Frequently Asked Questions

Please pick a subject area below:

Established in 2007, Probado serves as an IT and Telephony Managed Services Provider. As a people-centric organisation, we deliver all primary services internally. When specialist expertise is required, we collaborate with carefully selected partners. Our goal is to establish strong client relationships by consistently delivering high-quality service founded on mutual respect and benefit.

The business offers services such as IT support, Hosting, Networking, IT Security, Cloud Solutions, Telephony and Cyber Training. Our flexible solutions deliver for a diverse range of sectors like manufacturing, business and commerce, law and the charities space.

Our core values build trust with partners by keeping clients and suppliers central, strengthening relationships based on respect. This leads to greater client satisfaction and attracts talented professionals.

Honesty – ensures transparency so clients trust our services.
Integrity – fosters ethical practices and reliability.
Knowledge – supports effective solutions in a fast-changing tech world.
Excellence – commits us to high-quality service that meets client needs.

Our credibility is built on years of experience, proven project success and strong client testimonials. We prioritise reliability, follow industry standards and focus on lasting relationships through open communication, understanding client needs and adapting our services to exceed client expectations.

Yes, various case studies are available that highlight successful collaborations with clients across multiple sectors. These illustrate the impact of tailored IT solutions and the results achieved. View our Case Studies and Testimonial pages for reference.

The process includes a comprehensive assessment of your IT environment, enabling the design of a tailored plan that effectively addresses specific challenges and goals. Transparency is vital in the pricing structure, with detailed quotes provided to ensure clients understand the costs associated with various services, helping to avoid unexpected fees.

Services can be customised to fit individual client requirements. Whether seeking specific IT support or a comprehensive package, the business can adapt its services to align with client goals.

Our team delivers consistently high standards of service both personally and professionally, with a commitment to surpassing customer expectations. Staff regularly provide on-site or remote support and proactively align their efforts with clients’ needs and schedules.

Our dedicated Helpdesk and routine system maintenance provide ongoing support for our clients. Continuous monitoring ensures smooth operations and prompt issue resolution. The Helpdesk assists with technical questions by phone and email for timely support. To contact us:

Telephone 01484 905103 or Email help@probado.co.uk

Our staff places a high value on continuous professional development. By attending training sessions, industry events and online training, our team members maintain up-to-date expertise in emerging technologies and best practices.

Robust IT security measures are implemented that follow industry best practices. Through continuous monitoring of potential threats and regular updates to security protocols ensure that client data remains protected.

We welcome client feedback through direct communication and short surveys. This information is valuable for us in identifying areas of improvement and ensuring that services align with client expectations. To get in touch with any feedback, please telephone our Director Gordon Maclean on 01484 905103 or Email gordon@probado.co.uk

IT security refers to the protection of systems, networks and data from cyber threats. It is essential for safeguarding sensitive organisational information, preventing data breaches and ensuring the continuity of operations.

A managed IT Security service provides continuous monitoring, systematic updates and timely responses to new threats. By alleviating the demands on in-house resources, it enables organisations to concentrate on their core operations while maintaining robust system protection.

Network security is a series of strategies and tools used to protect network infrastructure from unauthorised access and potential attacks. Common defences include firewalls, intrusion detection and prevention systems (IDS/IPS), and secure communication protocols.

To protect against harmful online activity, secure browsing practices are used together with firewalls, secure DNS, VPNs, and web filtering. These measures help ensure that employees visit only safe and trusted websites.

Endpoint security protects devices such as computers, laptops, and mobile phones from cyber threats. Antivirus software, device encryption, and mobile device management (MDM) are deployed to secure all endpoints.

Cloud security involves safeguarding data and applications hosted on cloud platforms through comprehensive measures. Techniques such as encryption, implementation of access control policies, multi-factor authentication (MFA), and routine security audits are employed to maintain the integrity and confidentiality of cloud environments.

