FAQs

What is a Managed Service Provider?

A managed service provider (MSP) like Atlantic Computer Services of Wilmington, NC is a 3rd party technology service company that manages a customer’s information technology.

Typically, an MSP manages servers, workstations, network infrastructure, cyber security, cloud computing, and disaster recovery.

Additionally, MSPs typically provide end-user helpdesk support.  To properly deliver their services, MSPs use a variety of software applications from patch & update management, to cyber security tools, to backup and disaster recovery applications.  An advantage of working with us as your MSP is that you don’t have to worry about or manage the multitude of applications needed to properly support a business.

MSPs service all business types like healthcare, manufacturing, legal, financial, nonprofit, and government. Since 1996, Atlantic Computer Services has been solving technology issues for companies of all kinds and sizes. We understand there is no “one-size-fits-all” approach to IT. We work with your company on a strategic technology plan, created specifically for you. ACS  also works with larger organizations providing co-managed IT solutions.

Book a 10-minute Discovery Call to learn more about managed IT service providers and how they can benefit your business today.

What is Co-Managed IT?

Co-managed IT is an IT service model that allows companies to blend their in-house IT team with the expertise of a 3rd party IT provider like ACS.  These IT service packages are highly customized depending on the needs of the company.  It is a true partnership between internal IT and an external IT provider.

An example may be that in-house IT focuses on end-user helpdesk support while the MSP manages the network infrastructure.  Co-managed IT relationships are particularly beneficial when the company is growing quickly and outpacing the capabilities of the internal team.

ACS can step in to help boost your IT department to ensure your business stays protected. Whether you need experts to implement new cyber security measures or someone to take on the time-consuming day-to-day maintenance, we are here to help. Book a 10-minute Discovery Call to learn more about co-managed IT services with ACS.

Transitioning to a New IT Provider is Easier than You Think

The process of transitioning to a new IT provider can be daunting. The fear of switching providers is a major reason many businesses hesitate to replace ineffective support.  As companies grow beyond their current IT provider’s capabilities, it’s important to better understand how a transition would take place.  While it is possible a current provider could make the transition difficult, it rarely is the case.  ACS has seen only one or two client transitions that have been difficult. We have established relationships with other IT providers in this area for their cooperation when clients decide to move on.

To ensure an easy transition, you should know your important network and domain passwords.  If you know the critical passwords, the transition can be pushed through even without the current provider’s cooperation.  The main passwords you need to know are domain admin password, router/firewall administrator password, switch administrator passwords, web domain admin credentials, and O365 tenant administrator credentials.  (Some of these passwords may not be applicable to your business.)

Any credible provider would be happy to provide you with this information.  If you are concerned about asking, creating a disaster recovery plan which contains this info is a legitimate request any responsible business would make to their IT provider.  Using this approach when making your request for credentials can take the stress off of you.

Book a 10-minute Discovery Call with ACS to find out what to look for in a new IT provider and the best ways for your business to transition to a new IT service provider.

Getting started with Managed IT Services from ACS is Simple

ACS offers worry-free IT solutions while providing the most advanced ways to keep your company safe and secure. Book a 10-minute discovery call to find out how Managed IT Services with ACS can add IT support, expertise, and guidance to your growing company. We’ll help you put the problems and hassle of managing your company’s technology behind you so you can focus on what you do best.

What is Office 365 and what applications are included?

Microsoft Office 365 is a cloud-based productivity suite that includes a variety of applications for personal and business use. The following are the main applications and their usage:

  1. Word: A word processing application for creating and editing documents, such as letters, reports, and resumes.
  2. Excel: A spreadsheet application for creating and analyzing data, such as budget spreadsheets and financial reports.
  3. PowerPoint: A presentation application for creating slide shows, such as business presentations and lectures.
  4. OneDrive: A cloud-based storage application for storing and sharing files, such as documents, photos, and videos.
  5. Teams: A communication and collaboration platform for chatting, audio and video calling, and screen sharing with team members.
  6. Outlook: An email and calendar application for managing email, appointments, and contacts.
  7. SharePoint: A web-based collaboration and document management platform for organizing, sharing, and collaborating on projects and documents with team members.

These applications can be used individually or in combination to enhance productivity and streamline workflow for businesses and individuals.

Here are a few tips for using Office 365 effectively

Microsoft Office 365 is a powerful productivity suite that can greatly enhance a business’s workflow. Here are five tips for using Office 365 effectively:

  1. Familiarize yourself with the online versions of Office apps such as Word, Excel, and PowerPoint. They have the same functionality as the desktop versions, with the added benefit of being accessible from any device with an internet connection.
  2. Take advantage of the collaboration features in Office 365, such as co-authoring in real-time and version history, to work on projects with team members in real-time from anywhere.
  3. Use OneDrive for Business to store, sync, and share files, making it easier to access your important documents from any device.
  4. Utilize Microsoft Teams for communication and collaboration with your team. Teams integrates with other Office apps, making it easier to switch between tasks and communicate in real-time.
  5. Regularly back up important data and files by using OneDrive for Business and SharePoint to ensure your data is safe and secure.

What are some advantages of using Office 365 for a small business?

