Week 1
During the discovery call with your agency’s Point of Contact, we will gather relevant information and populate the agency info page. We will discuss the Archway Security Bundle, any ongoing projects, and the direction of your IT strategy. An email will be sent to request any remaining items needed. Please note that giving notice to your current IT provider may require a 30-day notice, and we will provide instructions for authorizing them to share IT-related information with Archway Computer. The process of authorization typically takes about a week, but it may vary depending on the vendor’s response time.
Week 2
The process of loading Archway management agents onto all computers, including those in the office and remote locations, takes less than 15 minutes. Archway works closely with the agency’s Point of Contact to reconcile the staff and computer list, ensuring seamless communication between agents and Archway. Discussions with the agency Point of Contact cover how staff can request computer support. The Archway Security Stack is deployed on all computers, ensuring comprehensive protection. Credentials provided by the previous IT provider are tested for accuracy. Backup solutions, such as Datto Transfer Paperwork or other options, are implemented as necessary. Discussions with a specialist address Microsoft Office 365 setup, including OneDrive, SharePoint, and file locations, to determine if email migration is required.
Week 3
During the transition process, we handle the removal of the previous IT provider’s Remote Monitoring and Management (RMM) software and Antivirus (AV). To bolster security, we implement measures such as dark web monitoring, phishing campaign detection, and online security courses. Additionally, we enable DNS filtering to protect against malicious websites, implement encryption for data security, and establish multi-factor authentication for enhanced access control. Furthermore, we enable Microsoft Office 365 backup through CloudAlly to ensure data protection. If a migration is necessary, we offer pre-staging of Microsoft Office 365 to facilitate a seamless transition.
Week 4
As part of our seamless transition process, we take care of removing the previous IT provider’s Remote Monitoring and Management (RMM) software and Antivirus (AV) solutions. To enhance security, we implement dark web monitoring, phishing campaign detection, and provide online security courses. DNS filtering is enabled to protect against malicious websites, while encryption measures ensure the confidentiality of sensitive data. We establish multi-factor authentication (MFA) for enhanced access security and enable Microsoft Office 365 backup via CloudAlly for reliable data protection. If needed, we pre-stage Microsoft Office 365 to facilitate a smooth migration process with minimal disruption to your operations.