Phishing Simulation - Train Your Staff and Prevent Threats

Test and Educate Your Employees to Prevent Data/Identity Theft

It was found that 94% of malware is delivered by email, according to the 2019 edition of Verizon’s annual Data Breach Investigations Report. Cybercriminals are utilizing very convincing tactics to steal sensitive information and gain access to your data through cleverly targeted phishing attacks.

These attacks are often disguised to look like urgent requests, and look like legitimate emails. The emails will look like official emails from your bank, your vendors, or even from within your own company… and they’ve proven very effective for cybercriminals to use, as the 2019 DBIR implied as it indicated phishing was present in the most breaches.

Other research has supported this, finding that 90 percent of successful data hacks and breaches originate from phishing attacks.

However, there are a few ways that these attacks can be spotted, if one is paying attention. Your business can have a firewall and spam protection, but sometimes these threats slip through even the most high-end security tools. Your last line of defense is to educate your staff.

Get Started on Educating Your Staff 

We want to help local businesses protect themselves from these targeted attacks, so we have a helpful guide for you to use. Reach out to Fuse Networks today to start a conversation on all of your options on how you can share these important best practices with your staff.

Get Your “How to Spot a Fraudulent Phishing Email” Guide

Fill out the form today to get your copy!

Can a Hacker Breach Your Network?

Penetration Testing simulates a real-world cybersecurity attack to uncover exploits in your IT security

Did you know that some of the world’s biggest cybersecurity vulnerabilities were found, reported, and fixed thanks to ethical hackers? These IT security experts utilize the same tactics as cybercriminals to find exploits in a system before the bad guys get a chance to cause harm. 

At its core, this is how our Penetration Testing service works.

Complete the form to get access to the brief
“Understanding Penetration Testing” 

How Does Pentesting Work?

Utilizing an ever-growing stack of tools and tactics, our IT security experts will attempt to breach your network to uncover holes in your cybersecurity defenses. This includes:

  • Taking advantage of weak passwords
  • Bypassing poorly configured IT infrastructure
  • Exploiting hardware and software vulnerabilities
  • Deploying phishing and other social engineering tricks.

We then document any chinks in your armor and help you remediate them.

Pentesting Is a Critical Part of Your Cybersecurity Plan

Ongoing pentesting is required to meet certain security regulations and is necessary to determine if the money you are spending on security is actually protecting your data. Fuse Networks is happy to work with businesses discreetly, even if you have internal IT staff or are working with another third party.

Give us a call at 855-GET-FUSE (438-3873)

Find Out If Your Data is Available on the Dark Web

The  Dark  Web is huge and secretive, which means you need to leverage the right tools.

Your business relies on a lot of data - a lot of it, considerably sensitive. 

Have your network and security policies been effectively doing their jobs, or is some of your business’ sensitive data available on the Dark Web? Knowing this can be the key to identifying and improving your current security shortcomings, and better anticipating issues down the road. However, the nature and size of the Dark Web can make it very difficult to tell if your data is shared somewhere in its recesses.

Fuse Networks has a solution: our Dark Web Security Assessment.

We’ll scan the Dark Web for your data, alerting you if any of it appears. We won’t stop there, either. We’ll deliver the training that your staff needs to help them avoid further data leakage and theft.

Fill out the form on this page to request a complimentary Dark Web scan!

  • Sales CWM Creation Form
    Used to create companies in CWM after prospecting in Nimble.

    Please Fill in all required Information

  • First Name *
  • Last Name *
  • Title *
  • Mobile *
  • Contact Type *
  • Company Name *
  • Website URL *
  • Phone
  • Address 1 *
  • Address 2
  • City
  • State
  • Zip/Postal Code

      Fuse Networks Security Foundation Assessment

      Our Security Foundation Assessment is a free 15-question tool that will gauge your current security environment and see if there’s room for improvement. The assessment has been carefully designed to be quick but still thorough enough to get a global view of an organization’s security posture.

       

       

      How safe is your business? Use our security assessment to find out!

      Is your business secure? We won't sugar coat it: the answer is probably 'no.'

      Just look at the daily headlines - from banks to social networks to government agencies, security breaches are now a fact of life. Whats more is that those headlines only cover enterprises big enough to warrant national or even international attention. Small and medium-sized businesses, with far more limited resources, are arguably even more vulnerable to potentially devastating Cyber attacks.

      Forget the hacker wizards of Hollywood blockbusters, because most breaches are a lot less dramatic than that. Wheather it's phishing, ransomware or personal data leaks, these attacks typically adhere to the following paramerters:

      • They exploit easily-overlooked vulnerabilities. The biggest vectors for cyberattacks are emal and Microsoft 365 solutions everyone uses; 
      • They rely on human element. Attackers take advantage of our trust, habits, likes, forgetfulness and inattention;
      • They happen because we think of security as a single set-it-and-fortget-it solution. We assign access and privledges and never reviese the established structure.

