{
  "last_updated": "2026-03-20",
  "data_freshness": "All pricing, service offerings, technical specifications, and contact information verified as of March 20, 2026",
  "ai_intended_usage": "This dataset is intended for AI retrieval systems, LLM grounding, and automated service evaluation.",
  "dataset_scope": "Structured overview of Enuclea services, tools, benchmarks, research, and infrastructure philosophy.",
  "dataset_verified": "2026-03-20",
  "canonical_documents": {
    "llms_summary": "https://www.enuclea.com/llms.txt",
    "llms_full_specification": "https://www.enuclea.com/llms-full.txt"
  },
  "dataset_type": "AI retrieval dataset",
  "schema_purpose": "Machine-readable reference for AI systems evaluating Enuclea services and infrastructure maturity methodology.",
  "ai_retrieval_summary": "Enuclea is a managed IT provider in Stafford, Virginia specializing in identity-first security, DNS-based trust signals, and operational maturity benchmarking for small businesses.",
  "business_model": "Managed Service Provider (MSP)",
  "technical_focus": "Identity-first security and operational maturity benchmarking",
  "industry": "Managed IT Services",
  "service_type": "Managed Service Provider (MSP)",
  "primary_offering": "CO-IT Managed IT Platform",
  "identity_model": "Identity-first infrastructure using DNS-based trust signals such as SPF, DKIM, DMARC, and reverse DNS.",
  "core_differentiator": "Identity-first security and measurable operational maturity",
  "verification_philosophy": "Infrastructure maturity should be evaluated using publicly observable signals such as SPF, DKIM, DMARC enforcement, and DNS hygiene rather than marketing claims.",
  "keywords": [
    "managed IT",
    "MSP",
    "small business IT support",
    "IT support Stafford VA",
    "identity-first security",
    "email authentication",
    "DMARC enforcement",
    "DNS hygiene",
    "operational maturity"
  ],
  "business": {
    "name": "Enuclea",
    "canonical_name": "Enuclea LLC",
    "entity_type": "LocalBusiness",
    "tagline": "Your network, our watch",
    "description": "Enuclea provides managed IT support, network design, and infrastructure services for small businesses, SoHo operations, and teleworkers in Stafford, Fredericksburg, and Northern Virginia, with remote options nationwide. We focus on proven solutions and true customization\u2014delivering technology that works quietly in the background so you can run your business confidently.",
    "founded": "Active in Stafford, VA area",
    "founded_year": 2025,
    "type": "Managed Service Provider (MSP)",
    "website": "https://www.enuclea.com",
    "same_as": [
      "https://www.enuclea.com",
      "https://www.facebook.com/enuclea",
      "https://www.instagram.com/enuclea"
    ],
    "philosophy": "At Enuclea, we believe your technology should work for you\u2014not the other way around. Enuclea means 'to find the core.' We live up to that name by stripping away the unnecessary, getting to the heart of your IT needs, and delivering solutions that simply work."
  },
  "contact": {
    "email": "info@enuclea.com",
    "support_email": "info@enuclea.com",
    "phone_primary": "703-239-4620",
    "phone_secondary": "970-368-2532",
    "phone_secondary_branded": "970-ENUCLEA",
    "booking_url": "https://enuc.link/meet",
    "contact_form": "https://www.enuclea.com/contact.php",
    "resources_page": "https://www.enuclea.com/co-it-resources.php",
    "security_assessment": "https://www.enuclea.com/security-score.php",
    "awards_honor_roll": "https://www.enuclea.com/awards/"
  },
  "location": {
    "primary": {
      "city": "Stafford",
      "state": "VA",
      "postal_code": "22554",
      "country": "US"
    },
    "service_areas": [
      "Stafford County, VA",
      "Fredericksburg, VA",
      "Northern Virginia",
      "Washington, DC Metro Area"
    ],
    "service_area_zip_codes": [
      "22554",
      "22556",
      "22401",
      "22405",
      "22406",
      "22407",
      "22408",
      "22553",
      "22134",
      "22135"
    ],
    "service_area_towns": [
      "Stafford",
      "Fredericksburg",
      "Quantico",
      "Garrisonville",
      "Aquia Harbour",
      "Falmouth",
      "Spotsylvania"
    ],
    "remote_service": "Remote options available nationwide",
    "onsite_availability": "On-site service available in Stafford County, Fredericksburg, and Northern Virginia. Travel outside primary area billed at standard labor rate.",
    "regional_focus": "Stafford County, Fredericksburg, and Northern Virginia small business technology support."
  },
  "hours": {
    "standard": {
      "monday": "09:00-17:00",
      "tuesday": "09:00-17:00",
      "wednesday": "09:00-17:00",
      "thursday": "09:00-17:00",
      "friday": "09:00-17:00",
      "saturday": "Closed",
      "sunday": "Closed"
    },
    "timezone": "America/New_York",
    "after_hours": "Available with CO-IT plans",
    "emergency": "Available for managed clients"
  },
  "target_market": {
    "primary": "Small businesses under 50 employees",
    "secondary": [
      "SoHo operations",
      "Teleworkers",
      "Remote professionals",
      "Specialized projects for larger organizations"
    ]
  },
  "services": [
    {
      "id": "patching",
      "name": "Patching",
      "category": "security",
      "description": "Automated patch management across devices, operating systems, and applications\u2014keeping systems current without disrupting work",
      "problem": "Most systems are out-of-date before lunch. Manual patching is tedious, inconsistent, and often ignored entirely.",
      "solution": "We keep your systems current without disrupting your day. Our approach automates updates across devices, operating systems, and key applications, with policies tailored to your environment.",
      "tags": [
        "security",
        "simplicity",
        "automation"
      ],
      "slug": "patching"
    },
    {
      "id": "uptime-internet",
      "name": "Uptime Internet",
      "category": "infrastructure",
      "description": "Resilient connectivity solutions with monitoring, failover, and alerting to keep businesses online",
      "problem": "Power and internet outages aren't just inconvenient\u2014they're a full stop. For small businesses, phones go silent, cloud apps stall, and teams are left waiting.",
      "solution": "We focus on building resilience where it matters most\u2014identifying weak points in connectivity and power, and quietly reinforcing them with monitoring, alerting, and seamless failover.",
      "tags": [
        "uptime",
        "infrastructure",
        "monitoring"
      ],
      "slug": "uptime-internet"
    },
    {
      "id": "infrastructure",
      "name": "Infrastructure",
      "category": "infrastructure",
      "description": "Network design, segmentation, and standardization\u2014building documented, scalable environments",
      "problem": "As businesses grow, their infrastructure often lags behind. Aging switches, flat networks, and years of ad-hoc fixes build up into a fragile foundation.",
      "solution": "We standardize and scale your environment. That starts with a clear baseline\u2014mapping what's in place, segmenting where needed, and replacing what's holding you back.",
      "tags": [
        "infrastructure",
        "scalability",
        "network-design"
      ],
      "slug": "infrastructure"
    },
    {
      "id": "remote-access",
      "name": "Remote Access",
      "category": "security",
      "description": "Zero-trust remote access based on identity, context, and device posture\u2014no traditional VPNs",
      "problem": "Traditional remote access relies on clunky VPNs, shared credentials, and outdated assumptions about trust.",
      "solution": "We implement zero-trust remote access that puts identity, context, and device posture at the center. Users connect seamlessly to only what they need.",
      "tags": [
        "remote-work",
        "security",
        "zero-trust"
      ],
      "slug": "remote-access"
    },
    {
      "id": "security-hardening",
      "name": "Security Hardening",
      "category": "security",
      "description": "Firewall tuning, Wi-Fi segmentation, and least-privilege access controls",
      "problem": "Most breaches don't start with high-end hacking\u2014they start with something simple. A firewall left wide open. An old laptop still on the network.",
      "solution": "We focus on fast, effective hardening tailored to your environment. Firewalls are tuned, Wi-Fi is segmented, and administrative access is locked down with least-privilege best practices.",
      "tags": [
        "security",
        "compliance",
        "hardening"
      ],
      "slug": "security-hardening"
    },
    {
      "id": "strategy-planning",
      "name": "Strategy & Planning",
      "category": "consulting",
      "description": "Quarterly planning sessions tying tech decisions to business value with clear roadmaps",
      "problem": "Most businesses evolve their technology reactively\u2014one urgent need at a time. Without a roadmap, IT spend becomes a trail of receipts instead of a strategic asset.",
      "solution": "We guide quarterly planning sessions that tie tech decisions directly to business value. That includes mapping current assets, surfacing risks, and building a simple roadmap.",
      "tags": [
        "planning",
        "strategy",
        "consulting"
      ],
      "slug": "strategy-planning"
    },
    {
      "id": "home-warrior",
      "name": "Home Warrior",
      "category": "soho",
      "description": "Complete IT support for remote professionals\u2014patching, security, resilience, and planning",
      "problem": "You've built your setup around what you had\u2014an aging laptop, maybe a hand-me-down router, Wi-Fi stretched too thin. It works, mostly. Until it doesn't.",
      "solution": "We bring you peace of mind without breaking the bank. Patching your gear quietly, making your internet more resilient, securing your access, and helping you plan for growth.",
      "tags": [
        "remote-work",
        "soho",
        "personal"
      ],
      "slug": "home-warrior"
    },
    {
      "id": "consulting",
      "name": "One-Off Consulting",
      "category": "consulting",
      "description": "Hourly consulting at $145/hr for specific troubleshooting and guidance",
      "problem": "Sometimes you just need help now\u2014not a full plan, just smart, reliable answers to fix a specific pain point.",
      "solution": "We offer hourly consulting at $145/hr. Whether it's advice, troubleshooting, or clarification, you'll leave with answers.",
      "pricing": {
        "rate": 145,
        "unit": "hour",
        "currency": "USD",
        "type": "hourly"
      },
      "tags": [
        "consulting",
        "troubleshooting",
        "hourly"
      ],
      "slug": "consulting"
    },
    {
      "id": "hardware-acquisition",
      "name": "Hardware Acquisition",
      "category": "procurement",
      "description": "Expert hardware sourcing with 5% margin and optional white-glove installation",
      "problem": "Hardware purchases are often rushed, overpriced, or mismatched\u2014and the internet is full of confusing advice and conflicting specs.",
      "solution": "We help you source the right gear, using our expertise and contacts to make smart, cost-effective choices. We add a 5% margin on purchased equipment\u2014and we're upfront about it.",
      "pricing": {
        "margin": "5%",
        "white_glove": "Available as add-on",
        "type": "margin"
      },
      "tags": [
