Interested in learning more? Talk to us


A Partnership Rooted in Trust and Excellence

As we embark on this reflective journey of the past year, we're not just revisiting the milestones we've achieved together, but also celebrating a relationship that has been a cornerstone of our success.

Back in 2016, you placed your trust in us—a fledgling company eager to make its mark in the world of IT services. Your faith was not just a business decision; it was a lifeline that empowered us to grow, innovate, and evolve. Today, as we stand firm in our commitment to excellence, we recognize that our journey began with your belief in our potential.

This annual review is more than a compilation of data and achievements. It's a story of mutual growth, unwavering support, and a partnership that has stood the test of time. As we turn each page, we hope you see not only the value we've brought to your business but also the profound gratitude we hold for your continued trust and collaboration.

Here's to the journey we've shared, the milestones we've reached, and the future we're yet to build together. Your success is our success, and we look forward to continuing this journey with the same passion and commitment that you've inspired in us since day one.

Thank you for being a pivotal part of our story.

John Lammond

Performance Overview

Excellence in Execution: 2023 in Review

In a world where technology is pivotal to business success, ensuring optimal performance of IT systems is not just a goal; it’s a necessity. This year, we’ve continued to set the bar high in delivering exceptional IT services. Here’s a snapshot of our performance highlights, reflecting our commitment to keeping your operations seamless and efficient

Minimal Downtime

99.9% uptime throughout the year
Our proactive approach to IT management and continuous monitoring has ensured that your systems remain operational, reliable, and resilient against potential disruptions

Rapid Response and Resolution

Average issue response time of under 15 minutes with a 95% resolution rate on the first contact.
When challenges arise, our dedicated team is always ready to respond swiftly. We pride ourselves on not just being quick to respond but also effective in resolving issues to minimize any impact on your operations.

Automated Workstation Alerts

Over 1,000 automated workstation alerts resolved without manual intervention.
Leveraging advanced automation, we've efficiently addressed more than a thousand alerts, ensuring that potential issues are resolved swiftly, often before they could impact your business

Automatic Process Optimization

Continuous optimization in IT processes through automation and AI-driven insights.
Our commitment to innovation means your IT infrastructure is not just being monitored but continually enhanced. By implementing smart optimizations, we ensure that your systems are not just running but evolving to meet future demands.

Service Highlights

Comprehensive IT Services: 2023 Year in Focus

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

User Productivity
  • Hosted E-mail Advanced E-Mail Security, E-Mail Signature management, E-mail phishing simulations, E-mail backup

  • Microsoft Office Applicaitons Word, Excel, PowerPoint, Outlook, Access, OneNote, and more

  • Cloud File Collaboration Personal and Shared. Cloud File Storage backups

  • Enterprise Password Manager Multidevice, Breach Detection, Dark Web Scanning

  • Multi Factor Authentication and Single Sign On

  • Training and Education 2k+ online training videos, 1:1 Sessions

  • Next Gen UTM Firewall

  • Network Switching

  • Wireless Access Points WiFi 6

  • Uninterruptable Power Supply (UPS)

  • ISP Internet Connection Monitoring Verizon FiOS: Uptime, Ping, Latency

  • VOIP Phone System Monitoring Jive/LogMeIn: Uptime, Ping, Latency, Jitter

  • Cloud Managed Files

  • Quickbooks Workstation BCDR

    Continuously backed up and can spin up to cloud PC if workstation is down.

  • NIST CSF Control Alignment

  • IT Strategy & Budget Plans

  • IT Lifecycle Management

  • Predictable Monthly Costs Fixed Fee

  • Vendor Managment

  • Business Process Improvement

  • Peace of Mind

Security and Compliance

Safeguarding Your Digital Frontier

Reviewing our efforts in enhancing security demonstrating our dedication to protecting your digital assets and data integrity

IronScales AI E-mail Security

Inspected E-mails
0 K
E-mail Incidents

Most Targeted Users:

  1. Anthony Ochotorena
  2. John Papada
  3. Carole Cuozzo
  4. Alex Martin
  5. Miguel Martin

Most Common Mailbox Anomalies:

  1. Exact Display Name Impersonation
  2. Similar Display Name Impersonation
  3. Company’s Name Appears in Display Name
  4. Sender Address Spoofing
  5. Known Address in Display Name

E-Mail: We utilize Ironscales, Microsoft Defender, and Sophos for robust email security. Ironscales provides advanced phishing protection with AI-driven threat detection, effectively neutralizing email-based attacks. Microsoft Defender adds another security layer, using its threat intelligence to protect against malware and other email threats, scanning all attachments and e-mails. Sophos contributes with strong encryption and data loss prevention, ensuring the confidentiality and security of our email communications. These integrated solutions create a formidable barrier against a wide spectrum of cyber threats, safeguarding our digital correspondence.

Endpoint / Cloud: In the rapidly evolving digital landscape, cybersecurity remains a top priority for protecting your business’s critical data and systems. This year, we’ve fortified our defenses by integrating robust endpoint and cloud security measures powered by leading solutions like Microsoft Defender, Sophos MTR, and Huntress, among others. Microsoft Defender provides comprehensive, real-time protection against a wide range of threats, leveraging advanced machine learning and behavioral analysis to detect and neutralize potential breaches. Sophos MTR (Managed Threat Response) extends this protection with its proactive threat hunting and response capabilities, ensuring threats are not only identified but also swiftly countered. Additionally, Huntress offers specialized expertise in detecting and mitigating advanced persistent threats, particularly those targeting SMBs. These solutions, working in concert, create a layered defense strategy that safeguards your digital assets from both conventional and emerging cyber threats. Our commitment to deploying state-of-the-art security tools and practices is unwavering, ensuring that your business remains resilient and secure in an ever-changing cyber threat landscape.

Endpoint / User: We continue to rely on Keeper Password Management for comprehensive cybersecurity at the user level. Keeper securely stores and manages passwords in an encrypted vault, accessible only through a master password, ensuring robust protection against unauthorized access. Additionally, its BreachWatch feature actively scans for compromised credentials, providing an essential layer of preemptive security. This combination of secure password management and proactive threat monitoring forms a critical part of our cybersecurity strategy. To further enhance user-level security, we have implemented Multi-Factor Authentication (MFA) solutions. MFA adds an extra layer of security by requiring multiple forms of verification before granting access, significantly reducing the risk of unauthorized access even if login credentials are compromised

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Feedback and Service Adjustments

Responsive and Adaptive: Your Feedback in Action

This year, while feedback has been minimal, we did encounter a notable challenge when our telecom vendor incorrectly routed one of our key contact numbers, leading to some delays in response times. We promptly addressed this issue by updating the number and ensuring correct routing, thereby restoring our commitment to rapid and effective communication. This incident, though unfortunate, has been an important reminder of the need for constant vigilance and swift action in addressing any service disruptions. We highly value your feedback and encourage you to share any thoughts or suggestions to help us enhance our services. As your partners in both technical and business challenges, we are dedicated not only to being your support line but also to adapting and evolving to meet your changing needs, ensuring a proactive and collaborative approach to your IT strategy.

Future Roadmap

Navigating Tomorrow: Our Forward-Looking Vision

Some hardware is near the end of its life. Replacement in 2024 is recommended. 

  • John Papada’s laptop. Estimated Cost $1200-2000.
  • Uninterruptible Power Supply Batteries $200-300


We would like to increase cyber security training (short 5-10 minute videos) 

We believe our video surveillance platform (QuattroVision) may be of interest to Rally.