Microsoft Office 365 provides many advantages for small businesses, including:

  1. Accessibility: Office 365 can be accessed from anywhere with an internet connection, allowing employees to work from any device, including smartphones and tablets.
  2. Collaboration: Office 365 includes applications such as Teams and SharePoint, which allow for real-time collaboration and communication with team members, even when working remotely.
  3. Scalability: Office 365 is scalable, so a small business can easily add or remove users as its team size changes.
  4. Affordability: Office 365 offers cost-effective subscription plans that allow small businesses to access the latest Office applications without the upfront cost of purchasing software licenses.
  5. Security: Office 365 includes advanced security features, such as multi-factor authentication and data encryption, to protect sensitive business information.
  6. Reliability: Office 365 is a highly reliable service that is backed by Microsoft’s extensive infrastructure and support resources.

By using Office 365, small businesses can increase productivity, improve collaboration, and enhance security, all while reducing costs and increasing efficiency.

Cyber Security Basics to Protect Your Business Today

When addressing cyber security in any business, it is important to understand that there is no ‘silver bullet’ that will keep you safe.  The secret is creating layers of protection.  You create these layers not only by implementing cybersecurity tools but also creating policies and procedures that protect your company’s data.  For our clients, we apply up to 7 different applications to create many of the layers.

There are a couple of things you need to do right now if you are not currently working with an experienced MSP who manages your security. 

  • Turn on MFA (multi-factor authentication) for everything! This includes email services, any and all business portals you use to make payments, payroll systems, and accounting applications.  No excuses! Implementing MFA is the single most important thing you can do.
  • Use a NextGen antivirus app on all company-owned The free version isn’t what you’re looking for.  We highly recommend SentinalOne and CrowdStrike.
  • Provide cyber security training to your employees. This doesn’t need to be fancy.  Find a few YouTube videos about recognizing phishing emails and require your employees to watch them.
  • Create manual checks and balances for your accounting transactions. One example would be a requirement to manually verify wire information via a phone call before making any wire transactions.

If you have questions about what you need to do to protect your company, do not hesitate to book a 10-minute discovery call with us. Let ACS create the layers of protection you need to increase your cyber resiliency and take the responsibility for a hack or breach off of your shoulders.

What should a basic cybersecurity plan include?

The most important thing a small business can do to prevent a cyber breach is to implement a strong cybersecurity plan that includes the following elements:

  1. Employee training: Educate employees on safe internet practices and how to identify phishing scams and other threats.
  2. Passwords: Require strong and unique passwords for all accounts and consider using a password manager to securely store and manage passwords.
  3. Software updates: Ensure that all software, including operating systems and applications, are kept up-to-date with the latest security updates.
  4. Firewall: Use a firewall to protect against unauthorized access to the network and sensitive data.
  5. Backup and disaster recovery: Regularly back up important data and files and have a disaster recovery plan in place in case of a breach or other data loss.
  6. Antivirus software: Install antivirus software and keep it up-to-date to protect against malware and other threats.
  7. Limited access: Limit access to sensitive data to only those employees who need it, and regularly review and update access permissions.
  8. Monitoring: Regularly monitor the network for suspicious activity and take prompt action to address any security incidents.

By implementing these best practices, small businesses can significantly reduce the risk of a cyber breach and protect their sensitive information and assets.

Basic tips & tricks for business users

By following these tips and tricks, business users can streamline their workflow, save time, and increase their overall productivity and security.

  1. Keyboard Shortcuts: Keyboard shortcuts allow you to perform tasks faster and more efficiently. They can save time by reducing the amount of time spent moving your hand between the keyboard and mouse. Some common keyboard shortcuts include “Ctrl + C” for copy, “Ctrl + V” for paste, and “Ctrl + Z” for undo. Keyboard shortcuts are specific to each software and can be easily found in the help section or online.
  2. Cloud Storage: Cloud storage allows you to store and access files from anywhere with an internet connection. This makes it easier to access important files from multiple devices and reduces the risk of data loss due to hardware failure or theft. Popular cloud storage options include Google Drive, OneDrive, and Dropbox.
  3. Automation: Automation tools automate repetitive tasks, saving time and reducing the risk of human error. For example, using macros in Microsoft Office can automate the creation of frequently used reports or documents. Automation can also be used to manage email, schedule social media posts, and perform other tasks.
  4. Virtual Meetings: Virtual meeting tools, such as Zoom and Microsoft Teams, allow for efficient and effective communication and collaboration with team members, even when working remotely. These tools provide video conferencing, screen sharing, and chat features, making it easier to conduct meetings and presentations from anywhere.
  5. Time Management: Effective time management is crucial for success in any business. Utilizing tools such as calendars, to-do lists, and timers can help prioritize tasks and ensure that deadlines are met. These tools can also help manage email, reduce distractions, and increase productivity.
  6. Backup and Disaster Recovery: Regularly backing up important data and files is crucial in case of a disaster or technical issue. This can be done using cloud storage, external hard drives, or other backup solutions. Having a disaster recovery plan in place can help minimize the impact of data loss and ensure that business operations can continue smoothly.
  7. Password Management: Strong password security is essential to protect sensitive business information. Using a password manager, such as LastPass or 1Password, can simplify the login process and ensure that passwords are securely stored and protected. A password manager can also help generate and store unique and secure passwords for each account.