Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Software Services
  • Register
The Cost of SPAM (Based on an 8hr Work Day) Small Medium Large
Your Employees
Number of Employees
10
25
50
*
Avg. Employee Salary
$45,000
$60,000
$90,000
$ *

SPAM per Person
 
 
 
 
Amount of SPAM per Day
150   
150
150
Seconds to ID & Delete
5
5
5
Seconds Wasted per Person
750.00
750.00
750.00 
Minutes Wasted per Person
12.50
12.50
12.50

Time Wasted (Entire Company)
 
 
 
 
Minutes Wasted per Day
125.00
312.50
625.00
Minutes Wasted per Week
625.00
1562.50
3125.00
Minutes Wasted per Year
32500.00
81250.00
162500.00
Hours Wasted per Year
541.67
1354.17
2708.33
Days Wasted per Year
67.71
169.27
338.54
Person-Weeks Wasted
13.54
33.85
67.71
Person-Months Wasted
3.19
7.97
15.93

Annual Cost of SPAM to Your Company
$11,948.53
$39,828.43
$119,485.29
 The Hidden Cost of Lost Productivity Staff Finance Sales
Your Employee
 Annual Employee Salary
$45,000
$60,000
$90,000
 Annual Sales Generated by  Employee
$0
$0
$250,000

 Monthly Salary
$3,750
$5,000
 $9,375
 25% Overhead for Benefits, Taxes and Insurance
   $937
$1,250
 $1,875
 Total Monthly Cost
$4,687
$6,250
 $9,375
 Hourly Cost (assuming 75%  productivity)
$36.06
$48.08
 $72.12
 Hourly Revenue Generated by Employee
$0
$0
$160.26
 Total Hourly Value of  Employee
$36.06
$48.08
 $232.38
 Est. Hours of Downtime per Month due to Computers
2
2
2
 Monthly Cost to your Business
$72.12
$96.16
 $464.76
 Useful Lifetime of a PC  (years in service)
3
3
3
 Total Lifetime Hidden Cost per PC
$2,596
$3,462
$16,731

techUnderstanding Automation - How We Leverage Automated Services

The strategic use of automation allows us to protect your business from harm.

Business technology is the bane of the modern worker. No matter how well-intentioned the members of your staff are, when they have computer troubles, it complicates everything they are trying to accomplish. This, in turn, complicates every goal you are trying to accomplish.

The automation of IT service delivery gives you a direct line to a stronger business by streamlining the services that your customers rely on. This is accomplished by removing downtime from the equation, while also securing your data and protecting your infrastructure. Since we only automate repeatable and routine tasks, it makes it so we can provide a comprehensive IT management service for an affordable monthly rate.

Read more ...

ransomwareUnderstanding Ransomware

What You Need to Know About the Malware that Hits Your Data, and Then Your Wallet

Cyber criminals have no shortage of tools at their disposal in their attempts to abuse and take advantage of those they set their sights on. Recently, however, it seems that more and more of them select ransomware as their weapon of choice. Knowing what ransomware is, and how to avoid falling victim to it, is critical to a business’s survival. Fortunately, this particular malware has a few distinct characteristics that make it relatively simple to identify and describe.

Read more ...

putting a lock on a cloud

Understanding Shadow IT

Unauthorized software can be a major pain for network administrators.

When a business sets out to add to their IT, they often choose the solutions based on their immediate needs. This is because when trying to look to the future an organization cannot know what obstacles will pop up. For this reason your organization’s IT department, whether you have in-house IT technicians or you utilize managed IT services from Capstone Works, has to be the ones that handle the implementation and management of your crucial IT.

Read more ...

clicking on a person

Understanding Your Virtual Identity

Protect yourself from online identity thieves.

We often talk about threats to business infrastructures, but the point stands that these same threats make advances on individuals as well. If enough personally identifiable information is stolen, a hacker could completely lift the identity of a user to take out loans, hijack credit card numbers, and even infiltrate social media accounts to further spread their influence. The result could be a ruined credit score and a damaged reputation--a major problem for anyone, not just the business owner.

Read more ...

the modern office

The Design of the Modern Office

Building a more productive business through innovative technology.

Capstone Works is your Central Texas leader for comprehensive managed IT services, that much is clear. You may not be aware, however, that our vast knowledge of information systems can be leveraged to help you build the office of your dreams. If you are searching for hi-tech solutions for your most pressing business problems look no further. We can design, implement, and support some of today’s most dynamic technologies.

Read more ...

clipboard and laptopUnderstand what threats are in store for your business.

The Internet can be a dangerous place, especially now that hackers are taking advantage of advanced tools and threats.

New types of malware, ransomware, and viruses are being created every day, for the express purpose of seeing your organization fail. If your business isn’t using comprehensive security solutions, you remain vulnerable to threats that can potentially compromise and damage your business’ IT infrastructure.

Read more ...

Windows 10 logoUnderstanding Windows 10 - Bringing Value to Business

The latest Windows operating system for your IT infrastructure.

Microsoft’s latest version of the Windows operating system, Windows 10, is a great new tool that businesses can leverage for greater productivity. However, Windows 10 is far more than just an upgrade to previous versions of the Windows operating system. In fact, Microsoft’s new OS improves significantly in areas where Windows 8 and 8.1 failed to produce the engagement Microsoft was expecting.