Cyber Essentials is a government-endorsed certification designed to verify that fundamental cybersecurity controls are established within an organisation. Cyber Essentials Plus entails a more comprehensive level of assessment through detailed testing procedures. Achieving certification not only enhances an organisation’s security posture but also signifies a strong commitment to protecting sensitive information.

Firewalls serve as critical security mechanisms that separate an organisation’s network from potential external threats. Both hardware and software firewalls are systematically configured to block malicious traffic and safeguard the network and systems from unauthorised access.

Anti-malware software protects against malicious software, such as viruses, ransomware, and spyware. Anti-malware solutions are installed and regularly updated to detect, block, and remove threats from systems.

Anti-spyware solutions are utilised to identify and eliminate spyware, which monitors user behaviour and compromises sensitive data. Maintaining the operation of these tools across all devices is essential to safeguard privacy and prevent data breaches.

Encryption converts information into a format that cannot be read without a specific key. It is used to protect both stored data and data being sent, helping keep confidential details safe.

To comply with GDPR requirements, comprehensive data protection policies such as data encryption, access controls, and secure storage solutions are put in place. These measures ensure that personal data is handled safely and help organisations avoid penalties.

Tools like Security Information and Event Management (SIEM) systems allow organisations to spot suspicious activity and react to cyber threats instantly. By acting early, they can stop security breaches before any harm is done.

Multi-factor authentication (MFA) asks users to verify their identity using at least two types of credentials, such as a password paired with a fingerprint scan. By introducing this extra step, MFA strengthens security and helps prevent unauthorised access to systems.

Email filtering solutions are implemented to prevent the delivery of malicious messages, while employees receive training to identify phishing attempts. Additionally, security systems monitor for suspicious links and attachments within emails, ensuring they do not reach recipients.

Incident response plans have been established to provide immediate containment, investigation, and resolution of security breaches. The recovery process prioritises rapid system restoration, reducing downtime and implementing improvements based on lessons learned to prevent future attacks.

A variety of networking solutions are offered, such as local area networks (LAN), wide area networks (WAN), wireless networks (Wi-Fi) and hybrid systems. Each network is customised to meet the specific requirements and scale of your organisation.

An organisation’s device needs; office size, remote connectivity and data security are evaluated first. Following this evaluation, a recommendation is made regarding the most appropriate type of network – whether LAN, WAN or cloud-based.

The installation process involves a site survey, network design, equipment procurement and physical setup. Configuration is completed efficiently to minimise disruption and ensure optimal performance.

The cost depends on factors such as network size, the type of hardware required, and the level of security. A tailored quote is provided after understanding the specific needs and budget.

Installation time varies with network complexity but typically ranges from a few days to about a week. Thorough planning minimises downtime and ensures a smooth transition.

The current network can be evaluated, with upgrade suggestions like boosting speed, adding equipment, or increasing security. The improved network will enhance reliability and scalability, enabling smoother operations and better communication and productivity across teams.

A range of security measures are in place, such as firewalls, VPNs, intrusion detection systems and secure access controls. The network is also protected through ongoing vulnerability assessments and timely updates to defend against new threats.

The network is capable of integration with cloud-based applications and services, including file storage, communication platforms and business software. Such integration optimises workflows and improves scalability for your organisation.

A range of secure, high-speed Wi-Fi options are offered, such as mesh networks designed for expansive areas, access point installations and Wi-Fi 6 technology for enhanced performance. These designs focus on providing superior coverage, robust speeds and strong security.

Employees can safely access the network from anywhere using secure remote solutions like VPNs. In addition, remote IT support is offered to quickly address and solve any technical problems that arise.

Trusted Internet Service Providers (ISPs) deliver reliable, high-speed internet connectivity. To maintain continuous network availability in the event of connectivity disruptions, redundancy measures such as dual internet providers may be implemented.

Please report any connectivity or downtime to the helpdesk so they can assist you in resolving any issues. In the event of downtime, the team responds quickly to restore services, whether it’s a hardware issue, software failure, or external connectivity problem.

Managed network services include proactive monitoring, routine updates and effective troubleshooting. To keep your network operating seamlessly, helpdesk support is ready to swiftly address any concerns. You can reach the helpdesk by phone or email.

