GBH

IT Essentials

IT Support

Unlimited Tech Support, Antivirus, OS and Office Support, and much more.

90

%

Customer retention over 15 years

500

+

Projects, and counting

95

%

Of clients refer us to their networks

We’ll take care of day-to-day tech issues so that you can focus on growing your business.

service
IT Foundation Plan

at a Glance

Best for:

service

Startups and small / medium businesses looking to upgrade basic IT needs to increase their business’ stability

service

Firms in need of a security upgrade to protect against common IT threats

service

Organizations looking for an economic option to free up time previously spent dealing with IT issues

Providing IT Support with integrity means offering industry-leading prevention.

You’re growing fast.

IT Foundation will help your IT catch up.

Industry-leading Prevention to Keep Things Running Smoothly:

image: Top Antivirus:
Top Antivirus:

State-of-the-art antivirus and daily background scans to stay ahead of vulnerabilities.

image: Updated to the Latest & Safest:
Updated to the Latest & Safest:

Keep your business running smoothly and risks controlled, we’ll ensure your software is always up-to-date.

image: Comprehensive Support:
Comprehensive Support:

Support to keep your business running smoothly: device inventory, enhanced password protection, filtering inappropriate or unproductive sites, and more.

image: Encrypted Password Vault:
Encrypted Password Vault:

Storing your firm’s passwords on a Post-it or document invites risk. Your business has grown; consider your personal encrypted vault your new Post-it.

image: Monthly Visibility Reports:
Monthly Visibility Reports:

Detailed monthly reports to give you full visibility into your business and state of IT.

Your IT Team Ready to Field Unlimited Requests:

image: Unlimited Support:
Unlimited Support:

No limit to the number of requests; but common issues include troubleshooting printing, software, email, and more.

image: Fast Response:
Fast Response:

Get common IT questions and issues handled quickly with our industry-leading response times.

Get enhanced protection and back up.

IT Foundation
IT Protection & Security
View detailed plan overview
Essential IT Support

Best for: Fast-Growing Businesses looking for their IT to catch up.

Unlimited Remote Assistance

Get common IT questions answered in real-time, when it matters most. Support has no limits; but common inquiries include troubleshooting for printing, email, phone, document issues, slow devices, and custom software configurations. We’ll take care of time-sensitive tech issues so you can focus on everything else.

Monthly Reports

Custom monthly report providing detailed visibility into the status of your tech assets (e.g. computers, servers, cell phones) to ensure everything is running properly (e.g. antivirus, hard drive, memory, OS services etc.).

Device Monitoring and Response

Software installed on each device will automatically flag device errors so that we can get it operating at full capacity quickly. Top things tracked: hard drive, memory, (what else?)

Service Desk with Standard SLA

Every tech issue opens a track-able ticket so you can check the status of the case and chat with the agent.

Annual Business Review

Custom report reviewing infrastructure and providing recommendations for improvements to increase service reliability. Common improvements include server optimization, network equipment, electrical equipment, and security considerations.

OS and Office Support

Support with day-to-day computer issues. From Office program crashes, to corrupted OS files, and even typos in an excel formula, your agents have you covered in real-time.

Email Platform Support

Ever ask any of the following? “My emails aren’t getting out?” “Why do emails take so long to get to me?” “I’m going on vacation can you add an automatic message for me, I forget to do it in the office?” ‘How do I create an email address for a new hire?” “How do I change my password?” “How do I disable an email account because an employee has left the company?” “Can you help me configure email on my phone or computer?” We’ve got your covered.

Device Inventory

An inventory of all tech assets both for insurance purposes and to allocate resources effectively between employees. Simple but helpful when you need it.

Automated Maintenance

A series of daily safety checks (without interrupting the user) to identify device errors, performance capabilities, and optimization opportunities. We’re immediately notified of any errors and get it resolved before the user even has to open a ticket.

Essential IT Security

Best for: Fast-Growing Businesses looking for their cyber security to catch up.

Antivirus

A Top 5 Antivirus Software to protect and prevent the most common threats.

Web Content Filtering

Filter inappropriate or nonproductive sites with smart web content filtering.

