Our IT experts are fully qualified professionals with over 40 years combined experience in various fields of technology.
With My Tech Team, you get on-demand access to U.S. based IT experts with just the click of your mouse, email, or call – providing support for on-premise and cloud based systems. Getting help has never been easier! No more expensive break-fix arrangements, and no more waiting for a tech to arrive, increasing your downtime.
Forget help desks with multiple levels, and long wait times. All of our technicians are just a click, call, or email away. Get instant support when you need it.
Proactive System Maintenance
Our software allows us to run periodic maintenance on your system including operating system patches and updates, software updates, system clean up, and more.
We’ll run periodic maintenance tasks and ensure all of the latest security patches are applied to your system(s). This is an effective and efficient solution not only for Microsoft Windows and Office applications security patches (particular targets for attackers based on their almost ubiquitous presence) but also non-Microsoft applications such as Adobe Reader, Adobe Flash Player, Mozilla Firefox, Mozilla Thunderbird, Java and more.
Antivirus & Internet security
Cyber Guardian, by My Tech Team, is a high-performance, cutting-edge, real-time proactive protection softwarefrom all forms of malicious activity.
The biggest frustration with antivirus programs is bloat and high resource usage. Our Antivirus software has been completely written from scratch to run seamlessly without impairing system performance. Users report amazing results after replacing their existing antivirus with ours – it’s like they have a new system!
At the core is an antivirus and antispyware engine that merges the detection of all types of malware into a single efficient and powerful system. The new technology was developed without building on older generation antivirus engines. Our software uses next-generation technologies making it the future of antivirus programs.
Our all-new anti-rootkit technology finds and disables malicious hidden processes, threats, modules, services, files, Alternate Data Streams (ADS), or registry keys on a user’s system.
Removing rootkits is supplemented by our FirstScan™ technology which runs at the system’s boot time. FirstScan bypasses the Windows operating system, to directly scan certain locations of the hard drive for malware, removing infections where found.
Active Protection delivers real time monitoring and protection against known and unknown malware threats. Active Protection works inside the Windows kernel (the core of the operating system), watching for malware and stopping it before it has a chance to execute on a user’s system.
As the number of web-based security threats multiply – from phishing sites, proxies, websites pushing malware to spyware, adware and botnets – it is vital that you have web security to avoid accidentally straying onto malicious websites.
Cyber Guardian delivers web security for your systems anyplace, anytime.
The Internet Security feature leverages an extensive site categorization database providing URL coverage for over 280,000,000 domains. Web Security is designed to provide optimal, safe, browsing speed through the use of multiple categorization servers strategically positioned around the globe.
Data Breach Risk Intelligence
With our risk intelligence services we’ll perform ongoing risk assessments within your IT environment through PCI DSS, Data Breach and Security Scans; calculating the real-time risk of a data breach and assigning a monetary value to it, and remediating the problem.
We’ll perform these audits periodically and remediate any discovered risks. Further, we’ll archive your reports so that you meet all of the latest federal regulations for IT auditing.
We’ll identify unprotected data and its location – including highly-sensitive Personally Identifiable Information (PII) such as Credit Card Numbers, dates of birth, government issued identification, and financial account numbers – to understand how an attacker would compromise it, and how much a data breach would cost. Then, we’ll work with you to take action to prevent such occurence.
We’ll help you understand the total risk exposure within your IT environment in monetary terms and use this insight to connect security to business value; to help justify the resources and expenditure required to better safeguard data.
Satisfy a host of highly punitive compliance requirements that mandate periodic risk assessments and audits, including HIPAA, PCI DSS, FINRA and more.
Included with our Service Desk Complete plan, our dedicated virtual CIO provides IT procurement assistance to help you make optimal technology purchasing choices that fit best with your organization’s needs. This enables you to offload onerous vendor issues to us.
Your dedicated CIO also provides expert guidance in developing strategies for implementing and managing technology, move/add/change projects to ensure a smooth and rapid deployment for your system changes – whether you require a hardware upgrade, software migration/upgrade or a complete network install, and IT budget planning.