The network follows all necessary regulations, including GDPR, ISO 27001, and PCI-DSS. Data security, privacy, and network access controls are maintained through industry best practices to safeguard sensitive information.

Network monitoring tools help you keep an eye on important metrics like bandwidth use, device status, and network security. You also receive regular reports on performance, along with suggestions for making improvements.

Networks are safeguarded with features like firewalls, encryption, anti-malware software, and intrusion detection systems. Frequent security audits and penetration tests help pinpoint and fix weaknesses before they pose a threat.

Secure cloud hosting, dedicated servers, and hybrid hosting solutions are offered. Each service is purposefully engineered to safeguard sensitive business data and maintain compliance with key industry standards, including GDPR.

The system uses advanced security measures such as end-to-end encryption, firewalls, multi-factor authentication, and around-the-clock monitoring. Regular security audits are performed to keep data safe from cyber threats.

The hosting services comply completely with GDPR standards, applying robust access controls, limiting data collection, conducting frequent audits, and using encryption to keep personal information secure according to GDPR requirements.

A comprehensive migration service is offered, featuring pre-migration evaluations, encrypted data transfers, and robust backup solutions. The process is designed to safeguard all data with minimal operational disruption, maintaining security at every stage.

Hosting infrastructure is continuously monitored with advanced IDS, vulnerability scanners and real-time alerts to address security threats. Regular penetration tests and audits further strengthen security.

Regular automated backups are created and kept in multiple secure locations. All backup data is encrypted during transfer and storage, protecting its integrity and making sure it’s available if a system fails or a disaster occurs.

Hosting is set up for high availability with backup infrastructure and automatic failover to maintain operations. Service Level Agreements (SLAs) guarantee at least 99.9% uptime, ensuring that data always stays accessible.

The hosting solutions scale easily, allowing storage, bandwidth, and processing power to grow with your business needs without disruption.

Hosting costs vary depending on things like how much storage you need, what kind of security is required, the size of the infrastructure, and whether you choose cloud, dedicated, or hybrid services. Businesses receive tailored quotes based on their individual needs.

Redundancy measures like UPS backups and multiple internet connections help prevent service interruptions. Disaster recovery solutions enable rapid restoration after failures.

Remote access is secured with VPNs and encryption whilst multi-factor authentication is mandatory for accessing sensitive data remotely.

Secure access is available from various devices and locations, using encrypted connections and secure login methods such as multi-factor authentication. The solutions are built to support remote work while maintaining data security and compliance.

A range of security measures is used, such as firewalls, intrusion prevention systems (IPS), anti-malware tools, encryption, and DDoS protection. Real-time monitoring systems actively identify and address threats, allowing for quick responses to potential attacks.

All sensitive data is protected using AES-256 encryption, an internationally recognised standard, both at rest and during transmission. This approach ensures the security of all data stored or transmitted within the hosting environment.

Disaster recovery and business continuity plans are established, with failover systems in place and regular recovery drills to ensure rapid data restoration after breaches or failures.

You can reach helpdesk support by phone or email if you have any issues with hosting. Our technical support team is dedicated to resolving problems swiftly and effectively. In addition, we proactively monitor systems to spot and fix issues before they affect your services.

Voice over IP (VoIP) systems provide organisations with flexible and cost-effective communication options. They are especially useful for organisations aiming to simplify communications and enable remote work.

The cost of installation depends on factors such as office size, the selected system, and any custom requirements. After a site survey to determine your exact needs, you’ll receive a customised quote with full transparency and no unexpected fees.

The setup period generally spans several days to one week, varying according to the system’s scale and complexity. Installation is conducted with minimal disruption, covering all phases from hardware configuration to comprehensive user training.

Yes, new telephony systems are engineered to integrate efficiently with established IT infrastructure, encompassing email platforms, CRM solutions, and collaboration tools such as Microsoft Teams.

Staff induction training is provided on office handset use, voicemail, call forwarding, and advanced features, with support available during the transition.

