On Demand IT Support Client Since 2020
IT Managed Partner Since 2022

I began working with Premier Pool Contractor, the top custom pool contractor in Lake & Sumter County Florida in 2020. I had previously worked with the owner’s wife at a Tavares Based Home Health company that she previously owned, before leaving around the time of the beginning of the COVID -19 pandemic to join him at Premier Pool Contractor. It did not take long for me to earn the trust of Jesse, the owner of the company, this guy has a great personality every time I work there I feel like I am surrounded by family. After one year of On Demand IT Support with us we were able to come up with a partnership that allows us to support and Manage their Technology so they can focus on Business. We help support their Server, Accounting System, Network, Computers, Phones, and much more. When they opened their store front in Leesburg, we were there to get everything ready for them.

    • Setup Microsoft 365 (Email & Collaboration Services) for partner
    • Setup Managed Security For Hosting Email Services
    • Implemented a notice when mail is received by external senders to assist in the protection of CEO spoofing.
    • Implemented DMARC, DKIM, and SPF policies to assist in the protection of unauthorized email attempts from the partner’s domain.
    • Managed the reputation of the partner’s domain to ensure that they stay off of email blocklists.
    • When partner was opening their first storefront we set them up with a VOIP phone system that has every feature you can think of that cost a fraction of the plan they had received through their internet provider.
    • Proactively maintain the desktop computers & servers at the main office by monitoring them for active problems as well as predicted problems.
    • If problems were detected I would immediately create a support ticket and address the concern remotely behind the scenes to ensure that we did not impede the productivity of the team at our partner’s location.
    • Provide routine maintenance by ensuring that common areas where malware hides are scanned and protected multiple times a day using our enterprise level A/V.
    • Monitor the system for any needed updates and manage those updates and ensure that the updates complete successfully.
    • Configure & Maintain Hosted Email Accounts
    • Create policies that automate printer installation, mapping of network drives, redirected folders, security permissions, and automated procedures.

  • Run uptime checks against firewalls, router, network printers, and network area storage devices every 5 minutes to ensure end-users are able to function without any issues
  • Monitor firewall & router logs for any suspicious activity
  • If a network device is offline we will go onsite to replace the device once a replacement has been acquired.
  • Implement industry best practices to protect these devices against cyber security attacks.
  • Manage Print Queues: assist with any issues printing
  • Monitor the backup status of the previous evening and test the backup image to ensure that is able to be restored and the data is un-compromised.
  • Create, Edit, Change, and Delete Network accounts as employees are added to and removed from our partner’s team.
  • Implemented a secure remote access policy that restricts access to the internal network unless you have connected to the company VPN previously, this helps limit remote takeover attempts from unauthorized parties.
  • Monitor the server for any suspicious login attempts, if any are detected we block the IP address that the bogus attempt came from to prevent brute force attacks.
  • Monitor the system for any ransomware infections and upon ransomware being detected that computer will automatically be isolated from the rest of the network to prevent the infection from spreading.
  • Scan the server with our Enterprise A/V solution
  • Review security logs for any unauthorized access attempts