Backup + Recovery
Digital Safe, by My Tech Team, is a fast, reliable, automatic, secure, hybrid backup solution, saving small businesses and small offices/home office from dealing with the mundane, but essential task, of data backup. Digital Safe includes a 28-day retention policy which makes your life easier! No more worrying about on-premise backup failure, or someone forgetting to run backups. The days of lost data are gone! Further, Digital Safe, together with My Tech Team support services provide your business with a recovery solution that meets your recovery time and recovery point objectives.
With our software, you can set your own on-site backup device for quick recovery. Your data will be backed up both to the cloud and to your own local device. For larger datasets, restores will not be limited by the speed of the connection to the cloud.
Retaining an archive backup may not simply be best practice, so there is a snapshot of your customer’s data available from outside of the retention period you can restore from, but it can be an industry or regulatory requirement.
In addition to specifying archives for the Files and folder backups in the Backup Policy dialog, you can configure archiving for all data sources in the device’s Backup Manager. Archive as often as you need!
All data is 256-bit AES encrypted and compressed before being uploaded to our fully audited, highly secure, and redundant data centers through a secure SSL channel. Before sending, the data is encrypted. No need for an extra secure connection or extra security on your storage. There is no decryption on the server and, even if asked, My Tech Team is unable to decrypt and read your data. You can rest assured that your data is safe.
Our recovery team will set up your solution and establish a disaster recovery and business continuity plan that meets your recovery point and recovery time objective. When a disaster occurs, we will ensure a quick and efficient restore.
24/7 System Monitoring
Instant Alerts. To the right technician. With Accurate Information. So we can fix it fast.
My Tech Team’s system monitoring service turns conventional IT support on its head. Rather than wait for you to notice that a problem has occurred often involving time-consuming ‘systems fiddling’ on your part – our system monitoring service will alert us to problems as soon as they occur. We’ll almost always know about an issue before you do, so we can take appropriate action to fix it fast and minimize disruption.
It sends us an email or SMS alert showing us the exact nature of the problem. And it updates our Wall Chart, a large screen in our office that shows the exact status of all our clients. We’ll see the true nature of a potential problem – rather than having to depend on (ahem) your best guess. That means we can fix it faster – radically decreasing resolution time and ensuring system stability and security.
Specific, informative alerts show us the exact nature of the problem so we can fix it faster.
Problems are almost always highlighted to us before you even know you have one so that we can take action. Uptime is maximized.Alerts are routed to the right technician. He or she can fix it faster – and do it right the first time.
Reduce exposure to vulnerabilities and minimize the level of disruption with unpatched systems.
Get access to our dashboard so that you can check the status of your own systems and see what actions we’ve taken.
We’ll send you periodic reports on the status of your system(s).
Other features included with all plans
On Site Support
Get discounted hourly on-site support, if required.Available for any location in the U.S.
Mobile Device Support
Get help with all of your mobile devices including Android, Apple, and Windows.
Dedicated Recovery Team
We’ll help you develop a disaster recovery plan, monitor your back ups, and perform periodic tests. When disaster strikes, your dedicated recovery team will assist in restoring systems and data.
Assets are the most critical element of any business, and with the addition of Asset and Inventory Management your already first class service is enhanced even further. We’ll keep an asset report updated at all times with your inventory.We can also track changes made to your systems.
You’ll get a weekly status report of your systems health and any maintenance performed. Further, we’ll send you a monthly executive summary that details your systems health status, protection effectiveness, coverage, and more in easy to understand language.
Get access to view your own business systems, run your own reports, check their status on the fly, and even remote access your systems anytime, anywhere.
ADD ON SERVICES
Selectable On Checkout
We’ll monitoring theperformance of server hardware components, and system health, performance and errors in server-based Operating Systems. It also includes unlimited support, advanced virus protection and 1 TB of data backup at only $150/server.
Mobile Device Management
Company owned or employee owned, our MDM service ensures critical data is secure. Set user policies on company devices and watch them in real-time at only $5/device.
Email Continuity & Protection
Get a highly effective and low-maintenance hosted email security solution whose next-generation technology protects thousands of organizations from junk email and viruses while also providing valuable email continuity at only $2/mailbox
Let Us be your IT department
Focus on running your business while we manage, maintain, and secure you computer systems and network.