IT Support for Greater Fort Worth

Compare Plans

= Included without limitation (unless specified)

Essential Protection

Cybersecurity
Complete

$149.00 seat/month

 

Remote
Managed Care

$229.00 seat/month

Adds On-site Support

Total
Managed Care

$289.00 seat/month

Minimum Service Term Agreement

Month-to-Month

Annual

Annual

Remote IT Helpdesk Support

8AM–5PM Central, Monday – Friday, excluding holidays
After-hours and emergency support available

1 hr/month per seat

On-site Technical Support

8AM–5PM Central, Monday – Friday, excluding holidays
After-hours and emergency support available

Hardware Install/Move/Add/Change Requests
Employee Onboarding/Offboarding
Computer Failure Diagnostics and Repair

No-Cost Microsoft 365 Setup and Cloud Migration

Managed Backup and Restore

Microsoft 365 & Google Workspace (SaaS) Protection
Managed Endpoint Backup and Restore

SaaS Protection Basic Storage Entitlement

Pooled, includes 1 user/seat, $3.50/month each additional user

60 GB/user

60 GB/user

60 GB/user

Endpoint Backup Basic Storage Entitlement

Pooled, $0.02/month each additional 1 GB usage

500 GB/seat

1000 GB/seat

1000 GB/seat

Cybersecurity

24×7×365 Real Time Threat Monitoring
Advanced Managed Endpoint Protection
Next-Gen Managed Antivirus Protection
Business Email Compromise Defense
Ransomware Rollback and Remediation Services
Software Update/Security Patch Management
Cybersecurity Awareness Training
Phishing Simulation Assessment Campaigns
Dark Web Monitoring and Alerting
Cyber Liability Warranty/Insurance Coverage Eligible

Managed IT Services

Microsoft 365/Azure Cloud Management
Legacy Windows Domain Administration
Remote System Monitoring and Management
Network Infrastructure and Firewall Management
Wireless Network Management
Hosted Phone Management
Camera Security System Management

Virtual CIO Services

Business Technology Development and Consulting
Technology Budget Planning
IT Projects Design Desk
Hardware Procurement and Vendor Relations
IT Compliance Framework Verification

Business Continuity and Disaster Recovery

Network-Attached Storage Protection
Workstation Virtualization and Rapid Recovery
Server Virtualization and Rapid Recovery
Microsoft Azure Cloud Protection

Optional Included

Optional Included

Optional Included

encrypted

24×7×365 Protection
Keeps You Secure

Threat actors don't follow a 9-to-5 schedule, and neither do we—24×7×365 Real Time Threat Monitoring guards you day and night

efficiency icon

30+ Years in Technology...
and Counting!

With experience in both the defense and commercial enterprise sectors, we have the requisite expertise to keep you safe

support

Unrivaled Support for
All Your Devices

Call, email or submit a support ticket right from your desktop. We're here to address all of your technology needs

Frequently Asked Questions

Your Questions Answered, Without the Technobabble

General

Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.

A managed service is one in which the provider maintains responsibility for performing all duties associated with delivery of the derived capabilities, fully managing the processes necessary to make complete use of functionality, including continually adapting the system to any changes in use or application.

Our fully managed service plans are progressive in their application: secure your business with Cybersecurity Complete, enhance your productivity with Remote Managed Care, and avoid unanticipated expenses with Total Managed Care.

Add Disaster Protection Plus (BCDR) to any service plan, or deploy it on its own, to empower your business to operate through a major disaster with the most rapid recovery possible.

Software-as-a-Service is a cloud computing service model where the provider, like Microsoft or Google, offers use of application software to a client and manages all needed physical and software resources.

A seat means a computer system or virtual machine capable of making use of Advanced Managed Endpoint Protection, with no distinction as to whether the system is a workstation (PC/laptop) or a server. Basic consumer electronics such as tablets, iPads, iPhones or Android-based mobile devices do not constitute a seat, however, do qualify for full support coverage.

User refers to either a Microsoft 365 or Google Workspace identity account, for purposes of providing protection of Software-as-a-Service (SaaS) application data. User does not refer to just anyone who uses a computer on your network, although they are often one in the same.

