
||||
- 24/7 security monitoring and threat response
|
||||
|
||||
- Remote troubleshooting when you submit a support request
|
||||
|
||||
- Policy enforcement (security settings, approved software, etc.)
|
||||
|
||||
- Backup management
|
||||
|
||||
### What We Don’t Do
|
||||
|
||||
- Keystroke logging
|
||||
|
||||
- Screen recording or screenshots
|
||||
|
||||
- Browsing history tracking
|
||||
|
||||
- Reading your emails or files
|
||||
|
||||
- Employee productivity surveillance
|
||||
|
||||
Our tools are for security and support, not surveillance. We’re not watching you work.
|
||||
|
||||
### Who Can See What
|
||||
|
||||
- **digiBandit:** Device health, installed software, security alerts, remote access for support
|
||||
|
||||
- **Huntress:** Security telemetry only (threat detection, not file contents)
|
||||
|
||||
- **You:** Full use of your device as normal
|
||||
|
||||
---
|
||||
|
||||
## If Your Employees Use Managed Devices
|
||||
|
||||
If the devices we manage are used by your employees, you are responsible for:
|
||||
|
||||
- Informing employees that devices are managed and monitored for security purposes
|
||||
|
||||
- Obtaining any consent required under employment or privacy law
|
||||
|
||||
- Including device management in your workplace policies as appropriate
|
||||
|
||||
We manage devices, not employment relationships. Compliance with the Employment Standards Act, PIPEDA, or any other employment/privacy legislation as it relates to your staff is your responsibility as the employer.
|
||||
|
||||
If you need template language for employee notification, we’re happy to help.
|
||||
|
||||
---
|
||||
|
||||
## Mobile Device Management (MDM)
|
||||
|
||||
For iOS, iPadOS, and Android devices, we offer MDM solutions including:
|
||||
|
||||
- Device enrollment via Apple DEP, Apple Configurator, Android Enterprise, or Samsung Knox
|
||||
|
||||
- App deployment and management
|
||||
|
||||
- Security policy enforcement
|
||||
|
||||
- Remote wipe capabilities for lost devices or employee departures
|
||||
|
||||
---
|
||||
|
||||
## No Partial Coverage
|
||||
|
||||
Device management is all or nothing. If a device is under managed services, it has the full security stack installed. We don’t offer partial monitoring or “RMM-lite” options.
|
||||
|
||||
If you don’t want a device managed, that device is outside the scope of our services and support.
|
||||
|
||||
---
|
||||
|
||||
## Questions?
|
||||
|
||||
- **Portal:** [portal.dbits.ca](https://portal.dbits.ca/)
|
||||
|
||||
- **Email:** hey@dbits.ca
|
||||
|
||||
- **Phone:** 506-988-9243
|
||||
|
||||
- **Text:** 506-404-0055
|
||||
|
||||
Or visit [dbits.ca/contact](https://dbits.ca/contact) to reach us.
|
||||
29
Digital_Display.md
Normal file
29
Digital_Display.md
Normal file
|
|
@ -0,0 +1,29 @@
|
|||
# Digital Display
|
||||
|
||||
### **A Professional Digital Display, Fully Managed**
|
||||
|
||||
Transform your public spaces with dynamic, zero-hassle digital signage. Our all-inclusive managed service ensures your display is always running, always secure, and always showing fresh, relevant content, all for one simple monthly price!
|
||||
|
||||
### **The All-Inclusive Digital Signage Bundle**
|
||||
|
||||
We’ve bundled our essential services into a high-value package to give you everything you need for a successful digital display. You get the software, the proactive management, and the priority support in one plan.
|
||||
|
||||
Here’s the value packed into your service every month:
|
||||
|
||||
- **Digital Display Software License ($30/month value)**
|
||||
|
||||
The core software that powers your signage, enabling dynamic content and reliable scheduling.
|
||||
|
||||
- **Proactive Computer Management ($20/month value)**
|
||||
|
||||
Full remote monitoring, security patching, and health management for the computer running your display, preventing issues before they happen.
|
||||
|
||||
- **3-Hour Priority Support Block ($180 value)**
|
||||
|
||||
A pre-paid block of three support hours for all your needs, including remote content updates and on-site technical assistance.
|
||||
|
||||
### **Partner with Us & Save!**
|
||||
|
||||
On top of the incredible bundle savings, you can lower your costs even further.
|
||||
|
||||
- **Display Local Ads for a $30 Credit:** Opt-in to show a small, rotating selection of ads for local businesses in a designated screen area and we’ll apply a **$30 credit** to your monthly invoice. Adds will be subject to approval and guidelines.
|
||||
19
Disaster_Recovery_Plan.md
Normal file
19
Disaster_Recovery_Plan.md
Normal file
|
|
@ -0,0 +1,19 @@
|
|||
# Disaster Recovery Plan
|
||||
|
||||
## Overview
|
||||
|
||||
This Disaster Recovery & Restore Plan ("Plan") outlines the procedures and policies to be followed in the event of a disaster that impacts the data and systems of DigiBandit clients (the "Clients").
|
||||
|
||||
## Purpose
|
||||
|
||||
The plan ensures business continuity and minimizes data loss in case of:
|
||||
|
||||
- Hardware failure
|
||||
- Natural disasters
|
||||
- Cyber attacks
|
||||
- Human error
|
||||
|
||||
## Related Documentation
|
||||
|
||||
- [dataBack by DigiBandit](dataBack_by_DigiBandit.md) - Backup service overview
|
||||
- [Backup and Recovery Policy](Backup_and_Recovery_Policy.md) - Backup schedules and procedures
|
||||
23
Domain_Name_Transfer.md
Normal file
23
Domain_Name_Transfer.md
Normal file
|
|
@ -0,0 +1,23 @@
|
|||
# Domain Name Transfer
|
||||
|
||||
Request a Domain Transfer to transfer any active domain names to LightHost Web Services (DigiBandit IT Services).
|
||||
|
||||
Once the domain transfer order is completed, you will be asked to **initiate the transfer **by providing LightHost Web Services with the domain’s transfer key (sometimes referred to as the AUTH code or EPP key).
|
||||
|
||||
Before initiating the transfer, you’ll want to make sure a few conditions are met:
|
||||
|
||||
- **Unlock your domain**. Most domains will be locked with their current providers to prevent unauthorized transfers. You may be able to unlock your domain directly from your provider’s domain management portal or by contacting them directly.
|
||||
|
||||
- Ensure the **email address of the domain’s Administrative contact in your environment is, in fact, one** that you have access to and that any **Domain Privacy is disabled**. You can view your domain’s current information using any [WHOIS lookup tool](https://www.easywhois.com/).
|
||||
|
||||
- Make sure your domain name **has not been registered or transferred in the last 60 days** (if it has, you’ll need to wait at least 60 days before proceeding) and is not going to expire in the next five days (if it does, your transfer might fail or your website might go offline mid-process).
|
||||
|
||||
Relevant information can be requested from your **current domain name provider**. If you are unsure who you’ve registered your domain name with, please try to find a payment invoice with the company’s contact information, perform a [WHOIS lookup](https://www.easywhois.com/) of your domain, or contact us for assistance.
|
||||
|
||||
For most domain transfers (excluding .CA domains), you will likely be asked to confirm your request by **clicking on a verification link** sent to your domain’s administrative email address. Once approved, a domain transfer may take up to 5 days. Certain domain types, such as .ca domains, may transfer within minutes.
|
||||
|
||||
Once your domain transfer is completed, we’ll take care of the rest!
|
||||
|
||||
When you transfer your domain registration, you are also automatically adding one year to your domain’s expiration date. So, for example, if your domain expires in 2024 and you transfer it today, its expiry date will be in 2025 with your transfer. This ensures you do not lose any time you have already paid for your domain with another provider.
|
||||
|
||||
Please contact our support team for immediate assistance if you have any additional questions about your domain’s transfer.
|
||||
7
Domain_Services.md
Normal file
7
Domain_Services.md
Normal file
|
|
@ -0,0 +1,7 @@
|
|||
# Domain Services
|
||||
|
||||
At DigiBandit IT Services, we understand the critical importance of managing your domains and DNS settings to ensure that your online presence is always available and secure. Our domain and DNS management services ensure your domains are up-to-date, secure, and protected against potential risks.
|
||||
|
||||
Our team will work closely with you to manage your domain registrations, renewals, transfers, and DNS settings, including MX records, A records, CNAMEs, and more. Our advanced tools and technologies allow us to quickly and easily change your domains and DNS settings, ensuring your website and other online services are always up and running!
|
||||
|
||||
Whether you’re a small business owner, a large corporation, or an individual looking for professional and reliable domain and DNS management services, DigiBandit IT Services has the expertise and experience you need. Contact us today to learn how we can help you manage your domains and DNS settings and take your online presence to the next level.
|
||||
76
E-Waste_Collection_Agreement.md
Normal file
76
E-Waste_Collection_Agreement.md
Normal file
|
|
@ -0,0 +1,76 @@
|
|||
# E-Waste Collection Agreement
|
||||
|
||||
## Overview
|
||||
|
||||
This agreement outlines the terms and procedures for e-waste collection and data device handling provided by DigiBandit IT Services. It ensures a secure and responsible approach to disposing of electronic waste, with special consideration for data-containing devices.
|
||||
|
||||
---
|
||||
|
||||
## Services Provided
|
||||
|
||||
### 1. In-House Secure Wiping Service
|
||||
|
||||
- **Description:** Complimentary secure wiping of drives included with e-waste collection
|
||||
- **Cost:** Free with e-waste
|
||||
- **Documentation:** Drive serial number list provided
|
||||
- **Note:** This service does not include a certificate of destruction
|
||||
|
||||
### 2. Certificates of Data Deletion and Secure Wiping
|
||||
|
||||
- **Description:** Optional service offering formal certificates of secure data deletion
|
||||
- **Cost:** $2 per drive
|
||||
- **Applicability:** Must accompany e-waste collection
|
||||
|
||||
### 3. Certificate of Destruction
|
||||
|
||||
- **Description:** Physical destruction via drilling or crushing
|
||||
- **Cost:** $5 per drive (minimum of 50 drives)
|
||||
- **Documentation:** Certificate of destruction provided
|
||||
|
||||
### 4. Third-Party Shredding Service
|
||||
|
||||
- **Description:** On-site shredding service with a mobile shredding truck
|
||||
- **Base Rate:** $289.75 + tax (includes truck, labour, serialization, and certificates for 10 drives)
|
||||
- **Additional Drives:** Discounted per-drive rate at higher volumes (e.g., $17.41 per drive for 100 drives)
|
||||
- **Additional Costs:** Fuel surcharge included on final invoice
|
||||
|
||||
---
|
||||
|
||||
## Customer Acknowledgment and Consent
|
||||
|
||||
- **E-Waste List:** Technician will record all collected e-waste
|
||||
- **Data Device Handling:** Technician will document handling per selected services
|
||||
- **Customer Sign-Off:** Customer must review and sign the collection list and chosen data handling method
|
||||
|
||||
---
|
||||
|
||||
## Agreement
|
||||
|
||||
I, [Customer's Name], representing [Business/Institution Name], acknowledge and agree to the services described in this agreement. I understand and consent to the handling of electronic waste and data devices as per my selections below.
|
||||
|
||||
### Collected E-Waste
|
||||
|
||||
*(To be completed by technician)*
|
||||
|
||||
| # | Item Description | Serial/Asset # |
|
||||
|---|------------------|----------------|
|
||||
| 1 | | |
|
||||
| 2 | | |
|
||||
| 3 | | |
|
||||
|
||||
### Data Device Handling
|
||||
|
||||
*(Select all that apply)*
|
||||
|
||||
- [ ] In-House Secure Wiping Service
|
||||
- [ ] Certificates of Data Deletion and Secure Wiping
|
||||
- [ ] Certificate of Destruction
|
||||
- [ ] Third-Party Shredding Service
|
||||
|
||||
---
|
||||
|
||||
**Customer Signature:** ___________________________ **Date:** _______________
|
||||
|
||||
**Technician Signature:** ___________________________ **Date:** _______________
|
||||
|
||||
<!-- dbits-0006 -->
|
||||
16
Getting_Started_with_Bitwarden.md
Normal file
16
Getting_Started_with_Bitwarden.md
Normal file
|
|
@ -0,0 +1,16 @@
|
|||
# Getting Started with Bitwarden
|
||||
|
||||
## Overview
|
||||
|
||||
Managing dozens of passwords for work and personal accounts is overwhelming, and without secure storage, password reuse can put your accounts at risk.
|
||||
|
||||
Bitwarden simplifies password management by providing a secure vault for all your credentials.
|
||||
|
||||
## Getting Started
|
||||
|
||||
For detailed setup instructions, contact DigiBandit IT Services or visit your client portal.
|
||||
|
||||
## Related Documentation
|
||||
|
||||
- [BitWarden Password Manager](BitWarden_Password_Manager.md) - Overview of Bitwarden service
|
||||
- [Security Awareness Training](Security_Awareness_Training.md) - Security best practices
|
||||
107
Google_Workspace.md
Normal file
107
Google_Workspace.md
Normal file
|
|
@ -0,0 +1,107 @@
|
|||
# Google Workspace
|
||||
|
||||
## **Introduction**
|
||||
|
||||
DigiBandit’s Managed Google Workspace service provides businesses with a seamless, secure, and productive environment using Google’s cloud-based tools. From setup to daily management, we ensure your Google Workspace is optimized, secure, and tailored to fit your business needs. This document outlines our offerings and support for Google Workspace, including configuration, user management, security, and compliance.
|
||||
|
||||
---
|
||||
|
||||
## **Service Inclusions**
|
||||
|
||||
### **Google Workspace Setup and Configuration**
|
||||
|
||||
Initial setup and configuration of Google Workspace, tailored to your organization’s structure and requirements:
|
||||
|
||||
- **Domain Verification**: Verify and configure your domain within Google Workspace.
|
||||
|
||||
- **Email and Calendar Setup**: Configure Gmail, Calendar, and Contacts for optimal functionality.
|
||||
|
||||
- **Drive and Document Settings**: Set up Google Drive, Docs, Sheets, and Slides with appropriate sharing permissions and organizational settings.
|
||||
|
||||
- **App Access Management**: Manage which Google services are accessible to users, including Chat, Meet, Keep, and Forms.
|
||||
|
||||
### **User Management**
|
||||
|
||||
- **Onboarding and Offboarding**: Create and configure new users, assign roles, and ensure departing users’ data is securely transferred and archived.
|
||||
|
||||
- **Role-Based Access**: Apply roles and permissions according to team requirements, ensuring controlled access to sensitive documents and resources.
|
||||
|
||||
- **Group and Alias Management**: Set up email groups, aliases, and distribution lists for efficient communication.
|
||||
|
||||
### **Mobile Device Management (MDM)**
|
||||
|
||||
Enable Mobile Device Management within Google Workspace to monitor and secure devices used by employees:
|
||||
|
||||
- **Device Enrollment**: Register and track all devices accessing Google Workspace.
|
||||
|
||||
- **App and Device Policies**: Set and enforce policies around app access, password strength, and encryption.
|
||||
|
||||
- **Remote Wipe and Device Lock**: Ensure security by remotely wiping or locking lost or compromised devices.
|
||||
|
||||
### **Security and Compliance**
|
||||
|
||||
- **Two-Step Verification (2SV)**: Enforce and support two-step verification across accounts for added security.
|
||||
|
||||
- **Access Control Policies**: Set up and monitor policies for data access, sharing, and user login.
|
||||
|
||||
- **Data Loss Prevention (DLP)**: Implement DLP rules to protect sensitive data within Gmail and Drive.
|
||||
|
||||
- **Audit Logging and Monitoring**: Regularly review activity logs for security and compliance purposes.
|
||||
|
||||
### **Data Backup and Recovery**
|
||||
|
||||
- **Google Vault**: Configure and manage Google Vault for long-term archiving and eDiscovery.
|
||||
|
||||
- **Backup Integration**: Provide additional backup services for critical data stored in Google Workspace applications.
|
||||
|
||||
- **Data Retention Policies**: Define and enforce data retention policies to ensure regulatory compliance.
|
||||
|
||||
Additional Backup services via dataBack Cloud for Google Workspace, where we backup your Google Workspace user’s inbox, calendars, drives and more!
|
||||
|
||||
---
|
||||
|
||||
## **Enhanced Services**
|
||||
|
||||
### **Advanced App Integrations**
|
||||
|
||||
Integration of additional applications or tools with Google Workspace to enhance productivity:
|
||||
|
||||
- **Third-Party Apps**: Integrate approved third-party applications like CRM systems or project management tools.
|
||||
|
||||
- **Custom Workflows with Google Apps Script**: Build custom scripts to automate routine tasks within Google Workspace.
|
||||
|
||||
### **End-User Training and Support**
|
||||
|
||||
Comprehensive training and support options for employees to ensure efficient use of Google Workspace:
|
||||
|
||||
- **User Training**: Provide webinars or one-on-one sessions covering Gmail, Google Drive, Docs, and collaboration tools.
|
||||
|
||||
- **HelpDesk Support**: Ongoing support for users experiencing issues with Google Workspace features.
|
||||
|
||||
- **Knowledge Base Access**: Access to a curated collection of guides and FAQs for common Google Workspace tasks.
|
||||
|
||||
### **Reporting and Optimization**
|
||||
|
||||
- **Usage Reports**: Regular reports on usage, storage, and security compliance within Google Workspace.
|
||||
|
||||
- **Optimization Audits**: Periodic audits to ensure settings and policies align with evolving business needs.
|
||||
|
||||
- **Storage Management**: Manage and monitor Google Drive and email storage to optimize performance.
|
||||
|
||||
---
|
||||
|
||||
## **Documentation and Compliance**
|
||||
|
||||
We maintain thorough documentation of your Google Workspace configuration, including:
|
||||
|
||||
- **Administrative Overview**: A record of admin settings, user permissions, and policy configurations.
|
||||
|
||||
- **Compliance Audits**: Monthly or quarterly compliance checks against industry standards.
|
||||
|
||||
- **Configuration Documentation**: Detailed documentation on Google Workspace structure, policies, and integrations.
|
||||
|
||||
---
|
||||
|
||||
## **Conclusion**
|
||||
|
||||
With DigiBandit’s Managed Google Workspace, your organization can expect reliable support, security, and efficiency from setup to daily management. For more detailed information or questions, please contact our team anytime.
|
||||
60
Huntress_EDR.md
Normal file
60
Huntress_EDR.md
Normal file
|
|
@ -0,0 +1,60 @@
|
|||
# Huntress EDR
|
||||
|
||||
# Huntress Managed Endpoint Detection and Response (EDR)
|
||||
|
||||
## Overview
|
||||
|
||||
Top-tier endpoint security shouldn’t be a luxury reserved for large organizations. With Huntress Managed EDR, you gain access to a powerful solution designed for businesses of all sizes, providing robust protection against evolving cyber threats.
|
||||
|
||||
## What We Offer
|
||||
|
||||
Huntress combines cutting-edge technology with expert oversight to ensure your endpoints are secure. Our service includes:
|
||||
|
||||
-
|
||||
**24/7 Monitoring**: Our seasoned threat hunters are on guard around the clock, ready to identify, stop, and eliminate hackers hiding in your environment.
|
||||
|
||||
-
|
||||
**Human Validation**: We cut through the noise by filtering out false positives. When you receive an alert, you can act with confidence knowing it’s a validated threat.
|
||||
|
||||
-
|
||||
**Proactive Threat Hunting**: Our expert hunters track and remove footholds left by attackers, ensuring they have nowhere to hide.
|
||||
|
||||
## Key Benefits
|
||||
|
||||
### 1. **Affordable Security**
|
||||
|
||||
- Protect your budget while safeguarding your endpoints. Our straightforward pricing keeps costs predictable—no surprises.
|
||||
|
||||
### 2. **Immediate Response**
|
||||
|
||||
- Our dedicated Security Operations Center (SOC) team responds to threats proactively, isolating and eliminating attackers before they disrupt your business.
|
||||
|
||||
### 3. **High Customer Satisfaction**
|
||||
|
||||
- Join over 3 million endpoints protected by Huntress, with a **98.8% customer satisfaction** rating and **4.8/5 G2 rating**.
|
||||
|
||||
### 4. **No Hidden Costs**
|
||||
|
||||
- Unlike many EDR solutions, Huntress provides everything you need in one package—no confusing subscriptions or extra fees.
|
||||
|
||||
## Why Choose Huntress?
|
||||
|
||||
-
|
||||
**Expertise**: Created by hackers to beat hackers, we understand the landscape and the tactics used by cybercriminals.
|
||||
|
||||
-
|
||||
**Comprehensive Coverage**: Our service includes everything from management to active threat hunting, ensuring you are fully protected.
