- Is it time to upgrade your office Laptops and PCs ?
Technology improves efficiency, automates tasks and enables remote working. Office technology including Laptops and PCs have become very much integrated with day to day work life. Without PCs and laptops, we would simply struggle with daily tasks. To maintain office productivity and efficiency we recommend you upgrade your PC’s and Laptops every 4 years as computers 4+ years will become less productive and struggle with technical advancements. These are the tell-tale signs when you know it's time to upgrade Blue Screen If you are frequently seeing the “blue screen of death” this is a sign all is not well with your computer. Unable to upgrade hardware This can be a real issue if and there are no available or no compatible slots to upgrade a graphics, network or sound cards on your desktop. The same for laptops normally adding a bit more RAM is an easy way of prolonging a PC’s lifespan however some of the older laptops can’t facilitate additional memory or SSD upgrades. Newer laptops are supplied with USB 3.0, Thunderbolt and HDMI connections with are replacing VGA and USB 2.0 connections. Security Older PCs and Laptops may struggle with security as they may not be running on the latest operating system. This could leave your office open to security issues as these devices which aren’t running on the most current & strongest security and could prove to be the weak link in your organisation. Noisy Fans and Overheating If you notice your devices are running noisy and overheating this may be due to your CPU working harder and causing components to overheat. The heat can cause damage to internal components. Slow when stating up and shutting down If your PC or laptop is taking a lengthy time to start up or shut down, this could be a sign your running out of space on your computer hard drive. Software requirements Conflicting hardware and software applications, your computer is struggling to keep up with the latest applications as a result your applications will run slow. Updating software will of course take up more space and require more system resources and could actually slow down your system. Running Multiple Applications Your PC or Laptop can’t cope with running multiple applications, your unable to quickly jump between applications and your system is constantly crashing. Your requirements have changed You perhaps require a more portable / mobile Solution for business trips. New devices are much lighter for example Microsoft Surface Pro & Go options, and some other manufacturers offer ultra-lightweight options. Limited Battery Life Order Laptops batteries require more frequent charging in comparison to current laptops which achieve up to and exceeding five hours of standard usage. Not just ready to upgrade? Check out our quick fixes! If you not ready to invest you could also consider some quick fixes to improve the quality of your day to day work. We would recommend you clear down any large files or hardware you no longer require to improve efficiency. Look at upgrading your hard drive by replacing your HDD for the much faster SSD (solid state drive) your data is simply cloned to the new drive. Also adding more memory/ RAM should help. You could consider a larger PC monitor, older monitors tend to be 19″ or 21” we supply 24″ as a standard size larger monitors enhances workflow.
- How IT managed services can stop Hackers damaging your business
Are you an easy target for hackers as a small business owner: You, the owner or managaing director of a small business, are under attack. We as an IT Managed Services Provider, want to alert businesses to these real risks and help stop them. This can be done with adequate IT security measures and IT managed services. Right now, dangerous, well-funded cybercrime rings in China, Russia and the Ukraine are using high-end software. They are using it to hack into thousands of small businesses like yours. We recently wrote about the dark web and the risks cyber criminals pose to small businesses here. They do this to steal credit cards and client information, and swindle money directly out of your bank account. In fact, it was reported last year by Silicon Republic that cyber crime is growing faster in Ireland than anywhere else in the world- frigtening news! Don’t think you’re in danger because you’re “small” and not a big target like a J.P. Morgan or Home Depot? Think again. 