Robust security protocols are in place, incorporating encrypted calls, secure SIP trunking, and firewalls to safeguard against eavesdropping, fraud, and various cyber threats. In addition, regular system updates are conducted to ensure ongoing protection.

Number porting services are offered, so you can keep your current phone numbers when switching to the new telephony system. This helps maintain uninterrupted business communications.

A VoIP system uses the internet to make calls, offering flexibility and cost savings. A traditional phone system is an on-premises phone system. This is better suited to larger businesses with specific needs. Advice can be provided to help determine the most suitable option.

It is advisable to equip VoIP systems with a backup power source like an uninterruptible power supply, as well as redundant internet connections to maintain service. Failover solutions are also available to help ensure uninterrupted operation during outages. For additional assistance, please reach out to the helpdesk.

We offer proactive maintenance and helpdesk support, with ongoing system monitoring to detect potential issues. Updates are provided promptly, and emergency assistance is available whenever problems occur.

These systems are designed to be scalable, so you can easily add or remove handsets or extensions as your business evolves, without needing major changes or incurring significant extra costs.

VoIP allows offices in different locations to stay connected using the internet. Staff can place or take calls from anywhere, which supports flexibility and keeps the phone system unified.

A cloud-based telephony system keeps phone services and data offsite, making it easy to scale, access remotely, and adjust as needed. This approach works well for businesses with remote teams or those aiming to minimise hardware on site.

VoIP systems offer greater savings, adaptability, and scalability. By routing calls through the internet, they lower expenses and can seamlessly connect with remote work setups, video conferencing, instant messaging, and various other digital tools.

The system blocks unwanted calls and restricts international or premium-rate calls. You can also set up call screening and forwarding rules to manage incoming calls.

Our helpdesk support handles troubleshooting and repairs. When a problem arises, it can be resolved remotely or by dispatching a technician to fix the issue promptly at your location.

IT security refers to the protection of systems, networks and data from cyber threats. It is essential for safeguarding sensitive organisational information, preventing data breaches and ensuring the continuity of operations.

A managed IT Security service provides continuous monitoring, systematic updates and timely responses to new threats. By alleviating the demands on in-house resources, it enables organisations to concentrate on their core operations while maintaining robust system protection.

Network security is a series of strategies and tools used to protect network infrastructure from unauthorised access and potential attacks. Common defences include firewalls, intrusion detection and prevention systems (IDS/IPS), and secure communication protocols.

To protect against harmful online activity, secure browsing practices are used together with firewalls, secure DNS, VPNs, and web filtering. These measures help ensure that employees visit only safe and trusted websites.

Endpoint security protects devices such as computers, laptops, and mobile phones from cyber threats. Antivirus software, device encryption, and mobile device management (MDM) are deployed to secure all endpoints.

Cloud security involves safeguarding data and applications hosted on cloud platforms through comprehensive measures. Techniques such as encryption, implementation of access control policies, multi-factor authentication (MFA), and routine security audits are employed to maintain the integrity and confidentiality of cloud environments.

Cyber Essentials is a government-endorsed certification designed to verify that fundamental cybersecurity controls are established within an organisation. Cyber Essentials Plus entails a more comprehensive level of assessment through detailed testing procedures. Achieving certification not only enhances an organisation’s security posture but also signifies a strong commitment to protecting sensitive information.

Firewalls serve as critical security mechanisms that separate an organisation’s network from potential external threats. Both hardware and software firewalls are systematically configured to block malicious traffic and safeguard the network and systems from unauthorised access.

Anti-malware software protects against malicious software, such as viruses, ransomware, and spyware. Anti-malware solutions are installed and regularly updated to detect, block, and remove threats from systems.

Anti-spyware solutions are utilised to identify and eliminate spyware, which monitors user behaviour and compromises sensitive data. Maintaining the operation of these tools across all devices is essential to safeguard privacy and prevent data breaches.

Encryption converts information into a format that cannot be read without a specific key. It is used to protect both stored data and data being sent, helping keep confidential details safe.

