Pricing
How are we priced?
What is ideal size for Managed Services?
How does employee count impact my monthly invoice?
When you sign an agreement with us, it includes a stated minimum employee count. This is the lowest number of employees you will be charged for year month, regardless of if your employee count is lower than that. We understand that employee numbers can change at any given time, which affects your monthly invoice.
Some common scenarios are:
- Employee replacement: If one employee leaves and another is hired in the same month, you are billed for both since the total count is based on the highest number of employees during the month, regardless of how long they are with the company. If employee #1 leaves on the 7th and employee #2 starts on the 21st, you would be charged your monthly rate for both employees.
- Staff reduction: If there is a staff reduction, your billing is based on the total number of employees during the month. If there is a staff reduction, it will be reflected in your monthly billing amount the first full month they are not on staff (assuming your employee count is larger than the agreement minimum).
- Staff increase: If there is an increase in the total number of permanent employees, you are charged based on the total number of employees during the month. As you add employees your monthly bill will increase by the “per user” rate.
Any hidden charges?
We believe in providing our services with transparent pricing. That is why we included unlimited remote support. We want you to contact us as many times as needed to get the help you need, without worrying about what it will cost you. We also include two hours of onsite support each month so there is no reluctance not to call us if there is the possibility we might have to come onsite to fix it.
For most companies, the only Microsoft licensing needed is the one we provide (M365 Business Premium). If your company requires additional Microsoft licensing (Project, Visio, PowerBI, etc.), then there would be an additional monthly charge for the licenses needed.
Other items such as cloud servers, licenses needed that are unique to your company and any project work would be billed separately. Our commitment is that we will discuss the cost upfront and get your approval before adding anything outside your MSP plan.
What is Project Work?
Are there any discounts available?
Do you charge sales tax?
What other services do you provide?
Do we need to have an onsite IT person?
Getting Started
How do you handle new hardware?
How do you onboard new employees?
How do you offboard an employee?
Why choose VoIP?
Should I buy VoIP service through RKT?
What is your VoIP Onboarding process?
To ensure a smooth transition to VoIP, we follow these steps:
- Assess your internet connection to ensure it is stable and has enough bandwidth.
- Identify your needs and design a plan.
- Obtain phone numbers or start the process to transfer (port) your current phone numbers.
- Choose your hardware (desk phones, softphones and headsets).
- Test your new system and
- Train your employees (the most important step!).
Should I change Internet Providers
Do you provide support during onboarding?
How do you transition from our current MSP to RKT?
We always recommend an overlap period whenever possible. This allows time for knowledge transfer and collaboration with your current MSP to maintain the security of your data and systems. During this transition, you will be responsible for managing communication between us and your current MSP. All requests to the outgoing MSP will go through you for consistency. It is important for you, as our client, to understand that both the departing MSP and RKT prioritize facilitating a smooth transition of services, ensuring security continuity, and preserving key information about your business’s technology. Our aim is to establish a temporary partnership with your current departing MSP to make this process seamless.
We will request the outgoing MSP provide us with any credentials and documentation they have created. We will also ask them to uninstall their management software in coordination with our team. If any legacy management software remains, RKT will removal it.
How Do You Handle My Custom / Unique Business Critical Application?
What permissions do you need?
We require administrative (admin) privileges for all your accounts.
These permissions are essential for us to effectively oversee your software ecosystem, manage your staff’s identity and access rights, and provide comprehensive support for your employees.
When it comes to your Microsoft tenant, you will need to grant us Granular Delegated Administration Permissions (GDAP). GDAP is a Microsoft security feature aligned with the Zero Trust cybersecurity protocol. It provides only the least privileged access necessary, allowing us to manage your accounts securely while reducing risk. GDAP access is also time-bound and must be renewed—permissions are never granted indefinitely. This ensures stronger protection for your business and better control over who has access at any given time.
What Changes Do You Make to Our Workstations, Servers, Network, and M365 Licenses That are Under Contract?
Will these changes disrupt my employees’ work?
What are the benefits of hiring an MSP?
Choosing RKT as your Managed Service Provider (MSP) brings key advantages: expert IT support from certified professionals, enhanced cybersecurity measures, reliable data protection, assured business continuity, scalable solutions for growth, and 24/7 system monitoring. This gives you more time to focus on your core business instead of learning IT.
Key Benefits of Working with RKT as Your MSP
- Access to Expertise: Our team brings a wealth of knowledge and expertise to the table. We are highly trained and certified employees that are skilled in working with a wide variety of technology. This means you can focus on your business, and we will keep you up and running.
- Improved Security: Data breaches and cyberattacks can be devastating to any business, both financially and reputationally. RKT uses the latest security protocols and advanced monitoring tools to detect, prevent, and respond quickly to potential threats.
- Reliable Data Protection: In the event of data loss, whether from a cyberattack, physical disaster, or human error, RKT has proven backup solutions in place. These systems ensure quick recovery and continuation of operations with minimal disruption.
- Prioritize Your Business Continuity: We focus on creating stable systems. We work closely with your business to implement resilient solutions and respond rapidly if something goes wrong.
- Scalability and Adaptability: As your business grows, so do your IT needs. Whether it is expanding its operations, entering new markets, or launching new products, RKT can provide services to match your evolving requirements.
- 24/7 Monitoring: The digital world never sleeps, and neither does potential threats. We provide round-the-clock monitoring service to keep your systems secure and operational around the clock so you can rest easy knowing your IT is always protected.
Support & Services
How does RKT handle IT emergencies?
What is RKT’s after-hours support policy?
How does RKT ensure your Data Privacy?
How do you prioritize tickets?
What is a Service Level Agreement (SLA)?
Our current SLA times are:
- Small service degradation – two business days
- Limited degradation of service – eight business hours
- Significant degradation of service – four business hours
- Critical problem – two business hours
How do you handle Line of Business (LOB) Apps?
How does RKT monitor client satisfaction?
Backups
How do you backup workstations?
How does RKT manage data backups?
Do you offer offsite backups?
Do you offer onsite backups?
Equipment & Licensing
Do you sell hardware?
Do you support M365?
Why do you recommend M365 Business Premium?
Do you support Google Workspace?
Do you sell software licensing?
Do you support Apple Mac computers?
Do you support out-of-date operating systems?
Do you support out-of-date software?
How do you maintain my environment?
Security & Compliance
What is EDR and how does it work?
Do small businesses need a cybersecurity strategy?
What are the most common ways small businesses are compromised?
Does RKT offer cybersecurity training?
How does RKT protect me from cybersecurity attacks?
Is RDP safe?
Does RKT recommend risk assessments?
What problems does RKT typically see in small businesses?
The most common issues we encounter are:
- Little to no patching of systems
- Security settings not optimized
- Encryption not enabled
- Multi-factor authentication (MFA) not enabled
- No employee security training