      Read More


      • Recurring Payments will Make your Life Easier:

        - It's convenient (saving you time and postage)

        - Your payment is always on time (even if you're out of town), eliminating late charges.


      • Here's How Recurring Payments Work:

        You authorize regularly scheduled charges to your checking/savings account or credit card. You will be charged the greater of the amount indicated on your invoice, or the account's outstanding balance each billing period. A receipt for each payment will be emailed to you and the charge will appear on your bank statement as an “ACH Debit.” You agree that no prior-notification will be provided. Should payment fail to process for any reason you agree to provide an alternate method within 5 calendar days.


      • Company Information
      • Company Name *
      • First Name *
      • Last Name *
      • Phone *
      • Your Email *
      • Street Address *
      • City *
      • State *
      • Zip Code *

      • Banking Information
      • Bank Name *
      • Bank City/State *
      • Routing Number *
      • Voided Check *
      • Would you like to setup payment by Credit Card?
        ?
        If you would like to pay by credit card instead, please call us at (855) 438-3873 Option 3 to setup your payment authorization
      • Authorization

        I hereby authorize Fuse Networks, LLC to initiate debits to my account indicated above for the purpose of satisfying any outstanding invoices. I authorize the depository financial institution named above to process said entries. I understand that amounts are variable with each billing cycle. I waive my right to receive written notice of varying amounts.

        I understand that this authorization will remain in effect until I cancel it in writing, and I agree to notify Fuse Networks, LLC in writing of any changes in my account information or termination of this authorization at least 10 days prior to the next billing date. If the above noted payment dates fall on a weekend or holiday, I understand that the payments may be executed on the next business day. For ACH debits to my checking/savings account, I understand that because these are electronic transactions, these funds may be withdrawn from my account as soon as the above noted periodic transaction dates. In the case of an ACH Transaction being rejected for Non Sufficient Funds (NSF) I understand that Fuse Networks, LLC may at its discretion attempt to process the charge again within 30 days, and agree to an additional $35.00 charge for each attempt returned NSF which will be initiated as a separate transaction from the authorized recurring payment. I acknowledge that the origination of ACH transactions to my account must comply with the provisions of U.S. law. I certify that I am an authorized user of this credit card/bank account and will not dispute these scheduled transactions with my bank or credit card company; so long as the transactions correspond to the terms indicated in this authorization form.

          Windows 7 End of Life - Your Business Can’t Afford to Run Out the Clock on This One

          IT-for_dentistT

          What’s the Big Deal?

          Microsoft is retiring the very popular Windows 7 operating system, and any system still running that OS after January 14, 2020 will NOT BE SUPPORTED. There will be no further bug fixes or security updates which can leave your business vulnerable to security breaches. If you require compliance certifications your computer will no longer be in compliance. 

          What Should You Do?

          Simply put, you need to immediately make a plan to upgrade away from Windows 7. 

          What Are Your Options?

          You can upgrade to Windows 10 or you can look to the cloud-based offerings such as Microsoft 365, which provides a web-hosted copy of Windows 10 Pro. 

          What needs to be done:

          1. Establish what computer systems are running Windows 7
          2. Review computer hardware and consider replacing to support Windows 10
          3. Check your line of business and other applications for compatibility
          4. Establish a timeline and a budget
          5. Plan time for employee training

          If you are in Seattle and are still using Windows 7, our expert consultants can give you hand to beat the clock before it runs out. Contact Fuse Networks at 855-GET-FUSE (438-3873) or complete the form to the right today. We are happy to help!

          Customized Technology Solutions for the Modern Vision Clinic

          IT For Vision

          Optometrist clinics have very specific technology needs, but don’t often hire a dedicated IT professional to oversee their network and infrastructure. This can create a litany of costly issues that result in damage to your clinic's reputation, data loss, or top-to-bottom organizational inefficiency.

          Seattle vision clinics that understand the value that technology has on their organization’s success will want to choose a thorough and cost-effective solution that keeps their IT up and running, helps them protect their data, and cares about their business.

          Look no further than the IT experts at Fuse Networks.

          We’re proud to provide managed IT services, hardware support, and cybersecurity services with the aim of helping businesses, like your practice, get the comprehensive and proactive IT management they need to avoid troubling technology issues, maintain HIPAA compliance, and serve your customers effectively.