To comply with GDPR requirements, comprehensive data protection policies such as data encryption, access controls, and secure storage solutions are put in place. These measures ensure that personal data is handled safely and help organisations avoid penalties.

Tools like Security Information and Event Management (SIEM) systems allow organisations to spot suspicious activity and react to cyber threats instantly. By acting early, they can stop security breaches before any harm is done.

Multi-factor authentication (MFA) asks users to verify their identity using at least two types of credentials, such as a password paired with a fingerprint scan. By introducing this extra step, MFA strengthens security and helps prevent unauthorised access to systems.

Email filtering solutions are implemented to prevent the delivery of malicious messages, while employees receive training to identify phishing attempts. Additionally, security systems monitor for suspicious links and attachments within emails, ensuring they do not reach recipients.

Incident response plans have been established to provide immediate containment, investigation, and resolution of security breaches. The recovery process prioritises rapid system restoration, reducing downtime and implementing improvements based on lessons learned to prevent future attacks.

Microsoft 365 is a subscription-based suite of productivity tools that includes Word, Excel, PowerPoint, Outlook, Teams, and OneDrive. It enables organisations to collaborate, communicate, and store data securely in the cloud. The software helps improve productivity by allowing employees to work from anywhere, on any device, and ensures that data is always backed up and up to date.

Microsoft 365 integrates seamlessly with both Windows and macOS environments. It supports a range of other software and applications, enabling smooth collaboration across platforms. Data and files stored in the cloud can be accessed securely from any location, making it easy for teams to work together no matter where they are based.

Microsoft 365 is suitable for organisations of all sizes. It is especially beneficial for organisations that need remote working capabilities, secure file storage and easy collaboration tools. Any organisation looking to increase productivity and improve team communication can benefit from Microsoft 365.

Acronis Backup is a powerful solution for safeguarding your data. It provides cloud and on-premises backup for servers, workstations, and mobile devices. Acronis ensures that your organisation’s data is protected from ransomware, system failures, and accidental loss. With automatic backup schedules, organisations can recover lost data quickly and minimise downtime.

Acronis uses military-grade encryption for both data in transit and at rest. It also includes active protection from ransomware and has advanced disaster recovery features. Regular updates and security patches help ensure the software remains resilient against new cyber threats.

Yes, Acronis Backup allows organisations to restore files from specific dates or times. It supports granular recovery, meaning you can recover individual files or full system restores, depending on your needs. This flexibility is crucial in situations where only part of the data needs to be restored.

Lunar Digital provides reliable, secure, and scalable hosting solutions tailored to businesses and organisations. Their fully managed hosting service includes fast cloud hosting, domain management, and high-performance applications. Focused on security, speed and uptime, their services ensure organisations can scale efficiently as their digital presence grows, offering peace of mind for companies relying on their infrastructure.

Microsoft Azure is a cloud computing service that provides organisations with scalable infrastructure, including virtual machines, storage and networking capabilities. It allows organisations to run applications, host websites and store data in a secure, flexible environment without the need for costly on-site servers.

Microsoft Azure offers flexibility, scalability, and cost-efficiency, as organisations only pay for what they use. It also provides high levels of security, compliance and redundancy. Azure’s global data centre presence ensures low-latency access to applications, enhancing performance for users around the world.

Yes, Microsoft Azure is ideal for organisations with limited IT resources, as it offers managed services that reduce the need for in-house IT expertise. Azure’s easy-to-use interface, alongside 24/7 support, makes it a good option for organisation that require robust hosting solutions but do not have a large IT department.

Cyber Essentials is a UK government-backed cybersecurity certification that demonstrates your organisation is taking basic steps to protect against cyber threats. It covers areas such as firewalls, secure configuration, user access control, malware protection and patch management.

Cyber Essentials is the entry-level certification that focuses on self-assessment and basic security measures. Cyber Essentials Plus includes a more in-depth assessment, with an independent test to verify that the security controls are working effectively. Cyber Essentials Plus offers a higher level of assurance to clients and stakeholders.

