Refer a business, earn rewards
Mon–Fri · 9am–5pm (24/7 Support for Managed Clients)
Frequently Asked Questions

Answers Before You Call

Real questions from real Wisconsin businesses — about pricing, contracts, SLA guarantees, compliance, security, response times, and what it's actually like to work with us. If your question isn't here, ask us directly.

5.0
Google rating
8 reviews
300+
Endpoints under
active management
Same-Day
Response target
(SLA-backed)
Month-to-Month
Available — no
long-term required

Getting Started

What to expect when you reach out.

How do I know if I need managed IT vs. break-fix support? Popular

Break-fix works if you rarely have IT issues, have technical staff in-house, and are comfortable waiting when something breaks.

Managed IT makes sense if you want proactive monitoring, security built in, predictable costs, and someone who knows your environment before there's a crisis.

Most businesses over 10 users find managed IT saves money long-term by preventing expensive emergencies — and by having response-time accountability in writing.

What happens during the first call?

We'll ask about your current setup, pain points, user count, industry, and compliance obligations. No sales pitch — just a conversation to see if we're a fit. Takes about 15–20 minutes.

If it makes sense to continue, we'll schedule a deeper discovery or quote call. Start a conversation here.

How long does onboarding take?

Typical timeline: 2–4 weeks depending on complexity.

We document your environment, deploy monitoring agents, configure security tools, and train your team on how to reach us. You'll have a dedicated point of contact throughout. See our Onboarding page for the week-by-week breakdown.

Do you work with businesses outside Madison?

Yes. We're headquartered in Monona, WI and serve businesses across Dane County and the surrounding counties including Jefferson, Dodge, Rock, Green, Columbia, Iowa, and Sauk.

Remote support works for most issues; we travel on-site for projects and hardware work. See our full service area for the list of cities we serve.

Can you take over from our current IT provider?

Yes, and we handle these transitions professionally. We work with your current provider (or navigate without them if the relationship is already broken) to get credentials, documentation, and system access transferred cleanly.

Most transitions complete in 1–2 weeks with zero downtime. We document everything as we go, so you own your environment from day one — portable if you ever leave us.

Pricing & Contracts

Transparent answers about what things cost.

How much does managed IT cost? Popular

Typical range: $125–$200 per user per month for fully managed IT, depending on scope, security requirements, compliance burden, and complexity.

This includes helpdesk, proactive monitoring, patching, backup, security tools (EDR/XDR, email filtering, MFA), vendor coordination, and quarterly business reviews. No hourly surprises.

Get a custom quote →

Are there long-term contracts?

No long-term contracts required. We offer month-to-month agreements with 30-day notice. We also offer 12 and 24-month terms with better pricing if you prefer commitment.

We'd rather earn your business every month than lock you in.

What's included vs. billed extra?

Included in the monthly fee: Helpdesk support, proactive monitoring, patching, backup management, standard security tools (EDR, email filtering, MFA enforcement), vendor coordination, documentation, and quarterly business reviews.

Billed separately: Hardware purchases, major projects (office moves, new site buildouts, migrations), one-time consulting engagements, software licenses you own directly, specialty compliance audits.

We're transparent — you'll always know in writing before we bill.

Do you offer block-of-hours support?

Yes. Pre-purchased hours at $150–$175/hour (depending on block size) for businesses that need occasional help but aren't ready for full managed services.

Hours don't expire for 12 months. Time is tracked transparently with monthly usage reports.

How do you handle price increases?

We don't surprise you. Price changes are communicated 60+ days in advance with clear reasoning (vendor cost changes, scope expansion, etc.).

Most clients see stable pricing year-over-year unless their environment changes significantly.

SLA & Guarantees

Our response promise in writing — with credit backing.

What is the SLA Credit Guarantee? Popular

For managed clients, if we miss our contracted SLA response time, we credit your invoice. No discretion on our side, no fine print, no wiggle room — written into every agreement.

