IT Consultation

Let's work out the best solution to solve your IT problems

Scope of Services


Scope of Services
  • Network Security Management
    • Review the system protection facilities in the IT infrastructure
    • Identify the gap between the protection of the existing IT environment and the required IT
    • Suggest the remediation to the existing IT environment and estimate the cost
    • Implement the remediation such as authentication and access control, end-point protection and
  • Risk Assessment and Management (with Risk Base Approach)
    • Identify the risks of the IT system, in terms of confidentiality, integrity and availability
    • Identify the critical operation of the company, and the corresponding protection to the IT system relied
    • Assess the importance of the system and plan the risk handling strategy for most likely system failure occur in the near future
    • Discover the End of Life (EoL) of hardware and software, recommend the upgrade pathway
    • Plan the contingency management, such as Disaster Recovery (DR) and Business Continuity Planning (BCP)
  • Server Virtualisation and Migration
    • Assess the scale of the migration and combine the findings with the requirements of the management, identify appropriate solution
    • Plan the migration
    • Test the migration plan to reduce the downtime and increase the success rate
    • Implement the migration plan
  • Continuity Planning
    • Identify different possible incidents, especially on sudden staff change and system threats
    • Design solutions to overcome different incidents
    • Ensure sufficient documents to support a quick response to implement the solution
    • Drill the solutions regularly to ensure the solutions work
    • Design data backup plan, including the off-site plan, to ensure the endurance of the IT operation
  • ISO and Legal Compliance (IT related parts)
    • Advise on the management of customer and employee data to comply with the Personal Data (Privacy) Ordinance (PDPO)
    • Check the existing IT environment and documentation. Find the gap between the actual environment, the documentation and the ISO requirement
    • Prepare documents on risk management and change management to comply with the ISO requirements
    • Respond to ISO audition
  • Documentation
    • Build and maintain document library to ensure the endurance of the survive of the IT system
    • Ensure sufficient documents to support a quick response if there is an incident
    • Ensure the document control fulfills the ISO requirements
  • Outsource Management
    • Assure the clients receive impartial advice in the clients’ best interests. We are independent from any vender
    • Identify the appropriate technology or solution to the clients
    • Evaluate the service provider, such as ERP Supplier, and negotiate the contract
    • Define the product evaluation strategy
    • Manage the project on behalf of the client
    • Advise on performing the user acceptance test(UAT)

We help...


We help...
  • The owners
    • Enjoy enterprise grade IT services in a budgeted way of the company
    • Ensure the IT systems support the operation of the company confidently without disruption
    • Having the intangible assets (trade secret, know-how, etc.) in their IT systems protected securely
  • The Management
    • No headache on managing the IT system
    • Enjoy professional advice service on different aspect of IT system
    • Ensure the expense on IT, especially those one-off outsourcing project or IT equipment procurement, meet the target return and requirements
    • Have cross-field professional team to give suggestions on different IT related issues, such as the impact of PDPO on storage of personal data and documentation requirements from ISO
  • Fellow Colleagues
    • Use the IT system more smoothly with confidence
    • More prompt response on IT incidents
    • Help them complete their works more efficiently with the help of a reliable IT system
    • Rely on the IT system and service with confidence
  • IT Team
    • Have professionals to support their work
    • Share knowledge with a team which is supporting different clients
    • Enhance their skills during the learning and sharing process
  • Ourselves
    • Broaden our knowledge and skill when we expose to different scenarios
    • Make us fulfilling our mission by helping more SMEs in Hong Kong to enjoy enterprise grade service
    • Help the SMEs better use IT to enhance their business
    • Enhance the business environment of Hong Kong by helping individual SME collectively

Our Approach


Our Approach
  • Enter into Non-disclosure Agreement (NDA)
    • Protect the prospective clients’ know-how and trade-secret
    • Critical for those prospective clients who have inventions going to register patents. Fail to enter a NDA may defeat the validity of a patent
    • Allow the prospective clients more open to discuss their problem, as the discussion is protected by NDA
    • Protect our methods and know-how (* All the following will be protected by NDA)
  • Preliminary Meeting
    • Discuss with the stakeholders on the issues they have concern
    • Provide preliminarily suggestions on handling the issues
    • Confirm the scope of the service
    • Fix time for the next meeting to present the solution
  • Preliminary Proposal / Fee Estimation
    • Consolidate the conclusions in the meeting, and give an outline proposal
    • Provide the estimated fee quote
    • Provide the estimated project time
    • Provide the estimated expense on procurement, if applicable. To avoid conflict of interest, unless the client request, we will not order the equipment for the client
  • Meeting (Proposal Presentation)
    • Present the solution to the clients
    • Answer the questions from the clients
  • Enter the Contract
    • Things are fixed and the project formally started
  • Detailed Working Plan
    • Procurement list (if applicable)
    • Responsible persons
    • Detailed schedule
    • Testing method
    • Implementation
  • Kick-Off
    • Project start formally