FAQs

  • We bill time and materials for technical work. In addition, our contracts include required tools, services, and recurring activities that ensure your systems remain secure, compliant, and well-maintained.

  • No. We’ve found time and materials, combined with clear standards and proactive maintenance, leads to better outcomes and more transparency for our customers.

    Read more information here.

  • Standardization allows us to support you efficiently and safely. Required tools—such as security software, monitoring, and backups—help us prevent issues, respond faster, and avoid costly incidents.

  • Depending on your environment, this includes:

    • Patch management and system updates

    • Firewall and network equipment checks

    • Backup monitoring and testing

    • Security posture reviews

    • Documentation and configuration updates

    These activities happen on a monthly, quarterly, and annual basis.

    Read more Here

  • Cyberattacks are no longer a matter of if, but when. Even with the best security tools and monitoring in place, no solution can guarantee 100% prevention. If a breach, ransomware attack, or business email compromise occurs, the cost of response, recovery, legal obligations, and potential damages can be substantial - often reaching hundreds of thousands of dollars or more.

    Without cyber insurance, these costs fall entirely on the affected organization. For managed service providers like KDH, working with an uninsured customer also introduces significant risk to us: we may be required to respond to and contain an incident without the financial safety net that insurance provides, potentially delaying response actions and impacting both parties’ ability to recover quickly and completely. For this reason, our updated Service Agreement requires that all our customers maintain active cybersecurity insurance. 

    Reach out to us for recommendations for CyberSecurity Insurance vendors

  • Our core focus is small to mid-sized organizations, typically up to ~400 employees. That said, complexity matters more than size—if your environment requires thoughtful planning and strong security practices, we’re a good fit.

  • Yes. We regularly support customers in regulated or security-sensitive industries and can help align systems with common compliance and audit expectations.

IT Tips & Insights