FAQs
Have questions about our IT services, security standards, or how we work with clients? Here you’ll find clear answers to the most common things businesses ask us.
All our IT support services are delivered from Australia. We do not offshore tickets or phone support, ensuring fast response times and a consistent quality of service.
Yes, we offer phishing simulations and user awareness training so your staff can recognise threats before they impact your business.
We support SMBs across multiple industries, including professional services, healthcare, construction, and finance. Our focus is secure, compliant, and scalable IT systems.
Yes, we support Windows, macOS, iOS, and Android through Microsoft Intune, ensuring consistent security controls across all devices.
Our onboarding process begins with a comprehensive assessment of your current IT environment and security posture. We then develop a customised plan to address your specific needs, including implementing necessary security measures and providing ongoing support. Our goal is to ensure a smooth transition and seamless integration of our services
Yes, we offer full migration support, including planning, execution, and post-migration optimisation. Whether you’re moving from on-premises systems or consolidating cloud platforms, we ensure a smooth transition.
Absolutely. We can complement your internal IT team by providing specialised support, strategic guidance, or taking on specific responsibilities.
Yes, we can assist with navigating Microsoft licensing. This can be complex to understand. At a minimum, I.T. With You requires clients to have Business Premium licenses with the Defender Suite add-on. We can assist you in upgrading to this licensing in order to be compliant with our security baseline for your organisation.
At I.T. With You we take cybersecurity seriously, and licensing below this specification may lack certain essential cybersecurity features which are a requirement for our managed services plans.
Our approach involves understanding your business needs, conducting thorough assessments and developing tailored solutions. This ensures successful implementation and continuous improvement for your business.
We offer fixed project pricing as well as hourly consulting rates. Our pricing is transparent, and we always agree on fees upfront.
Yes, we offer training programs to help your staff effectively use new technologies and stay updated with best practices.
The ASD Essential Eight is a set of baseline strategies recommended by the Australian Signals Directorate to mitigate cybersecurity incidents. These strategies include application control, patching applications, configuring Microsoft Office macro settings, user application hardening, restricting administrative privileges, patching operating systems, multi-factor authentication, and daily backups. Implementing these strategies helps organisations protect their systems and data from cyber threats.
We offer managed backup services for Microsoft 365, including email, SharePoint, and OneDrive. Our backup solutions ensure that your data is securely stored and easily recoverable in case of data loss or corruption. We follow best practices for data backup and recovery to minimize downtime and ensure business continuity. Our backup Provider is SOC2 Type II, ISO 27001 and HIPAA compliant. All backup data is also stored in Sydney, Australia.
Our contracts are clear and straightforward. They outline exactly what services we provide, response times, and deliverables. Payment terms and any recurring fees are defined upfront with no hidden charges. We include SLAs setting out response and resolution time expectations, and our contracts cover liability and data security obligations. Duration and exit terms are clearly stated so you always know where you stand.
Still have questions?
Can’t find the answer you’re looking for? Please chat to our friendly team.
Get A Free Health Check Today
Is your business at risk from cyber threats? Our free IT health check reveals what’s working, what’s vulnerable, and what needs attention in your technology environment.