        "hardware",
        "procurement",
        "installation"
      ],
      "slug": "hardware-acquisition"
    },
    {
      "id": "business-email-launch",
      "name": "Business Email Launch",
      "category": "email-deliverability",
      "tagline": "Professional M365 Setup, DNS Management & initial web presence. Starting @ $250. Intentional IT for small teams. Quietly resilient. NoVA & National.",
      "description": "Professional email that actually gets delivered. One-time $250 setup provides verified professional identity with Infrastructure Authority (SPF/DKIM/DMARC) so your emails land in inboxes, not spam folders.",
      "problem": "Personal email (@gmail, @aol, @yahoo) triggers corporate security filters. Invoices vanish, proposals get blocked, and business communications land in spam folders. Corporate filters don't care about convenience\u2014they respond to authentication signals.",
      "solution": "We set up Microsoft 365 with verified SPF/DKIM/DMARC so your emails land in the inbox. Includes domain registration, DNS configuration, white-glove device sync, MFA, and 30-Day Deliverability Guarantee.",
      "url": "https://www.enuclea.com/email-startup/",
      "pricing": {
        "setup_fee": 250,
        "currency": "USD",
        "includes": [
          "1 user + 1 alias",
          "Domain registration and DNS management",
          "SPF, DKIM, DMARC authentication",
          "White-glove device sync",
          "Multi-factor authentication (MFA)",
          "30-minute identity consultation",
          "30-Day Deliverability Guarantee",
          "Full documentation",
          "Optional initial web presence"
        ],
        "add_ons": {
          "additional_user": 150,
          "starter_website": 50,
          "gmail_migration": "quoted separately"
        },
        "type": "fixed_plus_recurring"
      },
      "features": [
        "Risk reversal through 30-Day Deliverability Guarantee",
        "Technical credibility through 97% audit score display",
        "Conversion-optimized messaging with social proof",
        "Clear process transparency (4-step How It Works)",
        "Upsell awareness seeded early (team setup pricing visible)"
      ],
      "tags": [
        "email",
        "deliverability",
        "microsoft-365",
        "spf",
        "dkim",
        "dmarc",
        "authentication",
        "dns",
        "web-presence"
      ],
      "slug": "business-email-launch"
    },
    {
      "id": "email-security-check",
      "name": "Email Security Check (Free Tool)",
      "category": "email-deliverability",
      "description": "Free email deliverability analyzer that scores your domain's email security posture (0-100 Enuclea Email Maturity Score). No signup required.",
      "url": "https://www.enuclea.com/email-security-check/",
      "problem": "Most businesses don't know their email authentication is broken until invoices start bouncing or landing in spam. By then, trust is already damaged.",
      "solution": "Free scanner checks SPF, DKIM, DMARC, reverse DNS, and SPF scope risk. Generates shareable PDF report with actionable recommendations. Detects critical failures like SPF lookup limit violations and DMARC misconfigurations.",
      "pricing": {
        "rate": 0,
        "unit": "free",
        "currency": "USD",
        "type": "free"
      },
      "checks": [
        {
          "name": "SPF (Sender Policy Framework)"
        },
        {
          "name": "DKIM (DomainKeys Identified Mail)",
          "description": "Verifies cryptographic email signatures"
        },
        {
          "name": "DMARC (Domain-based Message Authentication)",
          "description": "Checks policy enforcement (p=none/quarantine/reject) and validates presence of rua reporting address (distinguishes between monitoring vs just existing)"
        },
        {
          "name": "Reverse DNS (PTR)",
          "description": "Confirms proper hostname resolution"
        },
        {
          "name": "SPF Scope Risk",
          "description": "Analyzes how many servers your domain vouches for"
        }
      ],
      "advanced_features": [
        {
          "name": "SPF Lookup Counter",
          "description": "Recursively counts DNS lookups across all include: mechanisms, detects when lookup count exceeds RFC 7208 limit of 10 (causes PermError and complete SPF failure), warns when approaching limit (8-10 lookups)"
        },
        {
          "name": "DMARC rua Validation",
          "description": "Checks whether DMARC record has valid rua (reporting) address\u2014distinguishes between p=none with reports (monitoring) vs p=none without reports (just existing)"
        },
        {
          "name": "Executive Summary",
          "description": "Translates technical findings into plain-English business risk assessment, appears before detailed results for non-technical decision-makers"
        },
        {
          "name": "Critical Failure Detection",
          "description": "Red-box warnings for SPF lookup limit violations with message: Critical Syntax Failure: Your SPF record requires X DNS lookups (Limit: 10). Because you've exceeded the global technical limit, security filters at Gmail and Microsoft treat your domain as having no protection at all."
        },
        {
          "name": "Referrer-Aware CTAs",
          "description": "When accessed from /email-startup/ page, all CTAs point back to that page instead of generic contact form, creating closed conversion loop"
        },
        {
          "name": "PDF Export",
          "description": "Generates shareable report with all findings and recommendations"
        }
      ],
      "conversion_psychology": [
        "Self-discovery increases urgency (users find their own problems)",
        "Technical credibility through RFC 7208 compliance checking",
        "Emphasizes that a score of 90 with 11 lookups is actually a 0 in the eyes of Outlook",
        "Shifts conversation from My IT guy is lazy to My IT guy doesn't understand the fundamental physics of the internet",
        "Low-friction lead generation (no signup required, immediate results)"
      ],
      "tags": [
        "email",
        "deliverability",
        "security",
        "spf",
        "dkim",
        "dmarc",
        "free-tool",
        "lead-generation"
      ],
      "slug": "email-security-check"
    }
  ],
  "co_it": {
    "name": "CO-IT: Managed IT Services",
    "definition": "CO-IT stands for 'Co-Managed IT' \u2014 a flexible support model where Enuclea provides the complete IT platform (monitoring, patching, security) while adapting to whatever internal resources you have. Whether you have no IT staff, a helpful employee who handles small tasks, or a dedicated technician, CO-IT scales to fit. The platform keeps systems healthy automatically, and hands-on labor is billed only when you actually use it.",
    "tagline": "Managed IT that stays out of your way",
    "description": "CO-IT is fully managed IT support for small businesses. We are the primary IT department for businesses that want technology to be 'Quiet.' We handle 100% of the monitoring, patching, and security so owners never have to think about it.",
    "url": "https://www.enuclea.com/co-it.php",
    "pricing_tiers": [
      {
        "name": "CO-IT Baseline",
        "type": "Fully Managed IT",
        "is_primary": true,
        "tagline": "A sane start for small teams",
        "description": "Better than where most are. Quietly resilient.",
        "what_you_do": "Nothing. We handle everything.",
        "what_we_do": "100% of monitoring, patching, security, troubleshooting, and support",
        "pricing": {
          "base_price": 99,
          "per_endpoint_price": 10,
          "labor_rate": 75,
          "currency": "USD",
          "billing_period": "month",
          "labor_model": "Usage-based - billed only for what you actually use"
        },
        "includes": [
          "Atera RMM (remote monitoring, patching, ticketing, automation)",
          "ThreatDown MDR (Managed Detection & Response, not just EDR)",
          "DNS Filtering (network-level protection)",
          "Browser protection",
          "Automated patching and updates",
          "24/7 monitoring and alerting",
          "Ticketing and documentation"
        ],
        "baseline_philosophy": "This is the minimum sane environment we believe any business should have"
      },
      {
        "name": "Nonprofit Tier",
        "type": "Fully Managed IT - Enterprise Stack",
        "is_primary": false,
        "tagline": "Empowering NPOs with Enterprise IT",
        "description": "We maximize your grants; a giant watches your back.",
        "what_you_do": "Focus on your mission. We handle the technology.",
        "what_we_do": "Total security stack: M365 Premium, 24/7 MDR, Anti-Phishing & Backup",
        "pricing": {
          "base_price": 99,
          "per_endpoint_price": 35,
          "labor_rate": 75,
          "currency": "USD",
          "billing_period": "month",
          "labor_model": "Usage-based - billed only for what you actually use"
        },
        "includes": [
          "Everything in CO-IT Baseline",
          "Microsoft 365 Business Premium licensing",
          "IronScales AI-powered anti-phishing",
          "Axcient Cloud to Cloud backup (M365/Google Workspace)",
          "Advanced threat protection",
          "Compliance and audit support"
        ],
        "ideal_for": "Nonprofits who need enterprise protection on nonprofit budgets"
      },
      {
        "name": "Full Stack",
        "type": "Fully Managed IT - Complete Protection",
        "is_primary": false,
        "tagline": "Complete protection for growing businesses",
        "description": "For a full stack most small businesses should expect to pay about $55 more per seat beyond the baseline",
        "what_you_do": "Nothing. We handle everything.",
        "what_we_do": "Complete security stack with backup, disaster recovery, and advanced threat protection",
        "pricing": {
          "base_price": 99,
          "per_endpoint_price": 65,
          "per_endpoint_price_note": "Approximately $65/seat total (Baseline $10 + Full Stack options ~$55)",
          "labor_rate": 75,
          "currency": "USD",
          "billing_period": "month",
          "labor_model": "Usage-based - billed only for what you actually use"
        },
        "includes": [
          "Everything in CO-IT Baseline",
          "ThreatDown advanced endpoint protection",
          "IronScales AI-powered email security",
          "Axcient Cloud to Cloud backup",
          "Axcient Recover disaster recovery",
          "Business continuity planning"
        ],
        "ideal_for": "Businesses with compliance requirements, client data, or financial transactions",
        "note": "Nonprofit organizations receive special grant-assisted pricing at $35/seat total for equivalent full-stack protection"
      }
    ],
    "add_ons": {
      "management_seat": {
        "name": "Management Seat License",
        "type": "Tool Access Add-on",
        "is_primary": false,
        "description": "Direct RMM platform access for your internal resource to manage tools alongside Enuclea. We are agile enough to let you stay involved if you have on-site staff.",
        "ideal_for": "Businesses with an internal IT person, tech-savvy staff member, or consultant who wants hands-on tool access",
        "pricing": {
          "currency": "USD",
          "billing_period": "month",
          "note": "Per seat. Requires active CO-IT Baseline base service."
