Support Features

Unlimited Helpdesk Support

Our IT experts are fully qualified professionals with over 50 years combined experience in various fields of technology.

With My Tech Team, you get on-demand access to U.S. based IT experts with just the click of your mouse, email, or call – providing support for on-premise and cloud based systems. Getting help has never been easier! No more expensive break-fix arrangements, and no more waiting for a tech to arrive, increasing your downtime.

Forget help desks with multiple levels, and long wait times. All of our technicians are just a click, call, or email away. Get instant support when you need it.

small business it support

System Maintenance

Our software allows us to run periodic clean up tasks and maintenance on your systems, including operating system patches and updates, software updates, and more.

We’ll run periodic these periodic tasks and ensure all of the latest security patches are applied to your system(s).  This is an effective and efficient solution not only for Microsoft Windows and Office applications security patches (particular targets for attackers based on their almost ubiquitous presence) but also non-Microsoft applications such as Adobe Reader, Adobe Flash Player, Mozilla Firefox, Mozilla Thunderbird, Java and more.

Emergency After-Hours SupporT

Problems sometime arise at the most inconvenient times. Get access to our after-hours emergency support team when they do. You’ll get a private number to call for after-hours support.

What are emergencies?

  • System Crash Preventing Business Continuation
  • Network Outage Preventing Business Continuation
  • Loss of Access to critical business system(s)
  • Loss of Data
  • Infection causing loss of access (i.e. Ransomeware)
after hours IT support
virtual CIO

Dedicated Tech Advisor

Your dedicated tech advisor is a highly skilled IT professional that serves as your go to person for all things tech.

Your dedicated tech advisor also performs the following:

Provides IT procurement assistance to help you make optimal technology purchasing choices that fit best with your organization’s needs. This enables you to offload onerous vendor issues to us.

Monitors your workstation and server warranties while also providing expert guidance in developing strategies for implementing and managing technology.

Assists with move/add/change projects to ensure a smooth and rapid deployment for system changes – whether you require a hardware upgrade, software migration/upgrade or a complete network install.

Assists with developing a business continuity plan to ensure that your business stays afloat amid a system outage.

And much more..

Security Features

Antivirus

Cyber Guardian, by My Tech Team, is a high-performance, cutting-edge, real-time proactive protection softwarefrom all forms of malicious activity.

Features

High-Performance Threat Protection

The biggest frustration with antivirus programs is bloat and high resource usage. Our Antivirus software has been completely written from scratch to run seamlessly without impairing system performance. Users report amazing results after replacing their existing antivirus with ours – it’s like they have a new system!

Powerful Antivirus/Antispyware Engine

At the core is an antivirus and antispyware engine that merges the detection of all types of malware into a single efficient and powerful system. The new technology was developed without building on older generation antivirus engines. Our software uses next-generation technologies making it the future of antivirus programs.

Advanced Anti-Rootkit Technology

Our all-new anti-rootkit technology finds and disables malicious hidden processes, threats, modules, services, files, Alternate Data Streams (ADS), or registry keys on a user’s system.

Removing rootkits is supplemented by our FirstScan™ technology which runs at the system’s boot time. FirstScan bypasses the Windows operating system, to directly scan certain locations of the hard drive for malware, removing infections where found.

Active Protection

Active Protection delivers real time monitoring and protection against known and unknown malware threats. Active Protection works inside the Windows kernel (the core of the operating system), watching for malware and stopping it before it has a chance to execute on a user’s system.

anti virus software for small business
hipaa audit

Web Filtering

As the number of web-based security threats multiply – from phishing sites, proxies, websites pushing malware to spyware, adware and botnets – it is vital that you have web security to avoid accidentally straying onto malicious websites.

The web filtering feature leverages an extensive site categorization database providing URL coverage for over 280,000,000 domains. Web filtering is designed to provide optimal, safe, browsing speed through the use of multiple categorization servers strategically positioned around the globe.

Features

Threat Protection

Protect against malware, phishing, adware, botnets, and spam.

Access Controls

Keep users off sites that could cause a data breach and protect your business from the legal liability that comes with a data breach.

Site Blacklists

Set and automatically enforce browsing policies that keep users off non-work related sites like gaming or social media.

Time-Based Browing

Modify blacklist rules to allow employees to visit non-work sites outside of standard business hours.

Custom Policies

Utilize our default web protection policies or create your own custom rules for desktops, laptops, or servers.

24/7 System Monitoring

Instant Alerts. To the right technician. With Accurate Information. So we can fix it fast.

My Tech Team’s system monitoring service turns conventional IT support on its head. Rather than wait for you to notice that a problem has occurred often involving time-consuming ‘systems fiddling’ on your part – our system monitoring service will alert us to problems as soon as they occur. We’ll almost always know about an issue before you do, so we can take appropriate action to fix it fast and minimize disruption.

Our software sends us an email or SMS alert showing us the exact nature of the problem. And it updates our Wall Chart, a large screen in our office that shows the exact status of all our clients. We’ll see the true nature of a potential problem – rather than having to depend on (ahem) your best guess. That means we can fix it faster – radically decreasing resolution time and ensuring system stability and security.

By default, our software is setup to monitor key services required for your system to function such as print spoolers, windows update, DHCP, and many more.Further, we also monitor event logs to detect an critical system events (i.e. failing hard drives) so we can take action immediately. However, we recognize that every environment is unique.After we learn what your organization needs are, we can set our system to check and ensure that process and systems are always running and take appropriate action if not.

