YES. We have tools & resources that our clients can use that allow them to manage software and applications. These tools also give them access to our ticketing system. If they are unable to solve the issue with that, they are able to escalate as needed to solve the issue.
Your data is not important to the hacker, it is important to you. Their goal is to block you from accessing your clients’ data, your data, etc. If it has value to you, you might be willing to pay to get it back. This is exactly why they would target you.
Just like your workers, we have the ability to work remotely. We put our tools on their devices to be able to support, manage and secure those devices from anywhere.
This may require your employees to have a company device or to have their device locked down, but that decision is ultimately in the hands of the business owner. Securing these devices remotely allows us to keep the bad guys out and give your employees access to the files they need, no matter where they are.
Yes! We are able to do on-site visits to businesses, depending upon the client and where they are located. Typically, we don’t do much work in employees’ homes, primarily because most of our work is able to be completed remotely. If we are going into homes, it is usually the business owner’s home.
We do not assign primary technicians because we don’t want only one person to know our clients. All of our technicians are trained to support all of our clients equally. Sometimes one technician will know a client better than most, but we mitigate this issue by sharing information across the team.
Though we don’t assign primary technicians, each client has an account manager. The account manager serves as the main point of contact for that client.
We do assign dedicated account managers, but all our staff act as account managers by delivering the highest quality of customer service, and being able to answer any questions that may arise.
We have a system of checks and balances behind the scenes to ensure that every client is getting all of the work that they pay for. We can run reports at any time that show the work we are doing, and the results of that work.
Our average client has been with us for over 9 years, so we must be doing something right.
Costs can vary depending on what kinds of services and solutions a business needs. EIS has an in-depth interview process to determine the exact needs of potential clients, including their industry requirements (things like HIPAA and FINRA), their software requirements, and the number of users on devices. They use this information to create a customized plan designed to satisfy all the clients’ needs without redundancies or unnecessary services. Typically speaking, the cost per user ranges from $120 – $250.
We take a proactive approach to your IT and security to help prevent you from ever needing to make help desk calls. This proactive approach includes a lot of services, licensing, and labor that goes on behind the scenes.
We are always working to make sure things are running smoothly for our clients. If you don’t have to call us a lot, just know that that is because of all the “hidden” work we are putting into your IT support.
We hear this a lot, but the truth is you think you can hire an IT guy for less.
When you’re thinking about hiring that “IT guy,” as yourself these questions:
Does this person have the experience and expertise that I need to keep my business secure?
Are they going to be bringing in licensing, monitoring, tools for updates, and security?
Are they going to be on call to help with any IT issues that pop up 24/7?
If the answer is no, then you need to seriously consider whether or not you want to hire them to handle one of the most critical aspects of your business.
EIS has all the expertise you need to keep your business up and running smoothly. We do bring licensing, monitoring, tools for updates, the ability to run security reports, and security tools to the table.
Our help desk is on call 24/7 to help you whenever disaster strikes. We never take a vacation or call in sick.
Well, that depends on what you feel is overkill. If you’re willing to take the chance of your systems being down, of your security being breached, or if you’re not worried about meeting the industry standards that protect your clients, then yes, it is overkill.
If you aren’t willing to take those risks, then this is a far cry from overkill. This is an intelligent business decision.
We would love to say that everyone loves us, but that just isn’t realistic. If we determine that we aren’t going to be a good fit, then we are going to find a way to have an amicable breakup. We want each of our clients to be a client because they like us and the services they receive, not because they are forced to be with us.
Growth is a great problem to have, and we are here to support it! If you grow, we adjust the agreements based upon your growth.
If you shrink, some licensing will go down, but some of it may stay the same. There are some elements that have a minimum requirement, so those specific elements may not see a decrease in rates. We will offer adjustments to the rates everywhere we can.
This is a great question. Our initial contract is 3 years because our team spends a lot of time and effort up front, cleaning up your current IT environment and training you and your employees how to use the applications and systems we put into place.
Realistically, we lose money the 1st year of working with a new client, we break even in year 2, and our team starts to see the benefits of the relationship in year 3.
Working With Us is As Easy as 1-2-3
Here is our 3-step process:
We meet, get to know one another, and determine if we’re a good fit.
We begin network discovery and gather information on your network, people, challenges.
We present a solution with recommendations that is unique to you.