Achieving Cyber Essentials certification involves completing an online self-assessment questionnaire that covers basic security controls. The process can typically be completed within a few hours, and once submitted, a certification body will review your answers and award the certification if your organisation meets the required standards.

Achieving Cyber Essentials or Cyber Essentials Plus shows clients, partners, and stakeholders that your organisation is committed to protecting its digital assets and maintaining a secure IT environment. Certification can enhance your reputation and demonstrate your commitment to maintaining high security standards, especially in industries that handle sensitive data.

Bigger Brains provides interactive and engaging eLearning solutions to help organisations upskill their employees. The tools are designed to deliver training on a range of topics, from organisational skills to cybersecurity awareness, all at the user’s pace. The platform also supports compliance and certification needs.

CyberSmart eLearning provides organisations with comprehensive training on cybersecurity best practices. The platform covers key areas such as password management, phishing awareness, data protection, and how to identify and respond to cyber threats. This helps ensure employees understand their role in keeping company data secure.

There are many types of cybersecurity training, such as GDPR compliance, password management, recognising phishing attempts, ensuring email security, preventing social engineering attacks and safely using remote work tools like Microsoft Teams and VPNs.

GDPR training educates employees about their duties in protecting personal data, which helps the business comply with legal standards. This not only lowers the chance of data breaches but also supports ongoing GDPR compliance within the organisation.

Data protection training covers fundamental concepts including data encryption, secure data management, privacy rights, and breach notification. Through this training, employees acquire the competencies required to effectively identify potential risks and manage sensitive information in a secure manner.

Password management training covers best practices such as using strong, unique passwords, avoiding password reuse, and the importance of password managers for secure storage. Multi-factor authentication (MFA) is also included to enhance security.

Authentication training instructs employees on secure authentication practices, such as multi-factor authentication (MFA) and safe login procedures. These skills help safeguard sensitive information and systems from unauthorised access.

Email security training teaches employees how to spot suspicious emails, steer clear of scams and use encryption when sending sensitive information. It also instructs on safely managing attachments and links to reduce the risk of malware.

Phishing awareness training helps employees recognise phishing attempts and avoid falling victim to scams. This includes identifying deceptive emails, links, and attachments designed to steal personal information or install malware.

Training covers typical social engineering methods like pretexting, baiting, and tailgating. Staff members are taught how to identify these techniques and use approaches to prevent being tricked or deceived.

Cyber threat training helps staff stay informed about current dangers like ransomware, phishing, and malware. It teaches employees how to spot these threats and take the right steps to safeguard company data and systems.

Employees receive training on how to safely use remote work tools, such as Microsoft Teams and VPNs. The training covers topics like secure ways to log in, establishing protected connections, handling sensitive data during online meetings and sharing files securely.

Bigger Brains is an eLearning platform offering an extensive range of interactive, self-paced courses suitable for employees at all skill levels. Its Cyber Security curriculum covers essential topics such as password security, phishing awareness and secure remote work practices, providing adaptable and effective learning solutions that enhance both knowledge and employee engagement.

Employees can participate in interactive group workshops that cover important cyber security topics using discussions, case studies, and practical exercises. These workshops promote teamwork and strengthen understanding by allowing participants to learn together.

Virtual coaching sessions are available for more personalised learning. These sessions allow employees to discuss specific cyber security concerns, ask questions and receive expert guidance in a one-on-one or small group setting.

Helpdesk support provides ongoing assistance to employees after they complete their cyber security training. Whether it’s troubleshooting secure systems, assisting with phishing alerts, or offering advice on best practices, support is always available.

It’s advisable for employees to receive continuous training so they remain aware of new cyber threats. Holding annual refresher courses alongside workshops helps the team stay alert and knowledgeable.

Cyber security scenarios are evaluated through assessments and simulations to measure how well employees understand and respond to potential threats. Regular feedback is given and progress is monitored over time, to help ensure the team is prepared for any risks that may arise.

