Frequently asked questions

What is a "Managed IT Department"?

Think of it as having a full IT department, without actually hiring one.

A Managed IT Department means we're fully embedded in how your business runs. We're not just waiting for something to break. We handle the day-to-day, the big-picture stuff, and everything in between:

  • Day-to-day IT support for your team
  • Strategic leadership through a vCIO
  • Cybersecurity management
  • Vendor coordination (so you don't have to deal with hold music)
  • Long-term technology planning

We don't just fix issues. We own your IT environment and stay invested in how it performs.

How is this different from a traditional MSP?

Most MSPs are really good at two things: fixing what breaks and sending invoices. We go a few steps further than that.

With RTC, you get:

  • Flat, predictable pricing (no surprises at the end of the month)
  • Strategic guidance that's actually tied to your business goals
  • A fully layered cybersecurity program
  • Proactive monitoring and optimization (before problems reach you)
  • Real accountability for outcomes, not just tasks

It's the difference between "IT support" and a real IT department with leadership behind it.

How does your pricing work?

Simple. Predictable. No guesswork.

Pricing is based on what you actually have:

  • Managed computers (workstations and laptops)
  • Servers (physical or cloud-based)
  • Mobile devices

That covers everything: Microsoft 365 or Google Workspace administration, your full security stack, ongoing support and monitoring, and vCIO strategic services. No surprise invoices. No nickel-and-diming. Just one number you can plan around.

What is included in your cybersecurity offering?

Security isn't one tool. It's a system. We deploy and manage a layered, defense-in-depth approach that covers your environment from multiple angles:

Think of it as building walls, watching the gates, and training your team, all at once.

How do you handle cybersecurity incidents?

If something gets flagged, we don't just send you an email and hope for the best.

  • Our SOC begins investigating immediately
  • Containment steps happen fast, before they spread
  • We guide you through remediation and recovery
  • You get clear, straightforward communication the whole way through

Rapid detection, fast containment, clean recovery. That's the goal.

How do you handle backup and disaster recovery (BCDR)?

Losing data, or losing access to your systems, is expensive and stressful. Our BCDR solution is built so that neither has to derail your business for long.

  • Automated backups of your servers and critical systems
  • Frequent recovery points throughout the day
  • Secure offsite replication to a Canadian datacentre
  • Rapid recovery options to minimize downtime

The point isn't just to store your data. It's to keep your business running when something goes sideways.

What happens if a server fails or goes down?

We move quickly. Depending on the situation, we can:

  • Restore it from a recent backup
  • Spin up a virtual version of the server in a secure datacentre
  • Get your team temporary access so work doesn't grind to a halt

The goal is to get you back up and running, not leaving you waiting while we figure things out.

How often are backups taken?

Frequently, multiple times throughout the day. That means if something goes wrong, you're not rolling back to last night's data.

It lets us:

  • Restore from multiple points in time
  • Recover from ransomware or accidental deletions
  • Meet tight recovery objectives for your most critical systems
Where is our data stored?

Your backup data lives offsite, not on the same hardware that could catch fire, get stolen, or fail along with everything else.

  • Stored securely in an offsite datacentre
  • Encrypted in transit and at rest
  • Protected from local disasters like fire, theft, or hardware failure

It's there when you need it, and safe when you don't.

Are backups protected from ransomware?

Yes, and this one matters a lot. Our backup systems are:

  • Isolated from your production environment
  • Protected against unauthorized access
  • Immutable, meaning attackers can't tamper with them

Even if ransomware hits, clean recovery points are still available. That's the whole idea.

Do you test backups regularly?

Absolutely. A backup that's never been tested is just a hope. We make sure they actually work by:

  • Verifying backup integrity on a routine basis
  • Testing recovery processes
  • Confirming systems can be restored when it counts

If you ever need to restore, we're not crossing our fingers. We already know it works.

Does this cover Microsoft 365 or Google Workspace data?

