Frequenly Asked Questions

Have questions about our IT services? You’re in the right place. From understanding how we work to the specifics of our support packages, our FAQ section provides clear answers to the most common queries. Can’t find what you’re looking for? Reach out to our team, and we’ll be happy to help!

Find what you are looking for:
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
No items found.
No items found.
No items found.
Can I still use my regular email client with encryption?
Email Security

Yes, you can use your regular email client with encryption, but you will need to use an email service that offers encryption services or install encryption software.

Can I use my existing desktop hardware with a hosted desktop?
Hosted Desktop

In most cases, you do not need to purchase new hardware to use a hosted desktop. As long as your existing desktop hardware meets the minimum system requirements for accessing the hosted desktop, you should be able to use it. However, if your hardware is outdated or not compatible with the hosted desktop environment, you may need to upgrade or replace it.

How do I get started with Cyber Essentials certification?
Cyber Essentials

The first step to getting Cyber Essentials certification is to choose a certification body and then complete a self-assessment or external assessment, depending on the certification level. The certification body will provide guidance and support throughout the process.

How do I get started with Cyber Essentials certification?
Cyber Essentials

The first step to getting Cyber Essentials certification is to choose a certification body and then complete a self-assessment or external assessment, depending on the certification level. The certification body will provide guidance and support throughout the process.

How does a hosted desktop work?
Hosted Desktop

A hosted desktop is a virtual desktop that is hosted on a remote server, rather than on a physical computer. When a user logs in to their hosted desktop, they are connected to the remote server and can access all of their files, applications, and data from anywhere, on any device with an internet connection.

How does email encryption work?
Email Security

Email encryption uses an algorithm to scramble the contents of an email message. The intended recipient has a key that can unscramble the message and read its contents. Without the key, the message appears as a random sequence of characters.

How is a hosted desktop different from a traditional desktop?
Hosted Desktop

A hosted desktop is different from a traditional desktop in that it is a virtual desktop that is hosted on a remote server. This means that all of the data, applications, and files are stored and accessed from the server, rather than on a local computer. This offers benefits such as increased flexibility, scalability, and security, as well as the ability to access the desktop from anywhere on any device.

How long does Cyber Essentials certification last?
Cyber Essentials

Cyber Essentials certification is valid for one year. After that, organizations must renew their certification to maintain their cybersecurity posture.

How long does Cyber Essentials certification last?
Cyber Essentials

Cyber Essentials certification is valid for one year. After that, organizations must renew their certification to maintain their cybersecurity posture.

How much does Cyber Essentials certification cost?
Cyber Essentials

The cost of Cyber Essentials certification varies depending on the certification level and the certification body. However, the cost typically ranges from a few hundred to a few thousand pounds.

How much does Cyber Essentials certification cost?
Cyber Essentials

The cost of Cyber Essentials certification varies depending on the certification level and the certification body. However, the cost typically ranges from a few hundred to a few thousand pounds.

Is Cyber Essentials certification mandatory?
Cyber Essentials

Cyber Essentials certification is not mandatory, but it is recommended by the UK government and many businesses and organizations as a way to demonstrate their commitment to cybersecurity. Some government contracts also require Cyber Essentials certification.

Is Cyber Essentials certification mandatory?
Cyber Essentials

Cyber Essentials certification is not mandatory, but it is recommended by the UK government and many businesses and organizations as a way to demonstrate their commitment to cybersecurity. Some government contracts also require Cyber Essentials certification.

Is email encryption secure?
Email Security

Email encryption is a secure way to send sensitive information, but it's important to use a reputable encryption service or software and to take steps to protect your encryption key. Also, note that email encryption only secures the contents of the email, not the metadata (e.g., sender and recipient information), which can still be visible.

What are the benefits of Cyber Essentials certification?
Cyber Essentials

Cyber Essentials certification helps businesses demonstrate to their customers and partners that they take cybersecurity seriously. It also helps them identify areas where they can improve their cybersecurity posture and reduce the risk of a cyber attack.

What are the different types of email encryption?
Email Security

There are two main types of email encryption: symmetric encryption and asymmetric encryption. Symmetric encryption uses a single key that is shared between the sender and recipient. Asymmetric encryption uses two keys, one private and one public, to encrypt and decrypt messages.

What are the two levels of Cyber Essentials certification?
Cyber Essentials

There are two levels of Cyber Essentials certification: Cyber Essentials and Cyber Essentials Plus. The Cyber Essentials certification is a self-assessment, while the Cyber Essentials Plus certification requires a more rigorous external assessment.

What are the two levels of Cyber Essentials certification?
Cyber Essentials

There are two levels of Cyber Essentials certification: Cyber Essentials and Cyber Essentials Plus. The Cyber Essentials certification is a self-assessment, while the Cyber Essentials Plus certification requires a more rigorous external assessment.

What happens if there's an issue with my hosted desktop?
Hosted Desktop

If you're supported by us, and you experience an issue with your hosted desktop. you should contact Genmar IT on 0330 445 1234 or go to the customer support portal at Customer Portal Genmar IT. We'll be happy to answer and solve your issue as quick as we can.

What is Cyber Essentials?
Cyber Essentials

Cyber Essentials is a UK government-backed cybersecurity certification scheme designed to help businesses of all sizes protect themselves against common cyber threats.

What kind of software and applications can be used on a hosted desktop?
Hosted Desktop

Most software and applications that can be used on a traditional desktop can also be used on a hosted desktop, including productivity tools like Microsoft Office, as well as industry-specific software. The hosting provider typically offers a variety of pre-installed software options or can help install custom software as needed. Hosted desktops can also be used to run software that is not compatible with certain operating systems or hardware.

Who can apply for Cyber Essentials certification?
Cyber Essentials

Any organization, regardless of size or sector, can apply for Cyber Essentials certification. It is particularly relevant for small and medium-sized enterprises (SMEs) who may not have dedicated cybersecurity resources.

Who can apply for Cyber Essentials certification?
Cyber Essentials

Any organization, regardless of size or sector, can apply for Cyber Essentials certification. It is particularly relevant for small and medium-sized enterprises (SMEs) who may not have dedicated cybersecurity resources.

Why do I need email encryption?
Email Security

Email encryption can be essential if you're sending sensitive or confidential information, such as financial data, personal health information, or trade secrets. Email encryption ensures that your information is kept private and that only the intended recipient can read it.

Book a free consultation

_services

Managed IT Services

Think of us as your tech partner who’s always got your back. Our Managed IT Services keep things running smoothly, prevent problems before they happen, and make sure your tech is working to help your business grow.

Learn more

Security

Cyber threats keeping you up at night? We get it. Our security services are designed to protect your data and keep you safe, so you can focus on growing your business without the constant worry.

Learn more

Hosted Solutions

Need flexibility to scale? Our Hosted Solutions make it easy. From cloud desktops to data management, we help you streamline, save on costs, and stay productive—without missing a beat as you grow.

Learn more

Voice, Data & Hardware

Communication should be easy, right? With our Voice, Data, and Hardware solutions, we make sure your team stays connected and productive. Whether it’s phones, internet, or cables, we’ll set you up for success.

Learn more