GB is the abbreviation for gigabyte, a unit of data storage capacity roughly equivalent to 1 billion bytes or a thousand megabytes (MB). For purposes of services provided, 1 GB is precisely defined as 1,024,000,000 bytes.

Service Plans

When it comes to superior IT services and support, every business needs the same: knowledgeable, reliable, and responsive care and attention at a price they can afford. We enable your business to avoid undue cost by including every service you may need, eliminating the guesswork when it comes to determining applicability of coverage.

More than a simple IT provider, we offer strong strategic partnership; removing barriers to productivity by eliminating daily work distractions, helping form and guide your vision for growth and success, and providing the focus you need to better realize your long-term business goals while fostering a security-conscious work environment. As your partner in IT, our total quality of service is reflected in your achievement.

That being said, we do offer tailored business continuity and disaster recovery (BCDR) solutions tightly integrated with any of our service plan selections or stand-alone. Providing true onsite backup plus virtual machine hosting capability, both locally and in the cloud, our hybrid BCDR solutions enable businesses to successfully operate through a disaster, with the most rapid recovery possible.

Maintaining operation and overall productivity are top priority for every business, with many small to medium-sized businesses falling into the trap of thinking their organization is not large enough or high-profile enough to garner the attention of would-be attackers.

Long considered the exclusive domain of large enterprise only, information security is now something for which businesses of all size must account and is becoming increasingly important to deploy comprehensive protections against interruptions in operations or production, data loss or compromise, and ransom due to cyberattack.

Our service plans are purpose-built to provide exceptional continual value. It would be unethical on our part to permit clients to take advantage of some of the included services, like no-cost cloud migration, to then downgrade their plan the next month, leaving them without proper security management in the cloud. We avoid these types of situations by removing the temptations to do so.

Yes, but only in the case the endpoint(s) you wish to exclude from service coverage remain completely air-gapped from any and all of your internal networks and are never used to access any of your resources in the cloud (including email). While strictly permissible, we explicitly discourage such an approach as there still exist other avenues of attack against these types of seemingly isolated systems.

Because whole on-premises infrastructure and cloud resource monitoring and protection is a necessary feature of an effective cybersecurity plan, each unique workstation (PC/laptop) or server (physical or virtual) at any time discovered to be physically attached, wirelessly connected, or otherwise made part of any potentially-accessible internal network or having access to any cloud-based business resource, shall be construed a seat, regardless of device use or capability, and must be covered in your plan.

No, but we do accept tips. All kidding aside, we promulgate a set of minimum suitability for service standards contained within our Master Services Agreement, based on the need for establishing a proper cybersecurity baseline—such that we may effectively protect your infrastructure environment—which must be satisfied within 30 days of start of service. We can help with any remedial efforts, which depending on your service plan selection may be included in your service offerings.

Certainly, although you may only move to a lower cost plan at the end of your current term. Moving to the right plan to match your changing business needs is a great way to enhance productivity and avoid unanticipated expenses when something goes wrong.

Billing

We invoice you monthly on the tenth with first month pro-rated payment due at time of agreement. For your convenience, we accept check, e-check, and online credit card (VISA / MasterCard / Discover / American Express) and bank transfer (ACH) payment.

Cybersecurity standard protocol demands we protect all endpoints, meaning should you add an eligible computer to or remove a previously protected system from your network, the number of included seats in your service plan will necessarily go up or down. Any new seat added to your service plan will receive the same coverage afforded all.

In general, any services rendered not included in your service plan will be billed at the applicable hourly rate, with any payment due appearing on your next monthly invoice. Should this be the case, we will advise of such prior to the start of work.

You may also see small differences in your bill due to backup storage usage in excess of your basic storage entitlement or the addition of new users to your SaaS application space (without a corresponding increase in seat count); otherwise, you can expect your costs to remain largely constant, if not the same.

Month-to-month term agreements may be cancelled at any time with minimum ten (10) business days’ notice prior to start of the next billing cycle on the first. Any unpaid balance for agreed upon service deliveries will be immediately due and payable in full. There are never any cancellation fees.