Yes. A lot of businesses assume Microsoft 365 or Google Workspace automatically backs everything up. They don't, not in a way that protects you from accidental deletion or security incidents. We cover:

  • Email
  • OneDrive / Google Drive
  • SharePoint / Shared Drives
  • Teams and collaboration data
What's the difference between backup and business continuity?

Good question. They're related, but not the same thing.

  • Backup protects your data, so it can be recovered.
  • Business continuity keeps your team working, even during an outage.

We deliver both. Because recovering your data doesn't matter much if your business is still sitting idle while it happens.

Is BCDR included in your managed services?

BCDR is a core part of protecting your business and is typically included in your managed environment, though the specifics depend on your infrastructure and requirements. We design the solution around:

  • How critical each system is
  • What your recovery expectations are
  • The real-world business impact of downtime
Do you provide 24/7 monitoring?

Yes, your systems are watched around the clock, not just during business hours.

  • A Network Operations Center (NOC) monitors performance and uptime
  • A Security Operations Center (SOC) watches for threats and incidents

The goal is for issues to be caught and addressed before they ever land on your desk.

What happens when something breaks?

You reach out to our helpdesk, and we take it from there. But honestly? Most of the time you won't even get to that step.

Behind the scenes:

  • Your environment is already being monitored and maintained
  • Most issues are caught and resolved before you notice them
  • When we do need to step in, our team responds quickly and efficiently

The goal is fewer disruptions, not just faster responses to them.

What is a vCIO and why does it matter?

A vCIO (Virtual Chief Information Officer) is basically your strategic IT leader, without the full-time executive salary.

They handle:

  • IT budgeting and planning
  • Technology roadmaps
  • Cybersecurity strategy
  • Vendor and software decisions
  • Aligning your technology with where your business is actually headed

Most IT providers stop at keeping the lights on. A vCIO helps you figure out where you're going next.

Do you support Microsoft 365 and Google Workspace?

Yes, both. Fully. We manage and optimize your Microsoft 365 or Google Workspace environment, including:

  • User and access management
  • Security configuration
  • Compliance and data protection
  • Ongoing administration and support
Do you help with compliance requirements?

Yes. Compliance language can be dense, so we translate it into practical IT controls you can actually act on. We assist with:

  • PIPEDA
  • Industry-specific requirements (legal, healthcare, and others)
  • Security best practices and audit readiness

We deal with the framework complexity so you can focus on running your business.

Do you work with businesses of all sizes?

We've found our sweet spot with small to mid-sized businesses that:

  • Rely heavily on technology to operate
  • Need reliable, secure systems they can count on
  • Want predictable IT costs (not monthly surprises)
  • Don't want to build and manage an internal IT team

If that sounds like your business, we're probably a good fit.

Can you work alongside an internal IT person?

Absolutely, and this is actually pretty common. We can:

  • Augment your internal IT staff where needed
  • Add cybersecurity and monitoring layers they may not cover
  • Provide vCIO strategic leadership
  • Handle overflow or specialized projects

We work well as a complement, not a replacement.

How quickly can we get started?

After an initial assessment, we move through a structured onboarding plan:

  • Build out your onboarding plan
  • Transition your systems and documentation
  • Deploy monitoring and security tools
  • Begin full management

Most clients are fully onboarded within a predictable, structured timeline. No chaos, no scrambling.

Why should we choose RTC Managed Services?

Because we don't just "manage IT". We take responsibility for it.

With RTC, you get a real IT department in your corner: predictable costs, enterprise-grade cybersecurity, strategic leadership, and a team that's genuinely invested in how your business performs, not just whether your tickets are closed.

What's the next step?

The best starting point is a conversation. No pressure, no pitch deck, just a straightforward chat.

We'll:

  • Learn about your business and how you operate
  • Take a look at your current environment
  • Identify any risks or opportunities worth addressing
  • Be honest about whether we're the right fit

Reach out and let's talk.