FAQs

Have a question? We have an answer.

FAQs

Have a question? We have an answer.

Check out our frequently asked questions below. After serving the Knoxville, Tri-Cities, and Western Virginia regions over the past few decades, many folks had the same questions. If you have a question that isn’t answered on this page, feel free to reach out to us via the form below. We love talking about technology and answering questions.

My Account

My Account

How do I sign up for the Client Portal?

Your Client Portal is the gateway to many great services including ordering supplies and submitting service requests. If you would like to sign up, please contact Aryssa Snoblen at 865-862-0508.

How do I make changes to my account or update contact information?

If you need to update addresses, company name changes, contact information, or any other account changes, please email customerupdates@centriworks.com.

IT Services Pricing

IT Services Pricing

Does my company need managed IT services?

Every company, no matter the industry, is fit for managed IT services. Along with better cybersecurity, having managed IT services is beneficial for your growth as a business by bettering your technology and keeping you in compliance with data privacy laws. At the end of the day, it’s a lot for an in-house person to keep track of on their own.

How much do managed IT services cost?

Managed IT services vary in cost depending on the industry and plan. A fully managed plan will cost more than a co-managed plan that augments your existing technology resources. In general, fully managed plans range from $120-225. It’s important to remember that you get what you pay for. When it comes to co-managed plans pricing, there are more factors involved making it hard to provide an accurate estimate. If you’d like more info on a co-managed plan, please contact us here. Lastly, mostly managed IT Services plans charge a monthly flat fee based on a Service Level Agreement (SLA).

Why should we invest in managed IT Services?

Gone are the days when an in-house IT person could keep up with current IT trends and manage all your business-critical technology. Technology and cybersecurity are constantly changing. To stay ahead of cyber threats and retain your competitive edge, you need a team of IT and security experts who can not only ensure your technology is reliable, but that it’s secure. As a business owner or executive, you have an obligation to protect your employees and your customers’ confidential data. In order to accomplish these goals, you’ll need a managed IT Services partner.

What certifications does Centriworks have?

We’re proud to say we’re CompTIA Security Trustmark+ certified, which means we’ve been determined by a third-party as fully meeting technically demanding security criteria based on the National Institute of Standards and Technology Cybersecurity Framework (NIST).

We already have a VoIP phone system but are looking for additional services. What do you offer?

In addition to voice, our VoIP service offers SMS texting capabilities for your customers who prefer typing over speaking.

Why do I still have to pay for a phone line?

VoIP allows anyone with an internet connection to reach your business for help. However, if someone is trying to call your business with a cellular connection, they’ll be unable to connect to you without an active phone line. By having both VoIP and a phone line, any customer from anywhere can connect to you, no exceptions.

Do I have to pay for everything up front?

No, not necessarily. If you need to upgrade any of your hardware from PCs to network devices, we offer Hardware-as-a-Service (HaaS). Please contact us here for more information.

Cybersecurity

Cybersecurity

What do all these acronyms mean?

VoIP – VoIP stands for Voice over Internet Protocol, and is a technology used to make phone calls over the internet.

ITAR requirements – ITAR stands for the International Traffic in Arms Regulations, which are used to oversee any industry requiring employees to handle United States Munitions List products (USML).

NIST – NIST stands for the National Institute of Standards and Technology, an organization dedicated to scientific advancement in the U.S. Department of Commerce. They created the NIST Cybersecurity Framework, which is regarded as the most effective, adaptive approach to cybersecurity for businesses of any size.

CMMC – CMMC stands for Cybersecurity Maturity Model Certification, a set of compliance levels that assists the Department of Defense in determining an organization’s security level when working with CUI (Controlled Unclassified Information) data.

What is an SPF?

An SPF (Sender Policy Framework) is a technology used to prevent phishing and spoofing attempts by criminals. It prevents emails from being sent erroneously by running a permissions check on the identity of the sender before allowing the email to be sent out.

Example: If you’re subscribed to HubSpot, the SPF allows them to send emails on your behalf because you’ve authorized HubSpot to do so under your name. You are giving them permission to act on your behalf to send legitimate emails and communications.