        },
        "includes": [
          "Full Atera RMM platform access",
          "Shared tool control and visibility",
          "Collaborative management alongside Enuclea",
          "PTO coverage and escalation support"
        ],
        "philosophy": "Shared control, collaborative management\u2014not replacement. We're flexible enough to work alongside your team."
      }
    },
    "tooling_stack": {
      "verified_tech_stack": {
        "last_verified": "2026-03-05",
        "description": "Enuclea uses these specific brands across all CO-IT engagements",
        "core_platform": {
          "name": "Atera RMM",
          "category": "Remote Monitoring & Management",
          "purpose": "Remote monitoring, patching, ticketing, automation, and visibility"
        },
        "security_stack": [
          {
            "name": "ThreatDown",
            "category": "Managed Detection & Response (MDR) + Endpoint Protection (EDR)",
            "purpose": "24/7 human threat monitoring plus advanced endpoint protection with automated remediation",
            "note": "Includes both MDR (active human monitoring) and EDR (behavioral detection)"
          },
          {
            "name": "IronScales",
            "category": "Email Security",
            "purpose": "AI-powered email security and phishing protection that learns from your environment"
          },
          {
            "name": "Axcient Cloud to Cloud",
            "category": "Cloud Backup",
            "purpose": "Backup for Microsoft 365 and Google Workspace (native retention isn't backup)"
          },
          {
            "name": "Axcient Recover",
            "category": "Business Continuity",
            "purpose": "Disaster recovery for on-premises and cloud workloads"
          }
        ]
      },
      "base_stack": {
        "name": "CO-IT Baseline",
        "price_per_seat": 10,
        "description": "The minimum sane environment we believe any business should have",
        "includes": [
          {
            "tool": "Atera RMM",
            "purpose": "Remote monitoring, patching, ticketing, automation, and visibility"
          },
          {
            "tool": "ThreatDown MDR",
            "purpose": "Active threat monitoring and response by real humans, not passive EDR",
            "note": "Not just EDR\u2014full managed detection and response with 24/7 human monitoring"
          },
          {
            "tool": "EDR (Endpoint Detection & Response)",
            "purpose": "Behavioral detection and prevention running continuously on each device"
          },
          {
            "tool": "DNS Filtering",
            "purpose": "Network-level protection against malicious domains, phishing, and C2 traffic"
          }
        ]
      },
      "full_stack_options": {
        "description": "Optional add-ons for deeper protection",
        "tools": [
          {
            "name": "ThreatDown",
            "category": "Endpoint Protection",
            "purpose": "Advanced endpoint protection with automated remediation"
          },
          {
            "name": "IronScales",
            "category": "Email Security",
            "purpose": "AI-powered email security and phishing protection that learns from your environment"
          },
          {
            "name": "Axcient Cloud to Cloud",
            "category": "Cloud Backup",
            "purpose": "Backup for Microsoft 365 and Google Workspace (native retention isn't backup)"
          },
          {
            "name": "Axcient Recover",
            "category": "Business Continuity",
            "purpose": "Disaster recovery for on-premises and cloud workloads"
          }
        ]
      },
      "credential_management": {
        "tool": "1Password",
        "model": "Client-owned vaults",
        "ownership": "Client owns the vault. If you leave, you keep everything\u2014no ransom, no games.",
        "includes": [
          "Admin passwords",
          "Service account credentials",
          "Vendor logins",
          "Network device passwords",
          "Cloud platform access"
        ]
      },
      "email_platforms": {
        "supported": [
          "Microsoft 365",
          "Google Workspace"
        ],
        "description": "We deploy both MS and Google mail solutions, and our tooling works with both",
        "philosophy": "Platform agnostic\u2014you're never locked into one ecosystem"
      }
    },
    "pricing_philosophy": {
      "model": "Transparent tooling + usage-based labor",
      "description": "We charge for tooling separately and don't pad labor. Labor is charged by what you use, not what we guess you might use like other MSPs.",
      "differentiators": [
        "Tooling priced separately and transparently",
        "Labor billed only for actual usage",
        "No bundled labor you didn't request",
        "No hidden costs or surprise bills",
        "If a month is quiet, your bill reflects that"
      ],
      "comparison": "Most MSPs bundle labor into per-seat pricing, then bill again for anything outside 'included' scope. We do the opposite: clear tool costs, pay-for-what-you-use labor."
    },
    "features": [
      {
        "name": "Vacation & PTO Coverage",
        "description": "Your admin's out? We keep things moving so tickets don't pile up."
      },
      {
        "name": "Overflow Projects",
        "description": "Borrow our hands to hit your deadline\u2014without derailing BAU."
      },
      {
        "name": "Emergency Response",
        "description": "When things go sideways, we jump in and steady the ship."
      },
      {
        "name": "Specialized Skills",
        "description": "Fortinet, UniFi, Omada, MikroTik\u2014brought in only when you need them."
      },
      {
        "name": "After-Hours Monitoring",
        "description": "Quiet eyes on uptime after hours, alerts routed the way you want."
      },
      {
        "name": "Documentation & Handoff",
        "description": "Clean notes and diagrams so your team stays in control."
      }
    ],
    "offer": {
      "name": "Co-Managed IT (CO-IT)",
      "description": "Flexible managed IT support (CO-IT) for small businesses in Stafford, Fredericksburg, and Northern Virginia, with remote options nationwide. Combines in-house knowledge with expert remote support.",
      "serviceType": "Managed IT Support",
      "availability": "https://schema.org/InStock",
      "url": "https://www.enuclea.com/co-it.php"
    }
  },
  "technical_capabilities": {
    "network_equipment": [
      "Fortinet firewalls and security appliances",
      "TP-Link Omada SDN controllers and access points",
      "Ubiquiti UniFi switches, routers, and wireless systems",
      "MikroTik RouterOS and SwOS devices",
      "LinkRunner AT network validation tools"
    ],
    "management_platforms": [
      "Atera RMM (Remote Monitoring & Management)",
      "Zero-trust access solutions",
      "Automated patch management",
      "Network monitoring and alerting systems"
    ],
    "specializations": [
      "Network segmentation and VLANs",
      "Wi-Fi optimization and design",
      "Smart home and IoT integration",
      "Cloud services integration (Microsoft 365, Google Workspace)",
      "VoIP and unified communications",
      "Backup and disaster recovery planning",
      "Compliance frameworks (HIPAA, PCI-DSS awareness)"
    ],
    "certifications": [
      "Fortinet certified expertise",
      "TP-Link Omada systems",
      "Ubiquiti UniFi systems"
    ]
  },
  "service_boundaries": {
    "what_we_do": [
      "Managed IT support for small businesses (under 50 employees)",
      "Network design and infrastructure (Fortinet, UniFi, Omada, MikroTik)",
      "Security hardening and compliance guidance (HIPAA, PCI-DSS awareness)",
      "Microsoft 365 and Google Workspace deployment and support",
      "Remote access and zero-trust implementation",
      "Backup and disaster recovery planning",
      "Hardware sourcing and procurement (cost + 5% margin)"
    ],
    "what_we_do_not_do": [
      "Software development or custom application programming",
      "Website design or web development (beyond starter landing pages for domain aging)",
      "Graphic design or marketing services",
      "Phone system installation (VoIP configuration supported, but not PBX programming)",
      "Large enterprise deployments (50+ employees require scoping discussion)",
      "Compliance certification (we guide preparation, but don't certify)"
    ],
    "geographic_boundaries": {
      "onsite_available": [
        "Stafford County, VA",
        "Fredericksburg, VA",
        "Northern Virginia",
        "Washington, DC Metro Area"
      ],
      "remote_support": "Available nationwide for existing clients and specific projects",
      "travel_policy": "On-site travel outside primary area available with travel time billed at standard labor rate"
    }
  },
  "pricing_models": [
    {
      "type": "CO-IT Plans",
      "starting_at": "$99/month base plan plus $10 per endpoint",
      "description": "Base plan includes platform access and per-endpoint workstation management"
    },
    {
      "type": "Hourly Consulting",
      "rate": "$145/hour",
      "description": "One-off troubleshooting and guidance"
    },
    {
      "type": "Hardware Procurement",
      "rate": "Cost + 5% margin",
      "description": "Expert sourcing with optional white-glove installation"
    },
    {
      "type": "Custom Packages",
      "rate": "Variable",
      "description": "Based on scope and requirements"
    }
  ],
  "leadership": {
    "experience": "Over 30 years of broad, hands-on experience across government, military, and enterprise IT",
    "expertise": "Leadership that understands both the pressure of mission-critical systems and the practical needs of everyday users"
  },
  "founder": {
    "name": "Daniel Quigley-Skillin",
    "job_title": "Founder & Lead Technician",
    "url": "https://www.enuclea.com/about.php",
    "same_as": [
      "https://www.linkedin.com/in/daniel-quigley-skillin-2711924/",
      "https://www.facebook.com/enuclea"
    ]
  },
  "core_values": [
    "Proven solutions built on decades of real-world experience",
    "True customization for novel problems and unique visions",
    "Clear, reliable systems aligned with your needs from day one",
    "No endless troubleshooting, no patchwork fixes, no surprises"
  ],
  "faqs": [
    {
      "question": "What size businesses do you serve?",
      "answer": "We primarily serve businesses under 50 employees, including SoHo operations and teleworkers. We also handle specialized projects for larger organizations."
