What Happens in the First 90 Days After Switching IT Providers
BJ Pote
CEO, eTop Technology
The number one reason businesses stay with a bad IT provider is fear. Fear of the transition. Fear of downtime. Fear that switching will somehow be worse than what they’re dealing with now.
I get it. Your technology environment is critical to your operations. The idea of someone new coming in and touching everything is uncomfortable. (If you’re still in the evaluation phase, we put together 20 questions to ask before signing with any IT provider that might help.) But here’s what I tell every prospective client: we’ve done this transition dozens of times. We have a process. And when you see the process laid out, the fear goes away.
Let me walk you through exactly what happens in the first 90 days after you decide to switch.
Days 1-14: Discovery and Documentation
This is the most important phase, and it’s the one most IT providers rush through. We don’t.
During the first two weeks, our engineering team does a comprehensive audit of your entire technology environment. We’re documenting everything:
- Network architecture: firewalls, switches, access points, VLANs, VPN configurations
- Server inventory: what’s running, what operating systems, what’s the hardware age
- Cloud services: Microsoft 365 configuration, Azure resources, AWS instances, SaaS applications
- User accounts and access: who has access to what, admin accounts, service accounts
- Security posture: current antivirus/EDR, MFA status, backup configuration, firewall rules
- Licensing: what you’re paying for, what you’re actually using, what’s redundant
- Line-of-business applications: the specific software your team depends on daily
- Existing documentation: whatever your previous provider left behind (often not much)
We also sit down with department heads and key users. Not to talk about technology, but to understand how they work. What frustrates them. Where they lose time. What tools they wish worked better. This context shapes everything we do going forward.
The discovery phase usually uncovers things that surprise business owners. Expired SSL certificates. Admin accounts that belong to employees who left two years ago. Backup jobs that have been failing silently for months. It’s not unusual, and it’s exactly why we do this before we change anything.
Days 14-21: The Credential Handoff
This is the part that makes people nervous, so let me be direct about how it works.
We work with your previous provider to transfer all credentials, administrative access, and vendor relationships. Domain registrar logins. Microsoft 365 global admin. Firewall admin access. Everything.
Here’s the reality: a professional IT provider, even one you’re leaving, will cooperate with this process. It’s industry standard. If they don’t, that tells you a lot about why you’re leaving in the first place.
We handle this methodically. We have a credential transfer checklist that covers over 50 common access points. We verify each one. We change passwords and secure admin accounts as they’re transferred. Nothing gets missed because we don’t rely on memory. We rely on a process.
During this overlap period, both providers are available. If something breaks, there’s no gap in coverage. We’re not asking you to jump from one trapeze to another with nothing below. There’s a net.
Days 21-45: Migration and Deployment
Once we have full documentation and access, we start deploying our management and security tools. This is where the real work happens.
Monitoring agents go on every endpoint and server. These give us real-time visibility into the health of every device in your environment. CPU usage, disk space, patch status, security alerts. If something starts going sideways at 3 AM on a Sunday, we know about it immediately.
Security stack deployment. We roll out EDR (endpoint detection and response), configure email security policies, enable MFA where it isn’t already active, and set up security awareness training for your team. This is usually the biggest immediate improvement clients notice. Going from basic antivirus to a real cybersecurity stack is a significant jump in protection.
Backup verification. We don’t just check that backups are configured. We test them. We run recovery drills to make sure that if something goes down tomorrow, we can actually restore it. You’d be alarmed at how many businesses discover their backups don’t work only when they need them.
Help desk onboarding. We set up your team with our ticketing system, introduce them to the support process, and make sure everyone knows how to reach us. Phone, email, portal. We publish a simple one-page guide for your employees so there’s no confusion about how to get help.
This phase is where we also address the quick wins. Things we found during discovery that are easy to fix and have immediate impact. Maybe it’s cleaning up a messy shared drive structure. Maybe it’s finally enabling that Microsoft 365 feature you’re paying for but not using. Maybe it’s replacing a ten-year-old switch that’s been causing intermittent network issues for months.
Days 45-75: Stabilization
This is the phase most IT providers skip, and it’s the one that matters most for your team’s experience.
During stabilization, we’re running at full speed but with extra attention. Response times are faster than normal. We’re watching ticket patterns closely to identify recurring issues. We’re meeting with your team weekly to check in and make sure nothing is falling through the cracks.
This is also when we calibrate. Every business is different. Your team has preferences, habits, and workflows that we need to understand and adapt to. Maybe your accounting department needs extra hand-holding during month-end close. Maybe your sales team works weird hours and needs support at 7 AM. We learn this stuff during stabilization so that by the time we hit steady state, we already know your business.
We also use this phase to address the medium-priority items from discovery. The server that needs to be replaced in the next six months. The firewall that’s approaching end of life. The license audit that will save you $800 a month. These aren’t emergencies, but they’re important, and we start planning for them now.
Days 75-90: Optimization and Roadmap
By day 75, the reactive stuff is handled. Your systems are monitored, your security is deployed, your team knows how to get help, and the fires are out. Now we shift to strategic mode.
We present you with a technology roadmap. This is a prioritized plan for the next 12 months that covers:
- Infrastructure improvements that need to happen (aging hardware, network upgrades)
- Security enhancements beyond the baseline we’ve already deployed
- Efficiency opportunities (automation, better use of existing tools, workflow improvements)
- Budget planning so there are no surprises
- Compliance readiness if your industry requires it
This roadmap is built on everything we learned during the first 90 days. It’s not a generic template. It’s specific to your business, your goals, and your current state.
We also do a formal 90-day review with your leadership team. Here’s what we found. Here’s what we fixed. Here’s where you stand now compared to where you were. Here’s what we recommend going forward. Full transparency.
What Your Team Actually Experiences
I’ve described the process from our side. But what does your team experience during all this?
Honestly? Not much disruption. That’s the goal.
The monitoring agents install silently. The security tools deploy in the background. Your employees get a brief intro to the new ticketing system. They might notice their computers are running a little faster once we clean up the junk the previous provider left behind. They’ll definitely notice that when they submit a ticket, someone actually responds quickly.
The most common thing we hear from employees around day 30 is: “Oh, this is so much better.” And around day 60: “Wait, you guys already fixed that? My old IT company had that ticket open for three months.”
The Fear vs. The Reality
Let me be blunt. Every business we’ve transitioned has told us the same thing afterward: “We should have done this sooner.” Every single one.
The fear of switching is always worse than the actual switch. Because the switch is a process. It has steps, timelines, and checkpoints. The situation you’re currently in, the slow response times, the security gaps, the lack of strategic guidance, that’s the real risk. That’s the thing that doesn’t have a plan.
If you already have an internal IT person and you’re not sure you need to fully outsource, co-managed IT might be the right fit. The onboarding process is similar but scoped to the gaps your team needs filled.
If you’re considering a change, here’s what I’d suggest. Talk to us. Let us do a discovery assessment of your current environment. We’ll tell you honestly what we find, where the gaps are, and what a transition would look like for your specific situation. If we’re a good fit, great. If not, at least you’ll have a clear picture of where your IT stands.
The first 90 days aren’t something to fear. They’re something to look forward to. Because at the end of them, your technology finally works the way it should.
BJ Pote
CEO, eTop Technology
eTop Technology has spent over 15 years in IT and over 12 years serving the Inland Empire as a trusted managed IT provider. We host the Business Tech Playbook podcast and are passionate about helping business leaders make smarter technology decisions.