|
||||
|
||||
-
|
||||
**Focus on Validated Threats**: We prioritize your time by ensuring you only respond to threats that truly matter.
|
||||
|
||||
## Service Highlights
|
||||
|
||||
-
|
||||
**False Positive Reduction**: Our rigorous quality assurance processes highlight the most pressing threats.
|
||||
|
||||
-
|
||||
**Containment & Response**: Quickly isolates hackers and supports your team in ensuring their presence is eliminated permanently.
|
||||
|
||||
-
|
||||
**24/7 Coverage**: Our global SOC team monitors your environment around the clock, giving you peace of mind.
|
||||
125
Infrastructure_Management.md
Normal file
125
Infrastructure_Management.md
Normal file
|
|
@ -0,0 +1,125 @@
|
|||
# Infrastructure Management
|
||||
|
||||
Your network is the backbone of your business. Infrastructure Management services ensure your routers, switches, access points, and firewalls are configured correctly, monitored continuously, and updated regularly.
|
||||
|
||||
## Service Tiers
|
||||
|
||||
We offer three levels of infrastructure management to match your needs:
|
||||
|
||||
| Tier | What's Included |
|
||||
|------|-----------------|
|
||||
| **Basic** | Network monitoring and alerting only |
|
||||
| **Standard** | Basic + full network management, configuration, and support |
|
||||
| **Fully Managed** | Standard + firewall management included |
|
||||
|
||||
[View pricing and bundling options](https://dbits.ca/manage)
|
||||
|
||||
---
|
||||
|
||||
## What's Included
|
||||
|
||||
### All Tiers
|
||||
|
||||
- **Network Monitoring:** 24/7 uptime monitoring of your network devices
|
||||
- **Alerting:** Immediate notification when devices go offline or show issues
|
||||
- **Documentation:** Network diagrams and configuration records in your portal
|
||||
|
||||
### Standard & Fully Managed
|
||||
|
||||
- **Configuration Management:** We configure and maintain your network devices
|
||||
- **Firmware Updates:** Regular updates to keep devices secure
|
||||
- **Performance Optimization:** Tuning for optimal speed and reliability
|
||||
- **Troubleshooting:** When something's wrong, we diagnose and fix it
|
||||
- **Change Management:** Need a new VLAN, guest network, or SSID? We handle it
|
||||
|
||||
### Fully Managed Only
|
||||
|
||||
- **Firewall Management:** Full configuration and management of your firewall included (no separate firewall fee)
|
||||
- **Security Policy Management:** Firewall rules, port forwarding, VPN configuration
|
||||
- **Threat Monitoring:** Active monitoring for suspicious network activity
|
||||
|
||||
---
|
||||
|
||||
## Infrastructure Add-Ons
|
||||
|
||||
Enhance your network with these optional services:
|
||||
|
||||
| Add-On | Description |
|
||||
|--------|-------------|
|
||||
| **Firewall** | Managed firewall (if not on Fully Managed tier) |
|
||||
| **Backup Internet** | LTE failover connection for business continuity |
|
||||
| **dbitsDNS** | DNS-level filtering and security (multiple tiers available) |
|
||||
| **Domain + Cloudflare** | Domain management with DNS, SSL, and Cloudflare protection |
|
||||
| **Hosting** | Website hosting on WHC or Hetzner infrastructure |
|
||||
|
||||
---
|
||||
|
||||
## What We Manage
|
||||
|
||||
### Network Devices
|
||||
|
||||
- **Routers:** TP-Link Omada, Ubiquiti, pfSense, and others
|
||||
- **Switches:** Managed and unmanaged switches
|
||||
- **Access Points:** Wi-Fi infrastructure
|
||||
- **Firewalls:** pfSense, OPNsense, Omada Gateway
|
||||
|
||||
### Network Services
|
||||
|
||||
- **VLANs:** Network segmentation for security and organization
|
||||
- **Guest Networks:** Isolated Wi-Fi for visitors
|
||||
- **VPN:** Site-to-site and remote access VPN connections
|
||||
- **DNS:** Internal DNS and filtering via dbitsDNS
|
||||
|
||||
---
|
||||
|
||||
## How It Works
|
||||
|
||||
We deploy and configure network devices using our standardized approach:
|
||||
|
||||
1. **Site Survey:** Understand your space and requirements
|
||||
2. **Design:** Create a network plan that fits your needs
|
||||
3. **Deployment:** Install and configure all equipment
|
||||
4. **Monitoring:** Add devices to our monitoring platform
|
||||
5. **Documentation:** Record everything in your portal
|
||||
|
||||
For ongoing management, we:
|
||||
|
||||
- Monitor device health and connectivity 24/7
|
||||
- Apply firmware updates during maintenance windows
|
||||
- Respond to alerts and resolve issues proactively
|
||||
- Make configuration changes as your needs evolve
|
||||
|
||||
---
|
||||
|
||||
## blueBox (Turnkey Network Solution)
|
||||
|
||||
For small to medium businesses, we offer **blueBox** - a complete network-in-a-box solution:
|
||||
|
||||
- Pre-configured router with firewall
|
||||
- Managed switches
|
||||
- Enterprise Wi-Fi access points
|
||||
- Optional on-site backup server
|
||||
- Full monitoring and management included
|
||||
|
||||
blueBox is ideal for businesses that want enterprise-grade networking without the complexity.
|
||||
|
||||
---
|
||||
|
||||
## What We Need From You
|
||||
|
||||
- Physical access to network equipment (or coordination for access)
|
||||
- Approval for maintenance windows
|
||||
- Notification of any changes to your space or requirements
|
||||
|
||||
---
|
||||
|
||||
## Questions?
|
||||
|
||||
- **Portal:** [portal.dbits.ca](https://portal.dbits.ca/)
|
||||
- **Email:** hey@dbits.ca
|
||||
- **Phone:** 506-988-9243
|
||||
- **Text:** 506-404-0055
|
||||
|
||||
Or visit [dbits.ca/contact](https://dbits.ca/contact) to reach us.
|
||||
|
||||
<!-- dbits-0009 -->
|
||||
3
Legal.md
Normal file
3
Legal.md
Normal file
|
|
@ -0,0 +1,3 @@
|
|||
# Legal – Terms, Conditions, Warranty & More
|
||||
|
||||
**Welcome to digiBandit IT Services.** We believe in transparency, clear communication, and standing behind our work.
|
||||
79
Local_Products.md
Normal file
79
Local_Products.md
Normal file
|
|
@ -0,0 +1,79 @@
|
|||
# Local Products
|
||||
|
||||
# Support Local. Build Local. Thrive Together.
|
||||
|
||||
At DigiBandit IT Services, supporting local isn’t a trend — it’s our foundation. From the tech we repair to the products we sell, the art we feature to the coffee we serve, everything we do is built to uplift creators, organizations, and businesses right here in New Brunswick.
|
||||
|
||||
Whether you’re a customer, vendor, nonprofit, or just a visitor to our site — you’re playing a part in something that matters.
|
||||
|
||||
## For Local Vendors, Makers & Creators
|
||||
|
||||
We believe in making it easier for local talent to shine. That’s why we offer exclusive access to our store and website for New Brunswick-based creators, with everything set up and managed for you.
|
||||
|
||||
We charge a low commission of just 5% to 15%, and we handle inventory management, listings, sales processing, and customer service. You just keep us stocked — we take care of the rest.
|
||||
|
||||
This is your opportunity to get your work seen, appreciated, and purchased by a wider audience, without the headache of managing your own sales system.
|
||||
|
||||
## For Customers and Our Community
|
||||
|
||||
Every purchase you make with us helps support someone in your community.
|
||||
|
||||
You’re fueling local jobs. You’re supporting real people. You’re helping small-town dreams grow into something meaningful.
|
||||
|
||||
All of our locally made products are clearly labeled, so you can shop intentionally and confidently — knowing that what you’re buying is more than just a product, it’s a story, a craft, and a local livelihood.
|
||||
|
||||
## For Website Visitors and Online Shoppers
|
||||
|
||||
Our website is becoming more than a digital storefront — it’s a hub for local discovery.
|
||||
|
||||
You’ll find locally made products, creator profiles, exclusive online-only items, and regional promos tailored to NB residents.
|
||||
|
||||
When you shop online with us, you’re not just getting great products — you’re participating in a movement to build up New Brunswick’s maker culture and keep commerce close to home.
|
||||
|
||||
## Designed by New Brunswick Artist Mike Hachey
|
||||
|
||||
Everything visual at DigiBandit — our branding, mascot, packaging, and stickers — has been created by local artist Mike Hachey, also known as @themaicul.
|
||||
|
||||
Mike’s work defines the look and feel of DigiBandit, and we’re proud to showcase his original sticker art and merchandise in-store and online.
|
||||
|
||||
Half of all profits from our DigiBandit-branded stickers go directly to Mike. Supporting our brand also means supporting the artist behind it.
|
||||
|
||||
## What You’ll Find In-Store and Online
|
||||
|
||||
Handmade plushies crafted by Nizrifa’s Geeky Yarn — soft, quirky, and full of personality
|
||||
|
||||
Laser-cut wooden mounts, accessories, and art from GameShelf — perfect for gamers and collectors
|
||||
|
||||
Handcrafted dice and magical jewelry by MelMadeMagic — for everyday magic and tabletop adventures
|
||||
|
||||
Circuit Sippy coffee roasted locally by Down East Coffee Roasters — available in-store and included with all MSP subscriptions
|
||||
|
||||
Original sticker art and branded designs by Mike Hachey — proudly made in New Brunswick
|
||||
|
||||
## Coming April 2025
|
||||
|
||||
Print-A-PartSubmit your STL files and have your custom pieces 3D printed locally
|
||||
|
||||
Pick-A-PartBrowse our shelf of salvaged and donor tech parts for your next project
|
||||
|
||||
Pull-A-PartRequest specific parts from our donor machines — perfect for DIY techs and educators
|
||||
|
||||
These services are designed to support New Brunswick’s maker and repair communities with real tools and real materials, all locally managed
|
||||
|
||||
## Nonprofits and Community Collaboration
|
||||
|
||||
We provide free backend services to registered nonprofits that support or cross-promote our mission to uplift the local community.
|
||||
|
||||
If your organization is helping people, we want to help you. From website setup to signage, email to event registration — we’ve got your back.
|
||||
|
||||
One of our proud partners is the Muddy River Rollers, who are leading the charge in local roller derby and community empowerment.
|
||||
|
||||
## Want to Get Involved?
|
||||
|
||||
Are you a creator, nonprofit, or just someone with a cool idea? We’d love to hear from you.
|
||||
|
||||
Reach out at hey@dbits.ca or stop by the shop to start the conversation.
|
||||
|
||||
Support Local. Build Local. Thrive Together.
|
||||
|
||||
Let’s make New Brunswick stronger — one part, one plushie, one cup of coffee at a time.
|
||||
183
Login_with_GCPW.md
Normal file
183
Login_with_GCPW.md
Normal file
|
|
@ -0,0 +1,183 @@
|
|||
# Login with GCPW
|
||||
|
||||
Google Credential Provider for Windows (GCPW) allows you to sign in to your Windows computer using your [Google Workspace](https://dbits.ca/digidocs/public/services-and-offerings/mits/business-it/google-workspace/) account. This eliminates the need for a separate local username and password, streamlining account management while maintaining strong security through features like two-factor authentication.
|
||||
|
||||
*Official Reference: [Google GCPW Documentation](https://support.google.com/a/answer/9250996)*
|
||||
|
||||
---
|
||||
|
||||
## Signing In for the First Time
|
||||
|
||||
### Step 1: Initiate Sign-In
|
||||
|
||||
- At the Windows login screen, click **“Add work account”**
|
||||
|
||||
- *Note: This option appears as a button below the standard login fields*
|
||||
|
||||
### Step 2: Enter Your Google Workspace Credentials
|
||||
|
||||
- Enter your Google Workspace email address (e.g., yourname@company.com)
|
||||
|
||||
- Enter your Google account password
|
||||
|
||||
- Complete any additional verification steps:
|
||||
|
||||
Multi-factor authentication (MFA) code if enabled
|
||||
|
||||
- Security key verification if required
|
||||
|
||||
- Accept the terms of service when prompted
|
||||
|
||||
### Step 3: Profile Creation
|
||||
|
||||
- Windows will automatically create your user profile (this may take a few minutes)
|
||||
|
||||
- Your desktop will load once the setup is complete
|
||||
|
||||
---
|
||||
|
||||
## Initial Configuration (First Login Only)
|
||||
|
||||
After your first successful login, configure these essential applications:
|
||||
|
||||
### 1. Set Up Windows Hello Fingerprint Reader
|
||||
|
||||
- Open the Start menu and search for **“Sign-in options”**
|
||||
|
||||
- Under **Windows Hello Fingerprint**, click **“Set up”**
|
||||
|
||||
- Click **“Get started”**
|
||||
|
||||
- Follow the on-screen prompts to scan your fingerprint multiple times
|
||||
|
||||
You’ll be asked to lift and place your finger repeatedly to capture different angles
|
||||
|
||||
- This typically requires 8-10 scans for accuracy
|
||||
|
||||
- Once complete, you can use your fingerprint to unlock Windows and authenticate in compatible apps
|
||||
|
||||
*Learn more: [Windows Hello Setup Guide (Microsoft)](https://support.microsoft.com/en-us/windows/sign-in-options-and-account-protection-in-windows-7b34d4cf-794f-f6bd-ddcc-e73cdf1a6fbf)*
|
||||
|
||||
### 2. Set Default Applications
|
||||
|
||||
- Open the Start menu and search for **“Default apps”**
|
||||
|
||||
- Set the following defaults:
|
||||
|
||||
**Email**: Gmail/Google Chrome
|
||||
|
||||
- **Web browser**: Google Chrome
|
||||
|
||||
- When prompted, click **“Switch anyway”** to confirm your choices
|
||||
|
||||
### 3. Configure Google Chrome
|
||||
|
||||
- Open Google Chrome
|
||||
|
||||
- Sign in with your Google Workspace account
|
||||
|
||||
- **Important**: Enable sync and select “Make Chrome my own” when prompted
|
||||
|
||||
*Learn more: [Chrome Sync Guide (Google)](https://support.google.com/chrome/answer/185277)*
|
||||
|
||||
### 4. Set Up Bitwarden Password Manager
|
||||
|
||||
**About Bitwarden:** Bitwarden is our recommended password manager for securely storing and managing your credentials. [Learn more about our Bitwarden service](https://dbits.ca/digidocs/public/services-and-offerings/mits/user-management/bitwarden-password-manager/).
|
||||
|
||||
#### 4a. Configure Bitwarden Desktop App
|
||||
|
||||
- Open the Bitwarden desktop application
|
||||
|
||||
- Sign in with your Bitwarden account credentials
|
||||
|
||||
- Once signed in, go to **Settings** (gear icon) → **Security**
|
||||
|
||||
- Under **Unlock with Biometrics**, toggle **“Unlock with Windows Hello”** to **ON**
|
||||
|
||||
- Windows will prompt you to verify your identity using your fingerprint
|
||||
|
||||
- Test the biometric unlock by locking Bitwarden (File → Lock) and unlocking with your fingerprint
|
||||
|
||||
#### 4b. Enable Biometric Unlock for Autofill
|
||||
|
||||
- In Bitwarden desktop settings, navigate to **Security**
|
||||
|
||||
- Enable **“Unlock with Windows Hello”** (if not already enabled)
|
||||
|
||||
- Enable **“Require biometric unlock for autofill”** for added security
|
||||
|
||||
- This ensures autofill requests require fingerprint authentication
|
||||
|
||||
#### 4c. Connect Bitwarden Chrome Extension
|
||||
|
||||
- Open Google Chrome
|
||||
|
||||
- Click the Bitwarden extension icon in Chrome
|
||||
|
||||
- Click **“Log in”**
|
||||
|
||||
- Select **“Log in with device”** or enter your credentials
|
||||
|
||||
- Once logged in, click the Bitwarden extension icon → **Settings (gear icon)**
|
||||
|
||||
- Navigate to **Options**
|
||||
|
||||
- Enable **“Enable browser integration”** (this links the extension to your desktop app)
|
||||
|
||||
#### 4d. Configure Biometric Authentication in Chrome Extension
|
||||
|
||||
- In the Bitwarden Chrome extension, go to **Settings** → **Security**
|
||||
|
||||
- Ensure **“Unlock with biometrics”** is enabled
|
||||
|
||||
- The extension will now communicate with the desktop app for biometric unlocks
|
||||
|
||||
- Test by locking the extension and unlocking with your fingerprint through the desktop app prompt
|
||||
|
||||
*Learn more: [Bitwarden Biometric Unlock Documentation](https://bitwarden.com/help/biometrics/)*
|
||||
|
||||
### 5. Set Up Google Drive
|
||||
|
||||
- Open the Google Drive desktop application
|
||||
|
||||
- Sign in with your Google Workspace account
|
||||
|
||||
- Configure folder sync by checking the folders you want to back up to the cloud
|
||||
|
||||
- This ensures your important files are automatically backed up
|
||||
|
||||
*Learn more: [Google Drive Desktop Setup Guide](https://support.google.com/drive/answer/10838124)*
|
||||
|
||||
### 6. Configure Printing (If Applicable)
|
||||
|
||||
- Look for the **Printix** icon in the system tray (near the clock)
|
||||
|
||||
- Sign in to Printix
|
||||
|
||||
- Add any printers you need access to from the available list
|
||||
|
||||
*Learn more: [Printix Device Management (PDM)](https://dbits.ca/digidocs/public/services-and-offerings/mits/device-management/pdm/) | [Print Management with Printix](https://dbits.ca/digidocs/public/services-and-offerings/mits/business-it/print-management-with-printix/)*
|
||||
|
||||
---
|
||||
|
||||
## Using Bitwarden with Biometrics
|
||||
|
||||
- When visiting a website with saved credentials, Bitwarden will offer to autofill
|
||||
|
||||
- Click the Bitwarden autofill prompt in the login field
|
||||
|
||||
- Authenticate with your fingerprint when prompted
|
||||
|
||||
- Your credentials will be filled automatically
|
||||
|
||||
---
|
||||
|
||||
## Tips for Success
|
||||
|
||||
- Keep your fingerprint reader clean for reliable authentication
|
||||
|
||||
- If biometric unlock fails, you can always use your master password
|
||||
|
||||
- Ensure both Bitwarden desktop app and Chrome extension are running for seamless integration
|
||||
|
||||
- Pin the Bitwarden desktop app to your taskbar for easy access
|
||||
12
MDM_Android_Google_Samsung.md
Normal file
12
MDM_Android_Google_Samsung.md
Normal file
|
|
@ -0,0 +1,12 @@
|
|||
# MDM for Android (Google, Samsung)
|
||||
|
||||
## Overview
|
||||
|
||||
DigiBandit provides a comprehensive Mobile Device Management (MDM) solution for Android devices, including those made by Google and Samsung.
|
||||
|
||||
DigiBandit's MDM lets you easily manage and secure your Android devices across your organization.
|
||||
|
||||
## Related Documentation
|
||||
|
||||
- [MDM Mobile Device Management](MDM_Mobile_Device_Management.md) - Overview of MDM services
|
||||
- [MDM iOS iPadOS Apple](MDM_iOS_iPadOS_Apple.md) - Apple device management
|
||||
5
MDM_Mobile_Device_Management.md
Normal file
5
MDM_Mobile_Device_Management.md
Normal file
|
|
@ -0,0 +1,5 @@
|
|||
# MDM (Mobile Device Management)
|
||||
|
||||
In this section, we will introduce you to Mobile Device Management (MDM).
|
||||
|
||||
MDM is a software solution that allows organizations to manage and secure mobile devices used by their employees. With MDM, organizations can remotely manage and configure mobile devices, enforce security policies, and protect sensitive data. In this section, you will find information on how MDM works, the benefits of using MDM for your organization, and how DigiBandit can help you implement an effective MDM solution. We hope this section will help you understand the importance of mobile device management and how it can benefit your organization.
|
||||
12
MDM_iOS_iPadOS_Apple.md
Normal file
12
MDM_iOS_iPadOS_Apple.md
Normal file
|
|
@ -0,0 +1,12 @@
|
|||
# MDM for iOS & iPadOS (Apple)
|
||||
|
||||
## Overview
|
||||
|
||||
DigiBandit provides a comprehensive Mobile Device Management (MDM) solution for iOS and iPadOS devices, including Apple iPhones and iPads.
|
||||
|
||||
DigiBandit's MDM allows you to easily manage and secure your Apple devices across your organization.
