Fully Managed IT

Your dedicated IT & Cyber Security Team

Managed IT Support - Group 2176 1
Managed IT Support - IT Support Nottingham

Our All-Inclusive Managed IT Services Package

Everything listed below is included as standard in our Managed IT & Cyber Security service. No need for add-ons or bolt-ons. We provide comprehensive protection for your business, ensuring efficiency and delivering maximum value.

Managed IT Support - Helpdesk

INCLUDED

Unlimited IT Support

You'll be assigned a dedicated IT team and a specified head of cyber security ready to deal with any technical issues or cyber threats.

Nobody likes waiting around for a call back, right? Our average response times across all incident priorities continually remains under 30 minutes.

Unlimited remote & on-site IT support is included.

Managed IT Support - Vector

INCLUDED

Endpoint Device Management

In 2023, 1,228 vulnerabilities were found and patched by Microsoft alone. 84 of these were classed as critical, meaning there was a very high risk an attacker could exploit this to gain unauthorised access.

Staying on top of your devices allows us to get any issues dealt with promptly and monitor for risks you may not be aware of.

It also simplifies management and deployment of new software or changes required to make your computers and servers more secure.

Managed IT Support - Laptop Small Image
Managed IT Support - Vector

INCLUDED

24/7 Security Operations Centre

Hackers are working around the clock, attempting to get a foothold into your business to steal your valuable data.

Our third-party, expert security team watch over our client's devices 24/7 for any signs that hackers are trying to break in.

Think of this like a security monitoring team watching the CCTV at your premises and alerting the police to potential criminal activity.

Managed IT Support - Vector 2
Managed IT Support - Group 7 1 1

INCLUDED

Microsoft 365 Security

Microsoft 365 has become the biggest target for hackers. Not only do you use it for emails, you're probably also storing data in Teams, OneDrive and SharePoint as well.

If a hacker compromises one or more of your Microsoft 365 accounts, this leads to critical data theft and an opportunity to escalate the attack across your team or your clients/suppliers.

Whenever we take on a new client, we harden their Microsoft 365 security using our baseline tool, then we monitor your accounts for suspicious activity.

Managed IT Support - Vector 2
Managed IT Support - Security Monitoring

INCLUDED

Advanced Endpoint Security

Traditional anti-virus doesn't work. Gone are the days where a basic, free or cheap anti-virus solution could keep your devices safe from threats.

Modern attacks on Windows use scripts and other native features built-in to the operating system, making it much more difficult for traditional anti-virus to spot the threat.

Our solution uses behavioural analysis to detect threats where others fail.

Managed IT Support - Endpoint Security 1
Managed IT Support - Vector

INCLUDED

Data Breach Monitoring

Did you know that over 550 million usernames and passwords have been leaked from previous data breaches?

These include compromised accounts from LinkedIn, Adobe, Canva, Dropbox, Tesco and hundreds of others.

The risk to you and your employees is that malicious actors will attempt to login to your accounts using these leaked credentials.

We monitor these data breaches for you and inform your employees of any of their leaked passwords.

Managed IT Support - Vector 2
Managed IT Support - Password
Managed IT Support - Group 7 2

INCLUDED

Secure Password Manager

With the rise of password leaks on the dark web, it's vital that every employee uses unique passwords for each application or service. We recommend complex, long passwords (at least 16 characters), but these are hard to remember.

That's why, as part of our service, we provide a secure, user-friendly password vault, enabling employees to easily generate and manage strong, unique passwords.

Managed IT Support - Vector
Managed IT Support - Phishing Tackle

INCLUDED

Cyber Security Training

UK data protection law requires businesses to train employees on handling personal data and the risks of cyber attacks and phishing.

This training should be audited to keep a detailed record of who completed it and their level of understanding.

As part of our service, we provide a fully managed training platform to help you stay compliant.

Managed IT Support - Vector

Included

Simulated Phishing

Alongside our security awareness training, our team of Ethical Hackers will also simulate what malicious criminals do.

Far too many businesses are compromised because of phishing or spear-phishing.

Targeted attacks on your employees have become common and you need to ensure that everyone knows how to spot and report phishing emails.

Managed IT Support - Vector 2
Managed IT Support - Phishing Email
Managed IT Support - Email Protection

INCLUDED

Email Protection

Over 75% of cyber attacks start with an email, according to multiple sources.

A common technique we see is impersonation of a senior employee, whereby the attacker will use the name of a trusted manager to send an email to an employee, often a new starter.

This can be difficult to defend against as it's just a name of the email instead of the email address, but our email protection can detect and stop this threat, along with other email based attacks.

Managed IT Support - Vector

Included

Web Protection

Whilst email is a common attack vector, hackers are increasingly using platforms like Microsoft Teams to target your employees with malicious links.

If someone clicks on a harmful link, our web filtering agent detects the threat and protects your business.

It also allows you to block inappropriate content, such as gambling or adult sites.