82,000 NEW malware threats are being released every single day and HALF of the cyber-attacks occurring are aimed at small businesses. You just don’t hear about it because it’s kept quiet for fear of attracting bad PR, lawsuits and data-breach fines. What can your IT Managed Services Provider do for you to prevent being hacked: We can do a number of key hacking and security preventative measures or advise you on how on best practice or implement measures for you. 1. Strong Password Policies: So many people are still using easy-to-guess passwords like “password” or other words or phrases. Guess what: hackers have sophisticated software programs that can try to log in to your PC, account, web site, etc. This at the rate of 8 million login attempts per SECOND. If your password is easy, they’re in. Your password should contain at least 8 characters, uppercase and lowercase letters, a number and a symbol (! or #, for example). We can also install two-factor authentication to make dual login necessary for users periodically. We can also put a system in place whereby we ensure passwords must be updated at least monthly. 2• Install a “unified threat management” (UTM) system. Firewalls and antivirus aren’t enough to stop the sophisticated tools hackers now have. A UTM allows an IT administrator to monitor and manage a wide variety of security-related applications and devices to make sure you’re protected on all fronts. 3. Cyber Awareness Training for your employees- Educating employees is crucial for any small business in terms of their IT useage. An IT useage policy is highly advised by us at Cinnte Technologies. Employees clicking on phishing e-mails or downloading virus-laden files is still the #1 way hackers gain access to and control of business networks. Therefore, you need to outline an Acceptable Use Policy (AUP) that details what employees can and cannot do with company-owned devices, files, software, etc. Plus, you need to make them aware of how to spot a phishing e-mail or attack so they can avoid it altogether. Do you want to learn more about IT managed services, security and how to stop your IT systems being hacked?: We want to help you to achieve ultimate security for your IT and your business. We have over 20 years’ Security and disaster recovery among our team here at Cinnte. You can sign up for a free Network security assessment here with one of our senior Engineers. All you need to do is fill out our Network Assessment form. Please do this before June 30th to avail of this free service which takes 30 minutes to complete. [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]
- Top Ways IT Hackers from Get Around Your IT Security
How much do you know about IT Hackers? Cyber-crime is at an all-time high and IT hackers are setting their sights on small and medium businesses. They are doing this via Firewall and anti-virus weaknesses in particular in the IT security setup. These IT Hackers know the small and medium businesses who are “low hanging fruit.” Don’t be their next victim! This article reveals the most common ways that hackers get in and how to protect yourself today. IT Hackers Take Advantage Of Poorly Trained Employees- The #1 vulnerability for business networks are the employees using them. It’s extremely common for an employee to infect an entire network by opening and clicking a phishing e-mail (that’s an e-mail cleverly designed to look like a legitimate e-mail from a web site or vendor you trust). If they don’t know how to spot infected e-mails or online scams, they could compromise your entire network. IT Hackers are very well aware and well equipped to make the most out of gaps when it comes to poor employee IT security practices. IT Hackers Exploit Device Usage Outside Of Company Business- You must maintain an Acceptable Use Policy that outlines how employees are permitted to use company-owned PCs, devices, software, Internet access and e-mail. We strongly recommend putting a policy in place that limits the web sites employees can access with work devices and Internet connectivity. Further, you have to enforce your policy with content-filtering software and firewalls. We can easily set up permissions and rules that will regulate what web sites your employees access and what they do online during company hours and with company-owned devices, giving certain users more “freedom” than others. Learn more about cyber security awareness training for your employees here. IT Hackers Take Advantage Of WEAK Password Policies- Passwords should be at least 8 characters and contain lowercase and uppercase letters, symbols and at least one number. On a cell phone, requiring a password to be entered will go a long way toward preventing a stolen device from being compromised. Again, this can be ENFORCED by your network administrator so employees don’t get lazy and choose easy-to-guess passwords, putting your organization at risk. At Cinnte, we highly recommend you have strong, enforceable password policies. They Attack Networks That Are