|
||||
|
||||
## Related Documentation
|
||||
|
||||
- [MDM Mobile Device Management](MDM_Mobile_Device_Management.md) - Overview of MDM services
|
||||
- [MDM Android Google Samsung](MDM_Android_Google_Samsung.md) - Android device management
|
||||
296
Master_Service_Agreement.md
Normal file
296
Master_Service_Agreement.md
Normal file
|
|
@ -0,0 +1,296 @@
|
|||
# Master Service Agreement
|
||||
|
||||
**digiBandit IT Services**
|
||||
|
||||
607 St George Blvd, Suite 103, Moncton, NB E1E 2C2
|
||||
|
||||
[hey@dbits.ca](mailto:hey@dbits.ca) · [506-988-9243](tel:5069889243)
|
||||
|
||||
---
|
||||
|
||||
## Agreement Terms
|
||||
|
||||
| Term | Details |
|
||||
|------|---------|
|
||||
| **Effective Date** | Upon acceptance of services |
|
||||
| **Term** | 12 months, auto-renews |
|
||||
| **Billing** | Invoiced 15th, due 1st |
|
||||
| **Termination** | 90 days written notice, or payment in lieu |
|
||||
|
||||
Non-payment results in service suspension until balance is resolved.
|
||||
|
||||
---
|
||||
|
||||
## How This Agreement Works
|
||||
|
||||
### Your Custom Agreement
|
||||
|
||||
By request, defines specific terms and services, hours and pricing. Supersedes this Master Service Agreement.
|
||||
|
||||
### This Master Service Agreement
|
||||
|
||||
Outlines core policies, expectations, and standard terms by linking to the specifics as outlined in each referenced 'digiDoc.' Stands as the default agreement for all subscribers of digiBandit IT Services' Managed IT Services.
|
||||
|
||||
### SSA (Service-Specific Agreements)
|
||||
|
||||
Covers specific services with unique SLAs and terms. Is subject to this Master Service Agreement, as the service is managed by digiBandit IT Services.
|
||||
|
||||
---
|
||||
|
||||
## How We Operate
|
||||
|
||||
digiBandit directly manages core services under this agreement, ensuring reliable IT infrastructure and support.
|
||||
|
||||
- **Core services** = digiBandit-managed IT Services (recurring services, user & device management, network operations, invoicing, business continuity)
|
||||
- **Addon services** = digiBandit as a VAR/MSP (we act as a reseller and service provider for third-party solutions)
|
||||
|
||||
### How We Keep Costs Low
|
||||
|
||||
We minimize overhead while maximizing asset count to unlock group benefits for businesses and individuals.
|
||||
|
||||
- Management fees cover digiBandit's operating expenses and core service administration
|
||||
- Addons allow businesses to operate efficiently while digiBandit manages them
|
||||
- Projects drive profits—from setting up Google Workspace to building custom servers to digitizing business processes
|
||||
|
||||
> You run your business with addons we resell to you.
|
||||
>
|
||||
> We keep your business running by managing the services you pay for.
|
||||
>
|
||||
> We fund innovation and improvements through projects you hire us for.
|
||||
|
||||
---
|
||||
|
||||
## Scope of This Agreement
|
||||
|
||||
This Master Service Agreement covers services that are paid on a recurring basis.
|
||||
|
||||
Additional and addon services may have their own service agreements.
|
||||
|
||||
---
|
||||
|
||||
## Explanation of Services
|
||||
|
||||
> View detailed pricing and tier breakdowns at [dbits.ca/manage](https://dbits.ca/manage)
|
||||
|
||||
### Core Services
|
||||
|
||||
Core services are just that, the core offerings of digiBandit IT Services. This is our time, efforts and the things that keep the lights on.
|
||||
|
||||
- Managed Services Invoicing
|
||||
- User Management
|
||||
- Account Management
|
||||
- Network Monitoring & Management
|
||||
- Business IT Management
|
||||
- Business Device Management (Phones, Laptops, Desktops, AIOs, Servers, etc.)
|
||||
- Personal Device Management (PDM) — Consumer-focused device management with streamlined features and flexible controls
|
||||
- **Business Continuity** — Service continuity and emergency access provisions (see Business Continuity section)
|
||||
|
||||
*Note: Some services previously listed as separate addons (Huntress EDR, AutoElevate PAM, Patch Management) are now included in Device Management tiers.*
|
||||
|
||||
### Addons
|
||||
|
||||
Addons are in addition to, but separate from Core Services, in that they are 3rd party solutions to the most common problems we face in this digital world.
|
||||
|
||||
**Security & Compliance**
|
||||
|
||||
- Security Awareness Training (SAT)
|
||||
- DNSFilter
|
||||
- Cyber Insurance Compliance Assistance
|
||||
- Bitwarden Password Manager
|
||||
|
||||
**Productivity & Identity**
|
||||
|
||||
- Google Workspace Management
|
||||
- Cloud Identity (GCPW)
|
||||
- Software VPN
|
||||
|
||||
**Communication**
|
||||
|
||||
- VoIP / Cloud Phone Service
|
||||
- SMTP2GO
|
||||
|
||||
**Data Protection**
|
||||
|
||||
- dataBack by digiBandit
|
||||
- dataBack for Google Workspace
|
||||
- Data Recovery
|
||||
|
||||
**Business Operations**
|
||||
|
||||
- Printer & Print Management
|
||||
- Business Specific Software Management
|
||||
- Digital Display
|
||||
- Play Music Legally With Soundtrack Your Brand
|
||||
|
||||
**Support & Advisory**
|
||||
|
||||
- IT Consultations
|
||||
- Support HelpDesk
|
||||
- Remote Support & Remote Connect via Splashtop
|
||||
|
||||
**Specialty Services**
|
||||
|
||||
- Domain Services
|
||||
- Media Conversion
|
||||
- CCTV
|
||||
|
||||
---
|
||||
|
||||
## Business Continuity
|
||||
|
||||
digiBandit believes clients should never be held hostage by their IT provider. Business Continuity provisions ensure you maintain access to your IT infrastructure, documentation, and credentials—even if digiBandit is unable to provide services.
|
||||
|
||||
### What's Included
|
||||
|
||||
As part of core managed services, all clients receive:
|
||||
|
||||
**Documentation Access**
|
||||
|
||||
- Complete network documentation maintained in our Portal
|
||||
- Asset inventory with specifications
|
||||
- Configuration documentation
|
||||
- Historical ticket data and resolution notes
|
||||
- Client portal access to view documentation at any time
|
||||
|
||||
**Credential Escrow**
|
||||
|
||||
- All client-facing credentials stored securely in our Portal
|
||||
- Break-glass administrator accounts on managed endpoints
|
||||
- Cloud service credentials documented with client access paths
|
||||
- Credentials accessible via client portal or upon request
|
||||
|
||||
**Transition Support**
|
||||
|
||||
- Documentation package available upon service termination
|
||||
- 30 days of transition support included with proper notice
|
||||
- Cooperative handoff to successor provider or in-house IT
|
||||
|
||||
### Service Continuity Triggers
|
||||
|
||||
In the event digiBandit cannot provide services due to:
|
||||
|
||||
- Extended unavailability (14+ consecutive business days of non-response)
|
||||
- Business closure
|
||||
- Incapacitation of principal(s)
|
||||
|
||||
The following occurs:
|
||||
|
||||
1. Designated emergency contacts are notified of the situation
|
||||
2. Client portal access remains available for documentation and credential retrieval
|
||||
3. Transition support is provided as outlined above
|
||||
|
||||
### Emergency Contact Protocol
|
||||
|
||||
digiBandit maintains an emergency notification protocol through a designated trusted party who holds:
|
||||
|
||||
- Emergency contact information for all managed services clients
|
||||
- Instructions for client notification
|
||||
- Access credentials for emergency portal access
|
||||
|
||||
This party is authorized to notify clients and facilitate documentation access but is not expected to provide IT services.
|
||||
|
||||
### Client Responsibilities for Business Continuity
|
||||
|
||||
To ensure effective business continuity, clients agree to:
|
||||
|
||||
- Designate at least one emergency contact in the Portal
|
||||
- Maintain current contact information
|
||||
- Retain at least one administrator account under client control for cloud services (Google Workspace, Microsoft 365, etc.)
|
||||
- Respond to annual business continuity verification requests
|
||||
|
||||
---
|
||||
|
||||
## Client Responsibilities
|
||||
|
||||
To ensure effective service delivery, clients agree to:
|
||||
|
||||
- Provide timely access to systems, credentials, and information needed to deliver services
|
||||
- Notify digiBandit of changes to infrastructure, staff, or business operations that affect service delivery
|
||||
- Maintain valid payment method on file
|
||||
- Designate authorized contacts for support and decision-making
|
||||
- Follow reasonable security practices as advised
|
||||
- Fulfill Business Continuity responsibilities as outlined above
|
||||
|
||||
---
|
||||
|
||||
## Service Response Policy
|
||||
|
||||
digiBandit IT Services is committed to providing fast and effective IT support for all clients.
|
||||
|
||||
### Response & Resolution Commitment
|
||||
|
||||
- **Response Time:** We'll respond to all support requests within 1 hour during business hours
|
||||
- **Average Reply Time:** Most requests receive a response within 15 minutes
|
||||
- **Resolution Time:** We work towards a resolution as soon as reasonably possible, with an average of 3 hours for most issues
|
||||
|
||||
### Business Hours, Methods of Contact & Support Times
|
||||
|
||||
View our hours, details and more on our [Methods of Contact](https://dbits.ca/digidocs/internal/operations/methods-of-contact/) digiDoc.
|
||||
|
||||
### Exclusions & Limitations
|
||||
|
||||
This policy applies only to services within your agreement.
|
||||
|
||||
Extended resolution times may occur due to:
|
||||
|
||||
- Third-party vendor delays
|
||||
- Dependencies on client-provided information
|
||||
- Force majeure events
|
||||
|
||||
---
|
||||
|
||||
## Our Rates
|
||||
|
||||
View [Our Rates](https://dbits.ca/rates), always up-to-date and available on our website.
|
||||
|
||||
For detailed pricing on managed service tiers, visit [dbits.ca/manage](https://dbits.ca/manage).
|
||||
|
||||
---
|
||||
|
||||
## Legal Terms & Liability
|
||||
|
||||
### Governing Law
|
||||
|
||||
This Master Service Agreement shall be governed by and construed in accordance with the laws of the Province of New Brunswick, Canada. Any disputes arising under or in connection with this Agreement shall be subject to the exclusive jurisdiction of the courts in Moncton, New Brunswick.
|
||||
|
||||
### Limitation of Liability
|
||||
|
||||
digiBandit IT Services shall not be liable for any indirect, incidental, special, or consequential damages, including but not limited to loss of profits, data, or business opportunities. Our total liability for any claims related to this Agreement shall not exceed the total fees paid by the client in the twelve (12) months preceding the claim.
|
||||
|
||||
### Service Disruptions & Third-Party Failures
|
||||
|
||||
digiBandit shall not be responsible for service disruptions caused by third-party providers, including but not limited to cloud services, software vendors, ISPs, or hardware suppliers. We will make reasonable efforts to coordinate and escalate issues on behalf of our clients.
|
||||
|
||||
### Business Continuity Limitations
|
||||
|
||||
digiBandit makes reasonable efforts to maintain current documentation and credentials. Client acknowledges that:
|
||||
|
||||
- Credential changes made without digiBandit's knowledge may not be reflected in documentation
|
||||
- Emergency notification timing depends on circumstances outside digiBandit's control
|
||||
- Successor providers engaged by client are not agents of digiBandit, and digiBandit bears no liability for their actions or service quality
|
||||
|
||||
### Dispute Resolution
|
||||
|
||||
In the event of any dispute, the parties agree to attempt resolution through good-faith negotiations. If a resolution cannot be reached, disputes shall be resolved through binding arbitration in Moncton, New Brunswick, before any legal action is taken.
|
||||
|
||||
### Privacy
|
||||
|
||||
Your privacy matters. View our [Privacy Policy](https://dbits.ca/privacy) for details on how we collect, use, and protect your information.
|
||||
|
||||
---
|
||||
|
||||
## Acceptance
|
||||
|
||||
By using our services, you acknowledge and agree to the terms outlined in this Master Service Agreement, as well as any referenced or linked policies. If you require additional legal provisions beyond what is stated here, please contact us to arrange a custom agreement tailored to your specific needs.
|
||||
|
||||
---
|
||||
|
||||
## Questions or Need a Custom Agreement?
|
||||
|
||||
Contact us to discuss your specific requirements.
|
||||
|
||||
- **Location:** 607 St George Blvd, Suite 103, Moncton NB
|
||||
- **Phone:** 506-988-9243
|
||||
- **Email:** hey@dbits.ca
|
||||
|
||||
<!-- dbits-0001 -->
|
||||
42
Media_Conversion.md
Normal file
42
Media_Conversion.md
Normal file
|
|
@ -0,0 +1,42 @@
|
|||
# Media Conversion
|
||||
|
||||
VHS and tape cassettes, vinyl records to photos, slides and documents, BluRay and HD-DVDs…
|
||||
The physical medium of yesteryear has a shelf life; it’s time to back it up!
|
||||
After 10 years, the media stored starts to degrade, and the chance of losing your precious media increases.
|
||||
Avoid losing memories by converting or transferring your older media to Digital or more modern physical media!
|
||||
|
||||
## **Available Conversion Equipment**:
|
||||
|
||||
- Blueray Player
|
||||
|
||||
- DVD Player
|
||||
|
||||
- VHS Player
|
||||
|
||||
- MiniDV Player
|
||||
|
||||
- CD Player
|
||||
|
||||
- Tape Cassette Player
|
||||
|
||||
- Vinyl Record/LP 45/33 Player
|
||||
|
||||
- Slides/Negative/Photo Scanner
|
||||
|
||||
- Document Scanner
|
||||
|
||||
- DVD Burner
|
||||
|
||||
- BlueRay Burner
|
||||
|
||||
- HDMI 4k Capture Card (External)
|
||||
|
||||
- RCA/S-Video Capture Card
|
||||
|
||||
- Nearly any physical video cable type…
|
||||
|
||||
## Pricing, Services & Rates
|
||||
|
||||
[A list of prices can be found here.](https://dbits.ca/digidocs/public/services-and-offerings/rates/)
|
||||
|
||||
Don’t see what you need listed? Contact us anyway; we’d love to expand our list!
|
||||
7
Methods_of_Contact.md
Normal file
7
Methods_of_Contact.md
Normal file
|
|
@ -0,0 +1,7 @@
|
|||
# Methods of Contact
|
||||
|
||||
This document has been consolidated. See [Contact](./Contact.md) for all contact methods and information.
|
||||
|
||||
---
|
||||
|
||||
*Redirected January 2026 during documentation reorganization.*
|
||||
71
Network_Monitoring_and_Management.md
Normal file
71
Network_Monitoring_and_Management.md
Normal file
|
|
@ -0,0 +1,71 @@
|
|||
# Network Monitoring & Management
|
||||
|
||||
Are you tired of dealing with network issues and downtime? Let DigiBandit IT Services take the burden off your shoulders with our expert network monitoring and management services. We use the latest tools and techniques to monitor your network 24/7 and ensure it runs at peak performance. With our team of skilled technicians, we can quickly identify and resolve issues before they turn into major problems, saving you time and money.
|
||||
|
||||
Our network monitoring and management services are customizable to fit your specific needs, so you can rest assured that your network is in good hands. We provide detailed reports and regular updates to keep you informed on the health of your network, and our team is always available to answer any questions or concerns you may have. Say goodbye to downtime and hello to a reliable network with DigiBandit IT Services. Contact us today to schedule a consultation and see how we can help your business thrive.
|
||||
|
||||
## Network Monitoring
|
||||
|
||||
Welcome to the realm where network performance and reliability are not just goals but guarantees. At DigiBandit IT Services, we blend top-tier expertise with innovative solutions to ensure your network infrastructure operates seamlessly, 24/7. Let’s dive into how we make digital excellence your reality.
|
||||
|
||||
### **Continuous Network Vigilance**
|
||||
|
||||
Consider us the sentinels of your network’s well-being, ever-watchful to prevent and address issues swiftly, ensuring smooth sailing for your operations.
|
||||
|
||||
### **Customized Network Mastery**
|
||||
|
||||
No two networks are alike, and neither are our strategies. We tailor our approach to align with your network’s specific demands perfectly.
|
||||
|
||||
### **Transparent Insights**
|
||||
|
||||
With comprehensive reports, we keep you in the loop on your network’s status because knowledge is power.
|
||||
|
||||
### **Rapid-Response Support**
|
||||
|
||||
Our skilled technicians are your network’s rapid-response team, ready to tackle any challenge.
|
||||
|
||||
---
|
||||
|
||||
## Network Management
|
||||
|
||||
Our network monitoring and management services are designed to be the heartbeat of your business’s digital ecosystem, ensuring efficiency and resilience.
|
||||
|
||||
### Network Installation and Setup: Your Foundation for Success
|
||||
|
||||
Billed hourly or pre-paid with equipment, our network installation and setup services are as flexible as they are comprehensive and designed to suit your schedule and budget.
|
||||
|
||||
#### **Comprehensive Services Included**
|
||||
|
||||
Your monthly agreement encompasses extensive network management services, including but not limited to WiFi management, access points, VPNs, and RAID servers (the WiFi kind). We’re not just about keeping you connected but about enhancing how you work, communicate, and grow.
|
||||
|
||||
---
|
||||
|
||||
## Emergency Internet
|
||||
|
||||
We offer an emergency internet solution, ensuring your operations remain unshaken, even when unexpected downtime looms. This service is your operational continuity’s best friend.
|
||||
|
||||
### **Tech Innovations for Continuity**
|
||||
|
||||
- **IoT Connectivity**: Leveraging Telus IoT SIM cards, we equip you with a dependable backup internet connection, offering extensive coverage and swift internet access.
|
||||
|
||||
- **Powerful Devices**: The Inseego MiFi 8000 steps in as your compact yet mighty guardian, ensuring connectivity even amidst outages.
|
||||
|
||||
### **Deployment with Precision**
|
||||
|
||||
- **Tailored Preparations**: Our thorough pre-deployment assessments guarantee that the IoT solution integrates flawlessly with your existing network.
|
||||
|
||||
- **Custom Configurations & Regular Testing**: We ensure the emergency internet setup is operational, optimized, and reliable.
|
||||
|
||||
**Investment in Reliability**: Your package includes a monthly fee per location, uninterrupted connectivity, and peace of mind.
|
||||
|
||||
---
|
||||
|
||||
## PFSense and 3rd Party Firewall
|
||||
|
||||
Enhance your network’s defence with our specialized firewall management services. We offer unparalleled protection tailored to your specific needs at an additional monthly fee for PFSense 3rd party firewalls like Fortigate.
|
||||
|
||||
---
|
||||
|
||||
## Conclusion
|
||||
|
||||
With DigiBandit IT Services, you’re not just getting a service provider; you’re gaining a partner dedicated to ensuring your network is robust, secure, and efficient. From unparalleled monitoring and management to cutting-edge emergency solutions and firewall protection, we ensure your network is a cornerstone of your business’s success.
|
||||
134
NextCloud_File_Storage.md
Normal file
134
NextCloud_File_Storage.md
Normal file
|
|
@ -0,0 +1,134 @@
|
|||
# NextCloud File Storage
|
||||
|
||||
## Introduction
|
||||
|
||||
DigiBandit offers NextCloud as a secure, Canadian-hosted file storage and collaboration platform for businesses. NextCloud provides a complete solution for file synchronization, sharing, and team collaboration while keeping your data under your control and within Canadian borders.
|
||||
|
||||
With NextCloud, your organization can access files from anywhere, collaborate in real-time, and communicate seamlessly, all while maintaining the privacy and security standards your business demands.
|
||||
|
||||
---
|
||||
|
||||
## Why NextCloud?
|
||||
|
||||
**Data Sovereignty**
|
||||
Your files are stored on Canadian infrastructure, ensuring compliance with Canadian privacy regulations and eliminating concerns about foreign data access laws.
|
||||
|
||||
**Complete Control**
|
||||
Unlike consumer cloud services, NextCloud gives your organization full ownership and control over your data, with no third-party scanning or advertising.
|
||||
|
||||
**Enterprise-Grade Security**
|
||||
Industry-standard encryption protects your files both in transit and at rest, with granular access controls and audit logging.
|
||||
|
||||
**Cost-Effective Scalability**
|
||||
Grow your storage capacity as needed without per-user licensing fees or unexpected cost increases.