Credit amount scales with severity and response-time breach. Exact structure is laid out in your signed agreement so there's never ambiguity about what you get if we fall short.

What are the response-time targets?

Response targets by priority level, backed by credit guarantee for managed clients:

  • P1 Critical (complete outage, security breach): ≤ 1 hour
  • P2 High (major function impaired): ≤ 4 hours
  • P3 Medium (single user affected): ≤ 8 hours
  • P4 Low (questions, minor issues): ≤ 24 hours

These are initial response times during business hours (Mon–Fri 9 AM – 5 PM CT). P1 and P2 emergencies are covered 24/7 for managed clients.

Does the SLA apply to non-managed clients?

SLA Credit Guarantee applies only to clients on managed services or co-managed agreements — it's one of the reasons those agreements exist.

Block-of-hours and project clients get best-effort response times, which are typically same-day during business hours but aren't credit-backed.

What's the difference between response and resolution?

Response time = when we acknowledge your request and begin working on it. This is what the SLA Credit Guarantee covers.

Resolution time = depends on complexity. Some issues resolve in minutes; others require vendor involvement, parts, or investigation. We keep you updated throughout and set clear expectations.

How do I know if an SLA breach occurred?

Every ticket is time-stamped automatically. Your quarterly business review includes SLA performance data — you see exactly how we performed against every priority-level target.

If we missed an SLA, the credit appears on your next invoice. You don't have to chase us for it.

Managed IT Services

Day-to-day support and operations.

What does "proactive" actually mean?

It means we catch problems before you notice them. Our monitoring tools alert us to disk space issues, failing hardware, security threats, and misconfigurations — often before they impact your work.

We also run regular patching, review security posture, and make recommendations before things break. Less emergency, more engineering.

Will I have a dedicated technician?

You'll have a primary point of contact who knows your environment. But you also get the full team's expertise — so you're never stuck waiting for one person.

We document everything, so any engineer on our team can help you quickly.

What if we already have an IT person?

That's co-managed IT. We augment your internal staff with escalations, after-hours coverage, security operations, or project work. Your team stays in control; we fill the gaps.

Typical co-managed engagements are scoped after a discovery call.

Do you support Mac and mobile devices?

Yes. We manage Windows, macOS, iOS, and Android through unified endpoint management (Microsoft Intune, Jamf, or equivalent). Same security policies, same visibility across all device types.

How do you handle software updates?

We run automated patching on a defined schedule — typically weekly for workstations, monthly for servers with testing. Critical security patches are expedited.

You can set maintenance windows to avoid disruption during business hours.

Cybersecurity

Protection, detection, and recovery.

What security is included with managed IT? Popular

Our standard security stack includes:

  • EDR/XDR (endpoint detection & response on every workstation and server)
  • Email security with phishing and impersonation protection
  • MFA enforcement across all accounts and remote access paths
  • DNS filtering to block malicious sites
  • SPF/DKIM/DMARC configured and monitored
  • Backup monitoring with tested quarterly recovery

Advanced options (SIEM, SOC monitoring, dark web scanning, DLP) are available for higher-risk environments.

What happens if we get ransomware?

We contain immediately (isolate affected systems), investigate (determine scope and entry point), remediate (clean systems or restore from immutable backup), and harden (close the gap that let it in).

With proper backups and our security stack, most clients recover without paying ransom. This is why backup immutability matters — it's the line between a bad week and a business-ending event.

Do you provide security awareness training?

Yes. We run phishing simulations and training modules to help your team recognize threats. It's the most cost-effective security investment you can make — most breaches start with a clicked link.

How often do you test backups?

We verify backup completion daily and perform test restores quarterly (or more frequently for critical systems). You get documentation proving your data is recoverable.

An untested backup is a hope, not a control. We treat it accordingly.

Do you do penetration testing or vulnerability scanning?

We run monthly vulnerability scans on managed environments and make remediation recommendations. For formal penetration testing (required by some compliance frameworks), we coordinate with specialized third-party pen-test firms.