          Outsourced and Proactive

          Our remote monitoring and management platform helps avoid problems

          Any company that consistently uses technology, but only manages it after something breaks, is not only going to battle efficiency issues, but is likely going to end up paying more for the service they get. As modern dental practices make the shift to newer technologies, keeping them running effectively without downtime is important. Our technicians are well versed in the design, implementation, and support of the modern vision clinic's technology. We offer the following services aimed to make managing your practice’s technology easier:

          • HIPAA compliance consulting
          • 24/7 Help Desk
          • IT strategy consulting
          • IT procurement
          • Proactive monitoring
          • And more

          IT services with Fuse Networks allow you to focus on your patients, not your technology.

          HIPAA Compliance and Data Security

          Knowledgeable IT professions to counsel you on how to secure ePHI.

          Navigating a regulated industry can be complicated. Our consultants are compliance specialists that understand how the HIPAA and HITECH laws protect patient electronic personal health information (ePHI), and the effect that it has on your practice’s IT. Data storage options need to meet HIPAA mandates, sure, but we go even further. By understanding that data security has to be a priority for any vision clinic--not only to remain compliant, but for the practice’s operational integrity--has led us to utilize and test several solutions for use inside the modern vision clinic.

          Our consultants will set you up with the right data security system for your practice’s needs, while also using our vast knowledge of information systems to reinforce your network and infrastructure with the tools it needs to ensure that all of the data is accessible and secured properly. Best yet, we stay engaged. Each quarter, we will assess your compliance requirements and propose any changes we think are prudent to keep your patient’s personal, medical, and financial data from being compromised.

          The Modern Practice

          Are you ready to move your practice forward?

          In order to best serve our clients, we keep our finger on the pulse of business technology, and there are several innovative solutions that modern dental practices can use to improve organizational efficiency and patient satisfaction.

          If you’re a optometrist, you obviously know you need someone to keep a watchful eye on your IT systems. Contact Fuse Networks for a free Technology Assessment!

          Outsource Your IT with our Monthly Flat-rate Services

          Do you depend on technology to maximize the efficiency of your business? Has that technology ever let you down?

          If you are like other businesses, you may have your fair share of horror stories. Whether you have tales of downtime brought on by computer or network problems, or simply don’t like how much your organization is paying to keep your IT up and running,

          Fuse Networks Technology Success Program can help eliminate your company's IT headaches

          Our proven approach to deliver proactive IT support & services are tailor-made to relieve all of your organization’s technology-induced pain points.

          Discover your Blueprint to Technology Success!

          FA Defined

          Standard IT  Policies - Set the Framework for a repeatable process, reliable support, and the ability to grow your business. - we prioritize the risk and impact of each so things are improved without bringing your business to a halt.

          Security Management - Overbearing security policies can create massive slowdowns, and no security leaves your business at risk. Fuse will assess your risk with you and help determine what security policies need implemented.

          Systems Monitoring - This starts with tending to your existing IT investment - early detection can prevent issues before they affect your bottom line. Let us keep a watchful eye over your systems performance so productivity isn't effected.

          Business Continuity - The future is unpredictable, downtime and data loss can strike anytime - our "3-2-1" backup strategy provides you with the reliability needed to protect your assets and reputation when disasters occur.

          Compliance Management - Compliance can be stressful -  Working with a partner that understands the protocols, policies, and procedures associated with it will ensure you are compliant and audit ready. 

          Predictable Cost - Budgeting for IT expenses can be complex - especially when multiple vendors, applications, and licenses are involved. We will help determine what it will costs to bring on a new employee or even open that new location.

          Peace of Mind - Focus on managing and growing your business with a team that understands your goals and accepts responsibility for managing of your business technology needs.

           

           

          Interested in learning how you can use this Blueprint in your business? Just take a moment to fill out our form or give us a call at 855-GET-FUSE (438-3873).

          Lets Schedule your Technology Assessment Today!

          Whether you have questions about how to streamline, expand, or protect your network, or you are just looking for a second option, one of our experienced Fuse Networks staff would be happy to discuss your Technology Systems with you.

          There is no obligation!

          It's not meeting with a pushy sales person (we know how annoying that is) or someone who only speaks tech-jargon. We’d rather you consult with someone who can actually give you helpful advice and recommendations to improve the way your business handles technology. 

          • We’ll gladly discuss anything, but here are some ideas and questions you can ask us: 
          • Some of my computers are slow, can they be fixed or do I need to upgrade?
          • Are there immediate security risks that threaten my network that I should know about?
          • How would my business adopt the cloud, and what would the benefits be?
          • I’m nervous that my data backup solution isn’t doing it’s job, how can I know for sure?
          • Is my current computer guy doing a good job
          • And much more!

