/ How we engage

From handshake to handled.

Four stages, predictable timeline, zero business disruption. We've onboarded enough clients to know exactly what works — and what doesn't. Here's how it goes.

01
Week 1 — 2 · No charge

Discovery

We sit down with you, walk your office, and document everything: devices, vendors, software, tickets, pain points. We talk to your people, not just leadership. Free. No pressure to sign anything.

What you get
A written assessment with photos, asset inventory, network diagram, and a candid risk register.
Your time investment
One 90-minute kickoff meeting, plus brief check-ins with key staff. We do the rest.
What we'll find
Almost always: outdated patches, weak backup strategy, missing MFA, vendor sprawl, undocumented systems. It's normal.
02
Week 2 — 3

Roadmap & quote

We come back with a clear plan. What's solid, what's risky, what's burning. Priorities. Timelines. A flat monthly number for ongoing managed services, plus any one-time project costs to remediate critical issues. Everything itemized.

What you get
A written proposal: scope, monthly investment, project costs, SLAs, and a 90-day onboarding plan.
What's negotiable
Scope and pace. We can phase remediation work to spread cost and avoid disruption.
What's not
The fundamentals — backup, MFA, EDR, monitoring. We don't sign clients we can't actually protect.
03
Week 3 — 6

Onboard & deploy

We deploy our monitoring, security tooling, and documentation systems across your environment. Most of it happens off-hours so your team never feels it. Critical remediation gets done in this window — patches, backup configuration, MFA rollout, the works.

How we minimize disruption
Off-hours deployment, phased rollout per department, on-site presence on go-live day.
How your team meets us
Lunch-and-learn intro session, helpdesk welcome email, contact card, and a 1-page how-to-get-help cheat sheet.
Documentation
Full environment runbook delivered by end of week 6. You own it.
04
Ongoing

Operate & evolve

You get a real partner: 24/7 monitoring, fast helpdesk, monthly reports, quarterly business reviews, and a vCIO who actually shows up. We catch problems before your team notices, and we evolve your stack as the business grows.

Day-to-day
Helpdesk picks up fast. Tickets visible to you in real time. On-site dispatch within 2 hours for emergencies.
Monthly
Health report: what we did, what we caught, what's next. Always in plain English.
Quarterly
Business review with leadership. Roadmap updates, budget check, strategic recommendations.
/ Honest disclosure

What we won't do.

We'd rather lose a deal than mislead a client. Here's what's outside our scope or principles — so you know up front.

/ 01

Reactive break-fix only.

We don't do hourly break-fix as a primary engagement. If you only call when something's broken, you'll get burned — and so will we. We need to be in your environment regularly to do good work.

/ 02

Lock-in contracts.

Our agreements are 30-day-out. If we're not earning the relationship every month, you should be able to leave. We've never lost a client to a competitor — only to acquisition or closure.

/ 03

Sketchy software.

We don't deploy pirated software, untested freeware, or anything that violates licensing. If a vendor offers us a kickback for recommending their product, we tell you about it.

/ 04

Working with bad actors.

If a client asks us to help them spy on employees, sidestep regulations, or misrepresent their security posture — we walk. There aren't many of these calls. There are some.

/ Frequently asked

Things people ask us first.

If your question isn't here, ask. We'll answer honestly, even if the answer isn't what you wanted to hear.

Most clients are fully onboarded in 4-6 weeks. Smaller environments (under 15 users) can be done in 2-3 weeks. Larger or multi-site environments may stretch to 8 weeks. We never rush the security baseline — that gets done first regardless of timeline.
Managed IT typically runs $125-$185 per user per month for a fully managed engagement, depending on environment complexity, security requirements, and after-hours coverage needs. Project work (migrations, hardware refreshes, network rebuilds) is quoted separately. We give you a real number after the discovery — never before.
Sometimes. If your existing tools meet our minimum security standards and we can monitor them properly, absolutely. If they don't, we'll tell you why and propose alternatives. We don't switch tools just to switch tools — that's a fast way to rack up unnecessary fees.
Yes. Plenty of our clients have an internal IT person we co-manage with. We handle the things they don't have time for — after-hours coverage, security tooling, vendor management, strategic projects. We're not trying to replace good internal people.
Our 24/7 line is always answered. After-hours calls go to an on-call engineer with full access to your environment. For true emergencies (ransomware, total outage), we mobilize within 30 minutes. After-hours response is included in every managed agreement — no surprise invoices.
30 days notice and we transition you out cleanly. We hand over all documentation, provide a transition checklist, and coordinate with your new provider. We've never made a client feel stuck. The day someone wants to leave is the day we lose if we hold on tight.
Yes. We carry $2M general liability, $2M cyber liability, and $1M professional E&O insurance. Our team holds Microsoft, CompTIA, and Cisco certifications. We can provide certificates of insurance to your compliance team on request.
Likely yes. We have current clients in construction, healthcare, manufacturing, professional services, retail, hospitality, logistics, and non-profit. The exceptions: we don't currently take on financial services firms with FINRA reporting obligations, and we're selective about HIPAA-covered entities. Ask us — we'll tell you straight.
/ Step zero

Start with discovery.

It's free. It's not a sales pitch. You walk away with a written assessment whether or not you sign with us.

Book Discovery Call (901) 538-7011 // 90 minutes · No commitment