|
||||
|
||||
---
|
||||
|
||||
## Key Features
|
||||
|
||||
### File Sync and Share
|
||||
|
||||
- **Desktop Sync**: Automatically synchronize folders between your computer and NextCloud for seamless access to the latest versions
|
||||
- **Selective Sync**: Choose which folders to sync locally to manage storage on your devices
|
||||
- **File Sharing**: Share files and folders with team members, clients, or external partners via secure links
|
||||
- **Password-Protected Links**: Add passwords and expiration dates to shared links for enhanced security
|
||||
- **Version History**: Access previous versions of files and restore them when needed
|
||||
|
||||
### Collaborative Editing
|
||||
|
||||
- **Real-Time Collaboration**: Edit documents, spreadsheets, and presentations simultaneously with team members
|
||||
- **Office Integration**: Work with Microsoft Office and LibreOffice file formats directly in the browser
|
||||
- **Comments and Annotations**: Add comments to files for feedback and discussion without altering the original document
|
||||
|
||||
### Calendar and Contacts (CalDAV/CardDAV)
|
||||
|
||||
- **Shared Calendars**: Create team calendars for scheduling and coordination
|
||||
- **Contact Management**: Maintain shared address books accessible across all your devices
|
||||
- **Cross-Platform Sync**: Sync calendars and contacts with desktop and mobile applications using standard protocols
|
||||
|
||||
### NextCloud Talk (Video Calls)
|
||||
|
||||
- **Video Conferencing**: Host secure video calls with team members and clients
|
||||
- **Screen Sharing**: Share your screen during calls for presentations and demonstrations
|
||||
- **Chat Messaging**: Send instant messages to individuals or groups directly within NextCloud
|
||||
|
||||
### External Storage Integration
|
||||
|
||||
- **Unified Access**: Connect external storage backends to access all your files from one interface
|
||||
- **Flexible Storage Options**: DigiBandit configures NextCloud with multiple storage backends including:
|
||||
- Local Proxmox storage for high-performance access
|
||||
- Synology NAS integration for on-premise requirements
|
||||
- Backblaze B2 cloud storage for cost-effective archival and redundancy
|
||||
|
||||
---
|
||||
|
||||
## Accessing NextCloud
|
||||
|
||||
### Web Access
|
||||
|
||||
Access your files from any browser at **nx.dbits.ca**. The web interface provides full access to all NextCloud features including file management, calendar, contacts, and video calls.
|
||||
|
||||
### Desktop Applications
|
||||
|
||||
Install the NextCloud desktop client for Windows, macOS, or Linux to keep files synchronized automatically between your computer and the cloud.
|
||||
|
||||
- Download from: [nextcloud.com/install](https://nextcloud.com/install)
|
||||
- Configure the client with your NextCloud server address: **nx.dbits.ca**
|
||||
- Sign in with your DigiBandit-provided credentials
|
||||
|
||||
### Mobile Applications
|
||||
|
||||
Access your files on the go with NextCloud mobile apps:
|
||||
|
||||
- **iOS**: Available on the App Store
|
||||
- **Android**: Available on Google Play
|
||||
|
||||
The mobile apps support file browsing, automatic photo uploads, offline access, and push notifications for shared file updates.
|
||||
|
||||
---
|
||||
|
||||
## Benefits of Canadian-Hosted File Storage
|
||||
|
||||
**Privacy Compliance**
|
||||
Hosting your data in Canada means your files remain subject to Canadian privacy laws, including PIPEDA, providing stronger privacy protections than many international alternatives.
|
||||
|
||||
**Reduced Latency**
|
||||
Canadian servers mean faster upload and download speeds for Canadian-based team members and clients.
|
||||
|
||||
**No Foreign Access**
|
||||
Your data is not subject to foreign government access laws such as the US CLOUD Act, providing peace of mind for sensitive business information.
|
||||
|
||||
**Local Support**
|
||||
DigiBandit provides local, Canadian-based support for your NextCloud deployment.
|
||||
|
||||
---
|
||||
|
||||
## Getting Started
|
||||
|
||||
### Initial Setup
|
||||
|
||||
1. **Receive Credentials**: DigiBandit will provide your NextCloud login credentials via secure delivery
|
||||
2. **Access the Web Interface**: Navigate to **nx.dbits.ca** and sign in with your credentials
|
||||
3. **Install Desktop Client**: Download and configure the NextCloud desktop application for automatic file synchronization
|
||||
4. **Install Mobile Apps**: Set up the NextCloud mobile app on your smartphone or tablet
|
||||
|
||||
### Recommended First Steps
|
||||
|
||||
- Explore the web interface to familiarize yourself with the file browser, calendar, and contacts
|
||||
- Configure desktop sync for your most important folders
|
||||
- Enable automatic photo backup on your mobile device if desired
|
||||
- Review shared folders and understand your team's folder structure
|
||||
|
||||
---
|
||||
|
||||
## Support
|
||||
|
||||
For assistance with NextCloud, including account setup, file sharing questions, or technical issues, contact DigiBandit IT Services:
|
||||
|
||||
- **Support Portal**: ops.dbits.ca
|
||||
- **Phone**: See your welcome documentation for support contact numbers
|
||||
- **Email**: Contact your designated DigiBandit representative
|
||||
|
||||
Our team is available to help you get the most out of your NextCloud deployment and ensure your data remains secure and accessible.
|
||||
|
||||
<!-- dbits-9601 -->
|
||||
61
Notifications_on_UNV_Link.md
Normal file
61
Notifications_on_UNV_Link.md
Normal file
|
|
@ -0,0 +1,61 @@
|
|||
# Notifications on UNV-Link
|
||||
|
||||
# How to turn on the notifications from the NVR:
|
||||
|
||||
Open the UNV-Link Application.
|
||||
|
||||
You will see the home page screen:
|
||||
|
||||
Choose the play button on the top of your device as shown in the picture.
|
||||
|
||||
Next, go to the the settings of your device as shown in the image:
|
||||
|
||||
Choose the “My device” (the name could be different) that is first on the list:
|
||||
|
||||
In the settings of the Device (NVR), choose Allow Alarm Notification:
|
||||
|
||||
Allow Alarms from the Device first:
|
||||
|
||||
Now allow the notifications on your Phone. (If the app doesn’t have permission to send notifications, you may see a pop-up that gives permission to the application first. You are required to receive the notification from the system!!! ):
|
||||
|
||||
Report snapshot should be turned on to see the preview image from the camera.
|
||||
|
||||
## How to manage the schedule for notifications:
|
||||
|
||||
Open the UNV-Link Application.
|
||||
|
||||
You will see the home page screen:
|
||||
|
||||
Choose the play button on the top of your device, as shown in the picture.
|
||||
|
||||
Next, go to the the settings of your device as shown in the image:
|
||||
|
||||
Choose the “My device” (the name could be different) that is first on the list:
|
||||
|
||||
In the settings of the Device (NVR), choose Allow Alarm Notification:
|
||||
|
||||
Choose notification schedule:
|
||||
|
||||
Switch the slider to on:
|
||||
|
||||
##
|
||||
|
||||
In the available schedule, set up when you want to receive notifications (remember it is 24- 24 hours). If you want to receive the notifications from 6 pm to 6 am, you will need to set the first period from 00:00 – 6:00 and the second period to 18:00 – 23:59 (midnight):
|
||||
|
||||
When the schedule should be repeated is set below (!!!Warning didn’t test this feature yet!!!):
|
||||
|
||||
# How to manage the notifications on the cell phone:
|
||||
|
||||
Open the UNV-Link Application.
|
||||
|
||||
You will see the home page screen:
|
||||
|
||||
Choose the Message button on the bottom bar as shown in the picture:
|
||||
|
||||
Shoes the setting button on the top right corner as in the image:
|
||||
|
||||
You will see the complete list of notifications; you may choose what notifications are important for you.
|
||||
|
||||
Remove motion notifications; otherwise, you will receive too many notifications almost every second if you have any trees or anything moving inside the camera view. (Recommended notification is intrusion):
|
||||
|
||||
After selecting all notifications, you are going to see everything is unchecked. Choose intrusion detection and hit save:
|
||||
39
Patch_Management.md
Normal file
39
Patch_Management.md
Normal file
|
|
@ -0,0 +1,39 @@
|
|||
# Patch Management
|
||||
|
||||
Effective patch management is crucial for maintaining a robust cybersecurity strategy. DigiBandit IT Services, your trusted Managed Service Provider (MSP), offers comprehensive patch management services to ensure the security of your systems. We utilize JumpCloud’s Chocolaty Package Manager addon and AutoElevate for Privileged Access Management (PAM) request approvals. Read on to understand our simple standard operating procedures for software installation, removal, updates, and modifications.
|
||||
|
||||
## Software Installation/Removal:
|
||||
|
||||
- Chocolaty Package Manager (Automated):
|
||||
|
||||
[Submit a ticket](https://dbits.ca/ticket) with software specifications and requirements.
|
||||
|
||||
- Our team will initiate automated installation via JumpCloud’s Chocolaty Package Manager addon.
|
||||
|
||||
- Manual Installation (Non-Chocolaty software):
|
||||
|
||||
[Create a ticket](https://dbits.ca/ticket) at least one week in advance with software details and requirements.
|
||||
|
||||
- Our team will manually install the software on the specified date.
|
||||
|
||||
## Software Updates:
|
||||
|
||||
- Chocolaty Package Manager (Automated):
|
||||
|
||||
Weekly updates are performed automatically on Wednesdays.
|
||||
|
||||
- Our team monitors for critical or security-related patches.
|
||||
|
||||
- Manual updates may be scheduled if necessary for proper installation.
|
||||
|
||||
- Manual Updates (Non-Chocolaty software):
|
||||
|
||||
[Create a ticket](https://dbits.ca/ticket) specifying the software requiring an update.
|
||||
|
||||
- Our team will schedule and manually update the software on the selected date.
|
||||
|
||||
## AutoElevate
|
||||
|
||||
For additional information on our use of [Privileged Access Management (PAM)](https://dbits.ca/docs/public/services-and-offerings/helpdesk-by-digibandit/pam/) request approvals, please refer to our [Documentation](https://dbits.ca/docs/public/services-and-offerings/helpdesk-by-digibandit/pam/).
|
||||
|
||||
DigiBandit IT Services provides simple and effective patch management services to safeguard your business. We leverage JumpCloud’s Chocolaty Package Manager addon for automated management and AutoElevate for PAM request approvals. Our standard operating procedures for software installation, removal, updates, and modifications ensure that your systems remain secure and up-to-date. Contact us today to learn more about our patch management services and protect your business against cyber threats.
|
||||
35
Payment_Options.md
Normal file
35
Payment_Options.md
Normal file
|
|
@ -0,0 +1,35 @@
|
|||
# Payment Options
|
||||
|
||||
The following is a list of payment options that we support.
|
||||
|
||||
## Interac e-Transfer
|
||||
|
||||
This is our preferred payment method, as we get the money instantly without any holds, and it comes with a built-in receipt (even though we’ll send you one anyhow!)
|
||||
|
||||
- Name: DigiBandit IT Services
|
||||
- Email: pay@dbits.ca
|
||||
- Please include your INVOICE NUMBER in the MESSAGE field.
|
||||
|
||||
## Credit Card & Visa Debit Cards
|
||||
|
||||
If you wish to make your payment via Credit or Visa Debit Card, you have several options:
|
||||
|
||||
- [Online via the Customer Portal](https://dbits.ca/digidocs/customer-portal/navigating-the-customer-portal/account-overview/add-a-credit-card/)!
|
||||
- In-store with Credit/Debit!
|
||||
- [Over the phone](https://dbits.ca/digidocs/public/general-details/digibandits-phone-system-call-flow/)!
|
||||
|
||||
## Cash
|
||||
|
||||
If you wish to pay via Cash, please visit us at our shop:
|
||||
|
||||
607 St George Blvd, Suite 103, Moncton, NB E1E 2C2
|
||||
|
||||
## Cheque
|
||||
|
||||
If you are a business and wish to pay via Cheque, the information to use is found below:
|
||||
|
||||
- Name: DigiBandit IT Services
|
||||
- Address: 607 St George Blvd, Suite 103, Moncton, NB E1E 2C2
|
||||
- Memo: ‘**INVOICE NUMBER**’ (Can be found on your Customer Portal)
|
||||
|
||||
Please note that if this is your first time paying via cheque to DigiBandit, there will be a mandatory one-time 5-business-day hold on your payment to confirm funds are available and deposited.
|
||||
5
Personal_Device_Management.md
Normal file
5
Personal_Device_Management.md
Normal file
|
|
@ -0,0 +1,5 @@
|
|||
# Personal Device Management
|
||||
|
||||
Professional monitoring and management for your personal devices. We keep your computer secure, up-to-date, and running smoothly.
|
||||
|
||||
Member-Exclusive Service
|
||||
37
Play_Music_Legally_With_Soundtrack_Your_Brand.md
Normal file
37
Play_Music_Legally_With_Soundtrack_Your_Brand.md
Normal file
|
|
@ -0,0 +1,37 @@
|
|||
# Play Music Legally With Soundtrack Your Brand
|
||||
|
||||
# Elevate Your Business’s Atmosphere with Customized Music
|
||||
|
||||
**Overview**
|
||||
|
||||
SoundTrackYourBrand is an innovative music streaming service designed specifically for businesses in Canada. As a trusted managed service provider (MSP) and value-added reseller (VAR), we are excited to offer this exceptional service to our clients. SoundTrackYourBrand allows businesses to create a unique and tailored musical experience that enhances their brand identity, improves customer satisfaction, and sets the perfect ambiance for their establishments. With a vast library of licensed music and advanced features, SoundTrackYourBrand empowers businesses to curate the ideal soundscapes that align with their brand image and target audience.
|
||||
|
||||
**Benefits of SoundTrackYourBrand for Your Business**
|
||||
|
||||
- **Enhanced Branding**: SoundTrackYourBrand enables you to establish a consistent brand image by choosing music that reflects your values, target audience, and overall atmosphere. This customized audio experience strengthens brand recognition and creates a memorable customer environment.
|
||||
|
||||
- **Mood and Atmosphere**: With SoundTrackYourBrand, you can effortlessly set the mood and ambiance of your physical spaces through music. Whether you need an energetic playlist for a retail store or a calming selection for a spa, SoundTrackYourBrand offers an extensive catalogue of tracks to suit any atmosphere.
|
||||
|
||||
- **Legal Compliance**: Utilizing SoundTrackYourBrand ensures you legally comply with music licensing requirements. The service provides a vast repertoire of licensed music from major record labels and independent artists, mitigating the risk of copyright infringement.
|
||||
|
||||
- **Easy Management**: The intuitive SoundTrackYourBrand platform simplifies the management of music playlists across multiple locations. Our team will assist you in organizing your music library, scheduling playlists, and controlling the audio experience at each establishment. This streamlined process ensures a seamless customer experience.
|
||||
|
||||
- **Data-Driven Insights**: SoundTrackYourBrand provides valuable analytics and insights to help you understand the impact of music on your customer experience. By leveraging these data-driven insights, you can make informed decisions to optimize your music selection and improve customer satisfaction.
|
||||
|
||||
**How We Implement SoundTrackYourBrand for Your Business**
|
||||
|
||||
- **Consultation**: We begin by understanding your business, brand identity, and target audience. We tailor the SoundTrackYourBrand service through in-depth discussions to your unique requirements and desired atmosphere.
|
||||
|
||||
- **Account Setup**: Our team will guide you through the registration process on the SoundTrackYourBrand website. We will assist you in creating an account, setting up locations, and configuring administrative access for your staff.
|
||||
|
||||
- **Music Curation**: We work closely with you to curate customized playlists using SoundTrackYourBrand’s extensive music library. We ensure the selected tracks align with your brand identity, target audience, and desired atmosphere.
|
||||
|
||||
- **Scheduling and Automation**: We help you optimize your music playlists by scheduling different genres or moods throughout the day. The system can be automated to reflect opening hours, special events, or specific customer preferences.
|
||||
|
||||
- **Training and Support**: We provide comprehensive training to your staff on operating and managing SoundTrackYourBrand effectively. Additionally, our team offers ongoing support to address any questions, technical issues, or updates that may arise.
|
||||
|
||||
By integrating SoundTrackYourBrand into our suite of services, we aim to provide you with an innovative tool to enhance your customer experience and strengthen your brand identity through music. Contact us today to learn more about how SoundTrackYourBrand can elevate your business’s atmosphere and create a lasting impact on your customers.
|
||||
|
||||
*When you sign up for this service, you hereby accept and confirm that the DigiBandit IT Services may enter into and accept the GTC’s of Soundtrack Your Brand, as can be found through this link, on behalf of you: *[https://www.soundtrackyourbrand.com/legal/general-terms-and-conditions](https://www.soundtrackyourbrand.com/legal/general-terms-and-conditions)
|
||||
|
||||
[Soundtrack-Your-Brand-Pitch-Deck](https://dbits.ca/wp-content/uploads/2023/09/Soundtrack-Your-Brand-Pitch-Deck.pdf)[Download](https://dbits.ca/wp-content/uploads/2023/09/Soundtrack-Your-Brand-Pitch-Deck.pdf)
|
||||
40
Printer_and_Print_Management.md
Normal file
40
Printer_and_Print_Management.md
Normal file
|
|
@ -0,0 +1,40 @@
|
|||
# Printer & Print Management
|
||||
|
||||
### **Streamline Your Printing Operations with DigiBandit IT Services and Printix**
|
||||
|
||||
Are printer issues slowing down your workflow? At DigiBandit IT Services, we provide a smarter, more efficient way to manage your printing environment. With **Printix**, a powerful cloud-based print management platform, you can simplify operations, reduce costs, and enhance security—all without lifting a finger.
|
||||
|
||||
#### **Why Choose Printix?**
|
||||
|
||||
- **Simplified Printer Management**
|
||||
Say goodbye to the complexity of juggling multiple printers across locations. Our team will remotely manage your entire printer fleet, ensuring smooth and reliable operation.
|
||||
|
||||
- **Automated Supply Reordering**
|
||||
Never run out of ink or toner again. With Printix, we automatically monitor your supply levels and manage reorders, keeping your printers fully stocked and operational.
|
||||
|
||||
- **Advanced Security**
|
||||
Keep your sensitive data secure with Printix’s built-in security features. From encrypted print jobs to user authentication, we ensure your printing is safe and compliant.
|
||||
|
||||
- **Cost-Effective Solutions**
|
||||
Reduce unnecessary paper and toner usage by optimizing your printing workflows. Lower waste and boost savings with managed printing operations tailored to your business needs.
|
||||
|
||||
#### **Our Services:**
|
||||
|
||||
- **Complete Printer Fleet Management**
|
||||
From routine maintenance to troubleshooting and updates, DigiBandit will handle everything. Focus on your business while we ensure your printers perform at their best.
|
||||
|
||||
- **Includes:** Monitoring, remote management, software updates, and automated supply reordering.
|
||||
|
||||
- **Print Management with Printix**
|
||||
Take your printing to the next level with a cloud-based management system that offers powerful features like user-level print controls, automated workflows, and detailed reporting.
|
||||
|
||||
- **Includes:** Centralized cloud management, user access controls, print queue management, and security monitoring.
|
||||
|
||||
#### **Why Work with DigiBandit?**
|
||||
|
||||
With our **Printix** integration, you’ll enjoy hassle-free printing operations and the peace of mind that comes with a fully managed, secure print environment. No more downtime, no more supply shortages—just streamlined, efficient printing for your entire organization.
|
||||
|
||||
---
|
||||
|
||||
**Transform your printing operations today.**
|
||||
Contact DigiBandit IT Services to learn how we can enhance your print management with Printix.
|
||||
51
Privilege_Access_Management_PAM.md
Normal file
51
Privilege_Access_Management_PAM.md
Normal file
|
|
@ -0,0 +1,51 @@
|
|||
# Privilege Access Management (PAM)
|
||||
|
||||
## **Enhance Security with DigiBandit IT Services’ Endpoint Privilege Management Solution**
|
||||
|
||||
### **Tired of constantly worrying about the security of your endpoints?**
|
||||
|
||||
Do you want to improve your organization’s overall security posture? Look no further than DigiBandit IT Services’ Endpoint Privilege Management solution powered by **AutoElevate**!
|
||||
|
||||
### **Why Endpoint Privilege Management Matters**
|
||||
|
||||
Our solution allows you to control and monitor the privileges of all users and endpoints across your organization, reducing the risk of breaches and unauthorized access. By managing user access, you can prevent the spread of malware and limit the potential for attacks from insider threats. With real-time monitoring and alerts, you can respond quickly to any suspicious activity and ensure your endpoints’ security.
