Our onboarding processes are derived from over 20 years of IT experience and learning from what our customers want most.
Most IT service providers' on-boarding process consists of two steps:
Install their remote desktop software on your computers
Wait for the phone to ring
Our on-boarding process consists of
First Day
We'll send you links to our network documentation platform and password vault
We'll send you a one-page questionnaire to gather our basic network numbers and points-of-contact.
First week
Commence fielding your staff’s support requests
Install our various network performance monitoring, remote access, and security systems
Install our computer management and security suite on all of your computers which includes software that enforces the installation of Microsoft and third- party patches, anti-virus software, malicious website filtering, and our end- point privilege management platform.
First month
Perform the first technical review of your environment
Pursue the checklist generated by our best practices alignment system
Backup your computers to OneDrive
Enforce mobile device security policies
Enroll everyone in multi-factor authentication
Encrypt your computers' hard drives
Protect your email from phishing
Prevent automatic forwarding of email out of your domain, a common hacker exfiltration technique
Each quarter
Update the firmware on your servers, firewalls, and wireless access points
Review your Office 365 licensing and remove unused licenses
Meet with your team to go over the findings from our first technology review, get approval for implementing our recommended changes, and listen to your desires for the coming quarter