Knowledge Base
Frequently Asked Questions
Answers to the questions businesses ask most about managed IT, cybersecurity, and working with AshtonTek.
General
General Questions
Why should we choose an MSP over hiring in-house IT?
A managed service provider gives you access to an entire team of engineers, security analysts, and infrastructure specialists for a predictable monthly cost. Hiring even one senior IT professional in-house can be expensive, and that single person can’t cover every discipline or provide 24/7 availability. With AshtonTek, you get round-the-clock monitoring, multi-layered security, and deep expertise across networking, cloud, compliance, and more — without the overhead of recruiting, training, and retaining a full IT department.
How is managed IT different from break-fix support?
Break-fix is reactive — you call someone when something breaks, and you pay per incident. Managed IT is proactive — we continuously monitor, maintain, and optimize your environment to prevent issues before they cause downtime. The result is higher uptime, lower total cost of ownership, and a technology partner who actually understands your business rather than showing up cold every time something goes wrong.
What’s your response time for support requests?
We triage every support request based on severity. Critical issues — such as full outages or active security threats — receive an immediate response. Standard requests are acknowledged within one business hour and resolved as quickly as possible. Our support team is available 24/7/365, so even after-hours emergencies get the attention they need without delay.
Do you require long-term contracts?
We offer flexible engagement terms tailored to each client’s needs. While many of our managed service plans are structured as annual agreements to ensure proper onboarding and continuity, we believe in earning your business every month. We’re happy to discuss the arrangement that works best for your organization during a consultation.
How do we know you’re actually monitoring our systems?
Transparency is central to how we operate. Every managed client receives regular reporting that includes uptime metrics, ticket summaries, patch status, and security event logs. You also have direct access to our client portal where you can view the real-time health of your environment. We don’t just tell you we’re watching — we show you the data to prove it.
What happens during onboarding?
Onboarding with AshtonTek is a structured process designed to minimize disruption. We start with a comprehensive assessment of your existing environment — hardware, software, security posture, and network architecture. From there, we deploy our monitoring and management tools, document everything, and establish your support workflows. Most clients are fully onboarded within two to four weeks, and you’ll have a dedicated point of contact throughout the transition.
Security
Security & Compliance
How do you protect our business from ransomware?
We take a multi-layered approach to ransomware defense that includes:
- Advanced endpoint detection and response (EDR) on every device
- Email filtering and anti-phishing protections
- Network segmentation to limit lateral movement
- Immutable, air-gapped backups that ransomware cannot encrypt
- 24/7 monitoring through our Security Operations Center
If an attack does occur, our incident response team acts immediately to contain the threat, restore operations, and conduct a full forensic analysis.
Can you help us with HIPAA/PCI-DSS compliance?
Absolutely. AshtonTek has deep experience helping businesses in healthcare, finance, and other regulated industries meet and maintain their compliance obligations. We assist with risk assessments, policy development, technical controls implementation, and audit preparation. Our team understands the specific requirements of frameworks like HIPAA, PCI-DSS, SOC 2, and CMMC, and we build your IT environment to support continuous compliance rather than last-minute scrambles before an audit.
What happens if there’s a security breach?
Our incident response process kicks in immediately. We isolate affected systems to prevent further spread, identify the root cause, and begin remediation. You’ll receive clear communication throughout the process, including what happened, what we’re doing about it, and what steps to take next. After containment, we conduct a thorough post-incident review and implement additional safeguards to prevent recurrence.
Do you provide security awareness training for our staff?
Yes. Human error remains the leading cause of security incidents, so we offer comprehensive security awareness training programs for your employees. This includes simulated phishing campaigns, interactive training modules, and regular assessments to measure improvement. We tailor the content to your industry and risk profile so your team learns to recognize the threats most likely to target your organization.
How do you handle vulnerability management?
We run continuous vulnerability scanning across your entire environment — servers, workstations, network devices, and cloud resources. Discovered vulnerabilities are prioritized by severity and business impact, and our team handles patching and remediation on a defined schedule. Critical vulnerabilities are addressed immediately, while routine patches are deployed during maintenance windows to avoid disruption to your operations.
Technology
Cloud & Technology
Can you manage our Microsoft 365 environment?
Yes. Microsoft 365 management is one of our core competencies. We handle everything from initial migration and tenant configuration to ongoing administration, security hardening, and license optimization. This includes Exchange Online, SharePoint, Teams, OneDrive, Intune, Entra ID (Azure AD), and Microsoft Defender. We ensure your M365 environment is properly secured, backed up, and running efficiently so your team can focus on their work.
Do you support AWS, Azure, and Google Cloud?
We support all three major cloud platforms. Whether you’re running workloads on AWS, Azure, Google Cloud, or a hybrid combination, our cloud engineers can manage, optimize, and secure your environment. We’re vendor-agnostic, which means we recommend the platform that best fits your workload requirements, budget, and compliance needs rather than pushing a single provider.
What monitoring tools do you use?
We use enterprise-grade Remote Monitoring and Management (RMM) platforms alongside SIEM solutions for security event correlation. Our toolset covers endpoint health, network performance, server availability, cloud resource utilization, and security threat detection. All alerts flow into our operations center where they’re triaged by real engineers — not just automated scripts. The specific tools are tailored to each client’s environment for maximum coverage.
Can we keep our existing IT tools and vendors?
In most cases, yes. We evaluate your current tools during onboarding and integrate with what’s already working well. If we identify tools that are redundant, underperforming, or creating security gaps, we’ll recommend alternatives — but the decision is always yours. Our goal is to build on your existing investments, not rip and replace everything on day one.
Support
Support & Relationship
How do we submit support requests?
You can reach us whichever way is most convenient. Submit tickets through our client portal at mytek.co, email support@ashtontek.com, or call us directly at 215-757-3339. Every request is logged, assigned, and tracked to resolution. For critical issues, calling our support line ensures the fastest response.
What if we need to scale up or down?
Our services are designed to grow with you. Whether you’re adding new locations, onboarding additional employees, or scaling back during a transition, we adjust your plan accordingly. There are no penalties for scaling — we view flexibility as a fundamental part of a healthy IT partnership. Your dedicated account manager will work with you to ensure your services always align with your current business needs.
Do you provide on-site support?
Yes. While the majority of IT issues can be resolved remotely, some situations require hands-on attention — hardware replacements, network infrastructure upgrades, or new office buildouts. We provide on-site support as part of our managed service plans, and our field engineers are dispatched as needed to keep your operations running smoothly.
Where is your client portal?
Our client portal is located at mytek.co. From there, you can submit and track support tickets, view system health dashboards, access documentation, and review reports. If you’re a current client and need access credentials, contact us at support@ashtontek.com or call 215-757-3339.
Still Have Questions?
Our team is ready to help. Reach out and we’ll get back to you within one business hour.
Or email us anytime at support@ashtontek.com