Unlimited Expert IT Support

Our IT experts are fully qualified professionals with over 40 years combined experience in various fields of technology.

With My Tech Team, you get on-demand access to U.S. based IT experts with just the click of your mouse, email, or call – providing support for on-premise and cloud based systems. Getting help has never been easier! No more expensive break-fix arrangements, and no more waiting for a tech to arrive, increasing your downtime.

Forget help desks with multiple levels, and long wait times. All of our technicians are just a click, call, or email away. Get instant support when you need it.

small business it support

Proactive System Maintenance

Our software allows us to run periodic maintenance on your system including operating system patches and updates, software updates, system clean up, and more.

We’ll run periodic maintenance tasks and ensure all of the latest security patches are applied to your system(s).  This is an effective and efficient solution not only for Microsoft Windows and Office applications security patches (particular targets for attackers based on their almost ubiquitous presence) but also non-Microsoft applications such as Adobe Reader, Adobe Flash Player, Mozilla Firefox, Mozilla Thunderbird, Java and more.

Antivirus & Internet security

Cyber Guardian, by My Tech Team, is a high-performance, cutting-edge, real-time proactive protection softwarefrom all forms of malicious activity.


High-Performance Threat Protection

The biggest frustration with antivirus programs is bloat and high resource usage. Our Antivirus software has been completely written from scratch to run seamlessly without impairing system performance. Users report amazing results after replacing their existing antivirus with ours – it’s like they have a new system!

Powerful Antivirus/Antispyware Engine

At the core is an antivirus and antispyware engine that merges the detection of all types of malware into a single efficient and powerful system. The new technology was developed without building on older generation antivirus engines. Our software uses next-generation technologies making it the future of antivirus programs.

Advanced Anti-Rootkit Technology

Our all-new anti-rootkit technology finds and disables malicious hidden processes, threats, modules, services, files, Alternate Data Streams (ADS), or registry keys on a user’s system.

Removing rootkits is supplemented by our FirstScan™ technology which runs at the system’s boot time. FirstScan bypasses the Windows operating system, to directly scan certain locations of the hard drive for malware, removing infections where found.

Active Protection

Active Protection delivers real time monitoring and protection against known and unknown malware threats. Active Protection works inside the Windows kernel (the core of the operating system), watching for malware and stopping it before it has a chance to execute on a user’s system.

Advanced Internet Security

As the number of web-based security threats multiply – from phishing sites, proxies, websites pushing malware to spyware, adware and botnets – it is vital that you have web security to avoid accidentally straying onto malicious websites.

Cyber Guardian delivers web security for your systems anyplace, anytime.

The Internet Security feature leverages an extensive site categorization database providing URL coverage for over 280,000,000 domains. Web Security is designed to provide optimal, safe, browsing speed through the use of multiple categorization servers strategically positioned around the globe.

anti virus software for small business
hipaa audit

Data Breach Risk Intelligence

With our risk intelligence services we’ll perform ongoing risk assessments within your IT environment through PCI DSS, Data Breach and Security Scans; calculating the real-time risk of a data breach and assigning a monetary value to it, and remediating the problem.

We’ll perform these audits periodically and remediate any discovered risks. Further, we’ll archive your reports so that you meet all of the latest federal regulations for IT auditing.



Gain visibility of any sensitive data on devices

We’ll identify unprotected data and its location – including highly-sensitive Personally Identifiable Information (PII) such as Credit Card Numbers, dates of birth, government issued identification, and financial account numbers – to understand how an attacker would compromise it, and how much a data breach would cost. Then, we’ll work with you to take action to prevent such occurence.

Minimize the risk of a data breach

Avoid cost-prohibitive and crippling data breaches which can be detrimental not only to the business itself, but also its reputation.

Understand Risk Exposure

We’ll help you understand the total risk exposure within your IT environment in monetary terms and use this insight to connect security to business value; to help justify the resources and expenditure required to better safeguard data.

Demonstrate Regulatory Compliance

Satisfy a host of highly punitive compliance requirements that mandate periodic risk assessments and audits, including HIPAA, PCI DSS, FINRA and more.

