IT Support Services

Our Truly Managed Service

Back in 2020 a storm was brewing; we had multiple customers on different elements of different packages.  Over time, the flexibility of this mix-n-match service was overshadowed by the  lack of consistency that came with it. We found ourselves omitting service options on request, feeling increasingly uneasy about the vulnerabilities and likely drop in service levels that would leave in its wake.

One Package for Everything

Why We Built This Package

Over the next couple of years, we re-shaped, re-aligned with core values that were at the heart of what Computer Care set out to be, and in 2023 our Truly Managed Service was born,  so-called because it offers a comprehensive set of services that complement each other, puts value and transparency front and centre, and allow us to say with confidence that every base is covered.

 

 

Out Truly Managed Service Package

What TMS Includes

Since you’re here, you’d probably like a detailed breakdown of everything we include in our Truly Managed Service. So here goes…

We have tried where possible to stay away from the technical side of how the service works and focus on what it delivers for you. If a more technical spec is needed, please don’t hesitate to get in touch.

The list of everything that is included in our TMS Package has been categorised to make it a little easier to search – you can even interact with it to help make more sense of things.

You can click on each element of the first section to help you understand how our offering affects your business.

Have a play and see what you think – as we said, we are not for everyone but at least this will help you understand some benefits to tackling these issues.

Operational support

  • Service desk

    Core

    Responsive helpdesk support for your team — resolving issues quickly so people stay productive. High ticket volumes are a signal to look upstream, not a measure of our success.

  • 24/7 remote monitoring

    Core

    Round-the-clock automated monitoring detecting issues before they cause disruption — often resolving problems before you even notice them.

  • Onsite support

    Core

    When hands-on help is needed, our engineers come to you. Onsite visits are included within the TMS — no surprise call-out charges.

  • Problem resolution

    Process

    We investigate root causes, not just symptoms. Recurring issues are tracked until permanently resolved, reducing your overall ticket volume over time.

  • Standards library

    Process

    A comprehensive library of IT best-practice benchmarks measured against your environment regularly. Every gap becomes a visible improvement opportunity.

  • Improvements identification

    Process

    Continuous identification of improvements across your IT estate — fed into your roadmap and prioritised at Steering Meetings so nothing slips through the cracks.

  • Regular measure and testing

    Process

    Systematic testing of your systems and security controls against our standards library — giving you evidence that IT is improving, not just assumed to be.

CyberCare

  • Patch management

    CyberCare

    Managed, automated software updates across your entire estate — closing known vulnerabilities on a defined schedule before attackers can exploit them.

  • DMARC

    CyberCare

    Prevents criminals from sending emails that appear to come from your domain — protecting your brand and clients from impersonation attacks.

  • Password management

    CyberCare

    Organisation-wide password policy and tooling — eliminating weak, shared or reused credentials that cause the majority of account compromises.

  • Staff security awareness training

    CyberCare

    Regular simulated phishing and interactive training that turns your people from a vulnerability into a genuine defence layer.

  • Microsoft 365 security as a service

    CyberCare

    Ongoing hardening and management of your M365 tenant — configuring security controls and policies to best-practice standards, reviewed continuously.

  • Microsoft 365 backup

    CyberCare

    Automated backup of email, SharePoint, Teams and OneDrive — enabling fast, granular restore of anything lost, corrupted or accidentally deleted.

  • Enhanced email filtering

    CyberCare

    Advanced inbound and outbound filtering blocking phishing, malware and spam before it reaches your team.

  • Vulnerability scanning & dark web monitoring

    CyberCare

    Regular scans of your attack surface combined with dark web monitoring to detect exposed credentials or data before they are exploited.

  • SIEM

    CyberCare

    Security Information & Event Management — aggregating and correlating log data to surface suspicious patterns and provide a full audit trail.

  • MDR & SoC

    CyberCare

    Managed Detection & Response with 24/7 Security Operations Centre coverage — expert analysts hunting for threats and responding when found.

  • Identity threat detection & response

    CyberCare

    Continuous monitoring of your identity layer for account takeovers, privilege escalation and insider threats before they cause damage.

  • Business continuity & disaster recovery

    CyberCare

    Not just a plan — a tested, maintained process including simulated outages that prove recovery works when you need it most.

IT strategy & planning

  • 3-year IT roadmap

    Strategy

    A clear, costed plan for your technology over three years — aligning every IT investment with your business goals so each pound spent has a defined purpose.

  • IT steering meetings

    Strategy

    Quarterly business-focused meetings reviewing performance, tracking the roadmap and making decisions together. Plain English, no jargon.

  • Horizon scanning

    Strategy

    We monitor emerging technologies and threats on your behalf, evaluating them against your environment and presenting only those with a genuine business case.

  • Customer portal

    Operations

    Full visibility of IT assets, Office 365 licences, users, support tickets, invoices and reports — all in one place, available 24/7.