Compliance & Regulated Industries

HIPAA, PCI, Wisconsin breach law.

Do you support HIPAA-covered entities? Popular

Yes. We sign Business Associate Agreements (BAAs) with every healthcare and behavioral health client before touching any system that handles PHI.

We implement and maintain the HIPAA Security Rule technical safeguards: access controls, encryption at rest and in transit, audit logging, workforce security training, and incident response. We produce documentation you can hand to an auditor.

We're IT professionals, not legal counsel — compliance is a shared responsibility. See our Healthcare and Mental Health & Behavioral Health pages.

What about 42 CFR Part 2 for substance use records?

Yes. 42 CFR Part 2 adds strict consent and record-segregation requirements on top of HIPAA for practices treating substance use disorders. We configure EHR access controls, audit logging, and data handling to support these requirements.

This is a common gap — many MSPs don't even know Part 2 exists. If you're a behavioral health practice with substance use treatment, this should be a qualifying question.

Do you help with PCI DSS for credit card handling?

Yes. For retail, hospitality, and other card-handling businesses, we segment POS networks, implement vulnerability scanning, and help reduce PCI scope (often via P2PE-certified terminals).

We're not QSAs, but we configure the technical controls and document the network so your QSA or self-assessment is clean. See our Hospitality page.

What's Wisconsin Stat. § 134.98?

Wisconsin's data breach notification law. If personal information of a Wisconsin resident is acquired by an unauthorized person, your business must notify affected residents within a reasonable time. HIPAA Breach Notification Rule layers on top for healthcare.

Our incident response runbooks account for both federal and Wisconsin notification timelines — so if the worst happens, you're not figuring out the rules on the fly.

Can you help us prepare for a cyber-liability insurance audit?

Yes. Cyber-insurance underwriters increasingly require MFA, EDR, tested backups, and a written Information Security Program (WISP). We implement and document these controls, and produce the evidence insurers ask for.

Many policies now exclude incidents where basic controls weren't in place. Don't find out the hard way that your policy has teeth.

Industries We Serve

Dedicated playbooks for regulated verticals.

What industries do you have dedicated playbooks for?

Four primary industry focus areas, each with dedicated content and compliance frameworks:

We also serve manufacturers, non-profits, property management, construction, and retail — see All Industries.

Do you work with EHR systems like SimplePractice, TherapyNotes, or Valant?

Yes. We support the most common behavioral health and medical practice platforms — SimplePractice, TherapyNotes, Valant, Therabill, and others. We don't replace your EHR; we secure how your practice accesses it (MFA, access reviews, session timeouts, audit logging).

Do you support POS networks for restaurants and hotels?

Yes. PCI scope reduction, POS network segmentation, guest Wi-Fi isolation, redundant internet for credit card processing, and PMS (property management system) support for hotels.

Can you handle multi-location businesses?

Yes. We design networks, security policies, and user management that work consistently across multiple sites — with a single pane of glass for monitoring and patching. Works for retail chains, multi-clinic practices, hospitality portfolios, and distributed manufacturing.

Microsoft 365 & Google Workspace

Email, collaboration, and cloud productivity.

Microsoft 365 or Google Workspace — which should I choose?

Microsoft 365 if you need desktop Office apps, complex Excel work, Teams for collaboration, or tight integration with Windows/Active Directory.

Google Workspace if you prefer browser-based work, simpler administration, or have a Mac-heavy environment.

Both are secure and compliant when configured correctly. We support and migrate between both.

How much does Microsoft 365 cost?

Microsoft 365 Business plans range from $6/user (Business Basic) to $22/user (Business Premium with full security). Most businesses land at Business Standard or Business Premium depending on security needs.

Pricing is set by Microsoft and can change. We handle licensing, configuration, and ongoing management.

How much does Google Workspace cost?