Virtual CIO

Included with our Service Desk Complete plan, our dedicated virtual CIO provides IT procurement assistance to help you make optimal technology purchasing choices that fit best with your organization’s needs. This enables you to offload onerous vendor issues to us.

Your dedicated CIO also provides expert guidance in developing strategies for implementing and managing technology, move/add/change projects to ensure a smooth and rapid deployment for your system changes – whether you require a hardware upgrade, software migration/upgrade or a complete network install, and IT budget planning.

virtual CIO

Backup + Recovery

Digital Safe, by My Tech Team, is a fast, reliable, automatic, secure, hybrid backup solution, saving small businesses and small offices/home office from dealing with the mundane, but essential task, of data backup. Digital Safe includes a 28-day retention policy which makes your life easier! No more worrying about on-premise backup failure, or someone forgetting to run backups. The days of lost data are gone! Further, Digital Safe, together with My Tech Team support services provide your business with a recovery solution that meets your recovery time and recovery point objectives.


2-Tier Local/Cloud Bacup

With our software, you can set your own on-site backup device for quick recovery. Your data will be backed up both to the cloud and to your own local device. For larger datasets, restores will not be limited by the speed of the connection to the cloud.


Retaining an archive backup may not simply be best practice, so there is a snapshot of your customer’s data available from outside of the retention period you can restore from, but it can be an industry or regulatory requirement.

In addition to specifying archives for the Files and folder backups in the Backup Policy dialog, you can configure archiving for all data sources in the device’s Backup Manager. Archive as often as you need!

Multiple Data Sources
  • Backup multiple shared folders with one client
  • Live Exchange backup at the Information Store level using VSS
  • Live SharePoint backup
  • System State backup using VSS
  • Easily select the Files and folders to include in your dataset
  • Backup and restore Virtual Machines on devices running Hyper-V or VMware.
  • Backup databases(Supported databases: Oracle, MySQL, MSSQL)
Smart Bandwidth

Our cabinet technology and low delta’s minimize the usage of the connection, both for backup and restore

If the connection fails during backup, backups will automatically continue when the connection is restored

The software can be set to limits the usage of the bandwidth during specific hours

Point-In-Time Restoration

Restore or recover a set of data or a particular setting from a time in the past – up to 28 days.

Military-Grade Security

All data is 256-bit AES encrypted and compressed before being uploaded to our fully audited, highly secure, and redundant data centers through a secure SSL channel. Before sending, the data is encrypted. No need for an extra secure connection or extra security on your storage. There is no decryption on the server and, even if asked, My Tech Team is unable to decrypt and read your data. You can rest assured that your data is safe.

Dedicated Recovery Team

Our recovery team will set up your solution and establish a disaster recovery and business continuity plan that meets your recovery point and recovery time objective. When a disaster occurs, we will ensure a quick and efficient restore.

24/7 System Monitoring

Instant Alerts. To the right technician. With Accurate Information. So we can fix it fast.

My Tech Team’s system monitoring service turns conventional IT support on its head. Rather than wait for you to notice that a problem has occurred often involving time-consuming ‘systems fiddling’ on your part – our system monitoring service will alert us to problems as soon as they occur. We’ll almost always know about an issue before you do, so we can take appropriate action to fix it fast and minimize disruption.

It sends us an email or SMS alert showing us the exact nature of the problem. And it updates our Wall Chart, a large screen in our office that shows the exact status of all our clients. We’ll see the true nature of a potential problem – rather than having to depend on (ahem) your best guess. That means we can fix it faster – radically decreasing resolution time and ensuring system stability and security.

Key Benefits

  • Specific, informative alerts show us the exact nature of the problem so we can fix it faster.
  • Problems are almost always highlighted to us before you even know you have one so that we can take action. Uptime is maximized.Alerts are routed to the right technician. He or she can fix it faster – and do it right the first time.
  • Reduce exposure to vulnerabilities and minimize the level of disruption with unpatched systems.
  • Get access to our dashboard so that you can check the status of your own systems and see what actions we’ve taken.
  • We’ll send you periodic reports on the status of your system(s).

Other features included with all plans


Selectable On Checkout

Let Us be your IT department

Focus on running your business while we manage, maintain, and secure you computer systems and network.