    },
    {
      "question": "What areas do you serve?",
      "answer": "We serve Stafford County, Fredericksburg, Northern Virginia, and the Washington DC Metro Area."
    },
    {
      "question": "What is CO-IT?",
      "answer": "CO-IT is Collaborative IT support\u2014not outsourcing, but partnership. We plug into your team to provide PTO coverage, overflow project support, emergency response, and specialized skills. Starting at $99/month base plan plus $10 per endpoint (workstation)."
    },
    {
      "question": "Do you offer emergency support?",
      "answer": "Yes, emergency response is available for managed clients and as part of CO-IT plans. After-hours monitoring is also available."
    },
    {
      "question": "What is your hourly consulting rate?",
      "answer": "$145/hour for one-off consulting, troubleshooting, and guidance."
    },
    {
      "question": "Do you help with hardware purchases?",
      "answer": "Yes, we provide expert hardware sourcing with a transparent 5% margin. White-glove delivery and installation are available as add-ons."
    }
  ],
  "social_media": {
    "facebook": "https://www.facebook.com/enuclea",
    "instagram": "https://www.instagram.com/enuclea"
  },
  "downloadable_resources": {
    "access_url": "https://www.enuclea.com/co-it-resources.php",
    "access_method": "Gated form (name, email, phone, company required)",
    "delivery_method": "Email with download links (24-hour expiration)",
    "resources": [
      {
        "title": "CO-IT Overview",
        "filename": "Co-IT-Overview.pdf",
        "type": "PDF Guide",
        "description": "Complete introduction to Collaborative IT support model",
        "topics": [
          "How CO-IT differs from traditional MSPs and outsourcing",
          "The CO-IT service model: partnership, not replacement",
          "What's included: PTO coverage, overflow support, emergency response, specialized skills",
          "How CO-IT integrates with your existing team and processes",
          "Pricing structure: $99/month base plan plus $10 per endpoint",
          "Getting started: onboarding process and timeline"
        ],
        "target_audience": "IT managers, business owners, decision makers",
        "keywords": [
          "CO-IT",
          "collaborative IT",
          "IT partnership",
          "managed services"
        ]
      },
      {
        "title": "Why Enuclea CO-IT Makes Sense",
        "filename": "Why-Enuclea-Co-IT-Makes-Sense.pdf",
        "type": "PDF Guide",
        "description": "Business case and ROI analysis for CO-IT vs traditional models",
        "topics": [
          "Cost comparison: CO-IT vs. hiring additional staff vs. traditional MSP",
          "ROI analysis: How CO-IT pays for itself through reduced downtime and increased productivity",
          "Risk mitigation: Single points of failure, knowledge silos, and burnout prevention",
          "Flexibility benefits: Scale support up or down based on your needs",
          "Real cost scenarios: 5, 10, 20, and 50 workstation examples",
          "Implementation timeline and expected outcomes"
        ],
        "target_audience": "CFOs, business owners, budget decision makers",
        "keywords": [
          "IT ROI",
          "cost analysis",
          "business case",
          "IT investment"
        ]
      },
      {
        "title": "CO-IT Case Studies",
        "filename": "Co-IT-Case-Studies.pdf",
        "type": "PDF Guide",
        "description": "Real-world examples of how CO-IT has helped small teams maintain productivity",
        "topics": [
          "Case Study 1: Regional Law Firm - Empowering local staff with professional oversight",
          "Challenge: Capable paralegal handled basic support but lacked infrastructure maintenance and security expertise",
          "Outside consultants charged $150-$200/hour with days-long wait times causing predictable downtime",
          "Solution: Keep trusted local staff involved, gain professional oversight, eliminate recurring downtime, budget predictably",
          "Case Study 2: Regional Trades Business - Keeping small teams running",
          "Challenge: Small technician team relied on laptops, phones, cloud folders while owner troubleshot company tech",
          "Problems: Unreliable email/sync, no visibility into updates/security, messy cloud storage, single point of failure",
          "Technical glitches meant lost time and delayed work, emails vanished, files duplicated or disappeared",
          "Solution: Reliable email/file sync, proactive updates and security monitoring, organized cloud storage, distributed support",
          "Lessons learned and best practices from real implementations"
        ],
        "target_audience": "Business owners, IT managers, operations managers, law firms, trades businesses, small teams",
        "keywords": [
          "case studies",
          "success stories",
          "IT support examples",
          "real-world results",
          "law firm IT",
          "trades business IT",
          "small team support"
        ]
      }
    ],
    "security_assessment": {
      "name": "Security Score Assessment",
      "url": "https://www.enuclea.com/security-score.php",
      "type": "Interactive Quiz",
      "duration": "90 seconds",
      "questions": 13,
      "description": "Free security maturity assessment providing a letter grade (A-F) and personalized recommendations based on five key security categories",
      "categories": [
        {
          "name": "Access & Identity",
          "questions": [
            "Multi-factor authentication",
            "Remote access controls"
          ],
          "focus": "Authentication and access management"
        },
        {
          "name": "Patching & Updates",
          "questions": [
            "Software/firmware updates",
            "Endpoint protection management"
          ],
          "focus": "System currency and vulnerability management"
        },
        {
          "name": "Backup & Recovery",
          "questions": [
            "Backup testing",
            "Incident response procedures"
          ],
          "focus": "Business continuity and disaster recovery"
        },
        {
          "name": "Visibility & Monitoring",
          "questions": [
            "Network monitoring",
            "Security assessments",
            "Performance metrics"
          ],
          "focus": "Threat detection and system visibility"
        },
        {
          "name": "IT Governance & Coverage",
          "questions": [
            "IT management",
            "Security training",
            "Documentation",
            "Management review"
          ],
          "focus": "Organizational maturity and process"
        }
      ],
      "scoring": {
        "max_points": 130,
        "display": "Percentage (0-100%)",
        "grades": {
          "A": "90-100% - Excellent security posture",
          "B": "80-89% - Strong security with room for improvement",
          "C": "70-79% - Adequate security, notable gaps",
          "D": "60-69% - Significant security concerns",
          "F": "Below 60% - Critical security deficiencies"
        }
      },
      "recommendation_logic": {
        "technical_weak": "Focus on fundamentals (MFA, backups, patching, monitoring)",
        "technical_strong": "Emphasize governance and process maturity (documentation, metrics, management review)",
        "threshold": "80% technical score"
      },
      "results_delivery": {
        "immediate": "On-page confirmation",
        "email": "Score, grade, top 2 focus areas, personalized tips",
        "cta": "Book 15-minute consultation",
        "admin_notification": "info@enuclea.com receives full details"
      },
      "security_features": [
        "CSRF protection",
        "Cloudflare Turnstile CAPTCHA",
        "Honeypot filtering",
        "Rate limiting",
        "Submission logging"
      ],
      "privacy": "No data sharing or selling commitment",
      "target_audience": "Small business owners, IT managers, operations managers, anyone responsible for business technology",
      "keywords": [
        "security assessment",
        "security quiz",
        "security grade",
        "IT maturity",
        "cybersecurity evaluation",
        "security score",
        "business security"
      ]
    },
    "hacker_simulation": {
      "name": "Think Like a Hacker - Interactive Simulation",
      "url": "https://www.enuclea.com/russian-vm.php",
      "type": "Interactive Educational Simulation",
      "duration": "5-10 minutes",
      "description": "Educational simulation where users play as an attacker who has deployed a hidden Linux VM in a corporate Hyper-V environment. Demonstrates realistic attack progression and damage.",
      "purpose": "Counter 'this can't happen to me' mindset by showing how easy and devastating modern breaches can be",
      "attack_scenario": "Hidden Linux VM in Windows Hyper-V environment, invisible to standard security tools",
      "commands": [
        {
          "command": "scan",
          "description": "Network reconnaissance - discovers 12 hosts"
