Profile image of secludeditaid
@secludeditaid
Flag of Portugal Mafra, Portugal
Member since January, 2013
1 Recommendations

SecludedITAid

We have more than 11 years of experience from providing IT-support to non-governmental organizations (NGOs), the United Nations (UN), international security companies and various other companies worldwide. Our experience has shown that private persons, employees of organizations and companies as well as organizations and companies at large often run risks potentially affecting their privacy due to inadequate service of their computers and IT-equipment. The nature and scope of such risks can vary from country to country. For staff working for humanitarian organizations, absence of adequate IT-systems and software can pose a direct physical threat. However, in everyday life, most people are exposed to general virus attacks and attempts threatening their right to privacy. Our services exist on equal basis for everyone worldwide in need of IT-assistance. We are here for friends, colleagues, businesses, schools, NGO's, family members. Unfortunately, we cannot accept clients below the age of 18 years old Common problems: Work-computers and technical support of these are usually provided by in-house IT-teams. However, few have access to qualified, affordable technical support of their own private computers. Smaller companies or NGOs might also face difficulties to afford viable IT-solutions, especially those operating in war-affected countries and our experience have shown that this problem exist in the global phenomena of modern technology. One of the most common problems is the implementation of systems and software solutions that are either too expensive or the implementation of inexpensive and free software with non-licensed software. The latter mentioned is not only illegal - it also poses a direct threat to the private security of you, your friends, your work-place and your children. The computer might be working after such installations but few are aware of that they most likely have opened themselves and their private life to what we in "IT-language" call "a huge can of worms." Some practical examples: Among problems which everyday home-private users are most commonly facing, the following examples seem most common: In searching various webpages, most would not have the skills enabling them to pay attention to tracking cookies and trace alerts - generally known as viruses. We all get joke e-mails from families and friends that we love to read. However, many of these mails are filled with micros that track and trace your computer and its content. When we subsequently visit banking sites with the same computer, the history of your banking details can be "tracked" by these tracking cookies and other tracing viruses. Moreover, when opening Facebook accounts and other social networks - sure it is great to keep in touch with family and friends but do we really know how to protect the security and privacy settings on our computers? The answer is that most people are not. If your computer is not installed with the latest updates it will in eight out of ten times leave your private affairs exposed to prowlers at the World Wide Web. Let us help you keeping yourself, your family and friends safe. Why pay a fortune to have an IT-technician visiting your house. From years of experience in the field with various NGOs and the UN, we have noticed a gap in access to adequate service of private computers. The following provides one typical scenario: Staff-members approach a local IT-shop in Country ABC after experiencing a system crash or malfunctioning of their private computer. This can be a failure in an application installed at the computer or a failure in part of the operating system. Leaving the local IT-store the private computer has often been repaired applying pirated software. Unfortunately, many if not most local service providers in war-torn countries have neither the necessary equipment nor access to licensed software to actually repair and even less, securing a computer. This means that the computer now is open to various security risks. Personal matters - this being banking, Facebook, private e-mailing, Skype-conversations or personal photos - are no longer private but leaks out on the Internet. If working with sensitive issues in high-risk countries, this will naturally represent a security risk not only to the organization itself but also to staff-members as private persons. We cannot emphasize enough how vital it is to take these risks serious after having repeatedly experienced how staff become endangered due to this. We are not only here to assist staff of humanitarian organizations, but also to provide IT-plans to smaller non-governmental organizations (NGOs) and small companies: Local NGOs and small companies can often not afford expensive IT-solutions and support. In many cases smaller entities cannot afford having IT-staff - even on a part time basis. Let us face it: it costs to establish a safe IT-system and not at least to service it and keep it up to date if using the services of IT-companies. Our experience shows that smaller companies suffer disproportionately due to the fact that they are not able to implement cost- and time-efficient solutions. Needless to say, it also could pose a direct security risk - especially in sensitive operational environments. Because we have observed these and similar issues worldwide we also know what your company would need.

$5 USD/hr
0 Reviews
0.0
  • N/AJobs Completed
  • N/AOn Budget
  • N/AOn Time
  • N/ARepeat Hire Rate

Recent Reviews

No reviews.

Badges

  • The Regular

    Log in every day for 1 week.
  • Simply the Best

    Complete 5 or more projects, with a 95% completion rate.
  • Smart Money

    Create 10 Milestones.
  • The Investor

    Post a featured project.
  • Nine-to-Fiver

    Win a project and accept the offer.
  • All Star

    Receive a 5-star rating for a project.
  • The Adventurer

    Complete your first project.
  • Backup plan!

    Verify a backup payment method
  • Insta-Hire

    Use Hire Me to employ a Freelancer.
  • Quick Pick

    Award your project within 24 hours of posting
  • The Giver

    Award your project to a Freelancer.
  • The Prospector

    Post your first project.
  • The Speculator

    Sponsor 1 bid.
  • Look-At-Me

    Highlight 1 bid.
  • US English Qualified

    Pass the US English Exam (Level 1)
  • The Verified

    Verify your payment method
  • Simply the Best

    Complete 5 or more projects, with a 95% completion rate.
  • Smart Money

    Create 10 Milestones.
  • All Star

    Receive a 5-star rating for a project.
  • Backup plan!

    Verify a backup payment method
  • The Regular

    Log in every day for 1 week.
  • The Investor

    Post a featured project.
  • Nine-to-Fiver

    Win a project and accept the offer.
  • The Adventurer

    Complete your first project.
  • Insta-Hire

    Use Hire Me to employ a Freelancer.
  • Quick Pick

    Award your project within 24 hours of posting
  • The Giver

    Award your project to a Freelancer.
  • The Prospector

    Post your first project.
  • The Speculator

    Sponsor 1 bid.
  • Look-At-Me

    Highlight 1 bid.
  • US English Qualified

    Pass the US English Exam (Level 1)
  • The Verified

    Verify your payment method

Exams

  • US English Level 1
    83%

My Top Skills

  • Website Design 0
  • Internet Marketing 0
  • Computer Security 0
  • Blog 0
  • Customer Support 0
  • Bulk Marketing 0
  • Report Writing 0
  • Articles 0
  • Anything Goes 0
  • German 0
  • Norwegian 0
  • Portuguese 0
  • English (US) 0
  • Email Marketing 0

Browse Similar Freelancers