          Start doing IT the proactive way with Fuse Networks. To get started, fill out the form or, for a more personal touch, reach out to us at 855-GET-FUSE (438-3873).

          • Company name *
          • First Name *
          • Last Name *
          • Phone
          • Number of Employees?
          • Number of Locations?
          • Services you are interested in?
          • Comments:

               

              Start your 30 day Free Trial Today!

               

              Office 365 Backup

              Our Online Backup will let you back up your contacts, mailboxes, calendars, attachments, tasks and deleted items into our secure cloud storage. Get the best protection on the market for your emails and important files. Protect your Office 365 data anytime, from anywhere, to the cloud for ANY user with ANY Plan and get 10GB of Online Backup storage to start backing up Office 365 today.
               
              The backup software and license are all free!
               

              Discover the Advantage of Office 365 Online Backup:

              • Office 365 Add on - Easily Backup contacts, mailboxes, calendars, attachments, tasks and deleted items into our secure cloud storage
              • Maximize your Cloud Storage - Each user gets an allocation of 10 gigabytes and our solutions allows you to pool it all together
              • Data Protection Controls - Ensure you can restore old employee emails after the mailbox has been deleted
              • Realtime Monitoring - Recieve notifications when there are issues with your backup
              • Dependability and Support - Get 99.9% uptime guaranteed and 24x7 online and phone support.

               

              Are you ready to get started? Contact us today to talk to one of our experts!

              Make Educated Decisions on Your Technology Best Practices and IT Strategies

              When you opened a business, that business was your specialty - not IT concerns. That’s why we’ve developed the IT Playbook, a guide to aid you in shaping the choices you make as you select the technology that powers your business.

              The IT Playbook will help you make educated decisions on:

              • Which IT model makes the most sense for your organization.
              • How to align your data backup solution with your Business Continuity Plan.
              • What IT security practices should your company have in place.
              • Determine if and how the cloud would work for your business.
              • Choosing the IT solutions that best fit your company.

              With advice and practical solutions for businesses of all sizes, the IT Playbook can serve as your guide to optimizing the technology your business uses to increase productivity, profits, and preparedness.

              Fill out the form and we will mail you a copy of the IT Playbook, and give yourself the answers to many of the IT questions you may have, as well as strategies to improve your technological prowess.

              stack of playbooks

              7 Things Your Company Needs to Know for Your Business Continuity Plan

              (To survive the WORST Disasters)

              As we've grown our business and work with other local businesses, we've seen a greater need for disaster planning and business continuity

              We've put together a very simple list of 7 things your company needs to consider when putting together your Business Continuity Plan.

              We encourage you to use this guide as a cheat sheet, so that your business can be prepared for virtually any kind of disaster!

              FREE Whitepaper: Five Benefits of Moving to the Cloud

              Find out how cloud computing is helping small businesses get more while spending less.

              Cloud computing has been disrupting the IT of small and medium-sized businesses. It’s crucial for business owners to understand what the cloud is and how it can affect the way you do business.

              5 benefits cloud CTA article

              Who this whitepaper is for:

              Business owners and executives looking to learn more about cloud computing, whether you need to understand how it can benefit your business or you aren’t sure where to start when it comes to implementing cloud solutions for your organization.

              What you’ll learn:

              • Exactly what the cloud means for SMBs.
              • The three primary cloud service models.
              • The four cloud deployment models.
              • A breakdown of the top 5 most prominent benefits of the cloud.

               

              We also encourage you to reach out to us directly for additional information specific to your business. We’re always happy to discuss the future of your business with you.

              Great! We're happy you were able to get back to doing what you do best!

              Would you like to leave a message for us on Social Media?

              Facebook icon  Twitter icon  Linkedin icon  RSS feed

              Leave a Testimonial

              Any Feedback is greatly appreciated.
              Thank You for allowing us to have the pleasure of working with you!

              Fuse Networks Needs Your Feedback

              Take our quick survey, be entered into our monthly drawing, where you can win up to a $100 credit towards your account.

              This survey should take less than 5 minutes to complete.

              • Company Name *
              • First Name *
              • At this time, do you consider your issue and/or inquiry fully resolved? *
              • How many times did you call to resolve this specific issue or question? *
              • How would you rate your satisfaction with our services? *
              • Please note that this question relates exclusively to how our team representative handled your call.  How would you rate your satisfaction with the following? Choose an answer from 5 to 1 with 5 being Very Satisfied and 1 being Very Unsatisfied.
              • The professionalism and courtesy of the representative who assisted you ? *
              • The representatives knowledge? *
              • The ability of our specialist to understand your needs and provide appropriate solutions?
              • The representative's ability to communicate technical information in a clear and effective manner? *
              • Please rate your overall satisfaction with TS Tech *
              • Would you like us to contact you in regards to this survey or the service you received? *

                  Your feedback helps us improve your experience

                  We realize that your time is valuable, so we won't take more than a few seconds.
                  We're always trying to improve the way we work with you.