IT Services and Support

Request for remote support, done by email, phone or made using the small remote monitoring management tool that runs on your computer desktop, can be used to gain our assistance in any matter related to the use of technology in the course of your work. You can even request help for your personal mobile device. The possible scenarios are nearly too numerous to count.

Yes, any support provided in excess of your total monthly allotment will be billed at the applicable hourly service rate. Keep in mind your allotted helpdesk support hours are pooled, meaning regardless of who may request support, or for which device, hours are shared, and overage will not occur unless the total number of support hours provided for that month exceed the calculated quota for your plan.

No, Ransomware Rollback and Remediation Services are included in every service plan. You will not be assessed support hours for any time spent providing remediation or recovery in conjunction with response to cyberattack, regardless of whether that effort includes time spent on-site at your place of business.

Similar to remote IT helpdesk support, on-site technical support affords technical assistance which may require an on-site physical presence in order to satisfy the work request, but only in the case it is reasonable such request cannot be remotely accomplished. The final determination as to whether it appropriate the request be remotely fulfilled shall be at our sole discretion. We like to hang out with you, too, but we’re busy people.

Yes, although we make every effort to first attempt remote resolution, any time required on-site in response to your support request will be billed at the applicable hourly service rate.

Absolutely—you do not even need to have a service plan with us to request service. Services not included in your plan will be billed at the applicable service rate, although moving to the right service plan to include what you really need would probably cut expenses in the long run.

Our nominal rate for services and support is $150/hour, with minimum ½ hour for remote and 1 hour for on-site. Choosing the right plan to include bundled services you need is a great way to avoid unanticipated expenses when something goes wrong.

Yes, we offer after-hours support weekdays from 5PM–9PM, excluding holidays. Emergency support is available all other days and times, regular working hours (8AM–5PM, Monday – Friday, excluding holidays) notwithstanding.

Cybersecurity

These things can happen. You can rest assured the breach has been contained as rapidly as possible. Depending on severity, one or more endpoints may already appear offline and may remain in this state pending remediation. Our goal is always to return your business to regular operation as soon as is reasonably achievable.

First contact will be to provide you with our awareness of the situation and inform as to initial status of investigation. Following remediation, we’ll work closely with you to ensure we return any effected systems to the proper point in time, before the attack took place, like it never even happened.

This question is a lot like asking how a security alarm keeps your business safe from break-ins. The obvious answer is it doesn’t, but it does create an opportunity to respond before theft may occur. Cybersecurity monitoring operates in much the same fashion, the difference is it’s your information and data that’s at risk, not your tangible property.

Often times, those that experience a cyberattack are not even aware until too late to take action. Monitoring your network endpoints for the first sign of compromise affords us the chance to stop a cyberattack before damage can be done.

In addition to the robust protection afforded our advanced AI threat detection agent resident on each endpoint, we provide continuous 24×7 real time monitoring from a US-based Security Operations Center, staffed around the clock with live cybersecurity analysts trained in the detection, response, and mitigation of cybersecurity incidents, ready to take immediate action at a moment’s notice.

Email is the most successful delivery method for often the costliest cyberattacks. In fact, greater than 90% of all cyber incidents start with a simple phishing email. Phishing works by sending emails laced with ransomware, fileless malware, and other threats directly to your employees. These emails are disguised as messages from trusted individuals like a manager, coworker, or business associate to trick your employees into activating the enclosed malware or granting unauthorized access.

Our AI-based email protection works by analyzing your employees’ business relationships (who they work with, how often they communicate, etc.) to create trusted profiles, continuously scanning for suspicious irregularities in message content and attachments and comparing them to expected behaviors to detect attacks.

It should come as no surprise learning how to effectively recognize and identify real-world threats is your primary defense against cyberattack. To that end, we provide your whole team with continuing education in the proper application of cybersecurity best practices, further fortifying protection from within. Monthly email phishing simulation campaigns test your team’s growing ability to take the right appropriate action for avoiding loss.