|
||||
|
||||
**AutoElevate** is the leader in Endpoint Privilege Management, and DigiBandit IT Services is proud to offer this powerful solution to our clients. Say goodbye to endpoint security worries and hello to peace of mind with Endpoint Privilege Management from DigiBandit IT Services.
|
||||
|
||||
### **How It Works: AutoElevate User Guide**
|
||||
|
||||
When using **AutoElevate** as part of our Endpoint Privilege Management, you’ll experience a seamless process for managing administrative privileges. Here’s how:
|
||||
|
||||
#### **What to Expect from AutoElevate**
|
||||
|
||||
When an application or action requires elevated permissions (admin access), **AutoElevate** will notify the user with a request for elevation. This ensures users only perform actions they’re authorized to do while protecting your organization’s endpoints from potential threats.
|
||||
|
||||
#### **Submitting an Elevation Request**
|
||||
|
||||
-
|
||||
**AutoElevate Prompt**: When an action needs admin privileges, an **AutoElevate** pop-up will appear, informing the user.
|
||||
|
||||
-
|
||||
**Submit for Approval**: Simply click **Submit** to send the request for admin approval.
|
||||
|
||||
-
|
||||
**Approval Process**: Your IT team will review and approve legitimate requests to ensure security, preventing unauthorized access.
|
||||
|
||||
#### **Efficient, Secure, and Managed**
|
||||
|
||||
- **Automated Approvals**: Some common requests may be pre-approved for instant action, minimizing downtime.
|
||||
|
||||
- **Manual Approvals**: Sensitive actions are manually approved by IT, ensuring an additional layer of protection.
|
||||
|
||||
### **Your Benefits with DigiBandit IT Services’ AutoElevate-Powered Solution**
|
||||
|
||||
- **Limit the Spread of Malware**: By controlling elevated permissions, you can prevent malicious software from spreading across your network.
|
||||
|
||||
- **Real-Time Monitoring**: With real-time monitoring and alerts, you’ll always know what’s happening across your endpoints.
|
||||
|
||||
- **Fast Response to Threats**: When suspicious activity is detected, your team can respond quickly and effectively.
|
||||
|
||||
---
|
||||
|
||||
**Ready to take control of your endpoint security?**
|
||||
Contact DigiBandit IT Services today to learn more about how our **Endpoint Privilege Management** powered by **AutoElevate** can protect your organization.
|
||||
114
README.md
Normal file
114
README.md
Normal file
|
|
@ -0,0 +1,114 @@
|
|||
# digiDocs
|
||||
|
||||
**Customer-facing documentation for digiBandit IT Services.**
|
||||
|
||||
Browse online: [dbits.ca/docs](https://dbits.ca/docs)
|
||||
|
||||
---
|
||||
|
||||
67 documents available.
|
||||
|
||||
## Categories
|
||||
|
||||
### General Information
|
||||
- [Contact.md](Contact.md) - Contact methods and availability for DigiBandit
|
||||
- [Methods_of_Contact.md](Methods_of_Contact.md) - Detailed contact options including phone, email, chat, and in-person
|
||||
- [Payment_Options.md](Payment_Options.md) - Accepted payment methods (e-Transfer, credit card, cash, cheque)
|
||||
- [Tickets_and_Ticketing.md](Tickets_and_Ticketing.md) - Ticketing system guide with priorities, response times, and procedures
|
||||
|
||||
### Services and Offerings
|
||||
- [Services_and_Offerings.md](Services_and_Offerings.md) - Overview of DigiBandit services
|
||||
- [Repair.md](Repair.md) - Device repair services with pricing and warranty info
|
||||
- [Data_Recovery.md](Data_Recovery.md) - Data recovery service overview
|
||||
- [Media_Conversion.md](Media_Conversion.md) - VHS, tape, vinyl, and media digitization services
|
||||
|
||||
### Managed IT Services (MITS)
|
||||
|
||||
#### Device Management
|
||||
- [Device_Management.md](Device_Management.md) - Core device management services and tiers
|
||||
- [Administrative_Credentials.md](Administrative_Credentials.md) - Policy on admin credential management and PAM
|
||||
- [BYOD_Policy.md](BYOD_Policy.md) - Detailed Bring Your Own Device policy
|
||||
- [BYOD_Bring_Your_Own_Device.md](BYOD_Bring_Your_Own_Device.md) - BYOD overview and highlights
|
||||
- [dataBack_by_DigiBandit.md](dataBack_by_DigiBandit.md) - Business continuity and disaster recovery solution
|
||||
- [dataBack_for_Google_Workspace.md](dataBack_for_Google_Workspace.md) - Google Workspace backup protection
|
||||
- [dataBack_Discovery.md](dataBack_Discovery.md) - dataBack discovery and assessment
|
||||
- [Backup_and_Recovery_Policy.md](Backup_and_Recovery_Policy.md) - ISO-compliant backup schedules and procedures
|
||||
- [Cloud_Storage_Backblaze_B2.md](Cloud_Storage_Backblaze_B2.md) - Managed cloud storage via BackBlaze B2
|
||||
- [MDM_Mobile_Device_Management.md](MDM_Mobile_Device_Management.md) - Mobile device management overview
|
||||
- [MDM_Android_Google_Samsung.md](MDM_Android_Google_Samsung.md) - Android device management
|
||||
- [MDM_iOS_iPadOS_Apple.md](MDM_iOS_iPadOS_Apple.md) - Apple iOS/iPadOS device management
|
||||
- [Huntress_EDR.md](Huntress_EDR.md) - Managed endpoint detection and response
|
||||
- [Software_VPN.md](Software_VPN.md) - Tailscale VPN for secure network access
|
||||
- [Patch_Management.md](Patch_Management.md) - Software updates and patch management procedures
|
||||
- [Privilege_Access_Management_PAM.md](Privilege_Access_Management_PAM.md) - AutoElevate endpoint privilege management
|
||||
- [Personal_Device_Management.md](Personal_Device_Management.md) - Member-exclusive personal device monitoring
|
||||
- [Remote_Support.md](Remote_Support.md) - Secure remote support via self-hosted RustDesk
|
||||
- [Login_with_GCPW.md](Login_with_GCPW.md) - Google Credential Provider for Windows setup guide
|
||||
- [Ransomware_Canary.md](Ransomware_Canary.md) - Ransomware detection canary files
|
||||
- [Self_Approving_Elevation_Requests.md](Self_Approving_Elevation_Requests.md) - Self-service elevation request approval
|
||||
|
||||
#### Network and Infrastructure
|
||||
- [Network_Monitoring_and_Management.md](Network_Monitoring_and_Management.md) - Network monitoring, management, and emergency internet
|
||||
- [Infrastructure_Management.md](Infrastructure_Management.md) - Infrastructure management services
|
||||
- [dbitsDNS.md](dbitsDNS.md) - digiBandit DNS services
|
||||
|
||||
#### Domain Services
|
||||
- [Domain_Services.md](Domain_Services.md) - Domain and DNS management services
|
||||
- [Website_Design_and_Creation.md](Website_Design_and_Creation.md) - Website design services
|
||||
- [SEO_Services.md](SEO_Services.md) - Search engine optimization services
|
||||
- [SMTP2GO.md](SMTP2GO.md) - Reliable email delivery service for websites and printers
|
||||
- [Domain_Name_Transfer.md](Domain_Name_Transfer.md) - How to transfer domains to LightHost/DigiBandit
|
||||
- [Digital_Display.md](Digital_Display.md) - Managed digital signage solutions
|
||||
|
||||
#### Business IT
|
||||
- [Business_IT.md](Business_IT.md) - Overview of business IT services
|
||||
- [Printer_and_Print_Management.md](Printer_and_Print_Management.md) - Printix-powered print management
|
||||
- [Play_Music_Legally_With_Soundtrack_Your_Brand.md](Play_Music_Legally_With_Soundtrack_Your_Brand.md) - Licensed business music streaming
|
||||
- [VoIP_Cloud_Phone_Service.md](VoIP_Cloud_Phone_Service.md) - Ooma and Google Voice phone system integration
|
||||
- [Cyber_Insurance_Compliance_Assistance.md](Cyber_Insurance_Compliance_Assistance.md) - Checklist for cyber insurance requirements
|
||||
- [Google_Workspace.md](Google_Workspace.md) - Managed Google Workspace services
|
||||
- [Business_Specific_Software_Management.md](Business_Specific_Software_Management.md) - Software updates and management
|
||||
- [NextCloud_File_Storage.md](NextCloud_File_Storage.md) - NextCloud file storage and sync service
|
||||
- [Tools_We_Use.md](Tools_We_Use.md) - Transparency list of software and services used on managed devices
|
||||
|
||||
#### User Management
|
||||
- [User_Management.md](User_Management.md) - Onboarding, support, and offboarding services
|
||||
- [User_Management_Tiers.md](User_Management_Tiers.md) - User management service tiers and pricing
|
||||
- [Support_HelpDesk.md](Support_HelpDesk.md) - IT support services and remote assistance
|
||||
- [After_Hours_Support.md](After_Hours_Support.md) - After hours support availability and procedures
|
||||
- [Security_Awareness_Training.md](Security_Awareness_Training.md) - Employee security training with phishing simulations
|
||||
- [BitWarden_Password_Manager.md](BitWarden_Password_Manager.md) - Password management solution
|
||||
- [Getting_Started_with_Bitwarden.md](Getting_Started_with_Bitwarden.md) - Bitwarden quick start guide
|
||||
|
||||
### CCTV
|
||||
- [CCTV.md](CCTV.md) - Managed CCTV installation and monitoring
|
||||
- [Notifications_on_UNV_Link.md](Notifications_on_UNV_Link.md) - How to configure UNV camera notifications
|
||||
- [UNV_Link_App_for_UNV_Remote_View.md](UNV_Link_App_for_UNV_Remote_View.md) - UNV Link app setup guide
|
||||
|
||||
### Legal
|
||||
- [Legal.md](Legal.md) - Overview of terms, conditions, and warranty
|
||||
- [Master_Service_Agreement.md](Master_Service_Agreement.md) - MSP service agreement
|
||||
- [Warranty_Returns_and_Exchange_Policy.md](Warranty_Returns_and_Exchange_Policy.md) - Warranty coverage and return policies
|
||||
- [Standard_Repair_Agreement.md](Standard_Repair_Agreement.md) - Repair service agreement
|
||||
- [Disaster_Recovery_Plan.md](Disaster_Recovery_Plan.md) - Disaster recovery planning services
|
||||
- [E-Waste_Collection_Agreement.md](E-Waste_Collection_Agreement.md) - E-waste collection and disposal agreement
|
||||
|
||||
### Portal and Guides
|
||||
- [Welcome_to_your_new_Portal.md](Welcome_to_your_new_Portal.md) - Customer portal navigation and usage guide
|
||||
|
||||
### Other
|
||||
- [Local_Products.md](Local_Products.md) - Local New Brunswick products and vendors
|
||||
- [Circuit_Sippy_Our_Signature_Coffee.md](Circuit_Sippy_Our_Signature_Coffee.md) - DigiBandit's signature coffee blend
|
||||
|
||||
## Document Count
|
||||
|
||||
**68 documents** (excluding this README)
|
||||
|
||||
---
|
||||
|
||||
**digiBandit IT Services** - Managed IT, Computer Repair, Data Recovery
|
||||
|
||||
- **Address**: 607 St George Blvd, Suite 103, Moncton, NB E1E 2C2
|
||||
- **Phone**: (506) 404-0055
|
||||
- **Email**: hey@dbits.ca
|
||||
- **Website**: [dbits.ca](https://dbits.ca)
|
||||
21
Ransomware_Canary.md
Normal file
21
Ransomware_Canary.md
Normal file
|
|
@ -0,0 +1,21 @@
|
|||
# Ransomware Canary
|
||||
|
||||
## What is a Ransomware Canary?
|
||||
|
||||
If you're a computer user who's found a strange-looking file on your system guiding you to this page, you're in the right place! The file you found, which led you here, is called a ransomware canary.
|
||||
|
||||
## Purpose
|
||||
|
||||
A ransomware canary is a security feature deployed by Huntress EDR that:
|
||||
|
||||
- Acts as an early warning system for ransomware attacks
|
||||
- Monitors for unauthorized file encryption
|
||||
- Alerts security teams to potential threats before widespread damage occurs
|
||||
|
||||
## What to Do
|
||||
|
||||
If you found this file on your computer, **do not delete it**. It's a protective measure put in place by your IT administrator.
|
||||
|
||||
## Related Documentation
|
||||
|
||||
- [Huntress EDR](Huntress_EDR.md) - Endpoint detection and response
|
||||
157
Remote_Support.md
Normal file
157
Remote_Support.md
Normal file
|
|
@ -0,0 +1,157 @@
|
|||
# Remote Support
|
||||
|
||||
# Remote Support Services
|
||||
|
||||
## Service Overview
|
||||
|
||||
digiBandit provides secure remote support via our Remote Connect and Control Software (RCC). Built on RustDesk Pro and self-hosted at our Moncton infrastructure, your data never passes through third-party servers.
|
||||
|
||||
## How Remote Support Works
|
||||
|
||||
### Session Initiation
|
||||
|
||||
- Verify technician identity through our official support channels
|
||||
|
||||
- Managed devices connect automatically via pre-configured clients
|
||||
|
||||
- New devices receive guided setup or temporary access codes
|
||||
|
||||
- Web-based access options available for temporary support without installation
|
||||
|
||||
### Support Process
|
||||
|
||||
- Real-time troubleshooting with full transparency
|
||||
|
||||
- Technicians access only areas necessary for resolution
|
||||
|
||||
- End-to-end encrypted connections through our private servers
|
||||
|
||||
- Open communication via chat feature or direct technician contact
|
||||
|
||||
- Automatic reconnection attempts if connection is lost
|
||||
|
||||
### Session Preparation
|
||||
|
||||
- Save and close active files to prevent data loss
|
||||
|
||||
- Ensure stable internet connection and device is powered on
|
||||
|
||||
- Stay available for input (passwords, confirmations)
|
||||
|
||||
- Gather relevant error messages or troubleshooting history
|
||||
|
||||
- Minimize device usage during session unless instructed
|
||||
|
||||
## Technical Infrastructure
|
||||
|
||||
### Security Features
|
||||
|
||||
- Self-hosted RustDesk Pro servers in Moncton (rdp.dbits.ca)
|
||||
|
||||
- End-to-end encryption for all sessions
|
||||
|
||||
- Confidentiality protocols and session accountability
|
||||
|
||||
- Session logging for security and quality assurance
|
||||
|
||||
- Technicians bound by strict confidentiality agreements
|
||||
|
||||
### Client Setup
|
||||
|
||||
- **Managed devices:** Automatic deployment via Tactical RMM
|
||||
|
||||
- **New devices:** Download from dbits.ca/downloads with guided installation
|
||||
|
||||
- **Connection management:** Secure access through portal.dbits.ca
|
||||
|
||||
- **Portable option:** No-install version available for temporary support
|
||||
|
||||
### Network Compatibility
|
||||
|
||||
- Automatic NAT traversal and firewall compatibility
|
||||
|
||||
- Standard corporate firewalls require no special configuration
|
||||
|
||||
- Advanced network configuration support available for restricted environments
|
||||
|
||||
## End User Remote Access Add-On
|
||||
|
||||
Secure remote access between digiBandit managed devices.
|
||||
|
||||
### Features
|
||||
|
||||
- Access office workstation from home
|
||||
|
||||
- Connect between any managed devices
|
||||
|
||||
- Same security infrastructure as support sessions
|
||||
|
||||
- Portal-managed activation and user control
|
||||
|
||||
- Simple user management through service account
|
||||
|
||||
- Eliminates need for expensive third-party remote access solutions
|
||||
|
||||
### Activation
|
||||
|
||||
Contact support or enable through your customer portal.
|
||||
|
||||
## Frequently Asked Questions
|
||||
|
||||
### Security & Privacy
|
||||
|
||||
**Q: How secure are remote sessions?** A: Our self-hosted RCC uses end-to-end encryption with all data staying within our controlled infrastructure. No third-party services are involved.
|
||||
|
||||
**Q: Will technicians access personal files?** A: Only files necessary for troubleshooting are accessed. Privacy is always our priority.
|
||||
|
||||
**Q: Can I end a session early?** A: Yes, simply notify the technician or close the RCC application at any time.
|
||||
|
||||
### Technical Support
|
||||
|
||||
**Q: What if connection is lost during session?** A: Our platform automatically attempts reconnection. Contact support if issues persist.
|
||||
|
||||
**Q: Can multiple devices be supported simultaneously?** A: Yes, technicians can switch between managed devices efficiently. Notify us in advance to streamline the process.
|
||||
|
||||
**Q: What if my issue isn’t resolved?** A: Contact us immediately for follow-up support to ensure complete resolution.
|
||||
|
||||
## Post-Session Follow-Up
|
||||
|
||||
- **Completion confirmation:** Technician notification when session ends
|
||||
|
||||
- **Next steps:** Detailed action plans via email or ticketing system
|
||||
|
||||
- **Feedback opportunities:** Post-session surveys and direct team feedback
|
||||
|
||||
- **Documentation:** Session summaries and resolution records
|
||||
|
||||
## Support & Resources
|
||||
|
||||
### Immediate Assistance
|
||||
|
||||
- **Phone:** 506-988-9243
|
||||
|
||||
- **Email:** hey@dbits.ca
|
||||
|
||||
- **Live Chat:** Available through website or system tray on managed devices
|
||||
|
||||
### Self-Service Resources
|
||||
|
||||
- **Customer Portal:** portal.dbits.ca
|
||||
|
||||
- **Knowledge Base:** dbits.ca (digiDocs platform)
|
||||
|
||||
- **Client Downloads:** dbits.ca/downloads
|
||||
|
||||
## Service Benefits
|
||||
|
||||
- **Proactive Issue Detection:** Comprehensive monitoring prevents problems before they occur
|
||||
|
||||
- **Enhanced Data Security:** Self-hosted infrastructure maintains complete control over your data
|
||||
|
||||
- **Expert Resolution:** Experienced team handles diverse IT challenges with professionalism
|
||||
|
||||
- **Complete Support Ecosystem:** Integrated tools, documentation, and customer resources
|
||||
|
||||
- **Cost-Effective Remote Access:** Affordable user remote access compared to traditional solutions
|
||||
|
||||
- **No Third-Party Dependencies:** All services hosted and managed in-house for maximum reliability
|
||||
17
Repair.md
Normal file
17
Repair.md
Normal file
|
|
@ -0,0 +1,17 @@
|
|||
# Repair
|
||||
|
||||
[How It Works](https://dbits.ca/doc/public/#how-it-works)
|
||||
[Pricing](https://dbits.ca/doc/public/#pricing)
|
||||
[What We Fix](https://dbits.ca/doc/public/#what-we-fix)
|
||||
[Warranty](https://dbits.ca/doc/public/#warranty)
|
||||
[Terms](https://dbits.ca/doc/public/#terms)
|
||||
[Book Now](https://dbits.ca/doc/public/#repair-form)
|
||||
|
||||
# We Can Fix It!
|
||||
|
||||
Fast, reliable, and transparent repair services for all your electronics. From simple fixes to complex micro-soldering repairs.
|
||||
|
||||
|
||||
|
||||
|
||||
[Book Your Repair](https://dbits.ca/doc/public/#repair-form)
|
||||
96
SEO_Services.md
Normal file
96
SEO_Services.md
Normal file
|
|
@ -0,0 +1,96 @@
|
|||
# SEO Services
|
||||
|
||||
## Introduction
|
||||
|
||||
DigiBandit offers comprehensive Search Engine Optimization (SEO) services tailored to elevate your website’s visibility, attract organic traffic, and enhance your business’s online authority. We utilize leading SEO tools such as SEOptimer, AIO SEO for WordPress, Open Web Analytics, Google Search Console, and Google Site Kit, supported by sustainable hosting solutions. Each service is customized to meet your specific business objectives, ensuring that SEO aligns seamlessly with your goals.
|
||||
|
||||
---
|
||||
|
||||
## Our SEO Services
|
||||
|
||||
### 1. **Keyword Research**
|
||||
|
||||
- **User Intent Analysis**: We focus on understanding the search terms and intent behind keywords your target audience uses, helping us tailor content to meet their needs.
|
||||
|
||||
- **Target Keyword Selection**: We select keywords with the right balance of search volume and competition, prioritizing terms that maximize your online visibility and relevance.
|
||||
|
||||
### 2. **On-Page SEO**
|
||||
|
||||
- **Meta Tags and Descriptions**: Optimizing title tags and meta descriptions to be clear, relevant, and keyword-focused.
|
||||
|
||||
- **Content Optimization**: Integrating keywords naturally within headers, body text, and image alt attributes to improve relevancy and user experience.