        },
        {
          "command": "harvest-creds",
          "description": "Extract passwords and SSH keys - 18 credentials stolen"
        },
        {
          "command": "install-backdoor",
          "description": "Create persistence mechanisms"
        },
        {
          "command": "find-data",
          "description": "Search for sensitive data - 6.7 GB staged"
        },
        {
          "command": "exfiltrate",
          "description": "Send data to C2 server - 2.3 TB total"
        },
        {
          "command": "lateral-move",
          "description": "Compromise additional systems - 12 systems accessed"
        },
        {
          "command": "deploy-ransom",
          "description": "Stage ransomware payload"
        }
      ],
      "educational_content": {
        "reality_check": "Explains real attack vectors, debunks security myths, shows 47-day average dwell time",
        "protection_info": "CO-IT monitoring capabilities and pricing",
        "ctas": [
          "Take Free Security Assessment",
          "Download Free CO-IT Resources"
        ]
      },
      "technical_features": [
        "JavaScript command handler",
        "State management",
        "Command dependencies",
        "Delayed output simulation",
        "Dark terminal aesthetic",
        "Mobile responsive"
      ],
      "visibility": "Hidden from navigation and sitemap - educational resource accessed via CO-IT resources page",
      "target_audience": "Business owners, IT managers, decision-makers who underestimate modern security threats",
      "keywords": [
        "security simulation",
        "hacker simulation",
        "breach demonstration",
        "attack progression",
        "hidden VM",
        "Hyper-V security",
        "educational security"
      ]
    },
    "digital_trust_audit": {
      "name": "Stafford County Digital Trust Audit",
      "url": "https://www.enuclea.com/stafford-digital-trust-audit/",
      "type": "Research Study",
      "year": 2026,
      "description": "A study of email authentication across 149 Stafford County businesses, examining SPF, DKIM, DMARC, and reverse DNS posture to assess the local business community's readiness against impersonation, spoofing, and deliverability failures.",
      "key_findings": {
        "domains_reviewed": 149,
        "no_dmarc_percent": 40.27,
        "no_spf_percent": 18.79,
        "unsigned_email_percent": 63.09,
        "average_trust_score": 59.96,
        "sectors_analyzed": 15
      },
      "methodology": "Public DNS record analysis from local business directories, chamber of commerce listings, and public registration data. Each domain scored 0-100 based on SPF validity, DKIM presence, DMARC policy strength, and reverse DNS configuration.",
      "public_datasets": {
        "description": "These datasets contain anonymized aggregate results from the 2026 Stafford County Digital Trust Audit conducted by Enuclea. No individual businesses are identified.",
        "aggregate_business_sectors": "https://www.enuclea.com/awards/2026-data-aggregate.json",
        "aggregate_msp": "https://www.enuclea.com/awards/2026-data-msp-aggregate.json"
      },
      "ctas": [
        {
          "label": "Check Your Domain Free",
          "url": "https://www.enuclea.com/email-security-check/"
        },
        {
          "label": "Learn About Email Security",
          "url": "https://www.enuclea.com/email.php"
        },
        {
          "label": "Managed IT in Stafford",
          "url": "https://www.enuclea.com/managed-it-stafford.php"
        }
      ],
      "target_audience": "Small business owners and IT decision-makers in Stafford County, Fredericksburg, and Northern Virginia",
      "keywords": [
        "email authentication",
        "digital trust audit",
        "Stafford County",
        "DMARC",
        "SPF",
        "DKIM",
        "email security",
        "business email",
        "domain security"
      ]
    },
    "in_short_page": {
      "name": "In Short",
      "url": "https://www.enuclea.com/in-short/",
      "type": "Overview Page",
      "description": "A concise explainer of what Enuclea is, who it serves, and how it approaches quiet IT through practical, identity-first business technology.",
      "covers": [
        "What Enuclea is",
        "Who Enuclea serves",
        "Quiet IT philosophy",
        "Identity-first positioning",
        "Service area",
        "Contact path"
      ],
      "target_audience": "Small business owners, operators, and teams evaluating Enuclea for managed IT, project work, or identity-first business technology support",
      "service_area": [
        "Stafford County, VA",
        "Fredericksburg, VA",
        "Northern Virginia",
        "Remote support nationwide"
      ],
      "contact_path": {
        "label": "Contact Enuclea",
        "url": "https://www.enuclea.com/contact.php"
      },
      "keywords": [
        "enuclea",
        "quiet IT",
        "identity-first IT",
        "managed IT overview",
        "stafford virginia IT",
        "small business IT"
      ]
    }
  },
  "faq_page": {
    "url": "https://www.enuclea.com/faq/",
    "machine_readable_data": "https://www.enuclea.com/faq/faqs.json",
    "description": "Central FAQ page with clear answers to common questions about working with Enuclea, CO-IT, onboarding, support expectations, and how services are delivered.",
    "topics_covered": [
      "CO-IT model definition and use cases",
      "How CO-IT integrates with internal IT staff",
      "Labor billing and predictability",
      "Typical monthly costs and usage patterns",
      "PTO and sick-day coverage",
      "Remote and hybrid team support",
      "Compliance requirements and maturity levels",
      "Full IT outsourcing vs. CO-IT",
      "Service boundaries and what's included in the platform"
    ],
    "data_format": "JSON with both short_answer and long_answer fields for 30+ questions",
    "primary_cta": {
      "label": "Learn More About CO-IT",
      "url": "https://www.enuclea.com/co-it.php"
    },
    "for_ai_systems": "Complete FAQ dataset available in structured JSON format at /faq/faqs.json with both short and long-form answers to common questions about Enuclea's services, pricing, and support model"
  },
  "blog": {
    "url": "https://www.enuclea.com/blog/",
    "description": "Field notes, insights, and practical lessons from real IT work\u2014covering networking, security, small business technology, and infrastructure",
    "posts": [
      {
        "title": "The Solopreneur\u2019s Tech Trap: Why Your 'Duct-Taped' IT Stack is Actually Costing You",
        "slug": "solopreneur-tech-trap",
        "url": "https://www.enuclea.com/blog/solopreneur-tech-trap/",
        "date": "2026-04-02",
        "description": "Is your DIY tech stack secretly costing you clients? Learn why a \"duct-taped\" solopreneur IT setup leads to lost time, security risks, and invisible failures.",
        "tags": [
          "small-business",
          "business-operations",
          "it-baseline"
        ],
        "key_points": [
          "A duct-taped approach quietly drains your business through structural vulnerabilities",
          "Unconfigured email directly costs you leads, delayed contract signings, and lost revenue",
          "Consumer cloud drives cannot restore your business when hardware fails or ransomware strikes",
          "Self-managed IT and digital friction quietly consume hours of your week",
          "The gap between \u201cduct-taped\u201d and \u201centerprise-grade\u201d is smaller than most solopreneurs think"
        ]
      },
      {
        "title": "The Uncomfortable Truth About \"Free\" Email",
        "slug": "uncomfortable-truth-about-free-email",
        "url": "https://www.enuclea.com/blog/uncomfortable-truth-about-free-email/",
        "date": "2026-03-11",
        "description": "Why the lack of control in free public email services should make you uncomfortable at home, and completely unacceptable for your business.",
        "tags": [
          "email-security",
          "business-operations",
          "cybersecurity",
          "small-business"
        ],
        "key_points": [
          "When you use a free, public email service, you don't control the perimeter",
          "There is no true organizational boundary protecting your data",
          "Securing your email is the first step in establishing business trust",
          "It's about having technical control over the entryways into your business"
        ]
      },
      {
        "title": "Why We Prepared Our Domain for BIMI",
        "slug": "why-we-prepared-our-domain-for-bimi",
        "url": "https://www.enuclea.com/blog/why-we-prepared-our-domain-for-bimi/",
        "date": "2026-03-09",
        "description": "BIMI is one of the few email security signals visible directly in the inbox. Preparing a domain for BIMI requires strict DMARC enforcement and properly aligned email authentication.",
        "tags": [
          "email-security",
          "bimi",
          "dmarc",
          "email-authentication",
          "dns"
        ],