What are hosted solutions?

Hosted services are technology services where a provider physically provides servers with applications hosted on them. The customers access and manage these applications with a direct line connection.

What is a Software-as-a-Service solution?

Software-as-a-Service (SaaS) are technology services where a provider hosts applications on a cloud-based platform and makes it available for customers to use from their end by using a subscription service. These tend to have less upfront costs because they don’t require extra equipment to use and are mainly managed by the provider.

I have a LOB (Line of Business) application that a manufacturer is hosting for us. What does that mean?

If they’re hosting the LOB application for you, and there is no physical server containing the application on-site, then that means the LOB application is a SaaS solution.

What’s more secure? Cloud or On-Premises security?

Both are considered secure depending on the needs of your business. However, many business owners nowadays are migrating to cloud-based security because they like not having a physical server full of sensitive information sitting in their office.

Do you provide cloud hosted firewalls?

We do! If interested, please contact us to go over our available pricing plans.

How much does penetration and vulnerability testing cost?

Penetration testing costs are custom for every client depending on the scope of the project and what devices need to be tested in the scope.

How much does security awareness training cost?

Security awareness training costs depend on what level of training is needed for an organization, what areas of security are being taught, and the number of employees being trained.

What’s a VPN?

A personal virtual private network (VPN) is a service that protects your internet privacy by creating an encrypted tunnel for your data that hides your IP address and connection status. It’s the safest way to use a public Wi-fi connection.

A corporate VPN encrypts your data in transit and allows you to use corporation’s computing resources.

What’s the difference between VPN and a remote access tool?

A VPN protects and anonymizes your internet connection. A remote access tool allows someone else to directly connect and control your computer with your permission.

Do we really need a firewall?

Everyone needs a firewall. Firewalls keep out potential cyber attackers by safeguarding your business network from suspicious or malicious network traffic.

Why do I need a guest wireless network?

A guest wireless network is essential for any public-facing business. It allows your customers the comfort of staying connected to the internet without being able to access any of your office resources, such as servers, computers, and printers.

Copiers & Printers

Copiers & Printers

How does a copier lease work?

A copier lease is a fixed monthly payment system that, at end of term, allows your office the option to purchase the rented equipment at fair market value at the end of the lease. There are also dollar buy-out leases, which allow businesses to purchase the rented copy equipment for $1 at the end of the lease. If you have more questions about how a copier lease works, contact your ABM for additional information.

Do you only offer regular color printers?

Not at all! We offer multifunctional printers and copiers, some of the best in the market, to all the Knoxville, Western Virginia, and Tri-City regions from the best in the industry, like Ricoh, Kyocera, Hewlett-Packard and Epson.

What does a flat rate mean?

A flat rate is a fixed, linear price that remains the same no matter how often or little the service is used.

Can we order/lease equipment from you for our branches nationwide?

Yes. If you’re an existing customer, please contact your account manager to assist. If you’re a new client, please fill out our Sales Contact form at the bottom of this page.

How do I set up Scan-To-Email?

Scan-To-Email: Creating App Passwords

For our clients who would like to use scan-to-email from their multifunctional printer, there are a few steps that you’ll need to complete ahead of time to ensure a timely and efficient installation. You should create the proper credentials for the email address for the multifunctional printer to send the emails from. Click here for detailed instructions on how to create those accounts, depending on your email preferences. If you have questions before installation, please contact your Area Business Manager.

What do all those tech terms mean?

What does VPN stand for?
What is malware?

Colebee answers your questions in a series of short videos called the Data Dictionary. It’s our guide to help people understand commonly used technology acronyms and terminology.

15 Ways to Protect Your Business from a Cyberattack

Did you know that 81% of all breaches happen to small/medium sized businesses?

Centriworks can help identify your security weaknesses, suggest and implement security best practices to mitigate the weaknesses, and propose and install tools to help meet your compliance obligations. Download this guide for an overview of the basics.

Get technology that
puts your productivity
and security FIRST. 
Contact us now.