Loading color scheme

If you need help, we have a list of frequently asked questions and answers. We strive to give you the best buying experience possible. Click a question below to view the answer.

We operate remotely, leveraging secure cloud-based tools to provide efficient IT support. Our consultants use encrypted communication, virtual storage, and remote access technologies to manage your systems seamlessly. We use cloud-based services to collaborate.

We handle emergency calls first, followed by routine maintenance. Our Priority Service Plan customers receive top priority, ensuring fast response times for critical issues.

Our priority order:

  1. Priority Service Plan customers receive top priority
  2. Service Calls to non-contract customers, per our standard policies


Within these priorities, our service order is:

  • Medical devices

  • Payroll

  • Large Group work stoppages
  • 
Small Group work stoppages

  • Individual work stoppages

  • Routine installations and upgrades
  • 
Routine maintenance

It depends on the customer’s data and applications. In 2025, cloud providers, such as Microsoft Azure, can handle the identity portion of your security. Cloud storage services from Microsoft and Google can handle document storage and collaboration. However, a server is still needed when client/server applications must be used or when very large data files must be accessed directly.  Servers can exist as a local physical device on your network, or exist only in the cloud. JK Technologies has installed both solutions for our customers.

Absolutely. We recommend business-class solutions for enhanced security and reliability. These devices start at $250 a year. They include many security features, including Antivirus, Anti-Malware, Botnet Protection, Intrusion Detection, Geo-IP Isolation, and the ability to create VPNs between locations.