IT Processes


For CEO Computers, success means helping our clients to concentrate on their business and achieving their business goals without worrying about their IT.  We want to be a technology partner who empowers your employees and is an extension of your business.  What set us apart are our tried-and-true processes that have been honed for over 30 years.  We treat your business like ours and make technology an integral part of your growth, not a source of frustration.  Our caring employees and our processes are our valued assets – here is an outline of what we do:

Initial Assessment: 

First, we sign a Non-Disclosure Agreement to protect your sensitive data.  Then our qualified and experienced engineers thoroughly examine all the components of your technology infrastructure, your Line of Business applications (LOB), evaluate your vendor contracts, and take an inventory of all of the devices in your network.  We inquire about your pain points, where you are, and where you want to be in a year or two from now. Are you growing or downsizing?  How do you optimize and standardize your network using the best industry practices and appropriate hardware and software?  How do you safeguard your data? We use our network analysis software to scan the entire network and provide you with a vulnerability report.  More importantly: what are your company’s culture and values? Are we are the right fit?


The management team examines the information obtained from our initial assessment; if we require further information, we will go back and collect more. Based on the data, we will provide a fully detailed set of recommendations to bring your network up to the industry standard. We also offer a complete proposal, itemizing each component, warranty information, leasing or purchasing options, and clearly defining the work scope.  We always make sure that all our solutions are comprehensive with various options and, most importantly, affordable.


Once a client agrees with our proposal and has a go-ahead, an installation date is selected. Our entire team gets involved, ordering the proposed components and testing and trying them before the delivery and installation.  We put a lot of emphasis on minimizing the downtime for our clients.  All the vendors are contacted to ensure that there will not be a compatibility issue with the proposed solution.  All the appropriate software, updates, and product keys are gathered.  We can do as much in our office, remotely and after hours, to make sure our clients and their staff are fully operational. The communication line between our team and the client is kept open, and progress is reported daily.  Our goal is to do the job right the first time and as quickly and efficiently as possible.

Installation and On-boarding: 

Before the installation, we create a long-detailed list of all the steps necessary to complete the job flawlessly and assign each segment to a different team member and check them off once they are completed. The inventory list created during the initial assessment gets updated as part of our network administration document, and a copy is sent to you. Our installation makes sure that group policy and security rights are correctly assigned, shared folders are accessible, printers and scanners are operational for each user, antivirus and remote agents are working, and patch management software is functional.  The backup is set, and all the profile customization is restored. Most importantly, your backup is set correctly and tested. Finally, all passwords are changed, and if there was a previous IT company involved, their access is stopped and eliminated.


We ensure that all of your staff and stakeholders are fully informed and trained about the new system and the recently installed solution.  We provide detailed instructions and perform onsite training if necessary, to ensure every employee is comfortable and confident about using the new solution. 


All the relevant information is documented, and a network schematic including an admin sheet containing user names, passwords, email accounts, product keys, and contact information is created. A copy is given to the owners. The admin sheet is updated after any modifications.  

Ongoing support: 

Our ongoing support starts from the day after installation.  We monitor all the components of your network via our Remote Monitoring (RMM) dashboard daily.   We resolve any issues reported or encountered by our remote management monitoring tools.  Provide a 24/7 help desk in case of any troubles. Provide you with monthly reports, and if the Virtual CIO service is selected, you will have a quarterly Technology conference with our Chief Technology Officer.   

To ensure our client’s 100% satisfaction, there are many details involved in the above processes.  But the main ingredient is the level of care we put in to keep your business ahead of your competition.