We have collected the problems that our customers forwarded us beforehand! On this page you can reach questions that are frequently asked, faster without contacting our customer service and get support easily. Check it now!

First of all, let's talk briefly about what the Law No. 5651 is. According to Law No. 5651 about registering the activities performed on the internet and the prevention of crime by registering these activities in the event of a crime committed through such activities. Compliance with this law covers all institutions and organizations, including the private sector. In particular, enterprises like hotels, internet cafes, cafeterias and similar places where big number of people gets service are at greater risk.

In order to comply with law numbered 5651, you must keep your internet traffic under constant control. For this purpose, there are products belonging to different brands that provide both hardware and software-generated firewalls and log management systems. In order to control the internet connection provided by your organization, it is sufficient to ensure that the relevant products are supplied and established in order to meet the requirements of law numbered 5651.

Our qualified staff can supply products at the size your company needs and then provide installation, maintenance and support services. In this way, the sanctions of the 5651 Law are no longer risk for your organization.

If your computer is connected to a network, you must remove the infected computer from the network as soon as possible so that the cryptolocker virus does not infect your servers if you have computers as well. You can do this simply by turning off the wireless and/or disconnect the network cable. Then turn off your computer and bring it to our service center as soon as possible. Our data recovery teams, who have achieved many successful results in Cryptolocker, will help you. One of the most important things you should not do here, if you do not have expertise on the subject is definitely not interfere. You can turn the situation into a much more difficult, even irreversible state without being aware while you are trying to recover your files. You can also follow the money transfer instructions of those who infected your computer with this virus which are not possible to track (cryptowallet, bitcoin transfer code etc.). There's a big risk here. After you send money in ways like money transfer or Bitcoin, etc. there is absolutely no guarantee that they will be able to resolve your files. You should also pay attention to this issue. If you are not an expert on data recovery, the best way to do is to get your computer to our service center as soon as possible. ‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎

The newly established companies are composed of teams of up to twenty people and they are growing more and more day by day. Determining the right requirements in the newly established companies constitutes a very important issue regarding the correct licensing preferences. First of all, it is necessary to determine the shared systems in line with the general needs and to determine the correct licenses according to these needs and the company's budget.

As an example of a company composed of ten-person serving in service sector, the employee profile will consist of a general manager, a finance director, a technical services director and seven personnel working under these directors. For sales transactions, an accounting system and a service tracking software will be used for tracking and reporting of services and a file server will be required for file sharing and backup. Considering that it is a company that cares about data privacy, company will want to keep this data in its own office. In such cases, powerful server hardware is supplied and installing virtualized servers with Ms Hyper-V will be the right choice for both cost-effectiveness and management ease and continuity issues. It is a good choice for employees to use Office 365 SAME packages for their email and office applications, and to use anti-virus applications that are managed through cloud on the security software side.

If you want your IT requirements to be equipped with the most ideal solutions from A to Z when you are establishing a new company, contact us. Qualified consultants of BT Konsept will provide the ideal solutions for you.