Step 1 - New client onboarding paperwork and contact sheet. During this step we complete all of the required paperwork for the account. This includes the agreement for cloud services, authorization forms, and client contact sheet. We use the client contact sheet to gather the name, phone number, emails, cell phone and tablet types for each contact within the new client's company. We then transfer all the contact information into the client's account in Autotask to create the groundwork for proper communication.
Step 2 - G Suite implementation. During this step we gather all of the clients email domains so we can consolidate email addresses into one account for each user. We spend time gathering the proper logins to all the key areas necessary to accomplish this migration. We create accounts for each user and work with them to make sure all of their information (email, calendars, and contacts) is properly migrated to their new account. Once the accounts and data migration is complete we provide access to a video training series that covers each piece of the G Suite in detail.
Step 3 - Best practice setup completion. With over 15 years supporting technology we have identified several key elements that make for a safer more functional computer in the long term. In this step we implement them. Without going into the nerdy details we make sure steps have been taken to prevent viruses and unauthorized changes. Also we set up remote support on your systems with Teamviewer. In addition we document the computers and devices in use. We work with the clients computers to get the data redirected to our cloud systems. Next we provide access to video that explains what changes we have made and why we have made them. Now that we have clients configured and data moved we can move on to the backup system.
Step 4 - Backup system setup. We now implement a cloud to cloud backup system. This system is automatic and real time with unlimited storage. It will backup all historical data and changes. If you create a file today and delete it you can go into the backup system 2 years from now and retrieve that file. This system requires no user interaction it runs all on its own. In addition this backup is running copies of all email, calendar items, contacts, data and files. Recovery of data is a snap. Recovery can be self service or requested and carried out by us.
Step 5 - Mobile device configuration. During this step we provide access to all the apps we recommend for use on you mobile devices. This will allow you access to everything we have configured on any device not just your computer.
Step 6 - Password Management. Next we setup our password management system, Lastpass. This enterprise level password management system can be used from computers, mobile devices and tablets. Lastpass makes creating, documenting and using complex username and password combinations easy. The #1 reason for hacked accounts is simple and reused passwords. Using this system eliminates this possibility. All you need is one password (your lastpass) to open your vault of logins for all your websites and accounts. In addition we provide a video training series for this
Step 7 - Data move and printers. During this step we work to get any physical server migrated and turned off. We move all data on network locations to our cloud systems and shared just like it was before. This allows the data to be backed up just like we described in step 4. We also work to migrate printers to Google Cloud Print. Google cloud print allows you to be able to print from anywhere.
Step 8 - Final step line of business apps move and server shutdown. During this step we work with the client to move all of their line of business application to cloud versions of the software. One example may be moving from QuickBooks to Quickbooks online. We also work out all of the nerdy things that need to be changed on the network to allow the server to be shutdown without impacting anyone in a negative way. At this point the servers can be shutdown and the client is 100% cloud.
This completes our onboarding but not our work or client relationship. We continue to update software, apps, and our clients account to benefit them. We also take any and all client requests for service and provide SLA (Service Level Agreement) compliant resolutions remotely. In addition we function as the client's technical team. We deal with migrations, implementations, and client requests on their behalf.