Frequently Asked Questions
A: A Managed Service Provider (MSP) is a third-party company that manages and assumes the responsibility of a defined set of IT and technology management services to its clients. It is a strategic method of improving operations that is commonplace among large corporations as well as small and medium-size businesses, non-profit organizations, and governments. As an MSP, the team at Cooperative Systems can act as the client’s IT Department or can simply augment the IT staff that is already in place.
A: Instead of following the old practice of break-fix with a small in-house IT or outsourced “IT Guy” (literally meaning wait until the server, desktops or other critical networking devices fail, then scramble to fix them), a business operating in partnership with a Managed Service Provider like Cooperative Systems, focuses on the prevention of these issues before they disrupt employees, management and/or clients.
A: An MSP is a good option for several types of companies.
- Businesses looking for more predictable budgeting and IT spending should consider managed IT services.
- Small- and medium-sized businesses can benefit from managed services.
- Businesses concerned about hacks, data leaks, breaches and other cybercriminal activity.
- Businesses who must comply with industry regulations such as Healthcare, Government, and Financial organizations can trust Cooperative System’s knowledge and experience.
- Businesses positioning for future growth.
This list is by no means exhaustive, and if you don’t find yourself represented by one of these scenarios, it doesn’t mean managed services aren’t for you. However, these categories are a good indication you could benefit from managed services.
A: The vast majority of IT issues can be handled remotely, however sometimes there is a need to be on site. When that need arises, Cooperative Systems will dispatch our technicians to your site to handle those issues.
A: Response times to specific issues depend on the severity of the issue the client is facing. Our goal is to meet your needs by maximizing uptime and addressing issues as soon as they occur.
A: The technical staff at Coopsys carry a large variety of industry certifications including from Cisco and Microsoft and more.
A: Our Service Desk is always ready to help – We are available 24 hours a day, 7 days a week, 365 days a year!
A: All of our services are fixed fee. We perform a thorough Assessment & Discovery process at the onset of a client relationship to properly scope all of the required services to ensure a successful relationship. Our clients receive a fixed monthly service fee that covers everything we do – no surprises.
A: A significant focus of our relationship is to ensure our team is well aligned with our clients’ businesses. We hold regularly scheduled Strategic Business Review meetings with our clients to understand the trajectory of their business, so that we can make proper recommendations regarding technology, to ensure our services and technical recommendations will allow those objectives to be realized.
A: We always recommend a multi-layered approach to cybersecurity. There is no one product or service that completely protects a business against all cybersecurity threats. You must implement multiple systems that provide different types of protection, as well as implement multi-vendor solutions.
A: Here are a few tips for securely working remote:
- Use a VPN to connect to your company network
- Enforce multi factor authentication for connectivity
- Only use company machines that have up to date security patches and software running for accessing work resources
- Use a separate computer for personal web access, or at least minimize personal use of company equipment
- Follow the same vigilance when opening websites and emails as you would in the office.
A: A VPN is not necessarily required, but it’s probably the most secure method of connectivity, and we strongly recommend it.
A: This is dependent on your organizations policies, but in most cases, yes.
A: This is dependent on your organization’s policies, programs, and infrastructure, but it is possible to configure remote access to files and applications.