Most cyber insurance underwriters expect your business will conform with certain general standards in order to remain eligible for coverage under their policy. Not having cybersecurity makes your business more likely to experience cyberattack, and although you may be protected, no business can ever be made completely immune.

As an added benefit, businesses making use of any of our service plans will be made eligible for comprehensive third-party cyber liability warranty and insurance coverage offered to help defray or altogether avoid expenses typically associated with breach, such as the cost of cyber theft losses, extortion of monies, business or dependent service interruptions, regulatory fines and penalties, PCI fines and assessments, forensic investigations, damages and defense liabilities, reputational harm, and more.

Managed Backup and Restore

Malware infections affect more than just your working files, crippling your computers and impacting your ability to operate. Without proper remediation, it can spread into your cloud and back on to other systems in your network, finding its way into your backup sets, making it impossible to know which files are safe to be restored. Some malware even goes so far as to corrupt or delete your existing backup data, maximizing the probability of inducing payment of ransom.

We protect the whole of your systems and your cloud with immutable backup technology, making it fixed and unchangeable, safeguarding you from accidental or intentional deletion, as well as advanced ransomware attacks. Your data is securely stored in our immutable cloud, where neither you nor any other source can modify or delete it, preventing the spread of malware to backups, guaranteeing recovery by allowing us to identify and restore the last clean backup on record.

SaaS providers ensure they won’t lose your cloud data with built-in redundancy and other high availability measures; however, they do not take responsibility for restoring data if you lose it. Microsoft calls this the Shared Responsibility Model for data protection. That’s why Microsoft recommends third-party SaaS backup in its user agreement.

The Shared Responsibility Model places the onus of data protection squarely on businesses that rely on SaaS applications. SaaS providers are responsible for keeping their infrastructure up and running, but businesses are responsible for the preservation and security of their data.

Both your local data and your data in the cloud are protected from ransom and loss. Local data comprises everything stored on your workstation PCs, laptops, and servers, including configuration settings, application data, and operating system files.

Depending on your SaaS subscription provider, data in the cloud encompasses the following:

Microsoft 365

Google Workspace

  • Exchange
  • OneDrive
  • SharePoint
  • Teams
  • Gmail
  • Google Drive
  • Calendar
  • Contacts
  • Shared Drives

Microsoft 365 & Google Workspace Managed Protection provides 3x daily backups of your data in the cloud. Managed Endpoint Backup and Restore allows for backup capture of data on your local workstations and servers as often as once every hour, which may be adjusted in accordance with internet upload bandwidth limitations, or per your request.

Multiple incremental backups, such as these taken throughout the working day, are devised to minimize disruption due to re-work, in the case affected files or data must be restored from early versions in time.

Yes, any monthly data overage will be billed on a pro-rated basis beginning at the time of initial overage at $0.02/GB. Keep in mind your allotted local data storage quota is pooled, meaning overage will not occur unless total local data storage usage for that month exceeds the cumulative quota for your plan. Additional SaaS storage capacity may only be allocated in blocks of 60GB ($10.00) on a per-user basis.

Your cloud data is indefinitely retained on our secure cloud servers for as long as your service plan is active, with no limitation as to how far back in time data may be restored. Local data (primarily used for machine recovery) is kept for a minimum of 1 year and can be extended up to 7 years in accordance with your needs.

Simply call, email, or submit a support ticket with your request and we’ll handle the rest.

Most requests for data restore can be accomplished in minutes. Larger restore operations can take longer, depending on just how much data has to be downloaded from the cloud. Whole system restores, again, depending on the volume of data, can usually be done in a fraction of the time compared to the effort required to re-install an operating system, including software loads and re-configuration.

Next-Gen Managed Antivirus Protection

Unlike Windows Defender, managed antivirus protection provides continuous defense against the latest computer viruses, automatically and silently quarantining zero-day polymorphic threats using next-gen AI-based machine learning and advanced heuristics. And because we manage everything, your employees are not left to themselves to properly react, free to remain focused on the task at hand, undistracted by annoying pop-up messages.

