top of page
shutterstock_1369460255.jpg

Project Methodology

START HERE

*We will never spam or share your information

Thanks for submitting!

methodlogy-anchor

First, what is an IT project and where do they come from?   The idea or need for a project can come from our review of your IT systems, or may arise from a direct client request for a system improvement or other need.   We define an IT project as a task that we expect to take more than 5 hours to complete.   

 

Whether your task is 5 hours, or 500 hours, it needs a written plan!   The plan needs to be scaled in terms of detail appropriately to the stature and complexity of the task, and it needs to be understandable to you, our client.

Before a project starts, Bayside Networks provides our clients with a short project plan document that we refer to as a "PDN" (Project Design Note).   We ask you to approve this plan document before work begins on the project.

Our PDN documents seek to provide Bayside Networks and you, our valued client, the following:
checkbox.png

Understanding of what the project does and does not include

checkbox.png

Anticipated cost of the project

checkbox.png

Clear details on any products or other services, such as subscriptions, the client may need to purchase to complete the project.

Here are a few of the sections in a typical Bayside Networks Project Design Note (PDN):
checkbox.png

Project Title: Concise description of the project

checkbox.png

Project Number: ID code under which the project will be billed and cost controlled within its NTE budget approved by you

checkbox.png

Current Status:  Short written status of your issue or area that needs improvement or resolution

checkbox.png

Suggested Solution: The technologies and basic steps we recommend to address your need

checkbox.png

Caveats and Project Risks:   We make a best effort to list risks associated with the project.

checkbox.png

Required Purchases: Hardware and software items you must purchase from the source of your choice (ie Amazon, CDW or other) to complete your project.

checkbox.png

Cost and Approval: The Not to exceed cost we are asking you to approve for your project.   If fewer hours are required to complete your project, you will be billed that lesser amount.  If more hours are required for your project within its original scope, you will not be billed for the additional hours.

  • What is malware?
    Malware is a type of cyber threat and is a catch all term for dangerous software programs that can harm or steal your data, or even damage the software configuration of your computer systems. Malware programs become resident in a wide range of methods and they almost always have some type of nefarious purpose. The purpose of any particular piece of malware is normally referred to as the “payload”; like the warhead on a missile. Typical malware payloads include: - ransomware - enablement of remote access to your systems or data by a hostile party - data theft tools designed to allow identity theft of individual persons, customers or employee related data that may reside on your systems. Some forms of Malware depend on users to unwittingly open an infected e-mail attachment, others may enter your system by way of a security weakness in your system from an infected website that you might visit. Even very popular websites such as the DrudgeReport.com have been infected with and acted as a distribution point for spyware in the past. Often a site’s owner is unaware his site has been compromised and is being used to distribute malware.
  • How can I avoid getting malware?
    There is no “complete solution” on how to avoid malware but here are few basic tips that will help you avoid most of it: Know what devices are accessing your data. If you don't maintain a current inventory of your systems, it is difficult to assure they are all adequately protected against threats such as malware. > Bayside Networks offers a free of cost automated inventory system using a product known as Atera that solves this issue for all our clients Run current anti-virus software on all your PC's and make sure automatic security are setup to automatically download and install on your workstations (Windows Updates, Acrobat Updates, and Java Updates). These two simple steps can help avoid most (but not all) Malware infections in the first place. > High quality anti virus software should cost in the range of about $40/yr device or a little less. Bayside Networks normally recommends Microsoft Defender or Webroot for our clients. > If you use multiple computers (just about every business does), malware detection events should be reported to a centralized console that is professionally monitored. Bayside Networks offers this type of monitoring for anti-malware solutions that we recommend. Never open email attachments that don’t “look right” to you. Never open any attachment from a person or company that you do not know. Also, if an email looks odd to you, even from someone that you do know, call that person and ask if they sent it to you. Never agree to install anything from a pop-up message on the Internet –unless it is from a trusted site, for a program that you know you wish to install. Use an Internet access filtration service at your home or office, cloud based filtration services are best. Check out www.opendns.com for one possible option, especially the free level of their service. Google the terms “how to avoid malware” and become an expert!
  • What are some of the problems that Malware can cause?
    Stability problems with your computer, such as: loss of internet access, system freeze ups, partial or complete data loss, or other types of malfunctions Potential for your data to be accessed by an unauthorized outside party An potentially set you up as a distribution point for spam, such that your office gets “tagged” as a spammer, possibly jeopardizing the stability of your Internet connection.
  • How do I get rid of Malware it if I have it?
    First, give us a call here at Bayside Networks. We can always provide some initial advice on how to address your particular support need at no cost. Malware can be difficult to remove but there are a wide range of specialized removal tools along with an active “community” on the Internet that helps research and document removal methods for each type of Malware as it comes out. Here are a few facts and caveats about Malware removal: New Malware comes out all the time and there is often a period of time where the exact steps necessary to remove a new piece of Malware are unknown. We can sometimes still remove new Malware using basic removal steps that are rather universal in nature but it can be an inexact and time consuming process. Some Malware is designed to present an initial impression that it has been removed successfully, only to return after a period of time – sometimes several days. Some Malware damages the software programming on a computer to an extent that a machine may need to be reloaded. Reloading a machine is a time consuming, expensive and disruptive process. A full reload normally involves: Blanking out your computer’s storage space Reloading your operating system and programs All told, the above can take several hours to complete, potentially costing more than it would cost to replace your computer!

Over our many years in business we have developed a substantial library of PDN documents for just about every small-mid business IT project need you can imagine.   When possible, we use our library of existing project scope documents to expedite the preparation of a suitable plan for your project.

Our PDN process helps assure the success of every project we perform, meeting client goals and delivering results on time and on budget.

bottom of page