Not Properly Patched With The Latest Security Updates- New vulnerabilities are frequently found in common software programs you are using, such as Microsoft Office; therefore it’s critical you patch and update your systems frequently. If you’re under a managed IT plan, this can all be automated for you so you don’t have to worry about missing an important update. They Attack Networks With No Backups Or Simple Single Location Backups- Simply having a solid, reliable backup can foil some of the most aggressive (and new) ransomware attacks, where a hacker locks up your files and holds them ransom until you pay a fee. If your files are backed up, you don’t have to pay a crook to get them back. A good backup will also protect you against an employee accidentally (or intentionally!) deleting or overwriting files, natural disasters, fire, water damage, hardware failures and a host of other data-erasing disasters. Again, your backups should be AUTOMATED and monitored; the worst time to test your backup is when you desperately need it to work! They Exploit Networks With Employee Installed Software- One of the fastest ways cyber-criminals access networks is by duping unsuspecting users to willfully download malicious software by embedding it within downloadable files, games or other “innocent”-looking apps. This can largely be prevented with a good firewall and employee training and monitoring. They Attack Inadequate Firewalls- A firewall acts as the front-line defense against hackers blocking everything you haven’t specifically allowed to enter (or leave) your computer network. But all firewalls need monitoring and maintenance, just like all devices on your network. This too should be done by your IT person or company as part of their regular, routine maintenance. They Attack Your Devices When You’re Off The Office Network- It’s not uncommon for hackers to set up fake clones of public WiFi access points to try and get you to connect to THEIR WiFi over the legitimate, safe public one being made available to you. Before connecting, check with an employee of the store or location to verify the name of the WiFi they are providing. Next, NEVER access financial, medical or other sensitive data while on public WiFi. Also, don’t shop online and enter your credit card information unless you’re absolutely certain the connection point you’re on is safe and secure. They Use Phishing E-mails To Fool You Into Thinking That You’re Visiting A Legitimate Web Site- A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular web site or to click and download a virus. Often these e-mails look 100% legitimate and show up in the form of a PDF (scanned document) or a UPS or Fastway tracking number, bank letter, Facebook alert, bank notification, etc. That’s what makes these so dangerous – they LOOK exactly like a legitimate e-mail. They Use Social Engineering And Pretend To Be You- This is a basic 21st century tactic. Hackers pretend to be you to reset your passwords. In 2009, social engineers posed as Coca-Cola’s CEO, persuading an exec to open an e-mail with software that infiltrated the network. In another scenario, hackers pretended to be a popular online blogger and got Apple to reset the author’s iCloud password. If you want to learn more about how you can ensure your IT security is as strong as it could be and how you can improve this to ensure your data, network and all IT systems are kept safe, you can learn more here, or you can fill out the form here and we would be happy to send one of our Consultants to you to perform a complimentary IT security assessment. Don’t wait for hackers or other cyber criminals to take advantage of any vulnerabilities in your system. Help your business to be secure & grow by having the best IT security you could possibly have. [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]
- Managed IT Services | Cinnte Technologies| IT Services & Support
MANAGED IT SERVICES Guaranteed Response Time Guaranteed response time of 1 to 4 hours with an average resolution time of 2 hours for the majority of IT issues Short Term Contracts No long term/locked down contracts and you can cancel with only 90 day's notice 24/7 System Monitoring 24/7 Proactive monitoring of your systems to detect any issues or threats before they become serious in terms of IT security Customer Satisfaction We have a 95% client retention rate and 96% customer satisfaction rating and we are happy to put you in touch with our existing clients Guaranteed Data Security We guarantee the security of your data by testing them daily and running regular simulated recoveries Get Your Complimentary Assessment Cinnte Technologies offer a complimentary assessment of your current IT infrastructure. Our