Skip to content

FAQs: for Execs & IT Managers,resources,transparent,concise

Welcome to the Solve iT Frequently Asked Questions page! We’ve compiled answers to common questions about our services, processes, and expertise. Whether you're curious about how we can help your business, the industries we serve, or how to get started with us, you'll find the information you need here. Feel free to reach out to us directly – we're always here to help!

General Inquiries

Where is Solve iT located?

Solve iT operates primarily as a remote company, providing flexible IT solutions regardless of location. However, we also have two brick-and-mortar offices: 

  • 218 Westinghouse Blvd, Ste 207, Charlotte, NC 28273 
  • 2925 William Penn Highway, Ste 100, Easton, PA 18045 

These locations provide additional support and demonstrate our local presence while we maintain the ability to support clients remotely. 

What’s the difference between a Managed Service Provider (MSP) and a Managed Security Service Provider (MSSP)?

A Managed Security Service Provider (MSSP) is focused exclusively on cyber security, whereas, a Managed Service Provider (MSP) provides technical support, budgeting guidance, and project management in addition to cyber security. 

Can you help us if we get hacked and we're not a client?

We can, yes.  Depending on the circumstances and scope of the hack, your Cyber Liability Insurance carrier may bring in a forensics team.  Solve iT can initiate a Rapid Response team as well, and the starting price point for this is $35,000, but the final cost depends on the size of your business and the type of compromise.  All of our contracted clients have this available at no additional charge. 

What is your onboarding process like?

Our onboarding process has been developed to ensure a fast and comprehensive experience when switching to Solve iT. The process spans over four phases, starting with setting up users in the Solve iT databases, replacing previous vendor agents, securing the network, and updating documentation.   Phase two focuses on implementing email filtering, encryption, and training users on PII management and the Central Self-Service Portal. Phase three includes a client meeting, security review, and discussing additional hardware and software needs. Finally, phase four involves another client meeting to introduce LCI and the Autotask client portal, setting a Quarterly Business Review schedule, and beginning the risk assessment process. For more on our process, click here. 

How quickly should you hear from your IT provider?

It depends on the IT provider and the agreement you have with them.  At Solve iT, we pride ourselves on quick responses and review the numbers monthly.

 
What’s the difference between a Managed Service Provider (MSP) and a Managed Security Service Provider (MSSP)?

A Managed Security Service Provider (MSSP) is focused exclusively on cyber security, whereas a Managed Service Provider (MSP) provides technical support, budgeting guidance, and project management in addition to cyber security. 

How do I get better/cheaper internet?

Solve iT works with two Master Agents in the telecommunications industry who have direct relationships with all the major internet and telephone carriers throughout the United States.  We can shop for the best speeds at the best rates for our clients’ physical locations.  For clients with multiple sites, we can aggregate into a single bill and single point of contact for outage or problem resolution.  We offer a free network test you can run yourself on our Resources Page.  

Does Solve iT have insurance?

Solve iT carries Errors & Omissions insurance as well as Cyber Liability Insurance coverage.  COIs are available upon request. 

Do you do employee background checks? 

All of our employees get background screenings through https://www.hireright.com. 

How big/small is Solve iT?

Solve iT is a dynamic and growing IT services provider, with a team of skilled professionals delivering top-tier solutions. While we maintain a flexible and scalable approach, we’re large enough to offer a broad range of expertise and support, but small enough to provide personalized attention. We operate with two brick-and-mortar locations in Charlotte, NC, and Easton, PA, as well as a fully remote team that helps clients across various industries. 

What's the difference between CoManaged IT Services and Managed IT Services?

Co-managed IT Services enhance your organization's existing in-house IT team, working alongside your internal IT staff, providing support, expertise, tools, methodologies, and access to our portals based on your specific needs.

The fully Managed IT Services model benefits organizations that outsource IT operations, including managing and maintaining their IT infrastructure, including networks, servers, and workstations. 

As an IT Manager, how do I know you aren’t going to try to replace me?

We’re here to support you, not replace you. Our goal is to work alongside you through the CoMITs program, enhancing your capabilities and helping you succeed by providing the tools, resources, and expertise you need. 

Check out the Comanaged Services (CoMITs) page we created for you here.

Installation and Setup

Does Solve iT support Apple devices and computers?

Solve iT is a member of the Apple Consultants Network (ACN) and supports iPhone, iPad, and Macs for our clients. 

Since we only have laptops and local printers is it necessary to have firewalls installed?