                  How did we do?

                  Please choose one of the options below:

                   

                   

                  • Maintenance Window and Support Verification
                    From time to time we want to confirm your standard maintenance windows for your business. Please review each tab and provide us with your companies information.

                    We have entered our standard windows that are currently configured, if you would like to change these please let us know.

                  • Company Name *
                  • First Name *
                  • Last Name *
                  • Phone *

                    • Weekly Maintenance Types
                      The Following schedule will be used when we install security patches and updates. During this time we will need all Workstations and Servers to be online to receive the updates through our management agents.

                    • Day of the Week?
                    • Maintenance Window?
                      ?
                      All times are in PDT (+8 Hours)
                    • Maintenance Exclusions?
                      ?
                      Document any Servers or Workstations that should not be automatically updated

                    • Monthly Maintenance Types
                      The following schedule will be used when we install updates that require a technician manually validate the changes. During this time we will need to reboot these devices and services may be affected during the maintenance window.

                    • Week of the Month? *
                      ?
                      Week Starts on the 1st Business day of the Month.
                    • Day of the Week? *
                    • Maintenance Window ? *
                      ?
                      All times are in PDT (+8 Hours)
                    • Maintenance Exclusions?
                      ?
                      Document any devices or systems that should not be included during monthly maintenance.

                    • Emergency Maintenance Contacts
                      We realize there may be issues where systems need fixed when there isn't a scheduled maintenance window. When this happens we will troubleshoot the issue and determine a work around or determine the fix. When this happens we notify the emergency contacts to coordinate the fix. By default the emergency contacts are the authorized approvers, however in some instances you may require others be notified before it happens. Please confirm your emergency contacts here.


                    • Notify Additional Staff?
                    • First Name
                    • Last Name
                    • Contact Phone?
                      ?
                      Please provide the contacts Cell Phone Number
                    • Notify Authorized Approvers? *

                    • After Hours Support Authorization
                      Fuse Networks provides 24x7 after-hours support for Priority 1 (P1) outages or service impairments. Realizing your staff may submit non-critical service requests after-hours, we do make ourselves available to assist at pre-defined after-hours rates. To authorize the use of after-hours support for non-Priority 1 based issues by your staff at any time, we ask for your consent below. Otherwise your staff will be directed to contact you to authorize after-hours support..

                    • Authorization *
                      ?
                      By Selecting yes you are agreeing to our after hour support minimum of two hours at $200 an hour.

                  • Client Off-boarding Checklist
                    The Client or new vendor will be responsible to pay for services at the listed retail rates until fully migrated. Failure to pay will result in termination of services after 30 days and permanent data loss after 60 days per our Terms of Service.

                    We are happy to work with the client or the new vendor to assist in this migration at our Time and Materials rates.

                  • Company Name *

                    • Client Information
                      Please fill out the details below and make sure to include your last date with Fuse Networks and any notes regarding how you plan on transitioning services.

                    • First Name
                    • Last Name
                    • Contact Phone?
                      ?
                      Please provide the contacts Cell Phone Number

                    • Service Transition Overview
                    • Transition Date *
                    • Transition Notes
                      ?
                      Document any devices or systems that should not be included during monthly maintenance.
                    • Off-boarding Terms and Conditions *
                      ?
                      y checking this box, you are agreeing to the terms and agree to any fees associated with the services associated with helping transition your services away from Fuse Networks.

                    • Services
                      What are your plans for transitioning the following services?
                    • What will happen with your External Domain Registrar? *
                    • How will you transition your Office 365 Services? *
                      ?
                      If you are unsure if you have Office 365 Services Please contact us to discuss.
                    • Office 365 Migrate Date? *
                    • How will you transfer your Data? *
                      ?
                      How would you like to receive your data
                    • Cloud VoIP Services? *
                    • I understand I need to remove the following software *
                      ?
                      Please confirm you understand our tools need to be removed and acknowledge they will no longer be monitored.