Patch Management

All major attacks involve a form of missing patch implementation. Just as important as antivirus software, we’ll ensure your devices are consistently updated to the latest patch versions to guard against malicious attacks that can result in downtime, data exposure, and data loss.

Password Protection

An encrypted vault with strict security permissions to store all usernames and passwords for every account & device in one secured location. No more passwords in a master excel or in plain sight. A locked vault that only one/few people have access to increases overall network safety and efficiency.

Business Continuity Security

Best for: Businesses looking for proactive cyber security and powerful back up for always-on service.

Backup & Disaster Recovery

Every device is backed up daily, with a version retention period of 28 days. For full visibility, we’ll send daily reports confirming backup completion. Companies with a large amount of data changing frequently can be backed up twice per day. Servers can be restored using back up information in under 24 hours.

Endpoints Advanced Threat Security (Sandbox Analyzer)

Suspicious files are sent to your “Sandbox” quarantine area outside of the network, to executer the potentially malicious software before it enters your network. This is a security measure that allows suspicious files to be tested before they’re opened on network computers.

Emails Advanced Threats Protection for Office 365

Email has become the major vector of attack. Firewalls and antivirus software alone don’t block all email attacks. Advanced Threat Protection (ATP) blocks the most common email threats: phishing (e.g. someone pretending to be your bank or another trusted source) and malicious links or attachments. ATP keeps risky emails out of your inbox.

Data Driven Insights

Our remote monitoring and management tools analyze your entire infrastructure and give tips and insights on what can be improved (such as pending Window updates, recommended computer reboots for enhanced performance, operating system optimization, and data about potential vulnerabilities).

Yearly Security Awareness Training Seminar

Live webinar and Q&A providing an annual overview of top security threats and best practices for protecting against them.

Two Factor Authentication for Office 365

Layered security enhancement to make it more difficult for attackers to gain access to your network.

Get enhanced protection and back up.

Essential IT Support

Best for: Fast-Growing Businesses looking for their IT to catch up.

Unlimited Remote Assistance
Monthly Reports
Device Monitoring and Response
Service Desk with Standard SLA
Annual Business Review
OS and Office Support
Email Platform Support
Device Inventory
Automated Maintenance
Essential IT Security

Best for: Fast-Growing Businesses looking for their cyber security to catch up.

Antivirus
Web Content Filtering
Patch Management
Password Protection
Business Continuity Security

Best for: Businesses looking for proactive cyber security and powerful back up for always-on service.

Backup & Disaster Recovery
Endpoints Advanced Threat Security (Sandbox Analyzer)
Emails Advanced Threats Protection for Office 365
Data Driven Insights
Yearly Security Awareness Training Seminar
Two Factor Authentication for Office 365

The GBH Difference

Vision
Goals
Why

We deliver results like no-one else because we make tech choices rooted in a deep understanding of your business.

While tech gets fancier, we stay evermore rooted in the fundamentals.

image: All in the same boat
All in the same boat

We’re in this together. We solve meaningful challenges with ambitious clients and don’t stop until it’s right.

image: At the drop of a hat
At the drop of a hat

The market moves fast. You need a team that moves faster. We staff your dream team in a matter of days.

image: Come rain or shine
Come rain or shine

We will be there. We will follow through. And we will do what’s right to help you make a meaningful impact.

image: Actions speak louder than words
Actions speak louder than words

90% of our clients have been with us for over 15 years. Ensuring the wellbeing of our clients is more than a promise.

image: For the long haul
For the long haul

We deliver impactful solutions to complex challenges that evolve with you and pave the way for future growth.

image: Make no bones about it
Make no bones about it

Candid, clear, consistent communication that always does right by the business, even if it’s not an easy conversation.

image: Hit the nail on the head
Hit the nail on the head

We understand your why to make choices that align with your strategy the first time.

15 years proudly ramping up clients’ IT infrastructure with a tried-and-true process:

Schedule a call with a business-minded tech lead committed to understanding your business, challenges and objectives.

After initial technical due diligence, we will start a more detailed assessment of your infrastructure and what's needed to get your business running seamlessly.

We’ll fly out to your office to get hands-on insight into your existing infrastructure to start working on the foundational and critical things we've identified to increase your business’ stability.

Your IT is about to get an upgrade.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.




GBH: IT Foundation

Our latest best practices in information technology.