FAQ

Why should we choose Version2 as our MSP?

You get unlimited support, a comprehensive cybersecurity suite, proactive monitoring, and quarterly business reviews that align IT with your goals. Our approach keeps your environment consistent, secure, and efficient.

How do you keep our IT costs predictable?

We use a fixed monthly fee based on the number of end users. It includes unlimited support, cybersecurity, and proactive management. Projects and major upgrades are quoted separately, and vCIO meetings help you plan annual budgets and lifecycle replacements.

Is managed IT more cost-effective than hiring full-time staff?

Yes. You gain a full team of IT professionals with enterprise-level expertise at a fraction of the cost of one in-house hire. If you already have IT staff, we can co-manage to add consulting, cybersecurity, and strategy.

How quickly will someone respond when we submit a ticket?

We respond in minutes and fix most issues within an hour. The helpdesk runs Monday to Friday, 7:00 AM to 7:00 PM Central Time with continuous monitoring. Critical issues receive a response within 1 business hour. High severity gets 1 to 2 hours. Routine requests or projects are addressed within 4 business days.

Do you provide onsite support or only remote help?

Both. Most issues are solved remotely for speed. If a problem needs hands-on work, we dispatch a technician. Visits are prioritized by urgency. Clients within a 60-minute travel window typically do not incur travel charges. Standard travel or onsite rates may apply for longer distances or special access.

What happens if an issue occurs after hours or on weekends?

Emergency support is available outside standard hours. After-hours or weekend work is billed at twice the normal hourly rate with a one-hour minimum. Our 24/7 monitoring and SOC escalate critical alerts immediately. Uptime and service-credit policies may apply if covered response obligations are missed.

How do you protect us against phishing and email threats?

We use layered email threat protection with spam filtering, quarantine, AI-driven detection for credential theft, and security awareness training so employees can spot scams.

What security tools are included?

Every client receives next-generation antivirus and EDR, zero-trust application control, managed firewalls and intrusion prevention, patching, vulnerability scanning, DNS filtering, dark web monitoring, and 24/7 SOC oversight.

Do you monitor our systems 24/7 for cyberattacks?

Yes. Automated tools detect anomalies and our Security Operations Center investigates and responds quickly to minimize impact and protect data.

Can you migrate us to Microsoft 365 without downtime?

We plan, pilot, and phase migrations during low-use windows. Data sync runs in parallel so people can keep working. After cutover, we validate mail, Teams, SharePoint, and OneDrive and provide support. Hybrid coexistence is available if needed.

What ongoing management do you provide once we are in the cloud?

We handle user and license management, security and compliance policies like MFA and conditional access, monitoring, backups for mail and files, patching and updates, and ongoing training and governance reviews.

How do backups and business continuity work?

We tailor backups by system and recovery needs. Servers are backed up nightly to an isolated on-premises repository and replicated to an immutable offsite location. Managed endpoints can include secure offsite backup. SaaS platforms like Microsoft 365 and Google Workspace are backed up multiple times per day with encrypted, redundant storage and granular restores.

What is the difference between backup, disaster recovery, and business continuity?

Backup creates secure copies of data for restore. Disaster recovery brings systems and infrastructure back online after a major event. Business continuity keeps operations running during recovery with planning, failover, remote access, and prioritization.

What are co-managed IT services and how do you work with internal teams?

Co-managed IT extends your staff with our people, tools, and strategy. We share ticketing, set clear escalations, cover vacations and overflow, provide expert help on complex tech, deliver 24/7 monitoring, manage patching and backups, maintain documentation, and involve a vCIO for alignment.

What does onboarding look like and how long does it take?

Onboarding is structured and transparent. We orient your team, assess systems, document the environment, deploy monitoring, backup, and security tools, and launch a 12-month roadmap with your vCIO. Technical onboarding typically takes two to four weeks. Administrative documentation varies by complexity. You have a dedicated project coordinator and clear updates throughout. After onboarding, you receive proactive monitoring, unlimited helpdesk support, quarterly vCIO reviews, maintained documentation, and ongoing improvements. In the first 90 days we fine-tune, complete documentation, communicate frequently, start strategic planning, and address quick wins.