Probado offers an excellent workplace by prioritising both employee development and technological advancement. Here, you’ll experience a supportive atmosphere, engaging work, chances to enhance your skills, and a culture built on collaboration, trust, and ongoing improvement.

Our office is located at Globe Mill in Slaithwaite, Huddersfield, combines historic character with a contemporary working environment. The location features excellent rail and bus connections, private parking for staff and is conveniently close to local shops, cafés and is set in the scenic Colne Valley countryside.

To apply for open roles, simply go to our Careers page and check out listed job openings. Submit your CV with a brief cover statement. Our hiring process aims to be transparent and fair, ensuring we learn about both your abilities and future potential.

The process typically includes an initial application review, an interview (or interviews) and, depending on the role, a technical discussion or tasks. We aim to keep the process straightforward, transparent and respectful of your time.

We seek IT professionals with skills relevant to the role, such as networking, hosting, cloud technologies, telephony, data and security, along with an understanding of current IT practices. Equally important are adaptability, problem-solving abilities, and a willingness to learn in a rapidly evolving field.

Probado welcomes professionals at all career levels. If you’re just beginning your IT career or already have years of experience, we seek talented individuals who are passionate about technology and align with our values.

We’re a welcoming, supportive and collaborative team. Our culture puts people first, values every contribution, and encourages everyone to ask questions, share ideas, and grow with guidance from both colleagues and leaders.

We encourage growth by offering on-the-job learning, mentoring, sharing knowledge, and chances to develop new skills. Our commitment to our people is central to achieving lasting success.

Probado offers flexible working arrangements to fit both the business’s requirements and the employee. Roles allow for home or hybrid working, letting team members split their time between remote work and being in the office.

Probado offers competitive salaries that reflect skills and experience, along with a strong benefits package. This includes reasonable holiday allowances and additional perks designed to support wellbeing and work-life balance. See our Careers page for further information.

Yes, as a growing IT business, we are always looking for the best talent. Even if there isn’t a current vacancy that matches your skills, we’re always happy to hear from motivated individuals interested in joining Probado.

What sets Probado apart is our combination of technical excellence and genuine commitment to our people. We focus on building long-term careers, rather than simply filling roles. We’re committed to making our workplace a place where employees are happy to come in and take pride in their work.

Contact the Probado Helpdesk via phone or email to log your request. For a quicker resolution, include:

  • Company name and contact info
  • Brief issue or request description
  • Relevant error messages or affected systems
  • Level of urgency or business impact

Clear details help us prioritise and handle your enquiry quickly.

The Helpdesk is available from 9am to 5pm, Monday to Friday (except on UK bank holidays).

If you have an issue outside these hours, email the Helpdesk; your request will be logged and handled when they reopen. Out-of-hours support depends on your service agreement with Probado.

The Helpdesk handles issues and enquiries for Probado’s seven main service areas:
IT Servicing    Networking    Hosting    Telephony    IT Security    Cloud IT    Cyber Training

Support includes fault reporting, technical issues, service changes, account set up, advice, upgrades and general guidance for Probado-managed services.

Probado’s Helpdesk is staffed by highly skilled IT professionals with extensive experience across all supported service areas. The team receives ongoing training to ensure they stay up to date with the latest technologies, security practices, and industry standards.

Their friendly, courteous and professional approach ensures you receive both expert support and clear communication.

All enquiries are handled using a modern call and ticket management system. This system:

  • Logs every request
  • Track progress from start to resolution
  • Prioritises urgent and critical issues
  • Ensures accountability and clear communication

You will be kept informed of updates via phone or email, depending on your preference and the nature of the issue.

Yes, Helpdesk handlers give clear, step-by-step instructions and may provide secure remote support for fast issue resolution. They focus on solving problems and helping you understand and prevent them in the future.

All calls are taken from our Huddersfield office in the UK. While support is delivered remotely via phone and email, all Helpdesk activity follows strict data protection and security best practices.

Your information is handled confidentially, in line with IT security standards and Probado’s commitment to protecting client data.