Frequently Asked Questions

What is endpoint management?

It is the centralized control of all the company’s devices (PCs, laptops, servers), guaranteeing security, updates and technical support.

What is the difference between endpoint management and IT maintenance?

Endpoint management is continuous and proactive, while traditional maintenance is often reactive, only after failures.

Microsoft 365 no longer backs up automatically?

Not entirely. External backups guarantee additional protection against accidental deletion, synchronization failures and ransomware.

Where are the backups stored?

In certified and secure data centers, outside the company’s physical premises (off-site).

Is the cloud safe for my data?

Yes, as long as it is managed with appropriate security policies, backups and authentication – as we do at ITH Solutions.

Can I migrate to Microsoft 365 without stopping the operation?

Yes. We guarantee a planned, safe and uninterrupted migration.

Does IT consulting replace my internal department?

No. It acts as a strategic complement to more effective technological decisions.

How does digital transformation affect my business?

It improves processes, reduces costs, increases security and enables scalable growth.

How long does the service take?

The response is immediate within support hours. Urgent cases are prioritized.

Do you provide remote and face-to-face support?

Yes. We adapt the type of assistance to each client’s needs.

Is the website made to measure or with templates?

Fully customized, adapted to your company’s identity and objectives.

Is a firewall enough to protect my company?

It is essential, but it must be combined with backups, EDR and security policies for complete protection.

Do you install physical or virtual firewalls?

Both, depending on the structure of the network and the customer’s needs.

What happens if I don't have a continuity plan?

High risk of financial, reputational and operational losses in the event of a breach or attack.

How often should the plan be tested?

We recommend testing every six months and reviewing whenever there are changes to the infrastructure.

What are the benefits of hosted services?

High availability, security, technical management and reliable remote access to data and applications.

Is it possible to migrate my current systems to your servers?

Yes, we carry out the migration and monitor the entire process.

What is the risk of not managing Microsoft licenses properly?

Fines for non-compliance, losses due to inactive or duplicate licenses and lack of scalability.

Do you follow my company's growth?

Yes, we adapt the licensing to the evolution of the number of users and functionalities.

How do I know what equipment to buy?

We assess the company’s workload, technical needs and budget.

Do they also install the equipment?

Yes, we accompany you from choice to installation and final configuration.

What is the NIS2 Directive?

NIS2 is a European Union directive that establishes common rules to ensure a high level of cybersecurity in member states. It replaces the original 2016 NIS directive, broadening its scope and requiring stricter security measures from companies.

Is my company obliged to comply with NIS2?

If your company operates in sectors that are considered essential (energy, health, transport, banking, digital infrastructures, etc.) or important (ICT services, food industry, waste, among others), and has more than 50 employees or a turnover of more than 10 million euros, you are likely to be covered.

You can check if you are included through our self-assessment questionnaire.

What obligations does NIS2 impose?

The main obligations include:

  • Implementation of technical and organizational cybersecurity measures;
  • Risk assessment and management;
  • Mandatory reporting of serious incidents within 24 hours;
  • Definition of continuity and response plans;
  • Continuous training and involvement of top management;Evaluation of suppliers and critical third parties.
What are the penalties for non-compliance?

Sanctions can be imposed:

  • Up to 10 million euros or 2% of global turnover for essential entities;
  • Up to 7 million euros or 1.4% for important entities;

    Suspension of activity, management accountability or reputational damage.

When does NIS2 come into force?

The directive must be transposed into national legislation in theory by October 17, 2024. From that date, compliance becomes mandatory.

How can I prepare my company?

ITH Solutions supports your organization throughout the process:

  • Initial compliance diagnosis;
  • Implementation of technical solutions (EDR, RMM, backups, firewalls, etc.);
  • Drawing up the required plans and policies;
  • Team building and awareness raising;
  • Continuous monitoring and incident management.
How long does implementation take?

It depends on the current state of the company. The process can vary between 2 and 6 months, depending on the level of cybersecurity maturity, the number of systems involved and the existence (or not) of documented processes.

Does ITH Solutions only help with the technical side?

No. We offer a complete approach:

Technical (tools and infrastructure),
Procedural (plans, policies and procedures),
Organizational (training, safety culture and management support).

Can I schedule a meeting with ITH Solutions?

Yes, just fill in the

contact form

and one of our experts will contact you to arrange a face-to-face or online meeting.

What does "cybersecurity maturity" mean?

This refers to the company’s level of preparedness and ability to prevent, detect, respond to and recover from cybersecurity incidents. The greater the maturity, the lower the risk of suffering serious impacts.

How do I know my company's level of maturity?

ITH Solutions carries out a maturity diagnosis, based on international best practices (such as ISO 27001, NIST, CIS), which assesses:

  • Existing policies and procedures;
  • Tools and infrastructures in use;
  • Employee training and awareness-raising;
  • Incident response capacity;
  • Management involvement.
Why is it important to know my level of maturity?

Knowing where you are allows it:

  • Identify weaknesses and priorities for action;
  • Avoid unnecessary investments;
  • Comply with legal requirements (such as NIS2 or GDPR);
  • Reduce the risk of business downtime due to attacks.
What are the possible levels of maturity?

In general, they can be classified into five levels:

  1. Initial – No policies, reactive approaches.
  2. Repeatable – Some informal practices, but not documented.
  3. Defined – Formal and partially applied processes.
  4. Managed – Well-defined, controlled and audited processes.
  5. Optimized – Cybersecurity integrated into the company’s culture and strategy.
How can I improve my company's level of maturity?

ITH Solutions can help through:

  • Technical and organizational audits;
  • Implementation of solutions such as EDR, RMM, firewalls, backups;
  • Preparation of response and continuity plans;
  • Practical training for users and management;
  • Continuous monitoring and periodic review.
Is the evaluation technical or organizational?

It’s hybrid: we assess both the technical systems and tools, as well as the organizational structure and human processes associated with information security. You can take our self-assessment questionnaire.

Does this assessment help to meet other standards?

Yes. The diagnosis and recommendations are in line with:

  • NIS2 (mandatory cybersecurity);
  • GDPR (data protection);
  • ISO/IEC 27001 (information security management system);
  • CIS controls and NIST framework (market benchmarks).
My company is small. Is it still worth evaluating?

Yes, many small and medium-sized businesses are often the target of attacks because they have fewer protections. An assessment helps prioritize essential measures, even with small budgets.

How much does it cost and how long does it take?

It depends on the size of the company and the complexity of the systems. ITH Solutions offers:

  • A free basic assessment for interested companies;
  • Scalable plans depending on the level of risk and resources available.
A trusted partner. Always by your side.

Stay ahead with our latest updates

Receba dicas práticas, alertas de segurança e novidades exclusivas sobre soluções tecnológicas — diretamente no seu email.