assessment comprises of a 35-point checklist. It covers all aspects of your IT Systems including productivity of current equipment. The Technology Assessment Includes... Check for Multiple Microsoft Windows versions Review all your antivirus & Malware Servers & Backup review Email review Remote Access review Document Storage review Firewall analysis Checks on existing switches & wireless access points. Personalised report detailing our findings and recommendations. If you would like to arrange an on-site assessment, please call us on 049 436 0080 or 01 5240246 or alternatively, email . Our assessment comprises of a 35-point checklist. It covers all aspects of your IT Systems including Productivity of Current equipment. We check for multiple Microsoft Windows versions, review all your antivirus & Malware, Servers & Backup, Email, Remote Access, Document Storage, Firewall analysis and checks on existing switches & wireless access points (WAPs). email@example.com We will present you with a personalised report detailing our findings and recommendations. Schedule Your Free Technology Assessment Why Your Business Needs Secure Data Backup In case you didn’t realise, data is the world’s number one commodity. That’s right - even oil is less valuable in economic terms. So protecting this should be a top priority for you to grow and prosper as a business owner or director! After working with over 100 small and mid-size businesses in the the North East and Dublin regions, we at Cinnte found that 60% of businesses will experience some type of major network or technology disaster. That doesn’t even include lost productivity, sales, and client goodwill that can be damaged when a company can’t operate or fulfill on its promises due to technical problems. Remote Backups: What They Are And Why EVERY Business Should Have Them In Place The ONLY way to completely protect your data and guarantee that you could restore it all after a major disaster is by maintaining an up-to-date copy of your data offsite in a high-security facility. Tape backups in 2020 are no longer sufficient to protect your data as they are highly liable to failure. Remote backups, also called offsite backups, online backups, or managed backups, is a service that allows you to maintain a secure copy of your data in a different location than your office. You can find out more about for business and how you can best use their products for your business! Office 365 cloud solutions Usually this type of backup is done automatically via the Internet after hours to a high-security facility. There is no question that every business owner should have an offsite copy of their data; however, there ARE big differences among remote backup services and it’s critical that you choose a good provider or you could end up paying a lot of money only to discover that recovering your data - the very reason why you set up remote backups in the first place - is not an easy, fast, or simple job. Cloud backup, or cloud computer backup, refers to backing up data to a remote, cloud-based server. Cloud backup solutions enable our customers to store their data and computer files on the Internet rather than storing the data locally on a physical disk, such as a hard drive or tape backup. Cinnte offers a cloud based backup using the latest server imaging software to mirror backups and store it safely on remote location in the cloud. We offer multiple backup and disaster recovery plans, should your system go down we promise to get you operational minimum disruption. What will the cost be to my business if I don’t have secure backups? Here's the short answer - On average this type of disaster will end up costing a business between €10,000 and €60,000 in repairs and restoration cost. But that doesn’t even include lost productivity, sales, and client goodwill that can be damaged when a company can’t operate or fulfill on its promises due to technical problems. Unfortunately, we have found out in a reactive sense, whereby we have had to step in to rectify or aim to rectify damage that has been allowed happen under another IT provider’s watch. Often by the time we are contacted by a panic stricken business owner, we are cleaning up the mess left by some other sloppy and unprofessional IT providers! Want To Know More About Remote Data Backup? Learn more about remote data backup and the best solutions for your business by phoning us on or or or emailing us with your details to 0494360080 015240246 contacting us through the website firstname.lastname@example.org A member of our team will get you ASAP to discuss your queries and help provide you with information you need! Don’t hesitate and contact us today - protect your data and your business! Our