Frequently Asked Questions

Frequently Asked Questions

How do you secure our confidential data?

We have multiple methods to secure your confidential data.

First, we ensure all computers/servers have disk encryption turned on and is monitored.
Second, we deploy tools to help encrypt data in transit, like VPN services.
Finally, we have monitoring services that can look for unauthorized access or mass data moves/deletion from services like SharePoint.

Do you provide reports on our IT systems?

A key part of our service is reporting. This is highly important for our clients that require compliance services. We have regular meetings with your account manager to ensure service levels, discuss changes to plans and technology roadmaps, and review reports. Reports include phishing training, health of systems, ticket update, cybersecurity reports, executive summary reports, and more.

What is your pricing structure and what is included in your services?

You can view our Managed Services Comparison Guide below!


Get a customized quote here!

How do you support remote work and mobility?

We have a wide range of tools that support remote work. These include Microsoft 365, Always on VPN, and solid cybersecurity all allow for users to be safe and access the tools they need to work from anywhere. Each solution can be customized depending on the needs of the company.


Do you provide training services for new software?

We have a range of training videos and documents. If your company requires training for specific software, we can provide training as needed. We also include ongoing security training for our clients.

What makes Vector Choice the best choice for IT support?
We offer a no voicemail guarantee on our support line. When the call is answered, you are directly connected to an IT specialist. We solve your problems easily and you back to work as soon as possible.
Can you offer long-term technology roadmaps that align with the goals of the firm?

Yes! We work with firms of all seizes to make sure their technology goals align with the firms goals. It's important to make sure long term growth plans are included technology roadmaps, as well as cybersecurity and compliance needs.

Can we review the terms of the agreement regarding termination or changes in services?

Yes. We do not hide information from our customers and would rather review agreements and understand issues, rather than "sweep them under the rug."

When I have an IT problem, how do I get support?

When a client has a problem, we open a ticket in our IT management system so we can properly assign, track, prioritize, document, and resolve client issues. You can call, email, or submit a ticket via our portal.

Will I be given a dedicated account manager?

Yes! From initial call to final resolution, you will work with the same dedicated account manager who will know you, your business, and your goals.

Do you offer true managed IT services and support?

Yes. We proactively monitor for problems and perform routine maintenance on your IT systems. Our remote network monitoring system watches over your network to look for developing problems, security issues, and other problems so we can address them before they turn into bigger problems.

Is your help desk in-house or outsourced?

We provide in-house, dedicated technicians to your account who will get to know you and your company, as well as your preferences and history. We successfully resolve your IT issues and handle things the way you want.

Do you have a SOC (Security Operations Center) and do you run it in-house or outsource?

Yes, we have an in-house SOC that monitors your company's network for any security issues.

Do you have a system in place for your clients to provide feedback on your service? If so, can I see those reports?

Yes, we have a system that allows our clients to provide feedback on our customer service. We are very proud of our positive client feedback and will be happy to show them to you!