top of page

Frequently Asked Questions

  • How does Intology Tech handle returns and refunds?
    At Intology Tech, we value customer satisfaction and strive to provide high-quality products and services. We offer a hassle-free return and refund policy for our products. If you are not satisfied with your purchase, you may return the product within 14 days of receiving it. The product must be in its original condition, unused, and in its original packaging. To initiate a return, you must send an email to our customer support at [email protected], providing your order ID, the reason for the return, and any additional information. We will provide you with a return shipping label and you will be responsible for the shipping cost. Upon receiving the returned product, we will inspect it to ensure that it is in its original condition. If everything checks out, we will issue a refund to your original payment method, minus any shipping and handling fees. The refund may take up to 10 business days to reflect in your account. Please keep in mind that we do not accept returns or refunds for services that have been rendered and that refunds are subject to our discretion. For more information on our return and refund policy, please visit https://www.intology.tech/return-and-refund-policy.
  • Does Intology Tech list products new products, and do they include a manufacturer warranty?
    Yes, Intology Tech offers a wide range of new products, including laptops, desktops, servers, networking equipment, and software. All of our products come with a manufacturer warranty that varies based on the item purchased. We understand the importance of product warranties, which is why our team ensures that each product is eligible for the manufacturer's warranty before listing them for sale on our website. If you have any questions or concerns regarding our products or warranties, please don't hesitate to contact us.
  • What are the most common types of cyber threats?
    The most common types of cyber threats include malware, phishing attacks, ransomware, distributed denial of service (DDoS) attacks, and data breaches. Malware is malicious software that can cause damage to computers and networks. Phishing attacks are online scams that attempt to gain access to sensitive information. Ransomware is malicious software that encrypts data and demands a ransom for its release. DDoS attacks are attempts to make a computer or network unavailable through flooding it with traffic from multiple sources. Data breaches occur when hackers gain unauthorized access to data stored on a system.
  • What is Proofpoint and why is it important?
    Proofpoint is an email security platform that helps protect businesses from cyber threats by proactively filtering out malicious emails and other dangerous content. It does this by scanning inbound and outbound emails for viruses, malware, phishing attacks, and other malicious content and then blocking or quarantining the malicious emails before they can reach their intended recipients. This helps to keep employee accounts, customer data, and other sensitive information secure and protected from malicious actors.
  • What is multi-factor authentication (MFA) and why is it important?
    Multi-factor authentication (MFA) is an authentication method that requires more than one form of evidence to verify a user’s identity. This may include a combination of something you know (like a password or PIN), something you have (like a smartphone or hardware token) or something you are (like a fingerprint or facial recognition). MFA is important because it offers an extra layer of security, making it harder for malicious actors to gain access to your data and systems. At Intology Tech, we recommend using MFA for all of our customers to ensure the highest level of security and protection.
  • What is SentinelOne and why is it important?
    SentinelOne is a revolutionary endpoint security platform powered by artificial intelligence (AI) and machine learning (ML) technologies. It helps protect businesses from the latest cyber threats by detecting, blocking, and responding to malicious activity in real time. With its advanced AI and ML capabilities, SentinelOne is able to detect and respond to threats faster and more accurately than traditional security solutions, making it a critical part of any organisation’s security strategy. Available online: Security | Intology Tech
  • Why is cybersecurity important?
    Cybersecurity is important because it helps protect your business from cyber threats such as data breaches, malware infections, and cyber attacks. Cybersecurity can help ensure the safety and security of your sensitive data, customer information, and business operations. It also helps protect against the financial and reputational damage that can occur when a cyber attack is successful. Investing in cybersecurity is essential for any business that stores, processes, or transmits sensitive data.
  • What is cybersecurity?
    Cybersecurity is the practice of protecting networks, systems, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Cybersecurity is a critical component of any technology-driven organization, as it helps protect valuable data, maintain customer trust, and ensure business continuity.
  • What is EDR in regard to CyberSecurity?
    EDR stands for Endpoint Detection and Response, which is a type of cyber security solution that monitors and proactively identifies malicious activity on an endpoint device. It also provides the tools necessary to respond to threats as they arise. Intology Tech offers a wide range of EDR solutions designed to protect your endpoints from potential cyber threats.
  • What is an Endpoint when it comes to technology?
    An endpoint is a device or network node located at the edge of a network that serves as an access point for users and devices to communicate with a network. Endpoints can include any device that can connect to a network, such as a laptop, tablet, desktop computer, smartphone, or printer. For Intology Tech, our endpoint security solutions protect networks from malicious attacks and unauthorized access.
  • What are the contact details for Intology Tech
    Name of company Intology Tech (TA) Intology Limited Intology Limited (Incorporated on 23 March 2011) Intology AI (TA) Intology Limited Registered office Intology Limited, Queens Court Business Centre, Newport Road, Middlesbrough, TS1 5EH Contacts Details Email: [email protected] Tel: +44(0)1642 040 041 Fax: +44(0)1642 424 948 Business Registration Number Registered private company in England and Wales. Registration number 07574750Companies House Overview (SIC:62020) here VAT No. UK VAT registered business. VAT registration number is GB182712018
  • Who are Intology Technology
    Intology Technology (Tech) are part of the Intology group of companies. Established in 2011. The Intology Group are made up of three companies: Intology Business Consulting (https://intology.co.uk) Intology AI (Artificial Intelligence Automations) (https://intologyai.com) Intology Technology (https://www.intology.tech)
bottom of page