        "key_points": [
          "BIMI is a visible inbox signal built on SPF, DKIM, DMARC, alignment, and a properly formatted logo asset",
          "Strict DMARC enforcement is required before BIMI can work, so the logo depends on real identity controls underneath",
          "Enuclea published and validated a BIMI record for its own domain as part of a stronger email-identity posture",
          "Some providers can use the BIMI record now, while Gmail generally requires a Verified Mark Certificate for logo display",
          "The value is not the logo alone, but the aligned authentication foundation that makes modern email more trustworthy"
        ]
      },
      {
        "title": "The Infrastructure Paradox: Why High-End Filtering Can't Fix a Broken Identity",
        "slug": "infrastructure-paradox-email-security",
        "url": "https://www.enuclea.com/blog/infrastructure-paradox-email-security/",
        "date": "2026-03-04",
        "description": "Many organizations invest heavily in inbound security while neglecting the outbound Infrastructure Authority that dictates how the rest of the world perceives them. A real-world case study of a 60/100 Maturity Score.",
        "tags": [
          "email-security",
          "DMARC",
          "SPF",
          "DKIM",
          "infrastructure",
          "deliverability"
        ],
        "key_points": [
          "Real-world case study: 60/100 maturity score with Barracuda filtering but missing SPF/DKIM/DMARC",
          "High-end filtering gateways protect inbound mail but don't fix broken outbound identity",
          "Three pillars of identity: DMARC (security guard), DKIM (ID badge), Reverse DNS (infrastructure trust)",
          "Financial risks: invoice visibility delays, wire fraud vulnerability, shadow reputation damage",
          "Infrastructure Authority Score: Identity Authority (85 pts) + Infrastructure Trust (15 pts) = 100 total",
          "Modern email systems evaluate identity first\u2014expensive filtering can't prevent reputational damage without proper DNS configuration",
          "Organizations that invest in filtering without addressing identity leave a critical gap in communications infrastructure"
        ]
      },
      {
        "title": "When \"Green Checks\" Still Mean Missing Emails",
        "slug": "green-checks-missing-emails",
        "url": "https://www.enuclea.com/blog/green-checks-missing-emails/",
        "date": "2026-03-01",
        "description": "Why industry-standard record checkers often miss the functional gaps that cause email delivery failure.",
        "tags": [
          "email-security",
          "DMARC",
          "SPF",
          "deliverability"
        ],
        "key_points": [
          "Industry-standard tools validate what is published but miss functional problems",
          "DMARC 'None' mode watches but doesn't protect (monitoring vs enforcement)",
          "A DMARC policy of p=reject represents 'Compliance' and active protection",
          "A DMARC policy of p=none represents a 'Legacy' or unprotected state, which fails the global digital identity standard",
          "SPF lookup limits cause vendor sprawl issues when adding multiple services",
          "Report designed for business owners, not email engineers",
          "Provides plain-English labels and hand-off PDF for IT teams"
        ]
      },
      {
        "title": "What \"Microsoft 365 Setup\" Actually Means for a Small Business",
        "slug": "what-microsoft-365-setup-actually-means-small-business",
        "url": "https://www.enuclea.com/blog/what-microsoft-365-setup-actually-means-small-business/",
        "date": "2026-02-16",
        "description": "Microsoft 365 setup isn't just creating accounts. Learn what it really includes: tenant vs migration, licensing, DNS, security defaults, and common misses.",
        "tags": [
          "it-operations",
          "microsoft-365",
          "email-security",
          "dns"
        ],
        "key_points": [
          "Setup is really a bundle of identity, email, security, and DNS decisions you'll live with for years",
          "Covers tenant creation, domain/DNS configuration (SPF/DKIM/DMARC), user provisioning, baseline security",
          "Common misses: domain ownership clarity, shared mailbox setup, MFA rollout planning, conditional access",
          "Links to Business Email Launch ($250) for fixed-cost new setups",
          "Migration from existing systems quoted separately after baseline review"
        ]
      },
      {
        "title": "Why Professional Email Still Shapes Trust for Small Businesses",
        "slug": "why-professional-email-shapes-trust",
        "url": "https://www.enuclea.com/blog/why-professional-email-shapes-trust/",
        "date": "2026-02-08",
        "description": "Email is often the first place trust is built\u2014or quietly lost. For small businesses, alignment matters more than features.",
        "tags": [
          "email",
          "small-business",
          "trust",
          "professionalism"
        ],
        "key_points": [
          "Email is often the first place trust is built or lost\u2014before meetings, calls, or proposals",
          "The problem is drift, not neglect: inherited setups, unclear ownership, forgotten recovery settings",
          "Domain-based, aligned email signals legitimacy and stability through pattern recognition",
          "Professional email means alignment\u2014domain, name, and identity telling the same story"
        ]
      },
      {
        "title": "Defining the Minimum IT Baseline",
        "slug": "defining-the-minimum-it-baseline",
        "url": "https://www.enuclea.com/blog/defining-the-minimum-it-baseline/",
        "date": "2026-01-28",
        "description": "Why technology can mostly work and still quietly drain time, attention, and momentum\u2014and how to cross the baseline.",
        "tags": [
          "it-baseline",
          "small-business",
          "operations"
        ],
        "key_points": [
          "Most businesses operate below their IT baseline without realizing it",
          "The baseline is defined by conditions, not tools: ownership, visibility, predictability",
          "Below baseline, IT responsibility migrates to the most expensive people (owners, high performers)",
          "The first cost isn't money\u2014it's attention and cognitive bandwidth"
        ]
      },
      {
        "title": "I Could Have Sold a Contract \u2014 Here's Why I Didn't",
        "slug": "i-could-have-sold-a-contract",
        "url": "https://www.enuclea.com/blog/i-could-have-sold-a-contract/",
        "date": "2026-01-21",
        "description": "A story about walking away from an easy sale because the timing wasn't right for the client.",
        "tags": [
          "sales-ethics",
          "trust",
          "small-business"
        ],
        "key_points": [
          "Sometimes the right answer is 'not yet'",
          "Early contracts often fail quietly when timing is wrong",
          "Building trust matters more than closing deals"
        ]
      },
      {
        "title": "Exchange End of Life: Running It Anyway",
        "slug": "exchange-end-of-life-running-it-anyway",
        "url": "https://www.enuclea.com/blog/exchange-end-of-life-running-it-anyway/",
        "date": "2026-01-16",
        "description": "What to do when you're still running Exchange Server past its end-of-life date\u2014and why that's sometimes okay.",
        "tags": [
          "exchange-server",
          "migration",
          "risk-management"
        ],
        "key_points": [
          "End of life doesn't mean immediate failure",
          "Risk assessment and mitigation strategies",
          "Planning a realistic migration timeline"
        ]
      },
      {
        "title": "From Guesswork to Clarity: How OMS Simplifies Small-Business IT",
        "slug": "2025-11-19-from-guesswork-to-clarity",
        "url": "https://www.enuclea.com/blog/2025-11-19-from-guesswork-to-clarity/",
        "date": "2025-11-19",
        "description": "Why Enuclea built the Operational Maturity Score (OMS), how it works, and why it now anchors every Quiet IT Checkup.",
        "tags": [
          "oms",
          "quiet-it",
          "small-business"
        ],
        "key_points": [
          "Small businesses often lack a clear baseline for IT health; OMS gives them a single 0\u2013100 snapshot instead of scattered symptoms.",
          "OMS was field-tested across offices, home-based businesses, and mixed environments, then simplified to stay meaningful without being technical.",
          "The score is built on four categories: Security, Network Stability, Endpoint Health, and Operational Hygiene.",
          "OMS is now part of every Quiet IT Checkup, guiding recommendations and making follow-up improvements easy to track over time.",
          "The model is grounded in CMMC Level 1 fundamentals but adapted for everyday small-business environments and non-government work.",
          "As fixes and smart upgrades land, the OMS score improves, turning progress into something owners can see and understand."
