NAME
TITLE
DESCRIPTION

Case Studies

These are a few examples of subpar IT environments before Catalyst IT was brought in. Find the industry the case study took place in, the backstory, the problem, and our solution.


The Backstory:

  • Automotive repair shop
  • Serviced by a small, cheap, break-fix provider

The Problem:

  • The break-fix IT provider was hit with a supply-chain attack and their tools were hacked, then subsequently, all of their customers were ransomed.
  • This Auto Repair company reached out to the break-fix provider because every one of his customers were offline.
  • The break-fix IT company sent an intern down to check the backups, that the Auto Repair company had been paying for four years. They found out that the backup had never been started.
  • They lost all required paperwork and legal documents that they have to adhere to and then had to pay legal fees associated with not having those documents.

The Solution:

  • They came to Catalyst IT and asked, “Can you help us recover?” Our answer was, “No, we can’t. But, we can stop this from ever happening again.”
  • We stepped in and implemented backups correctly. They are checked every day and they even alert us if they are failing. We make sure they are functional.
  • We put their entire system behind additional security and verified that our security systems were working properly and covered all of the existing vulnerabilities.
  • Their original IT provider has since closed down.

The Backstory:

  • Retirement community
  • Serviced by a managed services provider.

The Problem:

  • Previous provider continuously sent bills for no apparent reason with no explanations provided.
  • The provider would show up, unannounced, and not explain what they were doing, but would still send a bill. The Client had no clue what work was actually being done.
  • The Client’s network was chaotic and disorganized. Downtime for them literally costs lives.

The Solution:

  • When they brought us in, we were shocked at how unorthodox their network was pieced together.
  • They now have an IT guy in house who does entry-level work and we take care of all of the back-end and escalation issues.
  • We reorganized their network to industry-standards and have provided clear, transparent billing. They know exactly what they’re getting with Catalyst IT.
  • The CFO of this Client has since moved on to a few different companies across the United States and has hired our services for each company he’s worked for. He liked Catalyst so much he replaced other MSPs with us.

The Backstory:

  • Multi-business conglomerate (insurance, real estate, investments)
  • The owner and one other executive were handling the IT of all of the businesses under the conglomerate.
  • They also had services from two IT companies as well.

The Problem:

  • One of their administrative assistants was compromised. Then their entire email network was compromised.
  • One of the compromised emails went to Century, because they were a client of Century’s first.
  • We followed up and informed them of the issue at hand. The Conglomerate reached out to their IT service providers, and they had no idea what to do. They didn’t know what to check and had no clue how to handle the situation.
  • We approached the company with our recommendations to correct the issue at hand and stop it from happening again.
  • We found that, with each acquisition the company had made, the technological environments did not follow the existing companies’ set ups. Meaning, each workplace environment varied greatly–causing great strain and confusion among the folks handling their IT.

The Solution:

  • Catalyst noticed that all of the businesses under the conglomerate were separate entities so we collapsed all of them under one corporation. We were able to merge them all connectively and still allow the individual businesses to operate independently.
  • We merged all of the processes and unified their technological environment. Now the computers are consistent ages, the processes from business to business are uniform, and the environments are as similar as they can be.