
Support
Get answers to common questions about our services, pricing, and how we can help your business.
Managed IT Services
Questions about our managed IT support and services
What is managed IT services?
Managed IT services is a comprehensive approach where an external provider (like Techvera) takes responsibility for maintaining, monitoring, and supporting your IT infrastructure. This includes help desk support, network management, security, backups, and strategic IT planning - all for a predictable monthly fee.
How is managed IT different from break-fix support?
Break-fix is reactive - you call when something breaks and pay per incident. Managed IT is proactive - we monitor your systems 24/7, prevent issues before they occur, and provide unlimited support. This results in less downtime, better security, and predictable costs.
What size companies do you work with?
We typically work with small to mid-sized businesses ranging from 10 to 500 employees. Our sweet spot is companies with 25-200 employees who need enterprise-level IT but don't want the cost of a full internal IT department.
How quickly can you respond to issues?
Our average response time is under 30 minutes, with a 97% first-call resolution rate. Critical issues are addressed immediately, and we offer 24/7/365 support for emergencies.
Can you support remote and hybrid workers?
Absolutely. We specialize in supporting distributed workforces with secure remote access, cloud-based collaboration tools, endpoint management regardless of location, and zero-trust security architectures.
What happens during onboarding?
Onboarding typically takes 2-4 weeks and includes a full IT assessment, documentation of your environment, deployment of our monitoring and security tools, user training, and a transition plan. We handle everything to ensure minimal disruption.
Cybersecurity
Questions about security, threats, and protection
What cybersecurity protections do you provide?
Our security stack includes endpoint detection and response (EDR), managed detection and response (MDR), email security, multi-factor authentication, security awareness training, vulnerability management, and 24/7 security monitoring through our Security Operations Center.
How do you protect against ransomware?
We use a multi-layered approach: advanced endpoint protection that detects ransomware behavior, email filtering to block phishing attempts, regular security training for employees, network segmentation, and robust backup systems with air-gapped copies that can't be encrypted by attackers.
Do you provide security awareness training?
Yes, we provide ongoing security awareness training including simulated phishing campaigns, interactive training modules, and regular security updates. Studies show that trained employees are 70% less likely to fall for phishing attacks.
What happens if we experience a security incident?
We have a documented incident response process. Our team immediately contains the threat, investigates the scope, remediates the issue, and helps with recovery. We also assist with any required notifications and provide a post-incident report with recommendations.
How do you handle vulnerability management?
We continuously scan your environment for vulnerabilities, prioritize them based on risk, and deploy patches promptly. Critical security patches are typically applied within 24-48 hours, and we provide regular vulnerability reports.
Compliance
Questions about regulatory compliance and audits
What compliance frameworks do you support?
We support HIPAA for healthcare, SOC 2 for service organizations, PCI-DSS for payment processing, CMMC for defense contractors, and various state privacy laws like CCPA. We can help you achieve and maintain compliance with these frameworks.
Can you help us prepare for a compliance audit?
Yes, we provide comprehensive audit preparation including gap assessments, policy development, technical control implementation, evidence collection, and audit support. Many of our clients pass their audits on the first attempt.
Do you sign Business Associate Agreements (BAAs)?
Yes, we sign BAAs with all healthcare clients as required by HIPAA. We understand the importance of protecting PHI and have the technical and administrative safeguards in place to meet HIPAA requirements.
How do you help maintain ongoing compliance?
Compliance isn't a one-time event. We provide continuous monitoring, regular risk assessments, policy reviews, employee training, and documentation management to ensure you stay compliant between audits.
Pricing & Contracts
Questions about costs, billing, and agreements
How is managed IT services priced?
We typically price per user per month, which includes all support, monitoring, and security services. This provides predictable costs and scales with your business. Contact us for a custom quote based on your specific needs.
Are there long-term contracts?
We offer flexible contract terms. While we recommend annual agreements for the best pricing and to allow time for strategic initiatives, we also offer month-to-month options. We're confident in our service quality and don't rely on contracts to keep clients.
What's included in the monthly fee?
Our managed services include unlimited help desk support, 24/7 monitoring, security tools (EDR, email security, etc.), patch management, backup monitoring, vendor management, and strategic IT planning. Hardware and major projects are typically separate.
Are there any hidden fees?
No hidden fees. We're transparent about what's included and what's not. Projects outside the scope of managed services (like office moves, new system implementations, or hardware purchases) are quoted separately and approved before work begins.
Technology & Tools
Questions about the technologies we use and support
Do you support both Mac and Windows?
Yes, we're certified in both ecosystems. As an Apple Authorized Reseller and Microsoft Partner, we can support mixed environments and help you choose the right tools for your team.
Can you help us migrate to the cloud?
Absolutely. We've helped hundreds of businesses migrate to Microsoft 365, Google Workspace, AWS, and Azure. We handle the planning, migration, and training to ensure a smooth transition.
What tools do you use for monitoring and management?
We use enterprise-grade tools including NinjaOne for endpoint management, Todyl for security, and industry-leading backup solutions. All tools are included in your monthly fee - no additional licensing costs.
Can you integrate with our existing tools?
Yes, we work with your existing business applications and can help optimize your technology stack. We have experience with most common business software and can recommend integrations to improve efficiency.
Looking for More Specific Answers?
Still Have Questions?
Our team is happy to answer any questions you have about our services or how we can help your business.