Never, we manage all aspects of your next-gen AI-powered antivirus protection. As part of that we recompile our known threat signature database every 2 hours, providing maximum defense against the latest zero-day attacks, as they are emerging.

Chances are you will be unaware of what may have transpired until we contact you to advise of the situation.

Depending on severity, the infected computer may be proactively isolated from the network pending remediation; otherwise, the detected malware will be quarantined and any resultant rogue processes terminated, neutralizing the threat. In the event of a false detection, and only under our advisement, you will be given the opportunity to request we restore to use any suspicious files which may have triggered the response.

Cloud Migration Services

Microsoft 365 operates on a subscription basis, which means you pay a monthly or annual fee. This can be more cost-effective than purchasing a one-time license for Microsoft Office software, especially for businesses that need to upgrade frequently. Subscriptions often include additional features and services, such as OneDrive for cloud storage, Teams for collaboration, and advanced security controls, which might otherwise require separate purchases.

Moving to Microsoft 365 offers several benefits, including improved collaboration through real-time document editing and communication and flexible access to applications from any device, promoting greater productivity and remote work capabilities for employees in the office, at home or anywhere in between.

Absolutely, no-cost Microsoft 365 cloud migration is included for any managed service plan. We recommend you take advantage of this service if you’re not already on Microsoft 365 for Business as all you pay for are the proper license subscriptions available from Microsoft.

We’ll setup and secure your new infrastructure, prepare Exchange Online, OneDrive, SharePoint, and Teams for your use, and migrate your existing user information, files, and email accounts to the Microsoft cloud, regardless of whether your data is stored local on your devices or with another provider, like Google Workspace, Box, or Dropbox.

Going forward, we’ll handle all aspects of Microsoft 365 administration for you. You can be confident security permissions and conditional access controls, like multifactor authentication (MFA) and app protection policies are properly managed and configured to keep your business secure.

We provide the same level of complete protection for data in the cloud as we do for data stored on your local servers and PCs.

Backup is just as important for data in SaaS apps as it is for data hosted on-premises. When businesses can’t access important business data, productivity falls, and revenue is impacted. Creating backups that are independent of a SaaS provider’s cloud servers is the only way to ensure access to essential files in the event of an outage.

Flying Blind is Risky Business

Your biggest cybersecurity risk may be not realizing the risk you face.

Long considered the exclusive domain of large enterprise only, information security is now something for which businesses of all size must account and is becoming increasingly important to deploy comprehensive protections against interruptions in operation or production, data loss or compromise, and ransom due to cyberattack.

Non-clients contacting us for help dealing with compromise due to breach reported effects including data manipulation, extortion of data, theft of data, destruction of data, and ransom of data as being some of the top consequences.

Don’t let perceived budget constraints leave your business unprepared to respond in the event of ransomware or other cyberattack. Our complete cybersecurity and backup services make protection and preparedness easy and affordable, with transparent pricing information provided up-front.

Request a Free Cybersecurity Assessment

Ready to Talk? We're Here to Help

Remove the risks and barriers in your way and take the first step in protecting your business from real threats, like ransomware, by booking a free consultation or complementary site visit. We’re here to help you enjoy the benefits of secure, reliable, and productive IT.

What's keeping your business secure from cyber threats?

Your business can save 60% or more on IT support and managed services plus essential cybersecurity monitoring versus the cost of staffing a team of full-time specialists

Crucial Protection

Cybersecurity
Complete

from $129.00 seat/month
Backup Storage:
Help Desk Support:
Onsite Support:
1000GB/seat
1 hr/seat/month
Available

Essential services to keep
your business safe, including:

Advanced Care

Remote
Managed Care

from $229.00 seat/month
Backup Storage:
Help Desk Support:
Onsite Support:
2000GB/seat
Included
20% Discount

Everything included with
Cybersecurity Complete, plus:

Extended Support

Total
Managed Care

from $299.00 seat/month
Backup Storage:
Help Desk Support:
Onsite Support:
2000GB/seat
Included
Included

Everything included with
Remote Managed Care, plus: