person holding pencil near laptop computer
person holding pencil near laptop computer

Essential Business Support

At Preferred IT, we understand that, as a business owner, you may not always see the immediate value in a fixed monthly fee for IT Managed Services (MSP), especially if you rarely interact with the IT staff or experience long delays in getting service. That's why we are dedicated to providing you with simple and competitive support packages that deliver tangible benefits and peace of mind.

Our Essential Business Support package is designed to provide comprehensive support to protect your organisation from external threats and ensure smooth operation of your IT systems. We have carefully crafted this package to address the specific needs of businesses like yours, taking into account your budget and the importance of seamless IT operations.

Key Features of our Essential Business Support Package:

  1. External Email Scanner: We implement a state-of-the-art external email scanner that acts as the first line of defence against email-borne threats. It scans incoming and outgoing emails, detecting and blocking malicious content.

  2. Email Advanced Scanning and Attachment Monitoring: Our advanced email scanning technology goes beyond traditional spam filtering to identify and block sophisticated email threats. It includes comprehensive attachment monitoring to detect any potentially harmful files.

  3. SPAM Filtering and URL Removal: We employ advanced SPAM filtering techniques to minimize unwanted and malicious emails. Additionally, we remove suspicious URLs embedded within emails to prevent users from accessing harmful websites.

  4. Firewall and Anti-virus SMTP Scanning: Our robust firewall solution protects your network by filtering incoming and outgoing traffic, while our anti-virus SMTP scanning actively scans email communications for malware. These measures enhance security and reduce the risk of infection.

  5. Automatic Updating of Anti-virus Software: We ensure that your anti-virus software is always up to date by enabling automatic updates. This guarantees that your systems are protected against the latest threats.

  6. Advanced Threat Protection and Sandboxing: We implement advanced threat protection technologies that use sandboxing techniques to analyze and isolate potentially harmful downloads and email attachments. This extra layer of security minimizes the risk of zero-day attacks.

  7. MSP Agent PC Monitoring: Our Managed Service Provider (MSP) agent monitors individual PCs for unusual behaviour, such as CPU over-usage, which could indicate the presence of malware or other security threats. This proactive monitoring allows for quick detection and mitigation of potential issues.

  8. Windows Updating, Patching, and Updating: We take care of regular Windows updates, patching, and system updates to ensure that your operating systems are secure and up to date with the latest security patches.

  9. Application Whitelisting: We enforce a strict application whitelisting policy, locking down your systems so that only approved and authorized applications can run. This reduces the risk of unauthorized software compromising your network.

  10. Group Policy: We implement a centralized network policy using Group Policy, which allows for efficient management and control of resources across your organization. This ensures consistent security configurations and enhances overall network stability.

  11. Folder Permissions, Access Review, and Removal: We regularly review folder permissions to ensure that only authorized personnel have access to sensitive data. Any unnecessary access rights are promptly removed to prevent unauthorized data breaches.

  12. Staff Training: We provide comprehensive staff training to educate users about spotting fake emails and recognizing potential phishing attempts. This empowers your employees to become the first line of defence against social engineering attacks.

  13. Corporate Policy and Governance: We assist in developing and implementing corporate policies and governance frameworks that guide the organization's software lifecycle and ensure the use of supported software. This helps maintain a secure and compliant IT environment.

At Preferred IT, we understand the value of delivering tangible benefits and providing prompt, reliable IT support. Our simple and competitive support packages, such as the Essential Business Support package, are tailored to meet

This is the IT model that we work towards for maxiumum security based on best practise principals and many years experience.

Our Essential Business Support Plan offers numerous benefits that can significantly enhance your business's overall security and productivity. By signing up for this plan, you can:

  1. Mitigate Security Risks: With advanced email scanning, attachment monitoring, and SPAM filtering, our plan provides a robust defence against email-borne threats and malicious content. This reduces the risk of data breaches, viruses, and other security incidents.

  2. Ensure Data Integrity: Our firewall, anti-virus SMTP scanning, and sandboxing technologies protect your network from external attacks and zero-day threats. By automatically updating your anti-virus software and implementing advanced threat protection measures, we ensure that your systems are always up to date with the latest security patches.

  3. Proactive Monitoring and Issue Detection: The MSP agent PC monitoring feature allows us to identify and address potential issues on individual PCs, such as malware infections or abnormal CPU usage, before they escalate. This proactive approach minimizes downtime and improves overall system performance.

  4. Streamline IT Operations: We take care of Windows updating, patching, and system updates, reducing the burden on your IT team and ensuring that your systems are always optimized and secure. This allows your internal IT staff to focus on strategic initiatives rather than routine maintenance tasks.

  5. Enforce Application Control: Through application whitelisting, we lock down your systems to only allow authorized applications. This prevents the installation and execution of unauthorized software, minimizing the risk of malware and ensuring system stability.

  6. Centralized Network Policy: With Group Policy implementation, we provide a central network policy that controls and manages resources across your organization. This ensures consistent security configurations, simplifies access management and enhances network stability.

  7. Data Access Control: Regular folder permission reviews and access removal for unnecessary personnel help maintain data integrity and prevent unauthorized access to sensitive information. This strengthens your overall data security and compliance.

  8. Empower Your Staff: Our comprehensive staff training educates your employees about identifying fake emails and recognizing potential phishing attempts. By equipping your staff with the knowledge to spot and report security threats, you create a strong first line of defence against cyber attacks.

How Does This Plan Benefit Your Business?

Why Should You Sign Up?

Signing up for our Essential Business Support Plan offers several compelling reasons:

  1. Simplified Pricing: Our simple and competitive support packages provide transparent pricing with no hidden fees. You'll have a clear understanding of the cost and value you receive, making budgeting and decision-making easier for your business.

  2. Enhanced Security: Our comprehensive security measures protect your business from various threats, reducing the risk of data breaches, downtime, and financial losses. By staying up to date with the latest security technologies, we ensure that your systems are always protected against emerging threats.

  3. Expert Support: With our professional team of IT experts, you can rely on prompt and reliable support. We are dedicated to addressing your IT needs efficiently and minimizing any disruptions to your operations.

  4. Time and Resource Savings: By outsourcing your IT security and management to us, you free up your internal IT team's time, allowing them to focus on strategic projects that drive your business forward. Our proactive monitoring and regular updates reduce the need for reactive maintenance and troubleshooting.

  5. Compliance and Governance: Our assistance in developing corporate policies and governance frameworks ensures that your software lifecycle is aligned with best practices and that you're always using supported software. This helps you maintain compliance with industry regulations and minimizes legal and reputational risks.

By choosing our Essential Business Support Plan, you can gain peace of mind knowing that your business is well-protected against cyber threats, your IT systems are running smoothly, and you have a dedicated team of experts supporting your technology needs.

Your Preferred IT Partner for Reliable and Efficient Solutions


Get in touch

Contact us today to discuss your business needs and receive an obligation-free consultation. Our team of experts is committed to providing personalised solutions that meet your unique needs.