AI & automation

  • AI readiness assessment

    Assessment

    A structured review of your business's readiness to adopt AI — covering infrastructure, data, people and processes to give you a clear and honest starting point.

  • Use case identification

    Strategy

    Working with your team to identify where AI and automation can remove repetitive work, reduce errors and free your people for higher-value activity.

  • Automation review

    Strategy

    An audit of your current workflows and systems to find where automation can save time, reduce cost and improve consistency.

  • Adoption & integration planning

    Strategy

    A practical roadmap for adopting AI and automation tools safely — covering integration with existing systems, training needs and managing change.

Always up to date

We don’t believe in sitting on our laurels, so this package is regularly updated with new services designed to further enhance your protection or productivity.  Once you are signed up we will make sure that you have everything you need for your business to run as smoothly as possible.

Truly Managed Service

When IT Delivers

Our delivery model elevates IT information and concepts into a simple dashboard.  Through this we will take you through your current risks, the health of your IT and give you clarity on the choice you need to make.  We go through this process with you in quarterly IT Steering Meetings.

Together we understand, we plan, we build and we execute

We believe that our collaborative approach cultivates a partnership of mutual growth and learning.

Advanced IT Requirements

What our customers say

“Alex was very quick on the task and also followed-up afterwards.”

Ineza
The Gilbert & George Centre

“Alex was very quick on the task and also followed-up afterwards.”

Ineza The Gilbert & George Centre
Ineza
The Gilbert & George Centre

It was all about getting the right systems in place for now, and I didn’t feel I was being upsold or pushed into anything. That really worked for me.

Jo
Hello Dorking

It was all about getting the right systems in place for now, and I didn’t feel I was being upsold or pushed into anything. That really worked for me.

Jo Hello Dorking
Jo
Hello Dorking

“The relationship isn’t transactional —it’s a partnership. We trust them, and they’ve earned that through consistency, communication, and real expertise.”

Alpesh
Apotec

“The relationship isn’t transactional—it’s a partnership. We trust them, and they’ve earned that through consistency, communication, and real expertise.”

Alpesh, Apotec
Alpesh
Apotec

“As always, Jonathan redenered exceptional to our requirement. Very fast and reliable.”

Rheng
Monaco Engineering Solutions

“As always, Jonathan redenered exceptional to our requirement. Very fast and reliable.”

Rheng Monaco Engineering Solutions
Rheng
Monaco Engineering Solutions

“Ben was Super Excellent. He fixed my computer issue with swift and detailed expertise. He went above and beyond and fixed issues that were on my PC prior to my calling. I am so overjoyed I no longer have computer issues.”

Alan
James Associates

“Ben was Super Excellent. He fixed my computer issue with swift and detailed expertise. He went above and beyond and fixed issues that were on my PC prior to my calling. I am so overjoyed I no longer have computer issues.”

Alan
Alan
James Associates

Cyber Security

Resources & Articles

Case Study: Supporting Pharmacy Innovation Through Strategic IT Partnership

Apotech is a healthtech organisation founded approximately four years ago with a mission to revolutionise the way community pharmacies in the UK operate. By developing...

Case Study: Transforming Organisational Efficiency through Email and Cloud Storage Migration

  Hello Dorking engaged our services to address a common yet critical issue: the need for a seamless, secure, and efficient setup for their digital communication and...
key steps for successful business continuity planning

Key Steps For Successful Business Continuity Planning

Read on for more information on how to start to create a business continuity plan. Preparing For The Unexpected Imagine being the owner of the most popular coffee joint...

Simple Ways To Improve Your Cybersecurity

Do we secure our businesses as much as our homes? Cybersecurity - Using The Foundations Of Physical Security  Most of us take steps to keep our homes safe, like locking...

How Much Should an SMB Spend on IT? 

[et_pb_section][et_pb_row][et_pb_text] Industry benchmarks and budgeting frameworks to guide smart investment.  Why IT Spend Matters More Than Ever  For many small...

Why Your Small Business Can’t Afford to Ignore Cybersecurity Anymore

If you're running a small or medium business in the UK, you might think cybersecurity is something only big corporations need to worry about. After all, who's going to...

Getting Your Workforce Ready for the AI Revolution (and Why It Matters)

[et_pb_section][et_pb_row][et_pb_text]Artificial Intelligence (AI) is rapidly transforming industries across the globe, and the UK is no exception. To fully harness the...

From Passwords to Passkeys: A New Era of Secure, Passwordless Login

With cyberattacks on the rise, it’s time to rethink the security of our accounts. One way is Passkeys. As a user-friendly alternative to passwords, it minimises risks...

Maximizing ROI on IT Investments

Knowledge is power, but cashflow is king Measuring the Right Metrics Tech spending can seem like a bit like throwing darts in the dark. You know it’s important. You’re...

Why IT Should Be Viewed as an Asset

Why IT Should Be Viewed as an Asset, Not Just a Cost Let’s be honest — when you're running a small or medium-sized business, every pound matters. You’re constantly...