IT Support and Technical Expertise

TheTechworx.com can provide you with full support for upgrading your Home, Office or Gaming computers. We offer you the best possibilities for your computer upgrade. Give your PC and laptop a second life by upgrading them.

We can supply replacement or upgrade components, or install parts which you have provided.


Storage Upgrades

Increase and addon additional internal hard disk storage capacity for family photos and home videos. We can also recommend and install network storage (NAS) ensuring you never run out of disk space again.

SSD Hard Drive Upgrades

Storage technology is always evolving. Solid State Drives (SSD) have faster read/write speeds and give an immediate improvement to your computer

DDR Memory Upgrades

Allowing you to do more at the same time, an upgrade to your DDR3/DDR4 memory modules is a quick fix to may PC problems

CPU & Motherboard Upgrades

Like and engine change for your computer. Motherboard evolution and compatibility with newer, faster processors gives your computer a new lease of life

Gaming Graphics Upgrades

High Definition, immersive graphics puts you in the middle of the action. Add a Gaming Graphics card to your system and experience the future of gaming

Wifi range Upgrades

Struggling to pick up wifi signal throughout your entire house/office? We can help increase and better the range of your wifi signal effortlessly.


New Builds

Whether you want laptop repair or wish to buy a bespoke computer, TheTechworx.com can assist you with fully comprehensive new computer builds - and promise to keep your pocket happy.

  • Custom Gaming PCs
  • Custom Laptops
  • Professional Desktop PCs
  • Overclocked Computers
  • Laptops & All-in-One PCs
Over 20 years of experience working with major electronics brands:

Quick Quote

Search your make/model for issues to receive your repair quote

Please select a Manufacturer
Invalid Input
Invalid Input
Invalid Input

Now, enter details on the issue you are facing

Please select a category
Please enter a description
Invalid Input

Finally, just some contact details to obtain your quote

Please enter your name
Enter a valid email address
Invalid Input
Invalid Input
  • Workforce Productivity
  • Keep Users Safe
  • Complete Control
  • Site blacklists: Set and automatically enforce browsing policies that keep users off non-work related sites like gaming or social media.
  • Time-based browsing policies: Modify blacklist rules to allow employees to visit non-work sites outside of standard business hours.
  • Threat protection: Protect against malware, phishing, adware, botnets, and spam.
  • Bandwidth monitoring: Monitor daily usage with automated bandwidth checks and alerts.
  • Access controls: Keep users off sites that could cause a data breach and protect the business from the legal liability that comes with a data breach.
  • Easy administration: TheTechworx.com Remote Monitoring & Management’s web-based console makes it simple to gain control over your users' web browsing with a user-friendly interface and workflow.
  • Policies: Use Our Remote Monitoring & Management’s default web protection policies or create your own custom rules for desktops, laptops, or servers.
  • Individual site blocking: Want to block specific sites that don't fall within our core site categories? The web protection feature lets you add custom URLs to the blacklist.
  • Benefits
  • Features
  • Staying Safe
  • Complete Control
  • Fully featured protection built on BitDefender's Endpoint Security engine.
  • Pay monthly, per device
  • Centrally managed by TheTechworx.com
  • Infection response from our helpdesk
  • No server required
  • No maintenance required
  • Flexible licensing
  • Award Winning Anti-Virus / Malware Protection
  • Active protection and behavioral scanning
  • Extensive signature-based scanning
  • Automatically always up-to-date
  • Application Control to block unauthorised applications.
  • Device Control to control use of memory sticks etc.
  • Extensive signature-based scanning: Use traditional signature-based threat detection to block known threats.
  • Heuristic checks: Protect against previously unknown threats using heuristic checks, which detect new, unrecognized viruses in a sandbox environment away from a business’ core systems.
  • Active protection and behavioral scanning: Shut down even the most sophisticated malware via continuous real-time monitoring that detects programs performing actions commonly associated with malware exploits.
  • Custom policies: Leveraging default policies for groups of servers, desktops, and laptops.
  • Powerful customization: Create your own policies around quarantine rules, virus definition downloads, etc.
  • Control timing: Pause, schedule or cancel scans to suit your environment needs.
  • Easy setup: Deploy managed antivirus in bulk across departments, servers, and workstations.
  • Proactive notifications: Our helpdesk receives updates in near real-time, as well as in-depth reports across your network to help quickly remedy malware issues.
  • Hybrid Backup
  • Backup & Restore
  • Enterprise Security
  • True-Delta™
  • Accelerator
  • Best of both worlds: Leverage a hybrid cloud architecture that gives you the control and speed of on-premises backup combined with the convenience and added redundancy of a cloud-based approach.
  • Back up a number of devices at almost any level: Back up everything, including workstations, servers, and even virtual machines and servers. Additionally, backups can be set for anything from individual files to applications all the way to full systems.
  • Fast backup: Take advantage of our True Delta technology, which backs up changes rather than full files. This helps to reduce the time it takes to run the backup process, allowing you to back up more frequently.
  • Fast recovery: Get rapid recovery after a disaster using our hybrid cloud architecture that restores from either cloud-based or local copies—whichever is faster.
  • Bare metal recovery: Restore to a bare metal state using nothing more than a bootable USB drive or CD-ROM.
  • Automatic updates: Remote Monitoring & Management can automatically update a standby virtual server after the completion of each live server backup.
  • Minimum resource usage: All backups and restores are lightweight, keeping resource drain to a minimum.
  • Bandwidth throttling: Restrict upload and download bandwidth during a user-defined backup window.
  • Standby image backup: Automatically create a local .VHD/X file of your backup selections during each scheduled backup.
  • Virtual machine support: Back up your virtual environments with host-level VMware® and Hyper-V® backups. You can restore to an existing or alternate virtual environment.
  • Ultra secure: Leverage AES 256 or 448-bit Blowfish encryption to help with keeping data safe on-premises, during transfers, and in the cloud.
  • Private keys: Data can be accessed only by someone holding a private key.
  • Secure data centers: Store your data in one of our global data centers, each of which are SSAE-compliant or ISO-certified.
  • Data archiving: Choose how long you want to retain backup copies, allowing you to keep specific datasets and backups indefinitely. 
  • Block-level changes: True Delta works at the block level, allowing it to transmit changes rather than the full file. 
  • Compatible across platforms: True Delta processes block-level changes for large files, Hyper-V, Microsoft Exchange, SQL Server, and much more. 
  • Better resource usage: By tracking only changes rather than full files, backups become so quick that they no longer have to be scheduled during off-hours. 
