[vc_row full_width=”stretch_row” css=”.vc_custom_1515751968085{padding-top: 100px !important;}”][vc_column css=”.vc_custom_1515752234075{padding-right: 0px !important;padding-left: 0px !important;}”][vc_row_inner][vc_column_inner][tek_sectiontitle st_title=”Frequently asked questions” st_title_tag=”” st_subtitle=”We now have an FAQ list that we hope will help
you answer some of the more common questions.” st_subtitle_tag=”” st_subtitle_decoration=”” st_separator_enable=”separator_off” st_text_align=”text-center” st_width=”st_6_columns” css_animation=”kd-animated fadeIn” css_animation_delay=”200″ css=”.vc_custom_1747056894903{margin-bottom: 45px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner gap=”30″ css=”.vc_custom_1555681526039{padding-bottom: 85px !important;}”][vc_column_inner css=”.vc_custom_1541160549301{padding-right: 0px !important;padding-left: 0px !important;}” offset=”vc_col-lg-6″][vc_toggle title=”1. What should we do if an employee forgets their password?” css_animation=”none”]If someone forgets their email address and password, they should start by using the self-service reset tool if it’s enabled. This avoids sending a request to the helpdesk and gives them faster access to their email account or Microsoft Office.
For better security, enable two-factor authentication across all accounts and store credentials using secure, easier to remember methods—never on sticky notes.[/vc_toggle][vc_toggle title=”2. How can we safely delete a file and still recover it later if needed?”]One of the most common IT FAQs usually involves files.
Before you delete a file, make sure it’s not stored solely on a local hard drive—especially if you don’t have a backup. If it’s saved to OneDrive or another cloud-based system, file recovery options are available through version history or the recycle bin.[/vc_toggle][vc_toggle title=”3. I received a suspicious email. Is it a phishing attempt?”]When you receive an email from an unknown sender or an email that looks remotely suspicious (think spoof emails), you should exercise caution and avoid clicking any links or downloading attachments.
The best course of action is to delete them. But emails you think are borderline dangerous but could be safe, should be reported to your IT support team for further clarification. We can check to see whether any malware can be detected on the file and open any attachments or links in a safe environment.[/vc_toggle][vc_toggle title=”4. Why can’t I connect to the company VPN during remote work?”]The most common reason users can’t connect to the VPN is due to incorrect authentication settings or weak internet connectivity.
First, check if you’re connected to the internet, then verify your identity with the proper credentials. VPN access is critical for remote work, so ensure your mobile device or laptop is configured properly before logging in.[/vc_toggle][vc_toggle title=”5. How can we improve our security awareness around email attachments?”]Educate your team on how to identify suspicious email attachments, especially from unknown senders. Attachments can carry malware, so use anti-virus software and train users to never open files unless verified.
Practicing information security through encryption, secure file sharing, and clear best practices reduces the risk of your systems becoming infected with malware.[/vc_toggle][/vc_column_inner][vc_column_inner css=”.vc_custom_1541160556700{padding-right: 0px !important;padding-left: 0px !important;}” offset=”vc_col-lg-6″][vc_toggle title=”6. What is the need for IT security?” css_animation=”none”]The need to protect your digital assets and devices is greater than ever, given how hackers keep getting smarter nowadays. Although IT security may seem like an expensive affair, a breach can cost far more. Data and network breaches can jeopardize the health of any small to medium-sized business. Thus comes the need for IT security.[/vc_toggle][vc_toggle title=”7. What is Phishing?”]Phishing is a type of cybercrime that targets organizations through phone calls (scams), emails and text messages. However, it is typically practiced through emails and many fall prey to it unknowingly.[/vc_toggle][vc_toggle title=”8. Is it safe to store work-related files in the cloud?”]Contrary to popular belief, the files you save in cloud-based services like Microsoft OneDrive may actually be safer on those remote servers than on your on-premises hardware.
The reason for this is that large-scale enterprises such as Microsoft use best-in-class encryption and cyber security measures to protect the data they hold for their clients. By contrast, many small businesses naturally cannot match the level of cyber security measures offered by the big providers.[/vc_toggle][vc_toggle title=”9. Should I install a Solid-State Drive (SSD)?”]In short, yes.
In today’s fast-moving business world, you need the computer hardware to match. By installing a Solid-State Drive (SSD) to your desktop or laptop computer, you’ll improve almost every aspect of your device’s performance: boot-up speed, app loading times, and file copying times.
Compared to a traditional mechanical hard-drive (HDD), which operates with a spinning disk which is slow and prone to physical damage, an SSD uses a system of flash memory with no moving parts. To demonstrate just how much faster an SSD is than an HDD, consider that an SSD will read data 10 times faster, and write data 20 times faster than a conventional HDD.[/vc_toggle][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1555681550431{padding-top: 100px !important;background-color: #f5f5f5 !important;}”][vc_column css=”.vc_custom_1515677064675{padding-right: 0px !important;padding-left: 0px !important;}”][vc_row_inner][vc_column_inner][tek_sectiontitle st_title=”Latest articles” st_title_tag=”” st_subtitle=”Explore our blog for insightful articles, personal reflections and ideas in the IT field.” st_subtitle_tag=”” st_subtitle_decoration=”” st_separator_enable=”separator_off” st_text_align=”text-center” st_width=”st_6_columns” css_animation=”kd-animated fadeIn” css_animation_delay=”200″ css=”.vc_custom_1747057004951{margin-bottom: 60px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner css=”.vc_custom_1541417234781{padding-bottom: 100px !important;}”][vc_column_inner][vc_basic_grid post_type=”post” max_items=”3″ item=”3729″ grid_id=”vc_gid:1747057388662-c213a855-ee0d-3″][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row full_width=”stretch_row”][vc_column][vc_row_inner css=”.vc_custom_1511348417220{padding-top: 100px !important;padding-bottom: 100px !important;}”][vc_column_inner width=”1/4″][/vc_column_inner][vc_column_inner width=”1/2″][tek_sectiontitle st_title=”Need help finding the best IT solution for your business?” st_title_tag=”” st_subtitle_tag=”” st_subtitle_decoration=”” st_separator_enable=”separator_off” st_text_align=”text-center” st_width=”st_fullwidth” css_animation=”kd-animated fadeIn” css_animation_delay=”200″ css=”.vc_custom_1747057330367{margin-bottom: 25px !important;}”][tek_button button_text=”Get In Touch” button_style=”tt_primary_button” button_color_scheme=”btn_primary_color” button_hover_state=”” button_icon_bool=”no” button_action=”button-action-link” button_link=”url:https%3A%2F%2Fcapitalexcellenceafrica.com%2Fcontact-us%2F” button_position=”button-center” css_animation=”kd-animated zoomIn” elem_animation_delay=”200″][vc_empty_space height=”25px”][vc_column_text css_animation=”fadeIn”]
World Class Consultancy
[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]