Steve has been in business since 1999, assisting people across the Downtown Core with IT issues. His patience and knowledge are focused on assisting only a few clients at a time to make sure that your service is high quality, friendly, and professional. Proficient in all areas of networking, security, software, data recovery and hardware for residential and small office clients Steve is always available for a quick 5-10min conversation to help you troubleshoot over the phone too. Steve has also been commended with a computer upgrading/servicing/repairing teaching position for the Toronto School Board and would love to share his knowledge in solving your IT problems. Call Steve today and book an appointment...
When my computer died I scanned and found the hard drive was not detected. I wanted to get my data out. That is expensive. When I called Computer Steve he explained that he would test the drive and pull my data if possible. I visited and during the test he explained the kind of damage sustained and why it was not possible to salvage. I paid $5.00. (Elsewhere I was priced $100+ for the same service). Great person and more important: HONEST. HIGHLY RECOMMEND HIS SERVICES.Read more
At Addis Computer Service we provide all computer services including virus removal, software & hardware troubleshooting, website design and network services.
We specialize in cyber safety and data security.
We are expanding our services and tech support by adding a REMOTE TECH SUPPORT, CLOUD and MANAGED SERVICES nationwide.
Cloudsync Corp is focused on effective and efficient IT resource management. We are one of the largest IT Governance, Risk Management and Compliance (GRC) providers in Canada. We provide our expertise in the area of IT risk assessment and mitigation. Cloudsync Corp will help you evaluate your business and information asset risks. Our comprehensive services and solutions are designed to give you transparency and control over your processes while creating value for your business.
At Cloudsync Corp, our customers come first. We work with you to understand your business needs, objectives and regulatory restrictions. We evaluate your security infrastructure and manage your risks. We ensure compliance with IT regulatory authorities.