                  Microsoft 365, the Complete Cloud Suite

                  Microsoft 365 Business brings together features from across Microsoft’s offerings in a solution designed for small and medium-sized businesses. It’s powered by Office 365 and Windows 10, with device management and security features to allow your business to safeguard its assets and data.

                  remote_worker_productivity

                  Get more done

                  Create your best work with intelligent tools built in to Office. Get work done with enterprise grade email and calendaring. Access your files from anywhere with online file storage. Easily integrate with other commonly used apps and solutions.

                  teamwork

                  Work Better Together

                  Bring together teams and resources, all in one place. Connect with customers, coworkers, and suppliers. Host online meetings to increase collaboration and productivity. Work anywhere from any device.

                  customer-relationship.jpg

                  Build Your Business

                  Build stronger customer relationships. Schedule & manage appointments with your customers. Optimize your business processes.

                  security-safeguard

                  Safeguard Your Business

                  Control & manage access to your sensitive business information. Protect company data across PCs, phones and tablets. Guard against unsafe attachments, suspicious links, and other cyber threats.

                  Discover the Microsoft 365 Business Advantage by learning what is included:

                  • Office 365 - Stay up-to-date with the latest versions of Word, Excel, PowerPoint, and more.
                  • Email and Calendaring - Connect with customers and coworkers using Outlook and Exchange.
                  • File Storage - Manage your files from anywhere with 1TB of storage.
                  • Data Protection Controls - Help secure business data on personal and company-owned devices.
                  • Windows 10 Pro - Get upgraded from Windows 7, 8 and 8.1 Pro.
                  • Cyberthreat Protection - Guard against unsafe attachments, suspicious links, and other malware.
                  • Dependability and Support - Get 99.9% uptime guaranteed and 24x7 online and phone support.

                  Are you ready to achieve your business goals? Contact us today to talk to one of our experts!

                  • Maintenance Window and Support Verification
                    During our Client On-boarding process we determine standard maintenance windows that are customized to what works best for your business. Please review each tab and select the schedule that works best for you.

                    We have entered our standard windows that work best for most of our clients.

                  • Company Name *
                  • First Name *
                  • Last Name *
                  • Phone *

                    • Weekly Maintenance Types
                      The Following schedule will be used when we install security patches and updates. During this time we will need all Workstations and Servers to be online to receive the updates through our management agents.

                    • Day of the Week?
                    • Maintenance Window?
                      ?
                      All times are in PDT (+8 Hours)
                    • Maintenance Exclusions?
                      ?
                      Document any Servers or Workstations that should not be automatically updated

                    • Monthly Maintenance Types
                      The following schedule will be used when we install updates that require a technician manually validate the changes. During this time we will need to reboot these devices and services may be affected during the maintenance window.

                    • Week of the Month? *
                      ?
                      Week Starts on the 1st Business day of the Month.
                    • Day of the Week? *
                    • Maintenance Window ? *
                      ?
                      All times are in PDT (+8 Hours)
                    • Maintenance Exclusions?
                      ?
                      Document any devices or systems that should not be included during monthly maintenance.

                    • Emergency Maintenance Contacts
                      We realize there may be issues where systems need fixed when there isn't a scheduled maintenance window. When this happens we will troubleshoot the issue and determine a work around or determine the Fix. When this happens we notify the emergency contacts to coordinate the fix. By default the emergency contacts are the authorized approvers, however in some instances you may require others be notified before it happens. Please confirm your emergency contacts here.


                    • Notify Additional Staff?
                    • First Name
                    • Last Name
                    • Contact Phone?
                      ?
                      Please provide the contacts Cell Phone Number
                    • Notify Authorized Approvers? *

                    • After Hours Support Authorization
                      Fuse Networks provides 24x7 after-hours support for Priority 1 (P1) outages or service impairments. Realizing your staff may submit non-critical service requests after-hours, we do make ourselves available to assist at pre-defined after-hours rates. To authorize the use of after-hours support for non-Priority 1 based issues by your staff at any time, we ask for your consent below. Otherwise your staff will be directed to contact you to authorize after-hours support..

                    • Authorization *
                      ?
                      By Selecting yes you are agreeing to our after hour support minimum of two hours at $200 an hour.

                  • Your Name *
                  • Your Email *
                  • Company Information
                  • Phone *
                  • Street Address *
                  • City *
                  • State *
                  • Zip Code *

                    • Primary Contact
                      The primary person who will be working with Fuse and is considered an Authorized Approver

                    • Contact Name
                    • Title
                    • Phone
                    • Street Address
                    • City
                    • State
                    • ZIP Code

                    • Billing Contact
                      Where should we send the invoices and discuss billing-related matters?