Key Benefits

  • Specific, informative alerts show us the exact nature of the problem so we can fix it faster.
  • Problems are almost always highlighted to us before you even know you have one so that we can take action. Uptime is maximized.Alerts are routed to the right technician. He or she can fix it faster – and do it right the first time.
  • Reduce exposure to vulnerabilities and minimize the level of disruption with unpatched systems.
  • Get access to our dashboard so that you can check the status of your own systems and see what actions we’ve taken.
  • Periodic reports on the status of your system(s).
intrusion detection

Intrusion DEtection

Preventative security products such as antivirus protect SMBs against most unsophisticated threats.However, the threat landscape is getting more sophisticated with threats that can slip past preventative security measures.

Our intrusion detection system provides advanced threat detection which identifies hackers and malware that slip past antivirus and firewalls.This solution consists of two components, an endpoint agent and a cloud-based analysis engine.

Endpoint Agent

The agent inventories each application scheduled to automatically start at boot or user login.Metadata on these applications are sent to our analysis engine for inspection.This lightweight design ensures user’s productivity is never hindered by resource intensive processes

Anaysis Engine

The analysis engine aggregates data from the agents and uses our proprietary algorithm to discover malicious outliers in the data.Each persistent application is evaluated using a combination of file reputation, frequency analysis, and other proprietary algorithms. The details of any discovered malicious content are fed into our analsys dashboard, giving our analysts additional data to correlate security events and take immediate action.

Data Protection Features

DAta Backup

Digital Safe, by My Tech Team, is a fast, reliable, automatic, secure, hybrid backup solution, saving small businesses and small offices/home office from dealing with the mundane, but essential task, of data backup. Digital Safe includes a 28-day retention policy which makes your life easier! No more worrying about on-premise backup failure, or someone forgetting to run backups. The days of lost data are gone! Further, Digital Safe, together with My Tech Team support services provide your business with a recovery solution that meets your recovery time and recovery point objectives.

Features

2-Tier Local/Cloud Bacup

With our software, you can set your own on-site backup device for quick recovery. Your data will be backed up both to the cloud and to your own local device. For larger datasets, restores will not be limited by the speed of the connection to the cloud.

Archiving

Retaining an archive backup may not simply be best practice, so there is a snapshot of your customer’s data available from outside of the retention period you can restore from, but it can be an industry or regulatory requirement.

In addition to specifying archives for the Files and folder backups in the Backup Policy dialog, you can configure archiving for all data sources in the device’s Backup Manager. Archive as often as you need!

Multiple Data Sources
  • Backup multiple shared folders with one client
  • Live Exchange backup at the Information Store level using VSS
  • Live SharePoint backup
  • System State backup using VSS
  • Easily select the Files and folders to include in your dataset
  • Backup and restore Virtual Machines on devices running Hyper-V or VMware.
  • Backup databases(Supported databases: Oracle, MySQL, MSSQL)
Smart Bandwidth

Our cabinet technology and low delta’s minimize the usage of the connection, both for backup and restore

If the connection fails during backup, backups will automatically continue when the connection is restored

The software can be set to limits the usage of the bandwidth during specific hours

Point-In-Time Restoration

Restore or recover a set of data or a particular setting from a time in the past – up to 28 days.

Military-Grade Security

All data is 256-bit AES encrypted and compressed before being uploaded to our fully audited, highly secure, and redundant data centers through a secure SSL channel. Before sending, the data is encrypted. No need for an extra secure connection or extra security on your storage. There is no decryption on the server and, even if asked, My Tech Team is unable to decrypt and read your data. You can rest assured that your data is safe.

System Imaging

Our software can create a continuously updated image of your entire system and data.In the even of system failure, your system can be accessed in a virtual environment until a replacement is installed.

Online Backup for business
start disaster recovery plan

Disaster REcovery

Our recovery team will set up your solution and work with your tech advisor to establish a disaster recovery and business continuity plan that meets your recovery point and recovery time objective.

When a disaster occurs, we will ensure a quick and efficient restore.

Compliance Features

Vulnerability
Scanning

We will scan, detect, assess and rectify security vulnerabilities on your systems by using over 60,000 vulnerability assessments using an extensive, industrial strength vulnerabilities databases incorporating OVAL (11,500+ checks) and SANS Top 20 standards, providing a complete picture of your network and helping maintain security.

vulnerability scanning
risk auditing

Risk Auditing

We will perform ongoing risk assessments within your environment through PCI DSS, Data Breach and Security Scans; calculating the real-time risk of a data breach, assigning a value to it, and taking remediation actions.

Through risk auditing it is possible to:

Gain visibility of any sensitive data on your systems. We will identify unprotected data and its location -including highly-sensitive Personally Identifiable Information (PII) such as Credit Card Numbers, dates of birth, government issued identification, and financial account numbers – to understand how an attacker would compromise it, and how much a data breach would cost.

Minimize the risk of a data breach.Avoid cost-prohibitive and crippling data breaches; which can be detrimental not only to the business itself, but also its reputation.

Build a business case for security projects. Understand the total risk exposure within your environment in monetary terms and use this insight to connect security to business value; to help justify the resources and expenditure required to better safeguard data.

Demonstrate regulatory compliance. Satisfy a host of highly punitive compliance requirements that mandate periodic risk assessments and audits, including HIPAA, PCI DSS and FINRA.

Other Features Included With All Plans

Add-On Services

Selectable On Checkout

Let Us be your IT department

Focus on running your business while we manage, maintain, and secure your computer systems and network.