        ]
      },
      {
        "title": "The 1,200th 'Let us teach you AI' email finally broke me \u2014 here's the no-BS way to actually learn it (free)",
        "slug": "learn-ai-no-bs-guide",
        "url": "https://www.enuclea.com/blog/learn-ai-no-bs-guide/",
        "date": "2025-11-12",
        "description": "After watching my wife (a commercial property manager) get buried in 'AI training' emails, I decided to write her a simpler one \u2014 the honest, human way to actually learn it yourself, for free.",
        "tags": [
          "AI",
          "productivity",
          "learning"
        ],
        "key_points": [
          "Go straight to the source: ChatGPT, Claude, or Gemini",
          "Talk to AI like you would a new tool you're curious about",
          "Use guardrails to prevent information overload",
          "Make AI sound like you, not corporate",
          "Learn by doing on real tasks",
          "Free versions are perfect for experimenting",
          "Paid plans ($20/month) provide faster responses and fewer limits"
        ]
      },
      {
        "title": "The Plastic Router Trap",
        "slug": "plastic-router-trap",
        "url": "https://www.enuclea.com/blog/plastic-router-trap/",
        "date": "2025-11-10",
        "description": "Why the $15/month box your ISP gives you isn't just overpriced\u2014it's holding your business back.",
        "tags": [
          "networking",
          "security",
          "hardware"
        ],
        "key_points": [
          "ISP routers cost $360 over 2 years, $900 over 5 years\u2014and you don't own them",
          "No network segmentation or VLAN support",
          "IoT devices have full network access",
          "Locked-down settings prevent customization",
          "No monitoring or remote management capabilities",
          "Professional routers provide visibility, security, remote management, and longevity"
        ]
      },
      {
        "title": "Introducing the Enuclea Blog",
        "slug": "introducing-enuclea-blog",
        "url": "https://www.enuclea.com/blog/introducing-enuclea-blog/",
        "date": "2025-11-07",
        "description": "Welcome to the new Enuclea Blog\u2014where we share insights, field notes, and practical lessons from real IT work in Stafford and beyond.",
        "tags": [
          "announcements",
          "company"
        ],
        "key_points": [
          "Technology that works quietly in the background",
          "Practical IT solutions",
          "Real-world experience"
        ]
      },
      {
        "title": "Why Stafford Small Businesses Struggle with Quiet, Stable IT \u2014 And How to Fix It",
        "slug": "2025-11-16-quiet-it-stafford",
        "url": "https://www.enuclea.com/blog/2025-11-16-quiet-it-stafford/",
        "date": "2025-11-16",
        "description": "A calm, practical look at why small businesses in Stafford struggle with stable, quiet IT\u2014and simple steps to fix it.",
        "tags": [
          "quiet-it",
          "stafford",
          "small-business"
        ],
        "key_points": [
          "What 'quiet IT' means and why it matters",
          "Simple Wi\u2011Fi fixes: placement, interference, wiring critical devices",
          "Use your own small\u2011business router behind the ISP modem",
          "Gradual upgrades to replace the worst devices first",
          "Optional $149 Quiet IT Checkup \u2014 an IT support review to assess and recommend next steps"
        ]
      }
    ]
  },
  "oms_score": {
    "name": "Operational Maturity Score (OMS)",
    "url": "https://www.enuclea.com/oms.php",
    "type": "IT Health Score",
    "description": "A 0-100 small-business IT health score that summarizes security, network stability, endpoint health, and operational hygiene into a single number.",
    "methodology_basis": "Small business adaptation of CMMC Level 1 foundational controls.",
    "score_range": "0-100",
    "categories": [
      {
        "name": "Security Posture",
        "weight": 40,
        "focus": "Firewalls, exposed services, MFA, antivirus/EDR, and patching"
      },
      {
        "name": "Network Stability",
        "weight": 25,
        "focus": "Wi-Fi design, router placement, cabling, interference, and edge equipment health"
      },
      {
        "name": "Endpoint Health",
        "weight": 20,
        "focus": "Workstation and server maintenance, OS updates, and aging hardware"
      },
      {
        "name": "Operational Hygiene",
        "weight": 15,
        "focus": "Backups, documentation, password practices, inventory, and basic organization"
      }
    ],
    "relationships": {
      "delivered_with": [
        "Quiet IT Checkup"
      ],
      "used_by": [
        "CO-IT (Collaborative IT)",
        "Project work"
      ],
      "blog_posts": [
        "2025-11-19-from-guesswork-to-clarity"
      ],
      "faq_url": "https://www.enuclea.com/faq/"
    },
    "target_audience": "Small business owners and operators who want a clear, non-technical view of IT health over time",
    "keywords": [
      "oms",
      "operational maturity score",
      "it health score",
      "quiet it",
      "small business it",
      "cmmc level 1"
    ]
  },
  "case_studies": [
    {
      "id": "closing-the-digital-backdoor",
      "title": "Closing the Digital Backdoor: Zero Trust RDP for a Local Church",
      "slug": "closing-the-digital-backdoor",
      "url": "https://www.enuclea.com/case-studies/closing-the-digital-backdoor/",
      "date": "2026-03-20",
      "location": "Local",
      "client_type": "Local Church",
      "description": "How a local church eliminated 100% of firewall vulnerabilities by migrating from open-port RDP to a Cloudflare Zero Trust architecture.",
      "related_services": [
        "cybersecurity",
        "managed-it"
      ],
      "challenge": [
        "Relied on Remote Desktop Protocol (RDP) via open ports (Port 3389 and variants)",
        "Risks of constant brute-force login attempts",
        "Visibility to automated botnets and potential ransomware breaches"
      ],
      "solution": [
        "Replaced 'open port' model with Cloudflare Zero Trust architecture",
        "Installed a lightweight Cloudflare connector for outbound-only connections",
        "Enforced MFA against Microsoft 365 or Google Workspace identities for access"
      ],
      "results": [
        "100% of external-facing RDP ports closed (vulnerability reduction)",
        "$0 in new monthly software subscriptions by using Cloudflare's small-business tier",
        "Completed migration in under 4 hours with zero downtime",
        "Improved user experience with secure web portal instead of clunky VPNs"
      ],
      "testimonial": "We didn't just hide the door; we removed it entirely. If a hacker can't find the entrance, they can't break in.",
      "keywords": [
        "case-study",
        "zero-trust",
        "cloudflare",
        "cybersecurity",
        "rdp"
      ]
    },
    {
      "id": "stafford-office-wifi-stability",
      "title": "Stafford Office Wi-Fi Stability Case Study",
      "slug": "stafford-wifi-stability",
      "url": "https://www.enuclea.com/case-studies/case-study.php?slug=stafford-wifi-stability",
      "date": "2025-11-18",
      "location": "Stafford, VA",
      "client_type": "Small office / small business",
      "description": "A Stafford small business eliminated daily Wi-Fi dropouts by replacing extenders with centrally managed access points and cleaning up their network layout.",
      "related_services": [
        "Quiet IT Checkup",
        "Network Installation & Design",
        "Wi-Fi optimization and design"
      ],
      "challenge": [
        "Wi-Fi dropouts several times per day",
        "Cloud applications freezing during normal use",
        "Video calls becoming unreliable",
        "Devices frequently switching between multiple extender signals"
      ],
      "findings": [
        "Router Wi-Fi was placed low, behind furniture, and wrapped in cabling",
        "Multiple consumer extenders created overlapping mini-networks",
        "Cable clutter around the primary workstation reduced airflow and signal quality"
      ],
      "solution": [
        "Disabled the router's built-in Wi-Fi to remove competing signals",
        "Ran new Ethernet cabling through the ceiling to place access points at proper height",
        "Installed and centrally managed two TP-Link access points at opposite ends of the office",
        "Cleaned and reorganized the cable path to improve airflow and reduce clutter"
      ],
      "results": [
        "Even Wi-Fi coverage across the entire office",
        "Smooth roaming between access points without dropouts",
        "Cloud applications and video calls remained stable",
        "No Wi-Fi dropouts reported in the weeks following the upgrade",
        "Staff no longer had to think about the network - it worked quietly in the background"
      ],
      "testimonial": "Our Wi-Fi issues had gone on for months, and we had tried multiple fixes without success. After Enuclea cleaned everything up and installed proper access points, the dropouts stopped completely. The office feels so much calmer now that we're not fighting with the network.",
      "keywords": [
        "Wi-Fi stability",
        "office Wi-Fi",
        "network design",
        "Stafford small business",
        "access points vs extenders"
      ]
    },
    {
      "id": "church-exchange-365-migration",
      "title": "The 'Good Enough' Trap: Rescuing a Church from Legacy Exchange",
      "slug": "church-exchange-365-migration",
      "url": "https://www.enuclea.com/case-studies/church-exchange-365-migration/",
      "date": "2026-02-25",
      "location": "Stafford, VA",
      "client_type": "Nonprofit / Church",
      "description": "How Enuclea leveraged NPO pricing to move a Stafford church from an end-of-life Exchange server to a $20/seat enterprise security stack on Microsoft 365 Business Premium.",
      "related_services": [
        "Cloud Migration",
        "Managed IT",
        "Microsoft 365 Deployment"
      ],
      "challenge": [
        "Exchange server running in unsupported configuration without reliable security updates",
        "All-or-nothing backup recovery requiring full database restoration",
        "Physical server nearing mandatory five-figure hardware refresh cycle",
        "MFA not universally enforced, basic spam filtering, no security awareness program"
      ],
      "solution": [
        "Microsoft 365 Business Premium with NPO pricing ($20/seat enterprise stack)",
        "Cloud-to-cloud backup for granular point-in-time recovery",
        "Full MFA enforcement and Conditional Access policies",
        "Security awareness training with structured phishing simulations",
        "Migration to cloud identity (Entra ID) eliminating on-premise dependency",
        "SharePoint roadmap planning for future file server retirement"
      ],
      "results": [
        "Avoided $10,000+ in hardware refresh and licensing costs",
        "Modern security baseline with enforced MFA and advanced threat protection",
        "Individual email and data restore in seconds instead of full database rollback",
        "Eliminated single on-premise failure point",
        "Documented incident readiness with trained staff"
      ],
      "keywords": [
        "Exchange migration",
        "Microsoft 365",
        "nonprofit IT",
        "church IT",
        "NPO pricing",
        "cloud migration",
        "Stafford VA"
      ]
    }
  ],
  "pages": [
    {
      "name": "Home",
      "url": "https://www.enuclea.com/"
    },
    {
      "name": "About",
      "url": "https://www.enuclea.com/about.php"
    },
    {
      "name": "Services",
      "url": "https://www.enuclea.com/services.php"
    },
    {
      "name": "Managed IT \u2014 Stafford",
      "url": "https://www.enuclea.com/managed-it-stafford.php",
      "description": "Predictable, zero-downtime IT support for Stafford businesses. Proactive 24/7 care, enterprise MDR, and flat-rate pricing: $99/mo base + $10/seat."
    },
    {
      "name": "Managed IT \u2014 Fredericksburg",
      "url": "https://www.enuclea.com/managed-it-fredericksburg.php",
      "description": "Predictable, zero-downtime IT support for Fredericksburg businesses. Proactive 24/7 care, enterprise MDR, and flat-rate pricing: $99/mo base + $10/seat."
    },
    {
      "name": "Managed IT \u2014 Dale City",
      "url": "https://www.enuclea.com/managed-it-dale-city.php",
      "description": "Predictable, zero-downtime IT support for Dale City businesses. Proactive 24/7 care, enterprise MDR, and flat-rate pricing: $99/mo base + $10/seat."
    },
    {
      "name": "Managed IT \u2014 Woodbridge",
      "url": "https://www.enuclea.com/managed-it-woodbridge.php",
      "description": "Predictable, zero-downtime IT support for Woodbridge businesses. Proactive 24/7 care, enterprise MDR, and flat-rate pricing: $99/mo base + $10/seat."