Read more ...

a cycle

A Well-Structured Continuity Plan Can Save Your Business

When the sky is falling on your business, can you make it through the storm?

For the average business owner, business continuity is looked upon as a secondary system that is put in place to protect the investments the business has made. Since the platform doesn’t have much to do with a business’ day-to-day operations, often times some aspects of a business’ continuity strategy is overlooked; a major mistake that the business owner will realize when it is suddenly too late.

Read more ...

Windows 10

Introducing Windows 10

Prepare to upgrade today.

As business professionals, it’s imperative that you keep your organization's technology up to date with the latest operating systems and software patches, as lapses of network security can be devastating. Microsoft is releasing its next operating system, Windows 10, on July 29th, 2015. To entice users to upgrade to their new offering, Microsoft is offering a free upgrade to those who currently use Windows 7 and Windows 8.1.

Read more ...

Windows Server 2003

Windows Server 2003: End of Support Date Rapidly Approaching

Is your business prepared?

Like all good things, Windows Server 2003 is coming to an end. The popular server operating system from Microsoft’s end-of-support date is July 14, 2015. If you are surprised by how rapidly that date is approaching, that’s because altering a server is a detailed process. We urge your business to seriously consider the ramifications of waiting until the last minute to upgrade.

Read more ...

internet of things

Understanding the Internet of Things

Is your business ready for it?

As technology grows more potent, Internet-connectivity is becoming a more common occurrence amongst consumer goods. According to Statista, we should expect to see just over 29.4 billion IoT devices in use around the world by 2030, with smartphones, IT infrastructure, and asset tracking all serving as major contributors to the number of devices out there. It might be difficult to adjust to such a huge technological shift, but as an IT service provider, it’s our job to inform you how your business can best approach this incredible change in the online community.

Read more ...

security for technology

Understanding Network Security

Maximizing Your Business’ Security

Businesses are often so concerned with their day-to-day operations that they forget to invest heavily in network security. Others understand the need for comprehensive network security, but have a lenient strategy in regards to their IT, which can be just as detrimental in the event of a data leak.

Read more ...

mathematics symbolsFor accountants that deal with publicly owned companies, ensuring your IT infrastructure is SOX-complaint is a must.

Read more ...


Bring Your Own Device

Mobile Strategies: Bring Your Own Device

The proliferation of security measures in response to the introduction of outside device access of your organization’s network is paramount for thorough network security.

In a world where seemingly everyone has a device that they bring everywhere, how can you make this trend work for your business while keeping your IT infrastructure from being infiltrated by malicious entities? By instituting a conscientious and thorough Bring Your Own Device (BYOD) strategy, your company can make your staff’s devices work for your company.

Read more ...

credit card security

Secure Credit Card Transactions

Capstone Works provides solutions for companies searching for a secure interface in which to transfer sensitive information.

Does your business accept credit cards? Do you need it to? In order to open your Central Texas area small business up to the enhanced profit potential that accepting credit cards can provide, you'll need to understand what responsibilities you take on by accepting these forms of payment. Small businesses are prime targets for data plunderers. If you don't protect against these thieves, you may be subject to paying restitution, fines, or lose the ability to accept cards as payment.

Read more ...

HIPAA-Compliant Data Systems

stethoscope

Laws for the secure and private transfer of individual's medical information.

The nearly instantaneous flow of information is a defining variable of the information age. Many leading companies have established a benchmark of implementing flexible and effective new technologies into their business plan, and just now many small businesses have been able to get out ahead of this trend and implement their own solutions. While it's true some companies can use this technology better than others, in regards to healthcare information, the seamless flow of information can literally be the difference between life and death.

Read more ...

Security Concerns Can Derail Your Business

Windows End of Life April 8 2014

To ensure your data and user identities are secure, upgrading immediately makes sense.

Microsoft has announced that as of April 8, 2014 support will no longer be available for for their popular Operating System, Windows XP. The world's biggest software manufacturer has supported the software for 12 years, even though they have released three major OS's since; Vista, Windows 7, and Windows 8.1. Users that are still using XP will want to upgrade their workstations to one of the newer versions as soon as they can to avoid the many detrimental circumstances that are often associated with running non-supported legacy software.

Read more ...

The Definition of Cloud Computing

cloud computing

Free yourself from traditional IT with Cloud Services

Cloud computing is managed, shared applications, development platforms, or computing infrastructure accessible via the internet. It provides options such as bandwidth and on-demand computing power with flexible capabilities normally purchased as a metered service.

Read more ...

Software Services Questions?

  • Fill out form below with your questions and our team will respond promptly!
  • First Name *
  • Last Name *
  • Company Name *
  • Phone *
  • Questions

      Free IT Whitepaper

      Free IT Whitepaper

      This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

      Download!   Need A Consultation?

      Latest News & Events

      Capstone Works is proud to announce the launch of our new website at https://www.capstoneworks.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

      Contact Us

      Learn more about what Capstone Works can do for your business.

      Call Us Today
      Call us today
      (512) 882-2242

      715 Discovery Blvd
      Suite 511

      Cedar Park, Texas 78613