|
||||
|
||||
- **Internal Linking**: Structuring internal links to guide users efficiently through the site and signal content hierarchy to search engines.
|
||||
|
||||
### 3. **Technical SEO**
|
||||
|
||||
- **Site Speed Optimization**: Enhancing load times to improve user experience and SEO ranking factors.
|
||||
|
||||
- **Mobile-Friendliness**: Ensuring full mobile responsiveness, as mobile optimization is a priority for search engines.
|
||||
|
||||
- **Schema Markup**: Using structured data to help search engines understand and display content effectively through rich results.
|
||||
|
||||
### 4. **Off-Page SEO & Link Building**
|
||||
|
||||
- **Link Building Strategy**: Outreach for guest posting, relevant directory listings, and link partnerships to build a credible backlink profile.
|
||||
|
||||
- **Social Media Integration**: Leveraging social channels to promote content and increase visibility.
|
||||
|
||||
- **Local SEO & Citations**: Optimizing Google Business Profile, local directory listings, and implementing local schema markup to improve local search results.
|
||||
|
||||
### 5. **Content Strategy**
|
||||
|
||||
- **Blogging and Articles**: Creating informative, keyword-rich blog posts that keep your site dynamic and relevant.
|
||||
|
||||
- **Topic Relevance**: Developing high-impact topics relevant to your industry, such as logistics, transportation, and more, tailored to client-specific sectors.
|
||||
|
||||
- **Content Expansion**: Adding depth and keyword variation to enhance content visibility and meet search engine standards for quality.
|
||||
|
||||
### 6. **Analytics and Reporting**
|
||||
|
||||
- **Google Analytics and Search Console**: Setting up tracking for traffic, keyword performance, and user engagement.
|
||||
|
||||
- **SEO Audit Reports**: Conducting SEO audits with SEOptimer to highlight areas for improvement and track growth.
|
||||
|
||||
- **White-Label Reporting**: Providing shareable, professional reports that outline SEO progress, strengths, and opportunities.
|
||||
|
||||
---
|
||||
|
||||
## SEO Tools
|
||||
|
||||
DigiBandit utilizes industry-leading tools for optimal results:
|
||||
|
||||
- **SEOptimer**: Regular site audits and competitor analysis to track SEO performance.
|
||||
|
||||
- **AIO SEO for WordPress**: Managing metadata, sitemaps, and other SEO elements directly on WordPress.
|
||||
|
||||
- **Open Web Analytics**: Analyzing user behavior and conversion data to optimize site performance.
|
||||
|
||||
- **Google Search Console & Site Kit**: Configuring essential Google tools to monitor SEO metrics, keyword rankings, and audience engagement.
|
||||
|
||||
---
|
||||
|
||||
## Why Choose DigiBandit for SEO?
|
||||
|
||||
- **Holistic SEO Approach**: Comprehensive SEO coverage, from keyword research to on-page, technical, and off-page optimization.
|
||||
|
||||
- **Sustainable Solutions**: 100% green hosting and Cloudflare DNS services to support performance and environmental goals.
|
||||
|
||||
- **Data-Driven Decisions**: All strategies are informed by analytics to ensure adaptive and results-focused SEO.
|
||||
|
||||
- **Local SEO Focus**: Expertise in local SEO, helping businesses improve visibility in local markets with Google Business Profile management and local citations.
|
||||
|
||||
---
|
||||
|
||||
## Getting Started
|
||||
|
||||
Our SEO services are available in flexible packages, with options for monthly support or one-time optimization projects.
|
||||
|
||||
- **Consultation**: Discuss your website needs and business goals with our SEO team.
|
||||
|
||||
- **Initial Audit & Strategy Development**: We conduct a comprehensive SEO audit to create a customized strategy that targets your audience effectively.
|
||||
|
||||
- **Implementation & Monitoring**: Our experts implement the SEO plan and monitor progress, providing you with regular updates and reports.
|
||||
|
||||
|
||||
Audit Your Website Homepage’s SEO now!
|
||||
69
SMTP2GO.md
Normal file
69
SMTP2GO.md
Normal file
|
|
@ -0,0 +1,69 @@
|
|||
# SMTP2GO
|
||||
|
||||
## **Reliable Email Delivery Service**
|
||||
|
||||
**SMTP2GO** is a cloud-based email service that provides reliable and secure email delivery through Simple Mail Transfer Protocol (SMTP). It ensures that your emails are successfully sent and delivered, whether for website contact forms, business applications, or office hardware like printers.
|
||||
|
||||
At **DigiBandit IT Services**, we utilize **SMTP2GO** for multiple tasks, including email delivery for **WordPress websites** and **safe scanning-to-email** functionalities for office printers. This service helps ensure consistent, secure, and compliant email delivery in various business scenarios.
|
||||
|
||||
---
|
||||
|
||||
### **Key Features of SMTP2GO**
|
||||
|
||||
- **Reliable Email Delivery**: Ensure that emails are successfully sent from any device or application, with high deliverability rates to avoid spam folders.
|
||||
|
||||
- **Secure Communication**: All communications are encrypted using TLS for secure email delivery.
|
||||
|
||||
- **Real-time Monitoring & Reporting**: Get insights into email activity, including sent, delivered, opened, and clicked messages. This is particularly useful for tracking communication performance.
|
||||
|
||||
- **Integration with Applications**: SMTP2GO works seamlessly with web applications, business software, and hardware like printers, enabling email notifications, contact forms, and automated emails.
|
||||
|
||||
- **Supports Multiple Platforms**: SMTP2GO supports a wide range of platforms, including **WordPress**, **G Suite**, **Office 365**, **Outlook**, and various other email clients.
|
||||
|
||||
- **Email Failover**: Automatic failover to backup SMTP servers ensures uninterrupted email delivery even if the primary server encounters issues.
|
||||
|
||||
- **Customizable SMTP Settings**: Adjust settings to suit your business needs, whether you’re managing email traffic for websites, customer portals, or internal tools.
|
||||
|
||||
- **SPF/DKIM/DMARC Compliance**: Strengthen your email security with SPF, DKIM, and DMARC settings to reduce the chances of spoofing and phishing attempts.
|
||||
|
||||
---
|
||||
|
||||
### **Use Cases for SMTP2GO at DigiBandit**
|
||||
|
||||
- **WordPress Website Contact Forms**
|
||||
|
||||
**SMTP2GO** is configured for WordPress sites to handle contact form submissions. This ensures that website inquiries are reliably delivered to your inbox without getting flagged as spam.
|
||||
|
||||
- Whether you’re using **Formidable Forms**, **Contact Form 7**, or any other plugin, SMTP2GO integrates seamlessly for smooth email operations.
|
||||
|
||||
- **Printers/Scanners for Scanning to Email**
|
||||
|
||||
Many modern printers and multi-function devices have the capability to scan documents and send them via email. **SMTP2GO** ensures these emails are safely delivered, providing businesses with a hassle-free way to manage scanning workflows.
|
||||
|
||||
- It’s particularly useful for securely sending sensitive documents from printers directly to email inboxes without routing through insecure networks.
|
||||
|
||||
- **Email Alerts for Monitoring Systems**
|
||||
|
||||
**SMTP2GO** can ensure alerts are sent out reliably and on time. Whether it’s for server notifications, network monitoring, or backup confirmations, SMTP2GO ensures those critical alerts get to the right people.
|
||||
|
||||
- **General Business Email Integration**
|
||||
|
||||
Businesses using email systems like **Outlook**, **Gmail**, or **Office 365** can also benefit from SMTP2GO’s email relay service, ensuring high deliverability and consistent performance.
|
||||
|
||||
- Ideal for transactional emails, newsletters, and any bulk mailing needs.
|
||||
|
||||
---
|
||||
|
||||
### **Why Choose SMTP2GO?**
|
||||
|
||||
- **Reliability**: Guaranteed email delivery with real-time tracking.
|
||||
|
||||
- **Security**: End-to-end encryption for all emails and support for SPF, DKIM, and DMARC.
|
||||
|
||||
- **Simplicity**: Easy integration with web platforms like **WordPress** and hardware like **printers**, ensuring seamless email functionality.
|
||||
|
||||
- **Support**: 24/7 support for troubleshooting and technical assistance.
|
||||
|
||||
---
|
||||
|
||||
**At DigiBandit IT Services**, we trust **SMTP2GO** to handle our email needs for websites and office infrastructure. Whether you’re managing customer inquiries through a contact form or sending secure scans from a printer, **SMTP2GO** ensures that your emails get delivered every time. For more information, visit [SMTP2GO](https://www.smtp2go.com/).
|
||||
61
Security_Awareness_Training.md
Normal file
61
Security_Awareness_Training.md
Normal file
|
|
@ -0,0 +1,61 @@
|
|||
# Security Awareness Training
|
||||
|
||||
## Enhance Your Business Security with DigiBandit
|
||||
|
||||
### Are You Concerned About Your Business’s Security?
|
||||
|
||||
In today’s digital landscape, the threat of data breaches and cyber-attacks is ever-present. At DigiBandit, we recognize the critical importance of security awareness and the need for proactive measures to safeguard your business.
|
||||
|
||||
### Customized Security Plans
|
||||
|
||||
Our team is dedicated to collaborating with your organization to create a tailored security plan that educates your employees on best practices, ultimately helping to mitigate potential threats.
|
||||
|
||||
### Why Choose Our Security Awareness Training?
|
||||
|
||||
With our comprehensive Security Awareness Training (SAT), you can rest assured that your business is equipped to handle any security situation that may arise. Here’s what sets our program apart:
|
||||
|
||||
#### **Program Highlights**
|
||||
|
||||
- **Fully Managed**: We take care of the details with curated monthly learning assignments tailored to your team.
|
||||
|
||||
- **Story-Driven Content**: Our engaging, story-based episodes captivate learners and make security training enjoyable.
|
||||
|
||||
- **Progress Tracking**: Monitor your team’s learning journey with monthly summary reports to ensure they stay on track.
|
||||
|
||||
- **Real-World Lessons**: Access a full library of episodes addressing real threats that could potentially target your business.
|
||||
|
||||
- **Phishing Simulations**: Challenge your employees to identify and report phishing attacks, enhancing their real-world readiness.
|
||||
|
||||
- **Compliance Training**: Equip your employees with the knowledge to meet major compliance requirements, including HIPAA, GDPR, PCI, SOC2, and NIST.
|
||||
|
||||
### Empowering Your Team
|
||||
|
||||
Effective Security Awareness Training empowers employees to recognize and report cyber threats before they can cause damage. Choosing the right SAT program is crucial for cultivating a security-aware culture.
|
||||
|
||||
**Example Episode**
|
||||
|
||||
### Use This Checklist to Find Your Ideal Training Solution:
|
||||
|
||||
- **User-Friendly Administration**: Look for intuitive administrative controls that simplify tracking learners, scheduling lessons, and monitoring progress.
|
||||
|
||||
- **Managed Phishing Simulations**: Reduce administrative overhead while ensuring content mirrors real-world threats.
|
||||
|
||||
- **Engaging Content**: Opt for memorable, story-driven content that enhances employee retention and interest.
|
||||
|
||||
- **Custom Content**: Ensure the program allows for the creation or modification of training materials specific to your organization’s needs.
|
||||
|
||||
- **Easy Deployment and Onboarding**: Quick deployment features, including automated directory syncing and multi-tenant support, facilitate smooth onboarding.
|
||||
|
||||
- **Compliance Support**: Select a program that supports compliance with essential regulations like NIST, GDPR, HIPAA, SOC2, and PCI.
|
||||
|
||||
- **Expert Support**: Choose a program that provides access to security experts for guidance and answers to any questions.
|
||||
|
||||
- **Detailed Reporting and Insights**: Comprehensive reports and actionable insights help track learner progress and identify areas needing improvement.
|
||||
|
||||
- **Scalable and Flexible**: Look for a training solution that easily scales to accommodate all current and future employees.
|
||||
|
||||
- **Transparent Billing**: Ensure clear pricing structures to track subscriptions and maintain cost-effective training.
|
||||
|
||||
### Get Started Today!
|
||||
|
||||
Contact us to learn more about how our Security Awareness Training can help safeguard your business and empower your employees. With DigiBandit, you can cultivate a security-conscious workforce ready to face any challenge.
|
||||
21
Self_Approving_Elevation_Requests.md
Normal file
21
Self_Approving_Elevation_Requests.md
Normal file
|
|
@ -0,0 +1,21 @@
|
|||
# Self-Approving Elevation Requests
|
||||
|
||||
## Overview
|
||||
|
||||
AutoElevate is a secure privilege management tool that allows users to self-approve elevation requests for administrative actions on their devices.
|
||||
|
||||
## How It Works
|
||||
|
||||
Each client will receive a Technician (Level 1) account that allows them to:
|
||||
|
||||
- Approve administrative actions without waiting for IT support
|
||||
- Install approved software
|
||||
- Make system changes within defined security policies
|
||||
|
||||
## Using the Self Serve App
|
||||
|
||||
Contact DigiBandit IT Services for setup and training on using the Self Serve App for elevation requests.
|
||||
|
||||
## Related Documentation
|
||||
|
||||
- [Privilege Access Management PAM](Privilege_Access_Management_PAM.md) - PAM overview
|
||||
5
Services_and_Offerings.md
Normal file
5
Services_and_Offerings.md
Normal file
|
|
@ -0,0 +1,5 @@
|
|||
# Services & Offerings
|
||||
|
||||
Here you will find information, details, documentation and guides for DigiBandit’s Services and Offers!
|
||||
|
||||
While this document fills out, don’t hesitate to contact us for more details!
|
||||
5
Software_VPN.md
Normal file
5
Software_VPN.md
Normal file
|
|
@ -0,0 +1,5 @@
|
|||
# Software VPN
|
||||
|
||||
Are you looking for a reliable and secure VPN service? A software VPN like Tailscale offers safe access to your network resources from anywhere, on any device. With Tailscale, you can quickly and securely connect to your business network from home or on the go without sacrificing speed or performance. End-to-end encryption and multi-factor authentication ensure your connections are always secure and protected.
|
||||
|
||||
Whether you need to connect remote employees, securely access your office network, or protect your data on public Wi-Fi networks, Tailscale has you covered. Contact us today to learn more about our VPN services and how we can help keep your business secure and connected.
|
||||
3
Standard_Repair_Agreement.md
Normal file
3
Standard_Repair_Agreement.md
Normal file
|
|
@ -0,0 +1,3 @@
|
|||
# Standard Repair Agreement
|
||||
|
||||
## [Moved to https://dbits.ca/digidocs/public/services-and-offerings/repair/](https://dbits.ca/digidocs/public/services-and-offerings/repair/)
|
||||
33
Support_HelpDesk.md
Normal file
33
Support_HelpDesk.md
Normal file
|
|
@ -0,0 +1,33 @@
|
|||
# Support HelpDesk
|
||||
|
||||
**Support Services – Your Comprehensive IT Partner**
|
||||
|
||||
At DigiBandit IT Services, our **Support** service is designed to keep your business running smoothly, ensuring that you always have the help you need when it comes to managing your IT infrastructure. With this add-on, you gain access to a broad range of support options tailored to meet your unique business requirements.
|
||||
|
||||
### **Features and Availability**
|
||||
|
||||
Our **Support** service includes chat, email, and phone support via tickets managed through our ticketing system. Whether you’re facing a technical issue, need guidance on software use, or require assistance with a configuration, our team is here to help. The service is available during standard business hours, Monday to Friday, 9 am to 5 pm, and extended hours can be arranged through a custom support agreement for businesses needing extra coverage. Whether you need additional support during peak times, late-night operations, or after-hours emergencies, we’re here to ensure you always have the help you need.
|
||||
|
||||
### **Comprehensive Remote Support**
|
||||
|
||||
As part of our **Support** service, we provide seamless remote support on all managed **Windows** and **macOS** devices via Splashtop RMM/SOS desktop and mobile apps. These tools allow us to offer real-time assistance, resolving issues without the need for an on-site visit, minimizing downtime and getting you back on track faster. Whether you need help with:
|
||||
|
||||
- Operating system interactions;
|
||||
|
||||
- Device setup and configuration;
|
||||
|
||||
- Installing and configuring software;
|
||||
|
||||
- Assistance with using specific programs or features;
|
||||
|
||||
- Network troubleshooting;
|
||||
|
||||
- General IT guidance and advice…
|
||||
|
||||
We’re just a ticket away. Whatever service you subscribe to, our team has the expertise to assist.
|
||||
|
||||
### **Your IT, Your Way**
|
||||
|
||||
Whatever managed service you subscribe to with DigiBandit IT Services, our **Support** service ensures you get the most out of it. From routine maintenance and software updates to troubleshooting and advice, we are your IT partner, dedicated to keeping your business running at its best.
|
||||
|
||||
Let us take care of the technology so you can focus on what matters most—growing your business.
|
||||
161
Tickets_and_Ticketing.md
Normal file
161
Tickets_and_Ticketing.md
Normal file
|
|
@ -0,0 +1,161 @@
|
|||
# Tickets & Ticketing
|
||||
|
||||
# Ticketing Guide
|
||||
|
||||
digiBandit is dedicated to providing fast and efficient IT support. Our ticketing process ensures your request reaches the right team member for a quick resolution.
|
||||
|
||||
---
|
||||
|
||||
## Contact Methods & Availability
|
||||
|
||||
For the latest details on our contact methods and availability, please visit our [Contact Page](https://dbits.ca/contact/).
|
||||
|
||||
---
|
||||
|
||||
## Service Tiers & Pricing
|
||||
|
||||
We offer three flexible service options to match your needs:
|
||||
|
||||
- **Standard Rate** – $90/hour
|
||||
|
||||
- **Pre-Pay & Save** – $60/hour (33% savings)
|
||||
|
||||
- **Member Rate** – $30/hour (67% savings + lifetime warranty)
|
||||
|
||||
**For complete pricing details and benefits:** [View our Rates Page](https://dbits.ca/digidocs/public/services-and-offerings/rates/) | [Membership Benefits](https://dbits.ca/digidocs/public/legal/membership/)
|
||||
|
||||
---
|
||||
|
||||
## Response Times by Priority
|
||||
|
||||
|
||||
|
||||
Priority
|
||||
Issue Type
|
||||
First Response
|
||||
|
||||
|
||||
|
||||
|
||||
**P1**
|
||||
Business down, safety/security risk
|
||||
15-30 minutes
|
||||
|
||||
|
||||
**P2**
|
||||
Major function impaired, multiple users affected
|
||||
Within 2 hours
|
||||
|
||||
|
||||
**P3**
|
||||
Single user issue, minor impact
|
||||
Same business day
|
||||
|
||||
|
||||
**P4**
|
||||
General requests, quotes, routine changes
|
||||
1-2 business days
|
||||
|
||||
|
||||
|
||||
**Typical Resolution Times:**
|
||||
|
||||
- Standard repairs: 3 business days
|
||||
|
||||
- Parts delivery: 3-21 days (supplier dependent)
|
||||
|
||||
*Note: Response and resolution goals apply during standard support hours. External factors (weather, traffic, supplier delays) may impact timelines.*
|
||||
|
||||
---
|
||||
|
||||
## Support Process & Escalation
|
||||
|
||||
Our tiered support ensures your issue reaches the right expertise:
|
||||
|
||||
- **Tier 1 – General Support:** Basic troubleshooting and FAQ assistance
|
||||
|
||||
- **Tier 2 – Advanced Support:** Complex issues requiring specialized technician intervention
|
||||
|
||||
- **Tier 3 – Specialist Review:** High-priority or unresolved cases requiring management escalation
|
||||
|
||||
---
|
||||
|
||||
## Work Authorization & Finance
|
||||
|
||||
To ensure transparency and avoid surprises:
|
||||
|
||||
- All work requires an approved quote before we begin
|
||||
|
||||
- Parts over $50 require deposit before ordering
|
||||
|
||||
- Invoices based on approved quotes and tracked time
|
||||
|
||||
- Payment timing depends on your selected service tier
|
||||
|
||||
---
|
||||
|
||||
## Communication & Updates
|
||||
|
||||
### Our Commitment to You
|
||||
|
||||
- **3-Day Contact Rule:** We reach out via email, phone, or text if we haven’t connected in 3 days
|
||||
|
||||
- **Regular Updates:** Progress reports based on your ticket priority
|
||||
|
||||
- **Full Transparency:** All communications logged in your ticket
|
||||
|
||||
- **Appointment Confirmations:** 24-48 hours before on-site visits with full details
|
||||
|
||||
---
|
||||
|
||||
## Ticket Resolution
|
||||
|
||||
### Our Process
|
||||
|
||||
- **Acknowledgment:** Confirms your ticket and priority
|
||||
|
||||
- **Ongoing Updates:** Progress reports until resolution
|
||||
|
||||
- **Final Resolution:** Summary of actions taken and confirmation before closing
|
||||
|
||||
- **Follow-up Window:** Tickets remain open for 14 days for any additional questions
|
||||
|
||||
### Unresponsive Client Policy
|
||||
|
||||
- **Days 1-21:** Contact attempts every 3 days (email → phone → text)
|
||||
|
||||
- **Day 21:** Final notice with 7-day response window
|
||||
|
||||
- **Day 28:** Ticket closed per policy; storage fees apply for devices
|
||||
|
||||
---
|
||||
|
||||
## Warranty Coverage
|
||||
|
||||
- **Member Repairs:** Lifetime warranty
|
||||
|
||||
- **Standard Repairs:** 1-year warranty
|
||||
|
||||
- **Exclusions:** Accidents, misuse, software issues post-repair, data loss, liquid damage repairs
|
||||
|
||||
[**View Full Warranty Policy**](https://dbits.ca/digidocs/public/legal/warranty-returns-and-exchange-policy/)
|
||||
|
||||
---
|
||||
|
||||
## Scope of Support
|
||||
|
||||
For complete details on what we support and our service agreements, please refer to our [**Master Service Agreement**](https://dbits.ca/digidocs/public/legal/master-service-agreement/).