  • More frequent backups: With shorter backup windows, you’re able to back up data more frequently, helping ensure that your backups are current.
  • Enhanced backup performance: The Backup Accelerator in Online Backup decreases the backup time for large files when compared to regular file-level backups of the same data.
  • Large file support: By default, Online Backup keeps track of what has changed in selected files that are 5 GB or larger. This makes the backup of changes to databases in SQL Server, Exchange, and SharePoint, as well as changes to Outlook PST files, Outlook OST Files, and Hyper-V virtual machines as fast as traditional backups of changes to smaller files.
  • Full support for Windows: Backup Accelerator is supported on Windows 7 and higher on client machines and Windows Server 2008 R2 and higher on servers.
  • Benefits
  • Features
  • Provide faster support quickly connect to any machine in your managed networks with one click.
  • Lower costs as no longer a requirement to physically visit your site
  • Anytime access means users do not have to be present
  • Custom connection policies to suit your requirements
  • Background routine maintenance
  • File transfers: Remotely upload files, including scripts, to users’ systems without disturbing you as you work.
  • Remote command line: Use the remote command line to solve issues from afar and even issue PowerShell® commands.
  • System preferences: Open the system controls in the background to diagnose computer or network issues, review or kill processes, and more.
  • Session recordings: Record any support session you want, so you can review later for quality control or troubleshooting.
  • Chat transcripts: Review historical chat transcripts broken down by end user or technician.
  • Features
  • Monitoring
  • Reporting
  • Alerts and performance checks: Notifications on device availability, performance, security, and backup statuses.
  • Security monitoring: Monitor antivirus scanning statuses, errors in event logs, and much more
  • Windows, Mac, and Linux compatibility
  • Network performance monitoring: Easily health-check hardware and software on workstations and servers across multiple work locations.
  • Virtual machine monitoring
  • Automation and bulk actions
  • Windows, Mac, and Linux compatibility: Unlike other remote monitoring software that focuses on a single platform, SolarWinds Remote Monitoring & Management enables you to keep track of workstations and servers across platforms and operating systems including Windows, OS X, and multiple versions of Linux.
  • Network performance monitoring: Use SNMP functionality to monitor network devices—including servers, printers, routers, and switches.
  • Mobile device monitoring: Keep track of smartphones and tablets with mobile device checks and monitoring.
  • Virtual machine monitoring: Run checks on all virtual sessions and virtual machines under your control.
  • Background maintenance: Fix issues without disrupting end users or causing downtime by using remote command lines and custom scripts, and by managing system processes and services.
  • Maintenance windows: Set scheduled maintenance to run during off hours so you don’t disrupt employees’ productivity or raise false downtime alarms.
  • Automation and bulk actions: Standardize your checks, rules, and tasks across sites, servers, and workstations. And take full advantage of our automation and scripting tools to help you perform bulk actions automatically across networks and work sites.
  • Executive summary report: Our flagship report is designed to help you quantify and communicate the business and technical value of your services to your users and management. These reports display key metrics and support activities in an easy-to-digest, professional-looking business report that showcases all the critical functions you perform.
  • Additional reports: A wide variety of additional reports helps ensure that you get the level of reporting you need when you need it most. These reports cover such key areas as device inventory, pricing, antivirus protection, backup integrity, user audits, hardware and software checkups, and more. That’s data you can immediately use to improve your IT environments.
  • Multiple report formats: If you want to share reports outside of Remote Monitoring & Management, you can easily export any report.
  • Firewalls
  • Routers
  • Switches
  • Printers
  • Wireless
  • Firewall Rules Management
  • Firewall Configuration Changes
  • 24×7 Monitoring of Firewall Availability
  • 24×7 Response – Remote Support of Firewall Outages
  • Software & Firmware Updates
  • 24×7 Management / Monitoring / Remediation of all VPNs
  • Router/Modem/WAP Configuration Changes
  • Printer Software & Firmware Updates
  • 24×7 Monitoring of Router Availability
  • 24×7 Response – Remote Support of Router Outages
  • Switch Configuration Changes
  • Software & Firmware Updates
  • 24×7 Monitoring of Switch Availability
  • 24×7 Remote Support of Switch Outages
  • Printer Configuration Changes
  • Printer Software & Firmware Updates
  • 24×7 Printer Monitoring of Availability
  • 24×7 Response – Remote Support of Printer Outages
  • Wireless Network Configuration Changes
  • Wireless Network Software & Firmware Updates
  • 24×7 Wireless Network Monitoring of Availability
  • 24×7 Response – Remote Support of Wireless Network Outages
  • Biannual technology and strategy reviews
  • Proactive monitoring of users, desktops, networks and servers
  • Friendly & jargon free support and advice from experienced team
  • Focused advice and consultancy to shape IT strategy
  • Complete suite of IT services available - Desktop, Server, Laptop & Mobile, Cloud and Websites Support
  • Flexible pricing based on your requirements. We support Individuals, Sole Traders, Small and Medium Sized Business
  • No hidden charges. No sudden extras - Just plain and simple, itemised invoicing
  • Rapid response times
load more / hold SHIFT key to load all load all