Process

Get to know our Proven Process where we align your business needs with our expertise.

Step 1: Discover

Before we begin, there’s a meeting, and we would like to refer to this meeting as Discovery for those of you who have been through the typical Discovery Process before. We can assure you this is different. It’s not a “pay-us-to-get-to-know-you” step. It’s more along the lines of exploring your business goals and how they align with technology conversation. If and only if there’s alignment between your needs and objectives and our services do we decide to proceed to the next step, because after all, it’s essential to both of us that we’re perfect for each other, isn’t it?

Don’t fret about the discovery, but rest assured that during this essential step, we will examine your business processes, goals, and challenges to assess how technology currently supports or hinders your efforts.

Step 2: Assess Your Environment (Gap Analysis)

Once our team establishes that we’re the perfect match, the next step is a comprehensive assessment of your environment. We will examine roles, responsibilities, and potential risk areas and determine the impact these risks have on your goals.
Be Prepared for Preferred IT Group to:

  • Develop and build our proposal + our recommended plan of action
  • Identify and outline vulnerabilities
  • Implement continuous vulnerability scanning

Step 3: Onboarding

Moving on from the initial assessment phase, we start the initial 90-day onboarding process. During the next three months, our team of experts (or as we call them, Nerds), will provide proactive services, including continuous monitoring, backup and disaster recovery, and deployment of cybersecurity tools.
Be Prepared for Preferred IT Group to:

  • Set up proactive services.
  • Implement monitoring and disaster recovery.
  • Deploy cybersecurity tools

Step 4: Technology Alignment (First Step after the contract is signed)

After the 90-day onboarding process, we continually revisit and reassess our initial findings. We do this for a number of reasons: It builds upon our earlier work, identifies new risks, and provides a system for checks and balances as we look for ways to reduce vulnerabilities through technology monitoring and reassessment.
Be Prepared for Preferred IT Group to:

  • Continuously reduce technology-related risks.
  • Identify & detect new vulnerabilities.
  • Perform continuous vulnerability scanning.

Step 5: Strategic Roadmap

After the 90-day onboarding process, we continually revisit and reassess our initial findings. We do this for a number of reasons: It builds upon our earlier work, identifies new risks, and provides a system for checks and balances as we look for ways to reduce vulnerabilities through technology monitoring and reassessment.
Be Prepared for Preferred IT Group to:

  • Continuously reduce technology-related risks.
  • Identify & detect new vulnerabilities.
  • Perform continuous vulnerability scanning.