|
||||
|
||||
---
|
||||
|
||||
## Best Practices for Faster Resolutions
|
||||
|
||||
- **Be Specific:** Include exact error messages and what you were doing
|
||||
|
||||
- **Document Steps:** Note any troubleshooting already attempted
|
||||
|
||||
- **Attach Screenshots:** Visual context helps technicians diagnose faster
|
||||
|
||||
- **Indicate Urgency:** Mention if business-critical upfront
|
||||
|
||||
- **Complete Info:** Device model, serial number, relevant history
|
||||
5
Tools_We_Use.md
Normal file
5
Tools_We_Use.md
Normal file
|
|
@ -0,0 +1,5 @@
|
|||
# Tools We Use
|
||||
|
||||
**Transparency matters.** This is a complete list of the software and services we use to manage, secure, and support your devices. We believe you should know exactly what's running on your systems and where your data goes.
|
||||
|
||||
Services marked Self-Hosted store data on our own infrastructure in Canada.
|
||||
61
UNV_Link_App_for_UNV_Remote_View.md
Normal file
61
UNV_Link_App_for_UNV_Remote_View.md
Normal file
|
|
@ -0,0 +1,61 @@
|
|||
# UNV Link App for UNV Remote View
|
||||
|
||||
## **Guide to Installing and Setting Up the UNV CCTV System**
|
||||
|
||||
Welcome! This guide will help you install, set up an account, sign in, and pair your system with the UNV Link App. Follow these step-by-step instructions to get started quickly and easily.
|
||||
|
||||
## **Install the UNV-Link App**
|
||||
|
||||
The UNV-Link app is available for both Android and iOS devices.
|
||||
|
||||
- For Android: [Download from the Google Play Store](https://play.google.com/store/apps/details?id=com.uniview.app.smb.phone.en.lingyun&hl=en_CA)
|
||||
|
||||
- For iOS: [Download from the Apple App Store](https://apps.apple.com/us/app/unv-link/id1353278463)
|
||||
|
||||
## **Set Up an Account** for UNV Link
|
||||
|
||||
After installing the app, you need to set up an account:
|
||||
|
||||
- Open the UNV-Link app.
|
||||
|
||||
- Tap on “Sign Up” to create a new account.
|
||||
|
||||
- Enter your email address and create a secure password.
|
||||
|
||||
- Tap “Register.” You’ll receive a verification email. Follow the instructions in the email to verify your account.
|
||||
|
||||
## **Sign In to UNV Link**
|
||||
|
||||
- Once your account is verified, open the UNV-Link app.
|
||||
|
||||
- Tap “Sign In.”
|
||||
|
||||
- Enter your registered email and password, then tap “Log In.”
|
||||
|
||||
## **Pairing Your System**
|
||||
|
||||
To pair your CCTV system with the UNV-Link app, follow these steps:
|
||||
|
||||
- Make sure your UNV CCTV system is powered on and connected to the internet.
|
||||
|
||||
- In the UNV-Link app, tap on the “+” icon to add a new device.
|
||||
|
||||
- Select the method to add your device (e.g., by scanning the QR code on your CCTV system, or in your [customer portal](https://dbits.ca/digidocs/customer-portal/)).
|
||||
|
||||
- Scan the QR code located on your UNV CCTV system or manually enter the device serial number.
|
||||
|
||||
- Once the device is found, follow the on-screen prompts to complete the pairing process.
|
||||
|
||||
## **Test the **UNV Link Connection
|
||||
|
||||
- After pairing, check that the live feed is working properly.
|
||||
|
||||
- Adjust settings as needed to suit your preferences.
|
||||
|
||||
## **Additional Details**
|
||||
|
||||
- **User Manual**: [UNV-Link User Manual (PDF)](https://global.uniview.com/res/202403/22/20240322_1900241_UNV-Link%20UserManual_804787_140445_0.pdf)
|
||||
|
||||
- **Video Tutorial**: [Watch the setup tutorial on YouTube](https://www.youtube.com/watch?v=JV4Yi9JUFZU)
|
||||
|
||||
If you encounter any issues, feel free to contact our support team for further assistance.
|
||||
43
User_Management.md
Normal file
43
User_Management.md
Normal file
|
|
@ -0,0 +1,43 @@
|
|||
# User Management
|
||||
|
||||
> For tier pricing and details, see [User Management Tiers](./User_Management_Tiers.md).
|
||||
|
||||
# **User Management** – Core Service
|
||||
|
||||
Our **User Management** service is designed to provide seamless **onboarding**, efficient support, **and** secure **offboarding **for your team. With comprehensive **digital account management**, we ensure that your users are equipped with the tools, resources, and guidance they need to succeed while **maintaining security** and compliance.
|
||||
|
||||
---
|
||||
|
||||
## **Services**
|
||||
|
||||
### **Onboarding**
|
||||
|
||||
- **Tech Stack Onboarding**: We handle the full onboarding process for new users, ensuring they have access to all necessary tools, applications, and resources from day one.
|
||||
|
||||
- **Getting Started Guides**: We provide customized **resource dumps**, including detailed instructions on how to get started with each service in your tech stack.
|
||||
|
||||
- **User Setup**: Accounts are configured for each user, ensuring access to the right software, cloud services, and internal systems.
|
||||
|
||||
### **Accounts Support**
|
||||
|
||||
- Users receive unlimited remote support during business hours via chat, email, or phone for everything to do with their account(s).
|
||||
|
||||
- **Issue Resolution**: We proactively monitor and resolve issues that may arise with user accounts or systems.
|
||||
|
||||
### **Account Maintenance**
|
||||
|
||||
- **Account Management**: We handle day-to-day user account maintenance, including password resets, security checks, and updates to access permissions.
|
||||
|
||||
- **Compliance and Security**: User accounts are managed to ensure compliance with security policies, including **BitWarden password management** to safeguard sensitive information.
|
||||
|
||||
### **Offboarding**
|
||||
|
||||
- **Secure Offboarding**: When a user leaves, we follow a structured offboarding process to revoke access, ensure data security, and maintain system integrity.
|
||||
|
||||
- **Data Backup and Transfer**: We securely manage the transition of user data and ensure all critical information is preserved or reassigned.
|
||||
|
||||
---
|
||||
|
||||
This **User Management** service ensures your business runs smoothly by providing reliable and efficient support for every stage of a user’s journey—from onboarding to offboarding. Stay focused on your business while we handle the tech.
|
||||
|
||||
For additional add-ons and services, check out the full list of options in our **DigiDocs**.
|
||||
118
User_Management_Tiers.md
Normal file
118
User_Management_Tiers.md
Normal file
|
|
@ -0,0 +1,118 @@
|
|||
# User Management Tiers
|
||||
|
||||
> For service overview, see [User Management](./User_Management.md).
|
||||
|
||||
At digiBandit, we manage your users alongside your devices. User Management services ensure your team has the right access, the right tools, and the right support to get their work done.
|
||||
|
||||
## Service Tiers
|
||||
|
||||
We offer three levels of user management to match your needs:
|
||||
|
||||
| Tier | What's Included |
|
||||
|------|-----------------|
|
||||
| **Basic** | Account onboarding/offboarding, identity management |
|
||||
| **Standard** | Basic + business hours remote support |
|
||||
| **Fully Managed** | Standard + GCPW identity integration + unlimited support |
|
||||
|
||||
[View pricing and bundling options](https://dbits.ca/manage)
|
||||
|
||||
---
|
||||
|
||||
## What's Included
|
||||
|
||||
### All Tiers
|
||||
|
||||
- **User Onboarding:** New employee? We set up their accounts, permissions, and access across all your systems.
|
||||
|
||||
- **User Offboarding:** Employee leaving? We ensure proper access revocation, data handling, and account cleanup.
|
||||
|
||||
- **Identity Management:** Centralized user accounts with proper access controls.
|
||||
|
||||
- **Documentation:** We maintain records of who has access to what.
|
||||
|
||||
### Standard & Fully Managed
|
||||
|
||||
- **Remote Support:** Business hours access to our support team for user issues (Standard) or unlimited support (Fully Managed).
|
||||
|
||||
- **Password Resets:** Quick resolution when users get locked out.
|
||||
|
||||
- **Access Requests:** Need to grant or revoke access? We handle it.
|
||||
|
||||
### Fully Managed Only
|
||||
|
||||
- **GCPW Integration:** Google Credential Provider for Windows - users sign into their computer with their Google account. One identity, one password.
|
||||
|
||||
- **Priority Response:** Your support requests go to the front of the queue.
|
||||
|
||||
- **Unlimited Support:** No hourly charges for user support issues.
|
||||
|
||||
---
|
||||
|
||||
## User Add-Ons
|
||||
|
||||
Enhance user security and productivity with these optional services:
|
||||
|
||||
| Add-On | Description |
|
||||
|--------|-------------|
|
||||
| **Security Awareness Training** | Phishing simulations and security training via Huntress SAT |
|
||||
| **Printix** | Cloud printing - print from anywhere to any printer |
|
||||
| **VaultWarden** | Self-hosted password manager (included storage) |
|
||||
| **BitWarden** | Enterprise password manager with SSO integration |
|
||||
|
||||
---
|
||||
|
||||
## How User Management Works
|
||||
|
||||
When we onboard a user, we:
|
||||
|
||||
1. Create accounts in your organization's systems (Google Workspace, Microsoft 365, etc.)
|
||||
2. Set up appropriate permissions and group memberships
|
||||
3. Configure their devices with proper identity integration
|
||||
4. Document the setup in your ITFlow portal
|
||||
|
||||
When we offboard a user, we:
|
||||
|
||||
1. Revoke access to all systems immediately
|
||||
2. Transfer or archive data as directed
|
||||
3. Remove licenses to stop billing
|
||||
4. Document the offboarding for compliance
|
||||
|
||||
---
|
||||
|
||||
## Identity Options
|
||||
|
||||
### Google Credential Provider for Windows (GCPW)
|
||||
|
||||
For organizations using Google Workspace, GCPW lets users sign into Windows with their Google account:
|
||||
|
||||
- **One password** for Windows and all Google services
|
||||
- **Automatic sync** between Google password changes and Windows
|
||||
- **Offline access** with cached credentials
|
||||
- **No separate Windows password** to manage
|
||||
|
||||
Included with Fully Managed user tier.
|
||||
|
||||
### CloudDirectory (Legacy)
|
||||
|
||||
JumpCloud-based identity management. We're migrating customers to GCPW where applicable.
|
||||
|
||||
---
|
||||
|
||||
## What We Need From You
|
||||
|
||||
- Employee information for onboarding (name, email, department, start date)
|
||||
- Advance notice for offboarding (same-day is fine, but earlier is better)
|
||||
- Approval for access requests
|
||||
|
||||
---
|
||||
|
||||
## Questions?
|
||||
|
||||
- **Portal:** [portal.dbits.ca](https://portal.dbits.ca/)
|
||||
- **Email:** hey@dbits.ca
|
||||
- **Phone:** 506-988-9243
|
||||
- **Text:** 506-404-0055
|
||||
|
||||
Or visit [dbits.ca/contact](https://dbits.ca/contact) to reach us.
|
||||
|
||||
<!-- dbits-0008 -->
|
||||
95
VoIP_Cloud_Phone_Service.md
Normal file
95
VoIP_Cloud_Phone_Service.md
Normal file
|
|
@ -0,0 +1,95 @@
|
|||
# VoIP / Cloud Phone Service
|
||||
|
||||
# **Ooma Office Pro Plus & Google Voice Integration**
|
||||
|
||||
---
|
||||
|
||||
## **Introduction**
|
||||
|
||||
Welcome to the next generation of business communication with DigiBandit’s integrated VoIP solution! Our system leverages both **Ooma Office Pro Plus** and **Google Voice** to provide a comprehensive, flexible, and efficient communication system. With Ooma holding the main business number, we forward all calls to Google Voice, which serves as our primary communication platform, while Ooma continues to provide essential SMS and fax services.
|
||||
|
||||
This setup ensures that DigiBandit and its clients can benefit from Google Workspace’s foundational tools while keeping Ooma as a reliable fallback for additional communication needs.
|
||||
|
||||
---
|
||||
|
||||
## **VoIP System Configuration**
|
||||
|
||||
- **Main Business Number**: Ooma Office Pro Plus holds our primary business number.
|
||||
|
||||
- **Call Forwarding**: All incoming calls are forwarded to Google Voice, enhancing our integration with Google Workspace.
|
||||
|
||||
- **Fallback Services**: Ooma remains available as a backup service and handles SMS and fax functions seamlessly.
|
||||
|
||||
---
|
||||
|
||||
## **Google Voice as the Core Communication Platform**
|
||||
|
||||
Google Voice integrates smoothly with Google Workspace, providing a unified, cloud-based communication platform that simplifies our operations. By forwarding calls from Ooma to Google Voice, we achieve the following benefits:
|
||||
|
||||
- **Unified Communication**: All calls, messages, and voicemails are managed within Google Workspace.
|
||||
|
||||
- **Centralized Management**: Google Voice works with Google Workspace, providing a centralized location for communication management and security.
|
||||
|
||||
- **User-Friendly Interface**: Google Voice’s straightforward design allows quick access and management of business communications.
|
||||
|
||||
---
|
||||
|
||||
## **Ooma Office Pro Plus for SMS, Fax, and Fallback**
|
||||
|
||||
Ooma Office Pro Plus complements Google Voice with features that ensure full coverage for all communication needs:
|
||||
|
||||
- **SMS and Fax Services**: Ooma remains the primary provider for SMS and fax services.
|
||||
|
||||
- **Fallback Solution**: Should there be any issues with Google Voice, Ooma Office Pro Plus serves as a reliable alternative, maintaining uninterrupted communication.
|
||||
|
||||
---
|
||||
|
||||
## **Features of Ooma Office Pro Plus**
|
||||
|
||||
Although Google Voice is our primary system, Ooma Office Pro Plus provides enhanced features that complement our VoIP needs:
|
||||
|
||||
- **Cloud-Based System**: Ooma’s cloud infrastructure eliminates the need for physical hardware, making it highly scalable.
|
||||
|
||||
- **Local Canadian Numbers**: Select from local Canadian numbers or port your existing number.
|
||||
|
||||
- **Advanced Voicemail**: Voicemail transcriptions are sent directly to email, ensuring messages are never missed.
|
||||
|
||||
- **Call Encryption**: Enhanced security ensures confidential communication.
|
||||
|
||||
- **Multi-Ring Functionality**: Calls can ring on multiple devices simultaneously, minimizing missed calls.
|
||||
|
||||
---
|
||||
|
||||
## **Benefits of DigiBandit’s Integrated VoIP Solution**
|
||||
|
||||
With DigiBandit’s integration of Ooma Office Pro Plus and Google Voice, businesses can expect:
|
||||
|
||||
- **Seamless Google Workspace Integration**: Google Voice works in harmony with Google Workspace, enabling unified communication for emails, calls, messages, and calendar syncing.
|
||||
|
||||
- **Cost Efficiency**: Streamline communication costs with transparent monthly fees and reduced expenses compared to traditional phone lines.
|
||||
|
||||
- **Scalability and Flexibility**: Our cloud-based solution adapts to your growth and allows team members to make and receive calls from anywhere.
|
||||
|
||||
---
|
||||
|
||||
## **Getting Started with DigiBandit VoIP**
|
||||
|
||||
- **Consultation**: Discuss your business communication needs with our team to determine the best setup.
|
||||
|
||||
- **Configuration and Deployment**: Our team handles the full configuration of Ooma Office Pro Plus and Google Voice integration.
|
||||
|
||||
- **Training and Support**: We offer training to ensure your team maximizes all features, with ongoing support available when you need it.
|
||||
|
||||
---
|
||||
|
||||
## **Why Choose VoIP with DigiBandit?**
|
||||
|
||||
Our VoIP solution, combining **Google Voice** and **Ooma Office Pro Plus**, represents a modern communication approach, enhancing reliability, flexibility, and scalability:
|
||||
|
||||
- **Cost Savings**: Reduce expenses compared to traditional phone systems.
|
||||
|
||||
- **Unified Platform**: Benefit from Google Workspace integration, offering email, calendar, and communication tools in one place.
|
||||
|
||||
- **Advanced Features**: From voicemail transcriptions to multi-ring and call encryption, enjoy modern features built for productivity.
|
||||
|
||||
Ready to enhance your business communication with DigiBandit’s VoIP solution? **Contact our specialists** today to discuss how we can support your communication needs with this powerful, integrated system.
|
||||
28
Warranty_Returns_and_Exchange_Policy.md
Normal file
28
Warranty_Returns_and_Exchange_Policy.md
Normal file
|
|
@ -0,0 +1,28 @@
|
|||
# Warranty, Returns, and Exchange Policy
|
||||
|
||||
# Warranty
|
||||
|
||||
|
||||
### What We Cover
|
||||
|
||||
|
||||
|
||||
|
||||
Type
|
||||
Coverage
|
||||
Duration
|
||||
|
||||
|
||||
|
||||
Services (Labor)
|
||||
Our workmanship on repairs – same issue recurring
|
||||
1 year standard
|
||||
Lifetime for PDM members
|
||||
|
||||
Goods (Products)
|
||||
Defective products purchased from us
|
||||
Manufacturer's warranty
|
||||
|
||||
Installed Parts
|
||||
Installation labor only
|
||||
Same as service warranty
|
||||
3
Website_Design_and_Creation.md
Normal file
3
Website_Design_and_Creation.md
Normal file
|
|
@ -0,0 +1,3 @@
|
|||
# Website Design & Creation
|
||||
|
||||
Are you looking to make a solid online presence for your business? Look no further than DigiBandit IT Services for expert website design and creation services. We offer a variety of customizable designs and features that will ensure your website stands out from the rest. Our team of skilled developers will work with you to create a website that meets your business needs and captivates your target audience. From e-commerce sites to simple informational sites, we’ve got you covered. Contact us today to expand your online presence and take your business to the next level.
|
||||
305
Welcome_to_your_new_Portal.md
Normal file
305
Welcome_to_your_new_Portal.md
Normal file
|
|
@ -0,0 +1,305 @@
|
|||
# Welcome to your new Portal!
|
||||
|
||||
This guide will help you navigate and make the most of your portal experience. **Note** your portal **may not look the exact same** as the one outlined information available will depend on your assigned roles.
|
||||
|
||||
## Getting Started
|
||||
|
||||
### Logging In
|
||||
|
||||
- Visit [https://portal.dbits.ca](https://portal.dbits.ca/)
|
||||
|
||||
- Enter your **Username** and **Password**
|
||||
|
||||
- Click **“Sign In”**
|
||||
|
||||
**Forgot your password?** Click the [**Forgot Password**](https://wiki.dbits.ca/en/Customer-Portal#PassReset) link and follow the instructions to reset it.
|
||||
|
||||
### Dashboard Overview
|
||||
|
||||
Once logged in, you’ll see your main dashboard with:
|
||||
|
||||
- **Home:** Brings you to the main dashboard.
|
||||
|
||||
- **Tickets:** Shows you a overview of your tickets and status.
|
||||
|
||||
- **Finance:** has subcategories including:
|
||||
|
||||
**Invoices:** Overview of your Invoices.
|
||||
|
||||
- **Recurring Invoices:** Overview of your Recurring Invoices.
|
||||
|
||||
- **Quotes:** Overview of your Quotes.