IT Suport Plans FOUNDATION Next Generation Anti-Virus DNS Web Filtering Email/Spam Filtering 24/7 Network Monitoring Security Patching Application Updates Server Backups PC Optimization Proactive Device Monitoring Vendor Liaison Cloud to Cloud Backup DEDICATED TEAM Account Manager System Administrator Virtual Chief Information Officer FIREWALL MANAGEMENT REPORTS Inventory Reporting STRATEGY Strategic Business Review Roadmap Budgeting CYBER VIGILANCE Dark Web Monitoring Phishing Simulations Security & Awareness Training UNLIMITED IT SUPPORT Remote Onsite WORK FROM HOME Virtual Desktops Virtual Servers CONTINUITY AND DISASTER RECOVERY 24/7 MANAGED DETECTION & RESPONSE Cloud Basics LEARN MORE Cloud Plus LEARN MORE Cloud Premium LEARN MORE Cloud Basics FOUNDATION Next Generation Anti-Virus DNS Web Filtering Email/Spam Filtering 24/7 Network Monitoring Security Patching Application Updates Server Backups PC Optimization Proactive Device Monitoring Vendor Liaison Cloud to Cloud Backup DEDICATED TEAM Account Manager System Administrator Virtual Chief Information Officer FIREWALL MANAGEMENT REPORTS Inventory Reporting STRATEGY Strategic Business Review Roadmap Budgeting Cloud Plus FOUNDATION Next Generation Anti-Virus DNS Web Filtering Email/Spam Filtering 24/7 Network Monitoring Security Patching Application Updates Server Backups PC Optimization Proactive Device Monitoring Vendor Liaison Cloud to Cloud Backup DEDICATED TEAM Account Manager System Administrator Virtual Chief Information Officer FIREWALL MANAGEMENT REPORTS Inventory Reporting STRATEGY Strategic Business Review Roadmap Budgeting CYBER VIGILANCE Dark Web Monitoring Phishing Simulations Security & Awareness Training UNLIMITED IT SUPPORT Remote Onsite WORK FROM HOME Virtual Desktops Virtual Servers CONTINUITY AND DISASTER RECOVERY LEARN MORE Cloud Premium FOUNDATION Next Generation Anti-Virus DNS Web Filtering Email/Spam Filtering 24/7 Network Monitoring Security Patching Application Updates Server Backups PC Optimization Proactive Device Monitoring Vendor Liaison Cloud to Cloud Backup DEDICATED TEAM Account Manager System Administrator Virtual Chief Information Officer FIREWALL MANAGEMENT REPORTS Inventory Reporting STRATEGY Strategic Business Review Roadmap Budgeting CYBER VIGILANCE Dark Web Monitoring Phishing Simulations Security & Awareness Training UNLIMITED IT SUPPORT Remote Onsite WORK FROM HOME Virtual Desktops Virtual Servers CONTINUITY AND DISASTER RECOVERY 24/7 MANAGED DETECTION & RESPONSE
- Why Choose Us | Cinnte Technologies| IT Services & Support
WHY CHOOSE CINNTE TECHNOLOGIES? About Us Since opening in 2010, Danny and his team at Cinnte Technologies have grown from one to seven employees and have built a solid reputation on technical excellence and a high level of customer service dedication. We provide a comprehensive range of Managed IT Services. We serve businesses across the North East region of Ireland and Dublin. Our team prides itself on continuous learning in a fast paced and ever evolving industry, so we can solve client issues with prompt, flexible and quality solutions to all aspects of business IT. Get A Quote The 4 pillars of our offering: Quality, Security, Reliability & Convenience We at Cinnte Technologies are committed to delivering excellent customer service and technical knowledge providing first class IT solutions to our clients. Our business values are based on four principles, namely quality, security, reliability and convenience. QUALITY SECURITY RELIABILITY CONVENIENCE Why Our Clients Choose Cinnte Technologies Guaranteed Response Time We have a guaranteed response time of 1 to 4 hours with an average resolution time of 2 hours for the majority of IT issues No Long Term Contracts No long term/locked down contracts and you can cancel with only 90 days’ notice. 24/7 Proactive Monitoring 24/7 Proactive monitoring of your systems to detect any issues or threats before they become serious in terms of IT security Regular Audits, Assessments and Backups Quarterly or bi-annual Business Technology Assessments, Security Audits & disaster recovery planning- free of charge and scheduled every 3 or 6 months Very Happy Customers We have a 95% client retention rate and a 96% customer satisfaction rating. Security & Quality Guaranteed Security & Quality- We guarantee the security of data backups so much that we will not lose one important document- or we will pay you. Flexible Plans Flexible plans to suit your business’ individual needs & we can give a full report on all information we have on your business. Schedule Your Free Technology Assessment
- Client Stories | Cinnte Technologies| IT Services & Support
