HSC Data Protection

How It Works

About HSC Data Protection

Whether you have computers for personal or business use, or both, our IT Security service may be right for you. The cost is just $5 per computer per month; we support quarterly, bi-annual or yearly invoicing arrangements. There is no limit to the number of users you can have on your computers, our service will protect the whole computer.

While our Terms Of Service tells you all the fine details, in short we look after the security aspects to stop virus and malware attacks from affecting your computer and the valuable data stored on it.  We ensure the security service is updating to ensure you have the latest protection.

Computer off for a while?  No problem.  When the computer has access to the internet or via the Proxy Internet Access mechanism, it will check for updates at least every hour.

Signup

We aim to make this process as easy as possible, if you’re coming into our store, we have a form that can be filled out on the spot or you can take it with you to return later, you can also email us to start the process.

We then provide an install link which you can run on the computer yourself or we can install it for you if you bring the computer in store or are having us perform other work to your computer.  If you’re buying a new computer from us, or upgrading your existing computer, we can set you up on the service right from the start.

After installation, policies and updates will start occurring and you will be protected.

Want to know more about how it can work for you?

The following examples show a number of configuration options on how a single or multiple computers can be connected to the service. This is kept at a high level to keep things simple but if you require more in-depth technical information, please contact us with your queries, we’d be happy to talk tech.

This starts to show how flexible the HSC – Data Protection – IT Security Service can be, and how it may be suited to your environment, no matter how many computers you have requiring protection.

A single computer, whether it be your personal computer or for your business with access to the internet can easily be connected to the service.

More than one computer can be connected as easily as a single computer.

Any supported computer, including desktops or servers with internet access can access the service directly.

This is just one of many possible examples of how computers at more than one site can be configured to utilise the service.

This example shows how an environment can utilise another computer as a proxy for other computers that you might not want to give direct access to the internet.  The computer performing the proxy role has to be included in your Service Agreement.

This example shows how an environment, including servers can utilise a computer as a proxy for other computers that you might not want to give direct access to the internet.  The computer performing the proxy role has to be included in your Service Agreement.

This example shows how an environment can utilise more than one computer as a proxy for other computers that you might not want to give direct access to the internet.  The computer performing the proxy role has to be included in your Service Agreement.