|
||||
|
||||
- **Auto Payment:** Information about your AutoPay setup.
|
||||
|
||||
- **Technical:** has subcategories including:
|
||||
|
||||
**Contacts:** List of your Contacts.
|
||||
|
||||
- **Documents:** List of your Documents.
|
||||
|
||||
- **Domains:** List of your Domin Information.
|
||||
|
||||
- **Certificates:** List of your Certificate Information.
|
||||
|
||||
- **All Tickets:** Information about all your Tickets.
|
||||
|
||||
- **Your Profile (Name):** has subcategories including:
|
||||
|
||||
**Account:** Manage or view account info and settings.
|
||||
|
||||
- **Sign Out:** Signs you out of your Account.
|
||||
|
||||
## Managing Support Tickets
|
||||
|
||||
### Creating a New Ticket
|
||||
|
||||
- Click **“New Ticket”** button
|
||||
|
||||
- Fill out the ticket form:
|
||||
|
||||
**Subject:** Brief description of your issue.
|
||||
|
||||
- **Priority:** Choose from Low, Medium, High.
|
||||
|
||||
- **Category:** Select the type of issue (Hardware, Software, Network, etc.)
|
||||
|
||||
- **Description:** Provide detailed information about the problem.
|
||||
|
||||
- Click **“Raise Ticket”**
|
||||
|
||||
### Viewing Your Tickets
|
||||
|
||||
- Navigate to the **“Tickets”** section to see all your support requests
|
||||
|
||||
### Ticket Details
|
||||
|
||||
Click on any **ticket** to view:
|
||||
|
||||
- Full conversation history
|
||||
|
||||
- Status updates
|
||||
|
||||
- Time tracking information
|
||||
|
||||
- Attached files and documents
|
||||
|
||||
- Resolution details
|
||||
|
||||
### Communicating on Tickets
|
||||
|
||||
- Add comments or replies directly in the ticket
|
||||
|
||||
- Upload additional files or screenshots
|
||||
|
||||
- Receive email notifications for updates
|
||||
|
||||
- Track response times and resolution progress
|
||||
|
||||
## Viewing Invoices and Billing
|
||||
|
||||
### Invoice Management
|
||||
|
||||
- Go to the **“Invoices”** section
|
||||
|
||||
- View all current and past **Invoices**
|
||||
|
||||
- Check payment **Status** and **Due Dates**
|
||||
|
||||
- Download **PDF** copies of invoices
|
||||
|
||||
## Making Payments
|
||||
|
||||
- Online payment options (if enabled)
|
||||
|
||||
- View payment history
|
||||
|
||||
- Set up automatic payments (if available)
|
||||
|
||||
- Access receipts and payment confirmations
|
||||
|
||||
## Auto Payments
|
||||
|
||||
### Add Auto Payments
|
||||
|
||||
- Go to **Finance** and Select **Auto Payment**
|
||||
|
||||
- This will pull-up the **AutoPay** details you will need to provide the following:
|
||||
|
||||
- **Email**
|
||||
|
||||
- **Card Information**
|
||||
|
||||
- **Cardholder Name**
|
||||
|
||||
- **Country or Reigon**
|
||||
|
||||
- **Postal/Zip Code**
|
||||
|
||||
- Select **Save Card**
|
||||
|
||||
### Check Auto Payments
|
||||
|
||||
- Go to **Finance** and Select **Recurring Invoices**
|
||||
|
||||
- This will open all your **Auto Payments** as **Recurring Invoices** and you can View:
|
||||
|
||||
- **Scope**
|
||||
|
||||
- **Amount**
|
||||
|
||||
- **Next Bill Date**
|
||||
|
||||
- **Freqency**
|
||||
|
||||
- **Auto Pay** (where you can **Enable** and **Disable** Payments)
|
||||
|
||||
## Asset and Network Information
|
||||
|
||||
### Network Domains
|
||||
|
||||
- Your Currently **Owned Domains**.
|
||||
|
||||
- Your Current **Domain Names**.
|
||||
|
||||
- Your Domain **Expiry Date**.
|
||||
|
||||
### Web Certificates
|
||||
|
||||
- Name of the **Certificate**.
|
||||
|
||||
- Your **FQDN** (Fully Qualified Domain Name).
|
||||
|
||||
- Your Certificate **Issuer**.
|
||||
|
||||
- Your Certificate **Expiry Date**.
|
||||
|
||||
## Documentation and Knowledge Base
|
||||
|
||||
### Adding Resources
|
||||
|
||||
This section outlines the standard process for adding new resources to the IT Flow system. Resources may include documentation, reference materials, guides, links, or internal notes relevant to operations and support.
|
||||
|
||||
**General Guidelines for Adding Resources**
|
||||
|
||||
- Keep it **Relevant**.
|
||||
|
||||
- Only add resources that are accurate, useful, and applicable to your clients or internal staff.
|
||||
|
||||
- Use Clear **Titles**.
|
||||
|
||||
- Make resource **Titles** concise and **Searchable**.
|
||||
|
||||
- If the resource may **change** over time, include a version number or last-updated date.
|
||||
|
||||
- Review regularly to ensure information is still **accurate** and **up-to-date**.
|
||||
|
||||
- **Archive** outdated entries instead of deleting them when possible.
|
||||
|
||||
### Accessing Resources
|
||||
|
||||
Accessing Resources is possible **however** the Resource needs to be created/Added then uploaded to **Documents** after which the information can be found manually or by search bar.
|
||||
|
||||
- Browse help **Articles** and **Tutorials**
|
||||
|
||||
- **Download** user **Manuals** and **Guides**
|
||||
|
||||
- Access **Policies** and **Procedures**
|
||||
|
||||
## Self-Service Options
|
||||
|
||||
### Password reset instructions
|
||||
|
||||
There are **two ways** to reset your **password**, One while **Logged in** the other at the **customer portal login**.
|
||||
|
||||
- **While Logged in** go to your **Username** and select **Account**.
|
||||
|
||||
- On the **Profile** screen scroll down to **Password** Type your new desired password and select **Save Password**.
|
||||
|
||||
- While at the **Customer Portal** go to the bottom and select **“Forgot Password?”**.
|
||||
|
||||
\
|
||||
|
||||
- Type your **Current email** in the provided feild and select **Reset My Password**.
|
||||
|
||||
- This will send you the **email password reset link** with the remaining instructions.
|
||||
|
||||
## Account Settings
|
||||
|
||||
### Profile Management
|
||||
|
||||
- Click on **“Technical”**
|
||||
|
||||
- Click on **“Contacts”**
|
||||
|
||||
- Click on the **Correct Profile**
|
||||
|
||||
- Change required **Information** (Name, Email, Roles, Portal Authentication)
|
||||
|
||||
- Select **Save**
|
||||
|
||||
## Mobile Access
|
||||
|
||||
### Using the Portal on Mobile
|
||||
|
||||
- Access through your **Mobile Browser**
|
||||
|
||||
- Responsive design **Adapts To Your Screen Size**
|
||||
|
||||
- **Full Functionality** available on smartphones and tablets
|
||||
|
||||
- Quick **Ticket Creation** and **Status Checking**
|
||||
|
||||
## Tips for Best Results
|
||||
|
||||
### When Creating Tickets
|
||||
|
||||
- **Be Specific:** Include error messages, steps to reproduce the issue
|
||||
|
||||
- **Include Context:** When did the issue start? What were you doing when it occurred?
|
||||
|
||||
- **Set Appropriate Priority:** Reserve **“High”** for business-stopping issues
|
||||
|
||||
### Communication Best Practices
|
||||
|
||||
- Respond **Promptly** to technician questions
|
||||
|
||||
- Keep all communication within the **Ticket** system
|
||||
|
||||
- Provide **Feedback** on resolutions
|
||||
|
||||
- Let us know if additional **Training** is needed
|
||||
|
||||
### Security Best Practices
|
||||
|
||||
- Use **Strong**, **Unique** passwords
|
||||
|
||||
- Log out when finished, especially on **Shared** computers
|
||||
|
||||
- Report **Suspicious** activity immediately
|
||||
|
||||
- Keep your contact information **Updated**
|
||||
|
||||
## Frequently Asked Questions
|
||||
|
||||
**Q: How do I reset my portal password? A:** Reset password instructions are [**HERE**](https://wiki.dbits.ca/en/Customer-Portal#PassReset).
|
||||
|
||||
**Q: Can I create tickets via email? A:** Yes, you can email [**hey@dbits.ca**](mailto:hey@dbits.ca) and a ticket will be automatically created.
|
||||
|
||||
**Q: How do I check the status of my ticket? A:** Log into the **Portal** and view the **“Tickets”** section, or check your **Email** for status updates.
|
||||
|
||||
**Q: Can I access the portal from my phone? A:** Yes, the portal is mobile-friendly and works on all modern smartphones and tablets.
|
||||
|
||||
**Q: Who can see my tickets and information? A:** Only authorized **technicians** and **administrators** can access your account information.
|
||||
|
||||
## Need Additional Help?
|
||||
|
||||
If you have questions about using the customer portal that aren’t covered in this guide, please:
|
||||
|
||||
- Create a **Support Ticket**
|
||||
|
||||
- Call our **Help Desk** ([1-506-988-9243](tel:1-506-988-9243) Ext.5 )
|
||||
|
||||
- Email our [**Support Team**](mailto:hey@dbits.ca)
|
||||
|
||||
We’re here to help make your IT experience as smooth as possible!
|
||||
18
dataBack_Discovery.md
Normal file
18
dataBack_Discovery.md
Normal file
|
|
@ -0,0 +1,18 @@
|
|||
# dataBack Discovery
|
||||
|
||||
## Overview
|
||||
|
||||
Discovery is a feature of the dataBack backup service that helps identify and catalog data across your organization.
|
||||
|
||||
## Purpose
|
||||
|
||||
The Discovery feature:
|
||||
|
||||
- Scans systems for important data
|
||||
- Identifies backup candidates
|
||||
- Helps ensure comprehensive data protection
|
||||
|
||||
## Related Documentation
|
||||
|
||||
- [dataBack by DigiBandit](dataBack_by_DigiBandit.md) - Backup service overview
|
||||
- [Backup and Recovery Policy](Backup_and_Recovery_Policy.md) - Backup policies
|
||||
53
dataBack_by_DigiBandit.md
Normal file
53
dataBack_by_DigiBandit.md
Normal file
|
|
@ -0,0 +1,53 @@
|
|||
# dataBack by DigiBandit
|
||||
|
||||
Are you concerned about the potential impact of data loss or system downtime on your business? Look no further than dataBack by DigiBandit! Our comprehensive business continuity and disaster recovery solution is designed for small and medium-sized businesses to provide fast and reliable data backup, recovery, and restoration services.
|
||||
|
||||
With added features like ransomware protection and encryption, dataBack ensures the security and recoverability of your critical business data and systems.
|
||||
|
||||
**Customized and Managed with CloudBerry (MSP360) and BackBlaze B2**
|
||||
|
||||
DigiBandit IT Services utilizes CloudBerry, or MSP360, as our preferred backup software to ensure a fully customized and managed backup experience. This powerful software, combined with our expertise, guarantees a seamless and efficient data backup process. As for storage, we partner with BackBlaze B2, a reliable and cost-effective object storage solution, to store your backups securely in the cloud.
|
||||
|
||||
**Backup & Recovery Policy**
|
||||
|
||||
We follow a comprehensive backup and recovery policy compliant with ISO/IEC 27031:2011 and ISO 22301:2019 standards to provide transparency and assurance. Here are the key elements of our policy:
|
||||
|
||||
**Backup Configurations:**
|
||||
|
||||
- All backups are performed using DigiBandit’s Backup Software, dataBack.
|
||||
|
||||
- Backups are uploaded to cloud storage, with additional fees applied for using Cloud Storage.
|
||||
|
||||
**Backup Schedule:**
|
||||
|
||||
We have implemented different backup jobs based on asset policies to ensure comprehensive coverage and data protection:
|
||||
|
||||
- Hourly Files Backup: These are recurring hourly backups with a retention period of one week. This backup type is for files like accounting databases, mission critical data.
|
||||
|
||||
- Image Backup: This is a nightly backup between 8 p.m. and midnight (1 Backup/Day) with a retention period of 1 Month. This backup type creates an image of the system and employs a ‘forever forward’ approach for efficient recovery.
|
||||
|
||||
- Files Backup: A daily backup of the “C:\Users” Directory between 6 pm and midnight (1 Backup/Day) with a retention period of 1 Month. This backup type creates an image of the system and employs a ‘forever forward’ approach for efficient recovery.
|
||||
|
||||
**Backup Procedures:**
|
||||
|
||||
- Backup Roles: Our team at DigiBandit IT Services diligently reviews backup statuses and addresses any errors or unsuccessful jobs promptly.
|
||||
|
||||
- Complete System Recovery Testing: Quarterly testing includes restoring a complete system in your environment to ensure the success and integrity of the backup process.
|
||||
|
||||
- Individual File Recovery Testing: Quarterly testing includes restoring individual files to assess the accuracy and completeness of backups.
|
||||
|
||||
**Recovery Procedures:**
|
||||
|
||||
- Recovery Roles: When recovery is needed, our clients identify the assets and files requiring recovery. DigiBandit IT Services then confirms and initiates the recovery based on the applicable policy.
|
||||
|
||||
- Full System Recovery: The latest available system image is leveraged to bring the system to an operational state, restoring the latest files using the most recent incremental backup.
|
||||
|
||||
- Individual File Recovery: The latest files are restored using the most recent incremental backup.
|
||||
|
||||
Don’t Wait for Disaster to Strike – Choose dataBack by DigiBandit Today!
|
||||
|
||||
Take proactive measures to protect your business from data loss and system downtime with dataBack by DigiBandit. Our robust backup and recovery solution, powered by CloudBerry (MSP360) and BackBlaze B2, ensures your critical business data’s security, reliability, and recoverability. Don’t wait until disaster strikes – choose dataBack by DigiBandit and gain peace of mind today!
|
||||
|
||||
For more details on our Backup and Recovery Policy, please see below.
|
||||
|
||||
[Backup & Recovery Policy](https://dbits.ca/digidocs/public/services-and-offerings/mits/device-management/databack/backup-and-recovery-policy/)
|
||||
21
dataBack_for_Google_Workspace.md
Normal file
21
dataBack_for_Google_Workspace.md
Normal file
|
|
@ -0,0 +1,21 @@
|
|||
# dataBack for Google Workspace
|
||||
|
||||
## Overview
|
||||
|
||||
Did you know that Google doesn't back up your data? While Google Workspace is a powerful tool for productivity, Google isn't responsible for accidental deletions or unexpected data loss.
|
||||
|
||||
## Why You Need Backup
|
||||
|
||||
dataBack for Google Workspace provides comprehensive backup protection for:
|
||||
|
||||
- Gmail
|
||||
- Google Drive
|
||||
- Google Docs, Sheets, Slides
|
||||
- Google Calendar
|
||||
- Google Contacts
|
||||
|
||||
## Related Documentation
|
||||
|
||||
- [dataBack by DigiBandit](dataBack_by_DigiBandit.md) - Overview of dataBack service
|
||||
- [Google Workspace](Google_Workspace.md) - Google Workspace services
|
||||
- [Backup and Recovery Policy](Backup_and_Recovery_Policy.md) - Backup policies
|
||||
123
dbitsDNS.md
Normal file
123
dbitsDNS.md
Normal file
|
|
@ -0,0 +1,123 @@
|
|||
# dbitsDNS
|
||||
|
||||
dbitsDNS is our DNS filtering service powered by DNSFilter. It blocks malicious websites, phishing attempts, and unwanted content at the network level - before threats ever reach your devices.
|
||||
|
||||
## How DNS Filtering Works
|
||||
|
||||
Every time you visit a website, your device asks a DNS server "where is example.com?" DNS filtering checks that request against threat intelligence and content policies before answering.
|
||||
|
||||
- **Malicious site?** Blocked before it loads.
|
||||
- **Phishing attempt?** Blocked before you see it.
|
||||
- **Inappropriate content?** Blocked based on your policy.
|
||||
|
||||
This happens in milliseconds, invisibly, for every device on your network.
|
||||
|
||||
---
|
||||
|
||||
## Service Tiers
|
||||
|
||||
| Tier | Best For | What's Included |
|
||||
|------|----------|-----------------|
|
||||
| **Basic** | Small networks | Threat blocking, basic content filtering |
|
||||
| **Pro** | Most businesses | Basic + advanced categories, reporting |
|
||||
| **Enterprise** | Regulated industries | Pro + compliance features, advanced controls |
|
||||
| **Education** | Schools, libraries | CIPA-compliant filtering for education |
|
||||
| **Guest** | Guest Wi-Fi networks | Lightweight filtering for visitor networks |
|
||||
|
||||
---
|
||||
|
||||
## What's Blocked
|
||||
|
||||
### All Tiers
|
||||
|
||||
- **Malware & Ransomware:** Sites known to distribute malicious software
|
||||
- **Phishing:** Fake login pages and credential harvesting sites
|
||||
- **Cryptojacking:** Sites that hijack your computer to mine cryptocurrency
|
||||
- **Newly Registered Domains:** Often used for attacks (configurable)
|
||||
|
||||
### Pro, Enterprise, Education
|
||||
|
||||
- **Content Categories:** 30+ categories including adult content, gambling, social media, streaming, etc.
|
||||
- **Custom Blocklists:** Add specific domains to block
|
||||
- **Custom Allowlists:** Ensure critical sites are never blocked
|
||||
|
||||
---
|
||||
|
||||
## Reporting & Visibility
|
||||
|
||||
Depending on your tier, you get access to:
|
||||
|
||||
- **Query Logs:** See what domains are being requested
|
||||
- **Block Reports:** Understand what's being blocked and why
|
||||
- **Top Sites:** Most visited domains across your network
|
||||
- **Threat Reports:** Security threats blocked over time
|
||||
|
||||
Reports help you understand network usage and identify potential security issues.
|
||||
|
||||
---
|
||||
|
||||
## Deployment Options
|
||||
|
||||
### Network-Wide (Router/Firewall)
|
||||
|
||||
Configure your router to use dbitsDNS servers. All devices on the network are automatically protected - no software to install.
|
||||
|
||||
### Per-Device (Roaming Agent)
|
||||
|
||||
For laptops that leave the office, we can install a lightweight agent that enforces DNS filtering anywhere - home, coffee shop, hotel Wi-Fi.
|
||||
|
||||
---
|
||||
|
||||
## Common Use Cases
|
||||
|
||||
### Business Security
|
||||
|
||||
Block malware, phishing, and other threats across your entire network. Meets many cyber insurance requirements for DNS filtering.
|
||||
|
||||
### Content Policy
|
||||
|
||||
Limit access to non-work-related sites during business hours. Categories are flexible - block social media but allow LinkedIn, for example.
|
||||
|
||||
### Guest Wi-Fi
|
||||
|
||||
Provide filtered internet for visitors without giving them full network access. Block inappropriate content while keeping things usable.
|
||||
|
||||
### Education/Library
|
||||
|
||||
CIPA-compliant filtering for schools and libraries receiving E-Rate funding. Age-appropriate content controls.
|
||||
|
||||
---
|
||||
|
||||
## What dbitsDNS Doesn't Do
|
||||
|
||||
- **Doesn't inspect encrypted traffic:** We see domain names, not page contents
|
||||
- **Doesn't block apps:** Only web traffic that uses DNS (most apps do)
|
||||
- **Doesn't replace antivirus:** It's a layer of protection, not a complete solution
|
||||
- **Doesn't log personal data:** We see domains, not what you do on them
|
||||
|
||||
DNS filtering is one layer in a defense-in-depth security strategy.
|
||||
|
||||
---
|
||||
|
||||
## Getting Started
|
||||
|
||||
dbitsDNS is typically configured as part of your network setup. If you're interested in adding DNS filtering:
|
||||
|
||||
1. We'll assess your current network configuration
|
||||
2. Recommend the appropriate tier based on your needs
|
||||
3. Configure your network to use dbitsDNS
|
||||
4. Set up any content policies you require
|
||||
5. Provide access to reporting (if applicable)
|
||||
|
||||
---
|
||||
|
||||
## Questions?
|
||||
|
||||
- **Portal:** [portal.dbits.ca](https://portal.dbits.ca/)
|
||||
- **Email:** hey@dbits.ca
|
||||
- **Phone:** 506-988-9243
|
||||
- **Text:** 506-404-0055
|
||||
|
||||
Or visit [dbits.ca/contact](https://dbits.ca/contact) to reach us.
|
||||
|
||||
<!-- dbits-0010 -->
|
||||
Loading…
Reference in a new issue