Why this is important
Onboarding of a client is a vital first step in understanding your how your business operates so that we can support it in the future.
The first of client onboarding is to document your current IT infrastructure.
To fix any immediate issues, and create a plan to deal with less urgent issues.
And to set a technical base line for our ongoing work.
Our process

Onboarding and installation
During onboarding of a new client, we create detailed technical documentation of all your current IT infrastructure, and install our automated tools to ensure the health of your IT infrastructure going forwards

Ongoing management
Our automated tools are always monitoring your environment to ensure the Confidentiality, Integrity, and Availability of your data. We check all updates against known CVE threats as listed by NIST, and then verify the installation.

IT Support
As an MSP, supporting your IT infrastructure is a core part of our business. Being a small MSP, we get to know your team, so when you raise a ticket with us, we care about you, and resolving whatever the issue is ASAP.
How do we onboard clients
Understanding your current technical environment, is key to managing and supporting it.
This is why documenting everything, within your organization is vital, weather its a physical or a virtual asset, it needs to be documented.
Everyone in IT works to minimise the chances of IT service outages, but ultimately, with the best will in the world, IT outages happen.
In the event of a loss of any IT service, getting the service back again as quickly as possible has got to be a core aim. In this situation quality of your IT documentation is can not be underestimated. For example, do you know where the most recent configuration backup of your router is stored? Having immediate access to such data will reduce the time spent on configuring routers by a massive amount compared to not having access to that information.
After documenting the environment, we need to ensure it’s secure, we do this by firstly reviewing access, and removing any unauthorized devices from the network, and then by identifying weaknesses within your IT infrastructure, planning to strengthen these up.
We will also installing tools on your network, and devices to monitor the security of your IT environment, and allow us (with your permission) to log in and provide you with IT support.
Once this has been done, we will set a technical baseline for your IT infrastructure, we will ensure that all the software on your network has a purpose, and put a patching and support strategy in place.
Additionally, any new users, or devices will go through a similar process to ensure they’re properly introduced, and fully documented.
After this, we’ll continue to manage your IT environment in the background.