Google Workspace Business plans range from $7/user (Business Starter) to around $22/user (Business Plus). Enterprise tiers available for larger organizations.

Pricing is set by Google and can change. Add-ons like Gemini AI and additional storage are extra.

Can you migrate us from one platform to another?

Yes. We handle email, calendar, contacts, and file migrations between platforms (or from on-prem Exchange/other providers). Typical timeline: 1–2 weeks with minimal disruption.

Do I need separate backup for M365 / Google Workspace?

Yes. Microsoft and Google don't back up your data the way you'd expect. Their recycle bins have time limits, and they won't help you recover from accidental deletion or ransomware in any meaningful way.

We deploy third-party backup for email, OneDrive/Drive, SharePoint, and Teams. Typical cost adds roughly $3–$5 per user per month.

Business Phones

VoIP, UCaaS, and modern phone systems.

How much do business phone systems cost?

$25–$55 per user per month depending on features. Basic calling at the low end; full UCaaS (video, SMS, call center features) at the high end.

Desk phones are typically $100–$300 one-time, or can be rented. Most modern deployments skip desk phones entirely in favor of mobile and desktop apps.

Can I keep my existing phone numbers?

Yes. We port your numbers from your current provider. The process takes 1–3 weeks depending on the carrier, but there's no downtime — we coordinate the cutover so your numbers work continuously.

Do I need new desk phones?

Not necessarily. Many users work entirely from mobile and desktop apps. If you want desk phones, we'll recommend models that work with your chosen platform.

What about fax?

Cloud fax is included with most UCaaS platforms. Send and receive faxes via email or web portal — no physical fax machine needed.

We run our own fax line this way. It's 2026; don't buy another physical fax machine.

How long does phone system deployment take?

Typically 2–4 weeks. We configure the system, port numbers, set up auto-attendants and call flows, train your team, and go live with support standing by.

Business Internet

Primary, failover, and redundant connectivity.

Why do I need failover internet?

One circuit is a single point of failure. If your ISP has an outage, your business stops — phones, email, cloud apps, payment processing, everything.

A failover circuit switches over in under 30 seconds, often for less than $100/month. Cheap insurance against the day your primary provider has a bad afternoon.

How much does business internet cost?

Primary circuits: $99–$299/month depending on speed and type (fiber, cable, fixed wireless).

Failover circuits: typically $50–$150/month for LTE/5G or secondary DSL/cable.

We'll help you right-size for your needs — no point paying for gigabit if you don't need it.

Fiber vs. fixed wireless — what's the difference?

Fiber: Fastest, most reliable, symmetric upload/download speeds. Best if available at your location.

Fixed wireless: Line-of-sight radio to a tower. Good option where fiber isn't available. Requires clear sightlines.

We survey your location and recommend the best fit.

Can you help with rural or hard-to-serve locations?

Yes. We work with multiple ISPs and provider partners — including fixed wireless and LTE/5G — to find options even in areas where traditional providers won't go.

Support & Communication

How to reach us and what to expect.

Do you offer after-hours support?

Yes. P1/P2 emergencies are covered 24/7 for managed IT clients. After-hours emergency calls route to on-call engineers.

Non-emergency after-hours support is available as an add-on for clients that want extended coverage for routine work.

How do I submit a support request?

Multiple options for managed clients:

For P1 emergencies, always call directly. Email is fine for everything else.

Will I talk to a real person?

Yes. When you call, you reach our team in Monona — not an offshore call center, not a chatbot. We know who you are and have context on your environment.

How do you handle knowledge transfer if we leave?

We document your environment in your name, not ours. If you ever leave us, you get full documentation, credential handoff, and a structured transition period to your new provider.

We don't hold your environment hostage. That's not how we do business.

Still Have Questions?

We'd rather answer your specific question than have you guess. No pressure, no pitch.

Ready to Stop Guessing About IT?

Get a 15-minute IT health check. We'll review your setup, identify risks, and give you a clear action plan — whether you work with us or not.