CLIENT STORIES Read what our clients are saying about us.. Cinnte Technologies are proud to present client testimonials showcasing the wide range of businesses we work with and how we help make doing business easier through great IT! If you like what you read and would like to find out more about how we can help your business please contact us. Cavan Agri & Industrial Machinery ”The biggest benefit to us is that we get a full IT Department of Engineers as opposed to just one in-house IT Guy, for probably half the cost. We would not be able to hire a full in-house IT Guy as this would not work for our business. Instead, we get several IT Engineers full time at a better cost & this works to a tee for our company.” Martina Owens, Office Manager CMP Mushrooms ”Cinnte Technologies are proactive in identifying any gaps in our IT. They do fantastic regular background checks for us and do not miss any areas particularly in relation to IT security. We are protected and know we don’t need to worry about losing data or having systems down hours or days. The Cinnte team have issues resolved quickly for us.” Declan Smith, Financial Controller Elite Architectural Systems “I would say the biggest benefit to us since Cinnte took over our IT support has been peace of mind. We are very happy overall with them as they are efficient in what they do for us and we know our IT system is productive, secure and we are completed covered in respect of data backup. Their team any issues get sorted quickly. " Catriona O’Berine, Senior Office Manager Laurence Mechanical Services “The security and peace of mind that Cinnte IT provides has been a massive benefit to us since we moved to Cinnte IT. In addition, their level of service has been excellent and they are very fast and efficient at sorting out our problems across IT. Their customer service is excellent and they treat all the customers, big or small, with the same level of service." Laurence Mechanical Services, Projects Director Dawson Sherlock & Associates ”Cinnte has definitely saved my company time and money by enabling us to have secure, pro-actively and securely managed IT at all times. This has been key to help running our business successfully here at Dawson Sherlock Associates. Having support on hand that’s prompt and efficient has been a big boost to our business.” Diane Dawson, Managing Director MDL Financial "We employ the services of Cinnte Technologies to monitor and maintain our IT infrastructure. We implemented a disaster recovery plan which included the provision for offsite data backup. Our data is of critical importance and the knowledge that it is actively being backed up and monitored allows us to continue with our business activities." Eamon McDwyer, Managing Director Sean Tully Animal Feeds ”The sense of security and that everything is backed up and monitored gives great peace of mind. No crashes or breakdown happen now, and we have this great sense of security. We think Cinnte Technologies do their job very well. They are very hands on and get involved continuously in the background and in person. ” Paula O’Donohoe, Office Manager McKenna Precision Engineering “For us it was the quick turnaround without any complications that made us choose Cinnte IT. We are very happy with the service. We 100% recommend Cinnte to any business as their IT provider. We have no criticisms whatsoever with the service and find them wonderful to deal with as a company.” Kelly McKenna, Director & Owner Mc Guigan Solicitors "We receive excellent support from Danny and his team and we would be happy to refer them to any business. As a leading law firm we depend greatly on our communications, following a series of on-going faults and downtime, we employed Cinnte Technologies to implement a modern, cloud based communications platform." Aine Mc Guigan, Managing Partner O’Gorman Surveyors "Cinnte has provided ICT services to our organisation for the last number of years, we find them extremely prompt and professional. Cinnte recently implemented a disaster recovery plan to ensure our data is completely safe in the event of a system failure. Their technical knowledge has allowed us to carry on our business activities without the headaches associated with IT." Andrew O’Gorman, Managing Director HR Desk We can recommend Cinnte’s proactive approach, intercepting and eliminating problems before they become business impacting. My company provides specialised outsourced HR and Health & Safety services. We had often taken services that run in the background for granted and this was very apparent to me when my IT system went down.” " Cyril Keegan, Owner & Director Breffni Mushrooms “Cinnte offer us remote support which eliminates the need for our own in-house IT staff. Reliability of service and quick