IT Support Services
Our Truly Managed Service
Back in 2020 a storm was brewing; we had multiple customers on different elements of different packages. Over time, the flexibility of this mix-n-match service was overshadowed by the lack of consistency that came with it. We found ourselves omitting service options on request, feeling increasingly uneasy about the vulnerabilities and likely drop in service levels that would leave in its wake.
One Package for Everything
Why We Built This Package
Over the next couple of years, we re-shaped, re-aligned with core values that were at the heart of what Computer Care set out to be, and in 2023 our Truly Managed Service was born, so-called because it offers a comprehensive set of services that complement each other, puts value and transparency front and centre, and allow us to say with confidence that every base is covered.
Out Truly Managed Service Package
What TMS Includes
Since you’re here, you’d probably like a detailed breakdown of everything we include in our Truly Managed Service. So here goes…
We have tried where possible to stay away from the technical side of how the service works and focus on what it delivers for you. If a more technical spec is needed, please don’t hesitate to get in touch.
The list of everything that is included in our TMS Package has been categorised to make it a little easier to search – you can even interact with it to help make more sense of things.
You can click on each element of the first section to help you understand how our offering affects your business.
Have a play and see what you think – as we said, we are not for everyone but at least this will help you understand some benefits to tackling these issues.
Operational support
-
Service desk
CoreResponsive helpdesk support for your team — resolving issues quickly so people stay productive. High ticket volumes are a signal to look upstream, not a measure of our success.
-
24/7 remote monitoring
CoreRound-the-clock automated monitoring detecting issues before they cause disruption — often resolving problems before you even notice them.
-
Onsite support
CoreWhen hands-on help is needed, our engineers come to you. Onsite visits are included within the TMS — no surprise call-out charges.
-
Problem resolution
ProcessWe investigate root causes, not just symptoms. Recurring issues are tracked until permanently resolved, reducing your overall ticket volume over time.
-
Standards library
ProcessA comprehensive library of IT best-practice benchmarks measured against your environment regularly. Every gap becomes a visible improvement opportunity.
-
Improvements identification
ProcessContinuous identification of improvements across your IT estate — fed into your roadmap and prioritised at Steering Meetings so nothing slips through the cracks.
-
Regular measure and testing
ProcessSystematic testing of your systems and security controls against our standards library — giving you evidence that IT is improving, not just assumed to be.
CyberCare
-
Patch management
CyberCareManaged, automated software updates across your entire estate — closing known vulnerabilities on a defined schedule before attackers can exploit them.
-
DMARC
CyberCarePrevents criminals from sending emails that appear to come from your domain — protecting your brand and clients from impersonation attacks.
-
Password management
CyberCareOrganisation-wide password policy and tooling — eliminating weak, shared or reused credentials that cause the majority of account compromises.
-
Staff security awareness training
CyberCareRegular simulated phishing and interactive training that turns your people from a vulnerability into a genuine defence layer.
-
Microsoft 365 security as a service
CyberCareOngoing hardening and management of your M365 tenant — configuring security controls and policies to best-practice standards, reviewed continuously.
-
Microsoft 365 backup
CyberCareAutomated backup of email, SharePoint, Teams and OneDrive — enabling fast, granular restore of anything lost, corrupted or accidentally deleted.
-
Enhanced email filtering
CyberCareAdvanced inbound and outbound filtering blocking phishing, malware and spam before it reaches your team.
-
Vulnerability scanning & dark web monitoring
CyberCareRegular scans of your attack surface combined with dark web monitoring to detect exposed credentials or data before they are exploited.
-
SIEM
CyberCareSecurity Information & Event Management — aggregating and correlating log data to surface suspicious patterns and provide a full audit trail.
-
MDR & SoC
CyberCareManaged Detection & Response with 24/7 Security Operations Centre coverage — expert analysts hunting for threats and responding when found.
-
Identity threat detection & response
CyberCareContinuous monitoring of your identity layer for account takeovers, privilege escalation and insider threats before they cause damage.
-
Business continuity & disaster recovery
CyberCareNot just a plan — a tested, maintained process including simulated outages that prove recovery works when you need it most.
IT strategy & planning
-
3-year IT roadmap
StrategyA clear, costed plan for your technology over three years — aligning every IT investment with your business goals so each pound spent has a defined purpose.
-
IT steering meetings
StrategyQuarterly business-focused meetings reviewing performance, tracking the roadmap and making decisions together. Plain English, no jargon.
-
Horizon scanning
StrategyWe monitor emerging technologies and threats on your behalf, evaluating them against your environment and presenting only those with a genuine business case.
-
Customer portal
OperationsFull visibility of IT assets, Office 365 licences, users, support tickets, invoices and reports — all in one place, available 24/7.
AI & automation
-
AI readiness assessment
AssessmentA structured review of your business's readiness to adopt AI — covering infrastructure, data, people and processes to give you a clear and honest starting point.
-
Use case identification
StrategyWorking with your team to identify where AI and automation can remove repetitive work, reduce errors and free your people for higher-value activity.
-
Automation review
StrategyAn audit of your current workflows and systems to find where automation can save time, reduce cost and improve consistency.
-
Adoption & integration planning
StrategyA practical roadmap for adopting AI and automation tools safely — covering integration with existing systems, training needs and managing change.
Always up to date
We don’t believe in sitting on our laurels, so this package is regularly updated with new services designed to further enhance your protection or productivity. Once you are signed up we will make sure that you have everything you need for your business to run as smoothly as possible.
Truly Managed Service
When IT Delivers
Our delivery model elevates IT information and concepts into a simple dashboard. Through this we will take you through your current risks, the health of your IT and give you clarity on the choice you need to make. We go through this process with you in quarterly IT Steering Meetings.
Together we understand, we plan, we build and we execute.
We believe that our collaborative approach cultivates a partnership of mutual growth and learning.
Advanced IT Requirements
What our customers say
“Alex was very quick on the task and also followed-up afterwards.”
It was all about getting the right systems in place for now, and I didn’t feel I was being upsold or pushed into anything. That really worked for me.
“The relationship isn’t transactional —it’s a partnership. We trust them, and they’ve earned that through consistency, communication, and real expertise.”
“As always, Jonathan redenered exceptional to our requirement. Very fast and reliable.”
“Ben was Super Excellent. He fixed my computer issue with swift and detailed expertise. He went above and beyond and fixed issues that were on my PC prior to my calling. I am so overjoyed I no longer have computer issues.”
Cyber Security
Resources & Articles