Cloud Strategy Development

Ensure business success by linking your cloud strategy to your overall business strategy. We'll support you in assessing you cloud readiness, defining the ideal cloud application portfolio, and planning on how to achieve your goals as efficiently and effectively as possible.


Making the right decisions when designing your cloud infrastructure is crucial in ensuring the success and financial viability of your cloud. We'll help you choosing the right cloud type, selecting the appropriate vendor / provider, designing your infrastructure and services as well as ensuring that you infrastructure and data is secure.


Migrating business-critical data and applications into the cloud poses a number of challenges. We'll support you in planning your migration process, from preliminary testing to final go live, and if required also provide hands-on technical support  during the actual migration.


Get the maximum benefits from your cloud migration by adopting best practices. We'll support and train your technical staff in setting up best practice procedures for monitoring and maintaining your cloud healthy. Additionally, we will be able to assist you in increasing the efficiency of your IT operations by assisting in the automation of routine administrative tasks.



Ransomware such as Cryptolocker and Gameover-Zeus is steadily becoming more widespread and effectively infecting corporate users’ computers. In order to help mitigate infections read through the following common practices:

1)    Ensure that Windows updates are installed when shutting down your computer. (Avoid shutting down without installing restarts; Microsoft releases Windows updates on the second Tuesday of each month, plan ahead and allow 15-20 minutes of install time if there are more than 10 updates available)

2)    Perform proper security maintenance by regularly checking whether your PC’s Windows updates are up to date, Windows Firewall is turned on and Anti-virus is enabled and updated with the latest definitions.

3)    Manage passwords effectively by using an online or local password manager with one secure master password that is changed regularly; never use the same password for multiple sites to avoid disclosure when sites are breached.

4)    Avoid clicking on suspicious links in email; don’t rely on hovering over any suspicious links either as legitimate URLs can also be spoofed to infect your computer with malware. The email method is the single most common attack vector so always pay attention to which URL / link you’re clicking on. 

5)    If you realise that your computer is infected with ransomware (screen popups, wallpaper changes etc.) disconnect its network cable / disable Wi-Fi and switch off your computer immediately and contact AddOne Support to start the troubleshooting process. Disabling network connectivity will prevent the infection from further encrypting files and folders on the network file server which is one of the attacks performed by common ransomware.

For further reading, go through the following links containing information and tips on security tools , password managers and online best practices.