response is key for our business, any of our IT issues were resolved completely and efficiently by Cinnte. Their strength is in their excellent communication and problem-solving capability." Matt Molloy, General Manager RP McEnroe "We found ourselves dealing with computer problems daily but after employing Cinnte IT we simply logged any issues via email all issues were resolved promptly. It was great finding a company with a quick turnaround, allowing us to focus on continuing to meet tax and accounting deadlines without down time." Orla McEnroe, Partner Adston Construction “We run a construction business with multiple locations across Ireland & UK. Cinnte offer us a top-class service and work hard to meet the IT demands of our company. Cinnte assisted us in implementing new technology to help us improve our network efficiency and ability to communicate across multiple sites." Louise Downey, Director St Patrick’s College, Cavan We are confident we made the right choice as Cinnte comfortably meets the demands of our college, listens to our needs and offers us expert advice. We are a large college with close to 700 pupils and 50 staff, the most important factor when choosing an IT provider is SERVICE. Budgeting is essential for our college." Christopher Rowley, Principal MI Solutions “Since we employed Cinnte to look after our IT, our systems are more secure, we have noticed a significant reduction in spam. Cinnte have enabled shared access to emails, calendars and deliver prompt remote support. My advice to any business currently evaluating/comparing IT Service Providers – Pay peanuts get monkeys or use Cinnte.” Kevin Smith, Managing Director Cavan Industrial Cleaning Services Ltd. "We have found Cinnte to be very capable and tuned in to our requirements. We placed all our technological requirements in to the capable hands of Danny and his staff some time ago following several bad experiences. We have absolutely no hesitation in recommending them to anyone requiring their services.” Ruth Tidy, Director Empire Recruitment “Cinnte provide Empire Recruitment with reliable and responsive IT Support, we subscribe to Cinnte’s Gold Plan which offers us excellent support for our day to day IT requirements. As a Gold Plan customer all our Laptops, PCs and Network are constantly scanned, and any issues are intercepted by Cinnte’s monitoring software.” Nisha Rutherford, HR Consultant Royal School Cavan “We are a Co-Educational Boarding & Day School based in Cavan with 25 Staff and 220 pupils. We have found the biggest advantage of working with Cinnte is all our IT needs can be met by just one company, Cinnte look after the sourcing all our IT requirements from machines to software including PCs, Projectors, Firewall and Anti-virus Protection." John Galligan, Principal Hayden & Dolan Solicitors “Since moving to Cinnte we find it is very useful to have full time local support at the end of the phone or literally 200 metres away in the event of an emergency as happened when the writer compromised on security by responding to a phishing email. Cinnte are always available and respond efficiently and in the case of an emergency." Rory Hayden, Managing Partner Smith Property "The self confidence that all our work is backed up properly which has a huge impact on our firm’s success.Cinnte has always been very supportive and ready to sort out any computer problems that occur. They handled our move to the cloud very well, so I would have no problem in recommending Cinnte.” Margaret McCabe, Director Breffni Arms Hotel “Cinnte have implemented a more effective and secure wifi network incorporating firewall and antivirus solutions. Our new IT System offers us improved efficiency as we no longer have to deal with recurring issues. We have no hesitation recommending Cinnte as an IT service provider.” Eamon Gray, Proprietor Elliott Properties Ltd. “We feel Cinnte IT meet our expectations offering us immediate support to any of our IT concerns or issues. We can sleep peacefully knowing that our backups are constantly monitored, tested and replicated offsite 24/7. Cinnte add that personal touch in a professional way. We would be happy to share our experience with any business considering Cinnte IT.” Paul Elliott, Managing Director Alan Traynor Consulting Ltd. The biggest benefit working with Cinnte is knowing we have constant IT support .The onsite audits carried out by Cinnte highlight what we are lacking, this service is unique to Cinnte as no other IT Provider offers this attention to detail .I would recommend Cinnte to anyone looking for an IT Service Provider. Most companies we know are already with Cinnte.” “ Mairead McCabe, Office Manager Like what you see...? Contact Us Now