Frequently Asked Questions

Answers to common questions about managed IT, cybersecurity, compliance, and what it looks like to work with eTop Technology.

General

About Managed IT Services

What is a managed service provider (MSP)?
A managed service provider handles your IT infrastructure and support on a proactive, ongoing basis. Instead of calling someone when things break, an MSP monitors your systems around the clock, patches vulnerabilities before they become problems, and provides strategic guidance so your technology supports your business goals. Think of it as having a full IT department without the overhead of hiring one in-house.
How much does managed IT cost?
Our Premium Managed Services plan runs $200 to $250 per user per month, plus Microsoft Business Premium licensing at $23.10 per user per month. The exact price depends on user count and environment complexity. Everything is included: help desk, 24/7 monitoring, cybersecurity, compliance support, and strategic IT planning. Every engagement starts with a free assessment so we can give you an accurate quote based on your actual environment.
What size businesses do you work with?
eTop Technology works with organizations that have 40 or more employees. At that size, IT complexity reaches a point where reactive break-fix support is no longer sustainable and you need proactive management, security monitoring, and strategic planning. If you have fewer than 40 employees, we may still be able to help depending on your needs.
What is your typical response time?
Every ticket is triaged and dispatched based on urgency and business impact. Critical issues affecting multiple users or business operations get immediate attention. We use a rigorous priority system so urgent problems always get handled first, and we provide 24/7 monitoring for critical infrastructure.
Do you provide onsite support?
Yes. While the majority of IT support can be handled remotely, some issues require hands-on attention. We provide onsite support throughout the Inland Empire within a roughly 40-mile radius of our Redlands headquarters. Onsite visits are included in our managed IT agreements at no additional charge.

Cybersecurity

Protecting Your Business

What security tools do you use to protect our business?
Our security stack includes SOC (Security Operations Center) monitoring, EDR (Endpoint Detection and Response), conditional access policies, multi-factor authentication, email security filtering, DNS protection, and backup encryption. We take a zero-trust approach, meaning every access request is verified regardless of where it comes from. The specific tools may vary based on your environment, but the security posture is always enterprise-grade.
What is EDR and why do we need it?
EDR stands for Endpoint Detection and Response. Traditional antivirus compares files against a known list of threats. EDR goes much further by monitoring behavior on every device in real time. If a process starts doing something suspicious, like encrypting files rapidly or communicating with a known bad server, EDR catches it and responds automatically. With ransomware attacks becoming more sophisticated, EDR is no longer optional for businesses that handle sensitive data.
Do you offer security awareness training for employees?
Yes. Human error is the number one attack vector in cybersecurity. We provide ongoing security awareness training that includes simulated phishing campaigns, training modules on current threats, and reporting on how your team is performing. Training is included as part of our security-focused service tiers because the best firewall in the world cannot protect you if someone clicks on a phishing link.
What happens if we experience a security breach?
If a breach occurs, our incident response process kicks in immediately. We isolate affected systems to prevent spread, investigate the scope of the compromise, remediate the threat, and restore from clean backups if needed. We also help you meet any legal notification requirements and document everything for compliance purposes. Our goal is to minimize downtime and data loss while getting you back to normal operations as quickly as possible.

Compliance

Regulations & Frameworks

What is HIPAA compliance for IT?
HIPAA requires healthcare organizations and their business associates to protect patient health information (PHI) with specific technical, administrative, and physical safeguards. On the IT side, this means encryption at rest and in transit, access controls, audit logging, regular risk assessments, and documented policies. If your business handles PHI in any capacity, your IT environment must meet these standards or you face significant fines and liability.
What is the FTC Safeguards Rule?
The FTC Safeguards Rule requires financial institutions, including auto dealers, CPAs, tax preparers, and other businesses that handle consumer financial data, to implement a comprehensive information security program. As of the 2023 updates, this includes encryption, multi-factor authentication, access controls, continuous monitoring, incident response plans, and regular risk assessments. Non-compliance can result in FTC enforcement actions and significant penalties.
Do we need a Written Information Security Policy (WISP)?
If your business handles sensitive personal or financial data, the answer is almost certainly yes. A WISP documents your security policies, procedures, and controls. It is explicitly required by several regulations including the FTC Safeguards Rule and many state data privacy laws. Even if not legally required for your specific industry, having a WISP demonstrates due diligence and can protect you in the event of a breach or lawsuit. We help our clients develop and maintain their WISP as part of our compliance support.
What is CMMC and does it apply to my business?
CMMC (Cybersecurity Maturity Model Certification) is a Department of Defense framework that applies to any business in the defense supply chain. If you are a government contractor or subcontractor that handles Controlled Unclassified Information (CUI), you will need CMMC certification. The framework has multiple levels, and the certification process is becoming mandatory for contract eligibility. eTop helps businesses assess their current maturity level and implement the controls needed to achieve certification.

Getting Started

Working With eTop

How does onboarding work with eTop?
Onboarding starts with a comprehensive discovery and assessment of your current IT environment. We document everything: hardware, software, accounts, configurations, vendors, and pain points. Then we build a transition plan that prioritizes security gaps and critical issues. We set up our monitoring and management tools, migrate you to our support platform, and introduce you to your dedicated team. The goal is a smooth transition with zero disruption to your daily operations.
How long does a typical IT migration take?
A standard onboarding and migration takes 2 to 4 weeks depending on the size and complexity of your environment. Simple transitions from another MSP with good documentation can be faster. More complex situations involving infrastructure upgrades, cloud migrations, or significant security remediation may take 4 to 8 weeks. We create a detailed timeline during the assessment phase so you know exactly what to expect.
Can we keep our current software and tools?
In most cases, yes. We work with a wide range of business software and do not force you to switch tools that are working well for your team. That said, if we identify security risks with a specific tool or find that a different solution would save you money and improve performance, we will make a recommendation. Any changes are discussed with you first and implemented on a timeline that works for your business.

Still Have Questions?

We're happy to answer anything we didn't cover here. Schedule a free consultation and let's talk about your specific IT needs.

Get in Touch →

Or call us directly: 951-398-0021