FAQ
Questions Anchorage businesses ask before they hire an MSP.
Honest answers, no marketing fluff. If your question is not here, call (907) 602-1363 or use the contact form.
How is managed IT priced — per device, per user, or flat rate?
+
Our managed IT pricing is per-device with a defined block of monthly support hours included. The flat monthly fee covers everything in your contract. Anything outside the contracted hours, we tell you the cost before we start the work. No hourly billing surprises, no emergency-rate gotchas.
Do you support Google Workspace? Most MSPs are Microsoft-only.
+
Yes. We support Google Workspace as a first-class environment, with the same depth of administration, security, and tooling we bring to Microsoft 365. Most Anchorage MSPs default to Microsoft because Google is unfamiliar to them. We currently run both for active clients across trucking, food and beverage, and professional services.
What is your average response time when something breaks?
+
For managed clients during business hours, calls typically connect to a real engineer within minutes. Emergency after-hours response for managed clients is included in the contract. For non-managed clients calling for the first time, we will get back to you within one business day.
Is there a minimum contract length? What if I want to cancel?
+
Standard managed IT contracts are 12 months with month-to-month renewal after the first year. There is no cancellation fee for honest reasons. If we are not the right fit, we will help you transition to whoever is, including handing over documentation and credentials cleanly.
What is the difference between EDR and regular antivirus, and why does it matter?
+
Antivirus from 2010 looks for known bad files based on signatures. EDR (Endpoint Detection and Response) watches for suspicious behavior, like a Word document spawning PowerShell or an unknown process trying to encrypt files. EDR catches the post-exploitation behavior that signature-based antivirus misses entirely. We use Huntress EDR with real human threat hunters reviewing alerts 24/7. This is the single most important security upgrade most SMBs have not made.
What is included in a "flat monthly fee" — and what is extra?
+
Included: unlimited business-hours helpdesk, 24/7 monitoring, proactive patching, on-site service within the Anchorage bowl, vendor management, quarterly business reviews, and the full security stack (Huntress EDR, Microsoft 365 / Google Workspace hardening, MFA enforcement). Extra: project work like office moves and major migrations, hardware purchases, third-party software licenses (Microsoft, Google, Huntress, etc. are billed at cost through Pax8). All extras are quoted before work begins.
Do you support Macs and mobile devices, not just Windows PCs?
+
Yes. We support Windows, macOS, iOS, and Android. Mobile device management runs through Microsoft Intune, Google Workspace MDM, or Meraki Systems Manager depending on your environment.
What if I am unavailable when the urgent issue happens — do I get a random helpdesk person?
+
No. Every call, every ticket, every site visit goes through the founder. The person who picks up the phone is the person who knows your environment. This is the operating model. It is also why we are intentional about how many clients we take on — we will not grow into something where you call and get a stranger.
Can you take over the IT environment we already have, or do you require us to start from scratch?
+
We take over what you have. No rip-and-replace required. Your existing equipment, vendors, contracts, and software stay. We document the environment, find what is broken or risky, and improve it from inside. Most environments need course correction, not demolition.
How long does onboarding a new client take?
+
For most SMBs, the technical onboarding (documenting the environment, deploying our monitoring and security stack, taking over admin access) takes 2-4 weeks. We are operationally available to support your team from day one. The full picture of your environment takes a quarter to develop, which is why the first quarterly business review is the most valuable one.
Do you do compliance work — HIPAA, CMMC, SOC2?
+
We are not a formal compliance firm. We do the technical security work that makes compliance defensible (encryption, MFA, audit logging, backup, endpoint protection, patch management). For formal documentation, audits, and certifications, we will refer you to compliance specialists. For accounting firms, we know the IRS Publication 4557 expectations and can implement the technical baseline.
What happens to my data and accounts if we end the contract?
+
Everything we have access to is documented, and we hand it off cleanly to whoever is taking over (whether that is you internally, another MSP, or back to you alone). We do not hold credentials hostage. We do not impose a "transition fee." You own your environment regardless of who manages it.
Still have a question?
We answer every email and pick up the phone. (907) 602-1363, or send a note via the contact form.