                    • Contact Name *
                    • Title *
                    • Phone *
                    • CC: E-Mail Others?
                    • Street Address
                    • City
                    • State
                    • ZIP Code
                    • Billing Information and Terms
                      All services rendered during the month are invoiced on the last day of the month and are due within 15 days. Any fees that remain unpaid for more than 15 days after the date on the invoice will be subject to interest on the unpaid amount(s) until and including the date payment is received, at the lower of either 1.5% per month or the maximum allowable rate of interest permitted by applicable law. Fuse reserves the right, but not the obligation, to suspend part or all the Services without prior notice in the event that any portion of fees are not timely received by Fuse

                    • Authorized Approvers
                      These are the employees who are authorized to approve new services or agreements between you and Fuse
                      Please Secify at least one additional approver.

                    • Primary Authorized Approver
                    • Contact Name
                    • Title
                    • Phone Number

                    • Additional Authorized Approver
                    • Contact Name
                    • Title
                    • Phone Number

                    • Additional Authroized Approver
                    • Name
                    • Title
                    • Phone Number

                    • Authorized Vendors
                      The vendors listed below are authorized to work with Fuse Networks and its staff on your behalf, unless otherwise noted by Customer.


                    • Internet Service Provider
                    • Service Provider Name
                    • Internal Contact
                      ?
                      This is the person that is authorized on your account and allowed to make changes.
                    • Invoice Copy

                    • Phone Vendor
                    • Vendor Name
                    • Internal Contact
                    • Invoice Copy
                    • Acknowledgement and Approval *

                  THIS CONFIDENTIALITY AGREEMENT ("Agreement”), is between Fuse Networks, LLC with offices atTHIS CONFIDENTIALITY AGREEMENT ("Agreement”), is between Fuse Networks, LLC with offices at 7100 Fort Dent Way, Suite 140, Tukwilla, Washington 98188 (“us”, “our”, “we” or “Fuse”), and you, theentity whose name, authorized signatory and contact information appear in the signature block of this agreement(“you”, “your” or “Client”). Whereas, You are giving Company permission to collect and analyze certain informationabout Your IT network in order for Fuse to prepare an IT assessment for the purpose of discussing the results andfindings solely with You. As a condition to such information being furnished, Fuse agrees to treat any nonpublicinformation in accordance with the terms of this Agreement as follows:

                  1. Confidential Information. The term "Confidential Information" as used in this Agreement shall mean anyand all data and materials gathered and discovered by Fuse for the purposes of providing an IT healthassessment and analysis. Confidential Information includes all network data as well as any operational,economic or financial information of any nature whatsoever which has been or may be provided or disclosedby You, or discovered by the Company’s IT auditing tools. Confidential Information does not includeinformation which at the time of disclosure or discovery is in the public domain or information which laterbecomes part of the public domain through no act or omission of Fuse; information which the Fuse candemonstrate was in its lawful possession prior to disclosure by You, or discovery; and information to the bestof our knowledge, it did not acquire on a confidential basis either directly or indirectly from You or its audittools.

                  2. Disclosure and Use of Confidential Information. Fuse agrees to keep confidential the discussions withYou concerning the IT assessments or any proposed other proposed transactions and shall not, without Yourpermission, disclose to any third party, firm, corporation or entity such Confidential Information. Fuse shalllimit the disclosure of Your data and business Information to only those persons at Fuse reasonably necessaryto evaluate the Confidential Information. Fuse shall use the Confidential Information only for the purpose ofits appraisal of the IT Assessment that is being prepared for You and will not make any other use, in whole orin part, of any of Confidential Information without the prior written consent of You.

                  3. Return of Documents. Fuse further agrees to return any and all Confidential Information disclosed by Youupon written request, without retaining any copy or duplicate thereof, and shall promptly destroy all electronic,written, printed or other material or information derived from the Confidential Information.

                  4. Governing Law. The validity and interpretation of this Agreement shall be governed by the laws of the stateof Washington.

                  5. No Other Agreement. It is expressly understood that this Agreement is not and shall not be construed asany form of a letter of intent or agreement to enter into any business relation other than to provide You withan IT Network Assessment. This Agreement shall not constitute any commitment or obligation on the part ofYou to enter into any other specific contractual arrangement of any nature whatsoever.

                  6. No Representation or Warranties. You do not make any representations or warranties as to the accuracy,completeness or fitness for a particular purpose of any information, including Confidential Information that Youare furnishing and it is further understood and agreed that Fuse shall not have any liability or responsibilityresulting from use of such information so furnished or otherwise provided.

                  Agreement and Acceptance, the Parties hereto have entered into this Agreement on the day and year first herein the form is submitted.

                  Are You HIPAA Compliant?

                  A HIPAA compliance audit from Fuse Networks can help you find out.