Managed IT Support - Vector 2
Managed IT Support - Web Filtering
Managed IT Support - Cloud Backups

INCLUDED

Microsoft 365 Backups

Businesses often wrongly assume that their Microsoft 365 data such as emails and files within Teams, OneDrive and Sharepoint are backed up automatically by Microsoft.

This isn't the case and corruption or loss of data is your responsibility.

Therefore, we include a third-party, cloud to cloud backup solution to protect all of our client's critical data.

Managed IT Support - Vector

Our Onboarding Process

How Does It Work?

Switching IT providers isn't as difficult as you probably think. We ensure that the transition goes as smoothly as possible and you shouldn't expect any disruption to your business.

Like what you see? Let's start the conversation.

If you are interested in our reliable and responsive IT Support Services, get a quote for your business or contact our team here.

Managed IT Support - Vector 1 1
Managed IT Support - Vector 3

FAQs

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Do you offer services to compliment an in-house IT Team?

Absolutely! In fact, over 25% of our clients have an internal IT team which we collaborate with.

Far too often, we see that the IT Manager/Director has been handed more and more responsibilities as technology evolves. From day to day support, IT projects, AV & meeting room equipment through to Cyber Security. It all lands on the shoulders of the IT Manager.

Unfortunately, with all this additional pressure from the business, it can often lead to burnout and leaves the company at risk.

It’s also unreasonable to expect the internal IT team to up-skill in all these areas whilst juggling their key responsibilities.

At Reformed IT, we can take the pressure off the internal IT team by working as an extension of it. We bring additional skills, tools and experiences whereby we can collaborate and make your IT stronger and more secure.

Do you offer ad-hoc or pay as you go IT Support services?

Quite simply, no, we don’t.

We’ve built one of the best IT and Cyber Security teams around. This requires significant investment in our people and they want job security, as you would expect.

If we allowed our clients to pay as and when they needed us, firstly, we wouldn’t be able to guarantee we could pay our team and secondly, we wouldn’t be motivated to ensure your IT works as perfectly as it possibly can.

If we only get paid when it breaks, that is not good for either party.

Have you got different packages for different budgets?

Our service and pricing is standardised to ensure that every single one of our clients receives the same exceptional service and all the Cyber Security measures we can think of.

Essentially, all we need to know is whether you have an internal IT team that we’re going to be working with or if you’re planning on outsourcing all of your IT requirements to us.

These are the only two pricing differences we have.

Is there a minimum starting price to work with you?

We have a minimum starting price of £1,300 per month for our fully managed service and £2,000 per month for our co-managed service.

The reason we have minimum monthly charges for our services is because we want to continue to deliver exceptional, best in class service to our clients.

We believe the best way to do this is to work with fewer clients, providing a more dedicated experience.

Because we work with fewer clients, we have to ensure that we work to a minimum starting price, otherwise we would be forced to take on too many clients which would dilute our attention and service levels.

What additional costs do we need to consider alongside the Managed IT Service?

The intention of our fully-inclusive Managed IT & Cyber Security service is to ensure that we aren’t trying to sell you add-ons or bolt-ons all the time.

We’ve found from conversations with businesses that their current experience with their IT partner is they feel like they’re constantly being sold to. With new products and services being offered on a regular basis with additional charges.

That said, there are some options that don’t benefit all our clients equally and stay separate to our Managed IT Service.

You will pay additionally for your Microsoft 365 licences as these aren’t included within the package price. We’ve done this to ensure that we provide the most cost-effective licenses for your particular use case.

A lot of our clients choose to use our hosted VoIP telephone solution too. This would be quoted for you based on your requirements.

Do you offer telephone/VoIP solutions as well as IT?

Indeed we do! Over 95% of our Managed IT clients use our recommended VoIP solution through us as well.

We implement a solution called 3CX as it’s one of the leading voice solutions on the market for businesses and a really cost-effective option too.

Businesses are often attracted by the idea of using Microsoft Teams as their phone system, and although we can help with this as well, we feel the better choice is 3CX.

What are your cyber security credentials?

Interesting fact, our CEO is a Certified Ethical Hacker and has been in the IT Security industry for 20+ years, so as you can imagine, Cyber Security is paramount to what we do.

As a business, we are Cyber Essentials Plus certified and have been since the year we were founded.

This is a government backed scheme and certification to encourage higher standards of cyber security resilience within UK businesses.

We also ensure every one of our clients meets these standards.

How can we prevent our business from being hacked?

It would be wrong for us, or anyone else for that matter, to guarantee 100% protection against cyber security threats.

However, what we do for our clients is to ensure we do whatever we possibly can to reduce and mitigate risks.

We do this by ensuring we have multiple layers of protection and controls for risks that are known to us.

We’re extremely active in the cyber security community, ensuring that we’re constantly on the look out for new, modern threats and then looking for ways to protect our clients from anything that emerges.

Which regions does your inclusive on-site support cover?

We provide inclusive remote and on-site IT Support in Nottingham & Derby.

We also provide fully inclusive remote IT Support in London.