The short answer is yes. Implementing layered security—firewalls, computer protection, email scanning, and other measures—is an industry best practice. Managed devices like laptops and desktops are protected by our security agents, but there are often other unmanaged devices on the same office network, such as printers and desktops, that require additional protection. Firewalls provide a critical layer of defense for these non-mobile systems. 

Mobile devices, however, require protection inside and outside of these networks. Currently, mobile phones without sufficient protection pose the highest risk, and we suspect your recent "hack" incident may be related to this. We are actively working on a solution for mobile device security and will have something available for you soon. 

Looking ahead, the industry is moving toward new technology, such as software-defined networks and Zero Trust architectures, which will eventually allow us to eliminate traditional firewalls. This emerging approach offers more granular control over network access and improved security. However, this technology is still in development and not ready for widespread use just yet. For now, firewalls remain an essential part of a robust security strategy. 

Which is better Microsoft 365 or Google Workspace?

At Solve iT, we work with both platforms, so the choice is really yours to make.  Most of our clients are on the Microsoft 365 platform and Microsoft Azure is our primary hosting platform. 

Which is better: Public Cloud, Private Cloud, or Hybrid Cloud?

The best choice between Public Cloud, Private Cloud, or Hybrid Cloud depends on your company’s specific needs, goals, and resources. Here’s a breakdown of each: 

Public Cloud: Public cloud solutions, like AWS, Microsoft Azure, and Google Cloud, are scalable, cost-effective, and ideal for businesses looking to offload infrastructure management. They provide the ability to scale quickly and pay only for the resources you use. This is an excellent choice for startups or companies that don’t have strict compliance or security requirements but still need flexibility and power. 

Private Cloud: A private cloud is dedicated to a single organization, offering greater control over security and compliance. It’s typically hosted either on-premises or by a third-party provider but is entirely

separate from the public internet. Private clouds are ideal for organizations with strict regulatory or security requirements, such as those in finance or healthcare. 

Hybrid Cloud: Hybrid cloud combines the benefits of both public and private clouds, allowing companies to host sensitive data on a private cloud while taking advantage of the scalability and cost-effectiveness of public cloud resources for less critical applications. This is ideal for businesses that want to keep sensitive data on-premises but need the flexibility to scale or manage non-sensitive workloads in the public cloud. 

Ultimately, Solve iT would recommend Hybrid Cloud for most businesses, as it offers the best of both worlds—security and control for sensitive data along with the scalability and cost savings of public cloud services. However, the final choice depends on factors such as budget, compliance needs, and the scale of your operations. 

We would work with you to assess your needs and design a tailored solution, ensuring your cloud infrastructure provides optimal security, scalability, and cost-effectiveness. 

Let us know how we can help you evaluate which cloud model is right for your business!

Is the cloud safe? Can I lose my company information?

The cloud is often safer than traditional on-premises systems because cloud providers invest heavily in security technologies and practices. Leading providers such as AWS, Microsoft Azure, and Google Cloud employ dedicated teams of security experts, implement advanced encryption methods, and offer built-in redundancy, making their platforms highly secure. These providers also comply with rigorous industry standards and certifications (e.g., SOC 2, ISO 27001), ensuring your data is well-protected. 

However, security doesn't stop with the provider. At Solve iT, we enhance your cloud security by implementing additional measures such as: 

Robust access controls to prevent unauthorized access. 

Regular data backups to ensure business continuity in the event of an emergency. 

End-to-end encryption to protect sensitive data from threats. 

Continuous monitoring to quickly detect and address any vulnerabilities. 

By leveraging our expertise, you can trust that your cloud environment will be optimized for security, making it a safer option than most on-premises systems. The cloud’s built-in security measures combined with our proactive management ensure that your company’s data is safer, more resilient, and less prone to loss. 

Which is better Dell, Lenovo, or HP?

At Solve iT, we do not have a preference, but we currently sell more Lenovo than any other manufacturer.  We can get bulk discounts for our clients, and we also typically set up a hardware refresh timeline for our clients to better budget for hardware replacement. 

Technical Support

What services and platforms do you support?

We support Microsoft 365 and G-suite products as well as Apple and many major computer brands like Lenovo and Dell. We also support many major vendors in accounting software such as QuickBooks and domain support such as GoDaddy. There’s a long list so we can be as detailed or and general as we want. 

How do you support custom or Line of Business (LOB) applications?

Solve iT requires that all 3rd party applications be covered under a support agreement with that vendor.  We will act as intermediary on behalf of our clients in support of the application if needed. 