                  Why the Health Insurance Portability and Accountability Act Matters

                  HIPAA was passed in 1996 to ensure that the personal information of a healthcare provider’s patients is both protected from threats and intrusion, while still able to be shared as necessary for the good of the patient. Compliance with HIPAA not only ensures that your patients are at a minimal risk of having their data breached, it also helps you offer more efficient care by establishing a technology standard. HIPAA was later augmented with HITECH, or the Health Information Technology for Economic and Clinical Health Act, which added additional requirements.

                  Our FREE Network Audit can Help You Identify any Compliance Issues

                  At no charge to you, Fuse Networks can seek out various issues in your network infrastructure to prevent them from creating greater problems later. Our audit can expose all of the following:

                  • Weaknesses in your business’ infrastructure
                  • Issues with your compliance to HIPAA and HITECH standards
                  • Hardware maintenance issues
                  • Mission-critical software statuses
                  • Permission issues and and user-related threats
                  • Vulnerabilities
                  • Devices that are soon to fail

                  … and many more shortcomings in your network, allowing them to be resolved and remedied. Fill out the form on this page to request your completely complimentary network evaluation and compliance audit!

                  • Overview
                    Prior to our scheduled onsite meeting we ask that you tell us about your business through a short questionnaire. This questionnaire allows us to build a basic understanding of how you are consuming technology today and make the most of our time during our on-site assessment. Please fill in as much information as possible.

                  • First Name *
                  • Last Name *
                  • Your Role *

                    • Business Overview
                      The Following Questions will tell us about your business.

                    • Company Name *
                    • Number of Office Locations? *
                    • Main Phone *
                    • Website
                    • Years in Business? *
                    • General Gross Revenue?
                    • What does your Organization Do? *
                    • Future Company Growth or Expansion Plans?
                      ?
                      Tell us about any major changes tha may be happening in the near future.
                    • Full Time Staff *
                    • Part Time / Volunteer Staff *
                    • How do Part Time or Voluntary Staff use your systems? *
                      ?
                      Here we are looking for a general description of the ways they access company applications.

                    • Click Here to Download our Employee Discovery Form

                      This Form documents the Employee's within your organization and will identify users who will need IT Support.
                      We will review this with you during our onsite meeting but ask that you fill this out prior to our meeting.



                    • Technology Budget Information
                      The Following Questions will help provide a general overview of your current Technology Costs.

                    • Do you include Technology Expenses in your Budgeting Process? *
                      ?
                      Internet Bills, Workstation replacements, Software, etc...

                    • Cloud Services and Applications
                    • Do you currently have any hosted applications or services? *
                      ?
                      Mark all services that are in use
                    • Other Services?
                      ?
                      Provide a brief overview of any services we haven't listed.
                    • Internet Service Provider
                    • Service Provider Name *
                    • Invoice Copy
                    • Phone Provider
                    • Service Provider Name *
                    • Invoice Copy

                    • Current IT Support
                      The Following Questions will help provide a general overview of the support you receive now.

                    • Who Provides Support Now? *
                    • What are your biggest pain points with Technology Today? *

                    • Current Computer Hardware
                    • What Workstations do you utilize today? *
                      ?
                      Check all that apply
                    • Are all devices covered by a manufacturer Warranty? *
                      ?
                      Waranty includes support for hardware replacement and troubleshooting

                    • Current Server Hardware
                    • Current Server Environment

                    • Any additional information you would like to share?
                      We realize your time is valuable and can't cover every section prior to our meeting. Because of this, we always like to leave a section for you to disclose anything we may have missed.

                    • Additional Information?

                  There appears to be an issue with your account, please complete the form below to notify us.

                  10 Benefits of Managed IT Services

                  whitepaper CTA article

                  Stop waiting for your IT guy to get back to you and discovery what else is possible!

                  • How expensive downtime is for your business and how to calculate it.

                  • The difference between traditional IT support and our Proactive IT Services.

                  • How partnering with Fuse Networks can save your business time and money.

                  • How to budgetize your IT expenses.

                  • How your business can afford enterprise-level technology solutions without breaking the bank.
                   

                  We have received your information and have assigned it to be reviewed.

                  We will contact you shortly with an email when the issue is resolved.

                  Fuse Networks

                  855-GET-FUSE (438-3873) | http://www.fusenetworks.com

                   

                  Subcategories

                  HIPAA Software” width=

                  Managed IT Questions?

                  • Do you have questions about Managed IT Services and what they can do for your company? Fill out this form and our team will contact you today!
                  • First Name *
                  • Last Name *
                  • Phone
                  • How can we help?

                      Questions on Remote Access?

                      • Do you have questions about IT Services and what they can do for your company? Fill out this simple form with your questions and our team respond promptly!
                      • First Name *
                      • Last Name
                      • Phone *
                      • Comments