Do you offer after-hours support?

After-hours support, project work, and onsite work are not included in Solve iT contracts. 

Do you recommend VPNs?
There are two types of VPNs, or virtual private networks:  office-to-office and remote-user VPNs.  The latter is the most common but is becoming less so due to cloud adoption. 

Security & Compliance

Do you offer endpoint protection and antivirus solutions

Yes, we offer full EDR (Endpoint Detection & Response) XDR (Extended Detection & Response), and MDR (Managed Detection & Response) solutions. All of our contracts come with 24/7 MDR, plus a $1M guarantee to protect your business.

How do you handle security patches and updates?

We schedule updates at times that are best for your business. We audit this process to ensure accuracy and maximum protection.

Can you help us implement multi-factor authentication (MFA)?

Yes. We recommend using our secure password vault application instead of texting for MFA. 

Can you provide security awareness training for our employees?

Yes. This is a component of our cyber security program. We help our clients tailor a program to their business needs.

How do you manage data backups to meet compliance standards?

We leverage backup solutions that are HIPPA and GDPR-compliant, whether on-premise or in the cloud. Our backup solutions are SOC2 compliant.

How fast can you restore our systems after a ransomware attack?

The answer to this is dependent on the scope of the attack, and whether or not a cyber insurance claim is required.

It's addressed in your Incident Response Plan. Businesses that do not yet have one, can help to develop one.

How do you protect our company from cyberattacks?

We help businesses examine and understand the pillars of a cyber security program: people, processes, and technology.

What are Solve iT's policies for securing sensitive data?

Implementing Data access policies by defining who has access to what data. We limit access to sensitive material to only those authorized to access it. We adhere to the CIS controls framework.

Can you help us get compliant with regulations like GDPR, HIPAA, or CCPA?

Solve iT offers comprehensive solutions to help organizations achieve compliance with regulations like GDPR, PCI, and HIPAA. Our services include:

  • Cybersecurity Wellness Portal: Access tools and resources to evaluate and improve your cybersecurity posture, a key component of regulatory compliance.
  • Breach Prevention Platform: Identify and mitigate potential security risks to safeguard sensitive data and meet compliance requirements.
  • Dark Web Scanning: Monitor for exposed data on the dark web to prevent unauthorized access and data breaches.
  • Remote Worker Security Solutions: Secure remote access and protect sensitive data for distributed teams, ensuring compliance across all work environments.

By leveraging our expertise and innovative tools, we help organizations build strong data protection measures and maintain compliance with regulatory standards.

Do you perform regular vulnerability assessments and penetration testing?

Yes, Solve iT can provide regular vulnerability assessments and penetration testing to ensure your systems remain secure and compliant. Our team identifies weaknesses in your infrastructure, applications, and processes, and simulates real-world attack scenarios to uncover vulnerabilities before they can be exploited.

We are able to deliver detailed reports with actionable recommendations to strengthen your security posture, helping you meet regulatory requirements and protect sensitive data.

What is your process for responding to a data breach?

Depending on the scope of the attack, we may engage the rapid response team which is covered under all of our agreements. This team is automatically engaged if nefarious activity is detected through proactive threat hunting.

Do you offer disaster recovery and business continuity planning?

Yes, Solve iT provides comprehensive disaster recovery and business continuity planning services. Our experts work with you to design tailored strategies that minimize downtime and ensure your business can quickly recover from disruptions.

We focus on:

  • Data Backup and Recovery: Implementing robust backup solutions to protect critical data.
  • Incident Response Planning: Preparing your team to handle incidents effectively.
  • Business Continuity Frameworks: Developing strategies to maintain operations during unexpected events.

By partnering with us, you’ll gain the confidence that your organization is prepared to face challenges and maintain resilience.

Billing & Payments

Will Solve iT "nickel & dime" us?

Not at all. Solve iT operates on a clear and predictable pricing model, ensuring there are no hidden fees or surprise charges. Our focus is on delivering value and building trust, not unnecessary add-ons. 

How does Solve iT bill its customers?

All of our Managed Services Agreements have unlimited remote support during business hours built into them.  

 

Additional charges apply for after-hours and onsite work.  We invoice twice monthly, on or about the 1st and the 16th of each month. 

Can we go month to month? 

Noall of our support agreements renew annually, bi-annually, and we also offer three year term agreements. 

How much do you charge or how much does it cost?

This can vary, and we provide a step-by-step guide to selecting a new IT company here.