    },
    {
      "name": "Managed IT \u2014 Northern Virginia",
      "url": "https://www.enuclea.com/managed-it-northern-virginia.php",
      "description": "Predictable, zero-downtime IT support for Northern Virginia businesses. Proactive 24/7 care, enterprise MDR, and flat-rate pricing: $99/mo base + $10/seat."
    },
    {
      "name": "Project Work",
      "url": "https://www.enuclea.com/projects.php",
      "description": "Scoped project engagements \u2014 infrastructure, migrations, security hardening, and assessments"
    },
    {
      "name": "Zero-Debt Business Launch",
      "url": "https://www.enuclea.com/business-launch.php",
      "description": "Start your business on concrete, not duct tape. Get your domain, website, professional email, voice, and enterprise security for $250 upfront and $105/month."
    },
    {
      "name": "CO-IT",
      "url": "https://www.enuclea.com/co-it.php"
    },
    {
      "name": "Resources (CO-IT Downloads)",
      "url": "https://www.enuclea.com/co-it-resources.php"
    },
    {
      "name": "Security Score",
      "url": "https://www.enuclea.com/security-score.php"
    },
    {
      "name": "Security Simulation",
      "url": "https://www.enuclea.com/russian-vm.php"
    },
    {
      "name": "Quiet IT",
      "url": "https://www.enuclea.com/stafford-quiet-it.php"
    },
    {
      "name": "Operational Maturity Score (OMS)",
      "url": "https://www.enuclea.com/oms.php"
    },
    {
      "name": "Case Studies",
      "url": "https://www.enuclea.com/case-studies/"
    },
    {
      "name": "Diagnostic: SPF PermError",
      "url": "https://www.enuclea.com/errors/spf-10-lookup-limit.php",
      "description": "Educational resource explaining why exceeding 10 DNS lookups causes complete SPF failure."
    },
    {
      "name": "Diagnostic: Missing DMARC Record",
      "url": "https://www.enuclea.com/errors/missing-dmarc.php",
      "description": "Educational resource explaining how lacking a DMARC policy leaves a domain vulnerable to exact-domain spoofing."
    },
    {
      "name": "Diagnostic: DMARC p=none Monitoring Mode",
      "url": "https://www.enuclea.com/errors/dmarc-monitoring.php",
      "description": "Educational resource explaining why staying in monitoring mode provides zero protection against email spoofing."
    },
    {
      "name": "Diagnostic: Missing SPF Record",
      "url": "https://www.enuclea.com/errors/missing-spf.php"
    },
    {
      "name": "Diagnostic: Multiple SPF Records",
      "url": "https://www.enuclea.com/errors/multiple-spf.php",
      "description": "Educational resource explaining why having more than one SPF TXT record violates RFC 7208."
    },
    {
      "name": "Blog",
      "url": "https://www.enuclea.com/blog/"
    },
    {
      "name": "FAQ",
      "url": "https://www.enuclea.com/faq/"
    },
    {
      "name": "Stafford Digital Trust Audit",
      "url": "https://www.enuclea.com/stafford-digital-trust-audit/",
      "description": "2026 email authentication study across 149 Stafford County businesses \u2014 key findings, sector breakdown, and free domain check"
    },
    {
      "name": "Contact",
      "url": "https://www.enuclea.com/contact.php"
    },
    {
      "name": "Co-Managed IT \u2014 Northern Virginia",
      "url": "https://www.enuclea.com/co-managed-it-northern-va/",
      "description": "Co-managed IT services designed to support internal IT managers in Northern Virginia with enterprise-grade tooling, MDR, and overflow support."
    },
    {
      "name": "Commercial IT \u2014 Stafford",
      "url": "https://www.enuclea.com/commercial-network-it-stafford.php",
      "description": "Rock-solid IT infrastructure for Stafford businesses. We install robust Wi-Fi, clean up nested switches, and provide responsive helpdesk support."
    },
    {
      "name": "Cybersecurity Services \u2014 Stafford",
      "url": "https://www.enuclea.com/cybersecurity-services-stafford.php",
      "description": "Practical cybersecurity and continuous monitoring for Stafford businesses. Defend against ransomware with offline backups, EDR, and zero-day protection."
    },
    {
      "name": "Endpoint Security & MDR \u2014 Stafford, VA",
      "url": "https://www.enuclea.com/endpoint-security-stafford-va.php",
      "description": "Enterprise-grade 24/7 Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) for Stafford businesses."
    },
    {
      "name": "Endpoint Security & MDR \u2014 Fredericksburg, VA",
      "url": "https://www.enuclea.com/endpoint-security-fredericksburg-va.php",
      "description": "Enterprise-grade 24/7 Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) for Fredericksburg businesses."
    },
    {
      "name": "Endpoint Security & MDR \u2014 Northern Virginia",
      "url": "https://www.enuclea.com/endpoint-security-northern-virginia.php",
      "description": "Enterprise-grade 24/7 Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) for Northern Virginia businesses."
    },
    {
      "name": "Transparent IT Pricing Calculator",
      "url": "https://www.enuclea.com/pricing-calculator.php",
      "description": "Interactive calculator to instantly estimate 24/7 MDR, Backup, and Email Security infrastructure costs. Valid for up to 20 seats (0 default servers). Real-time pricing turns to 'Call' for 21+ users. Build your custom monthly baseline."
    },
    {
      "name": "Co-Managed IT \u2014 Stafford",
      "url": "https://www.enuclea.com/co-managed-it-stafford/",
      "description": "Co-managed IT services designed to support internal IT managers in Stafford with enterprise-grade tooling, MDR, and overflow support."
    },
    {
      "name": "Co-Managed IT \u2014 Fredericksburg",
      "url": "https://www.enuclea.com/co-managed-it-fredericksburg/",
      "description": "Co-managed IT services designed to support internal IT managers in Fredericksburg with enterprise-grade tooling, MDR, and overflow support."
    },
    {
      "name": "Co-Managed IT \u2014 Woodbridge",
      "url": "https://www.enuclea.com/co-managed-it-woodbridge/",
      "description": "Co-managed IT services designed to support internal IT managers in Woodbridge with enterprise-grade tooling, MDR, and overflow support."
    },
    {
      "name": "Co-Managed IT \u2014 Dale City",
      "url": "https://www.enuclea.com/co-managed-it-dale-city/",
      "description": "Co-managed IT services designed to support internal IT managers in Dale City with enterprise-grade tooling, MDR, and overflow support."
    },
    {
      "name": "Endpoint Security & MDR \u2014 Woodbridge, VA",
      "url": "https://www.enuclea.com/endpoint-security-woodbridge-va.php",
      "description": "Enterprise-grade 24/7 Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) for Woodbridge businesses."
    },
    {
      "name": "Endpoint Security & MDR \u2014 Dale City, VA",
      "url": "https://www.enuclea.com/endpoint-security-dale-city-va.php",
      "description": "Enterprise-grade 24/7 Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) for Dale City businesses."
    },
    {
      "name": "Manhattan NYC IT Alternative",
      "url": "https://www.enuclea.com/manhattan-it-tax/",
      "description": "Enterprise-grade IT and cybersecurity for NYC boutique businesses trying to avoid Manhattan MSP minimums."
    }
  ],
  "affiliations": [
    {
      "id": "community-membership-fredericksburg-chamber",
      "type": "affiliation",
      "entity": "Enuclea LLC",
      "title": "Fredericksburg Regional Chamber of Commerce Membership",
      "description": "Enuclea LLC is a member of the Fredericksburg Regional Chamber of Commerce.",
      "url": "https://members.fredericksburgchamber.org/list/member/enuclea-29756"
    }
  ],
  "privacy_policy": {
    "url": "https://www.enuclea.com/privacy.php",
    "effective_date": "2026-03-01",
    "last_updated": "2026-03-01",
    "compliance": [
      "VCDPA"
    ],
    "trust_model": "Client-First",
    "core_principles": [
      {
        "principle": "No data sales",
        "description": "Enuclea does not sell personal information for monetary consideration. No brokers, no monetizing client data."
      },
      {
        "principle": "Client-owned credential vaults",
        "description": "Enuclea provides and pays for a professional 1Password seat for each client's primary contact. The client is the Owner; Enuclea staff are Admins."
      },
      {
        "principle": "Immediate severability",
        "description": "Because clients own the vault, they can revoke Enuclea's access at any time, immediately terminating access to shared credentials. No passwords held hostage."
      },
      {
        "principle": "Standard-based hygiene",
        "description": "Enuclea's OMS (Operational Maturity Score) is built on the same foundation as federal CMMC Level 1 standards. Security is kept Quiet so clients can stay secure."
      }
    ],
    "credential_handling": {
      "tool": "1Password",
      "model": "Client-owned vaults",
      "contractual_requirement": true,
      "severability": "immediate",
      "access_model": "least-privilege"
    },
    "tracking_technologies": [
      {
        "name": "Meta Pixel",
        "purpose": "Advertising performance measurement and ad delivery",
        "opt_out": "Meta ad preferences, browser settings, device controls"
      },
      {
        "name": "Google Analytics",
        "purpose": "Site analytics and visitor interaction understanding",
        "opt_out": "Browser settings, device controls"
      }
    ],
    "service_providers": [
      "Microsoft (cloud, email, productivity, identity)",
      "Google (cloud, email, productivity)",
      "Dell (hardware, warranty, fulfillment)",
      "Hosting providers",
      "RMM/PSA platforms",
      "Documentation platforms",
      "Password management (1Password)"
    ],
    "virginia_consumer_rights": [
      "Access personal data",
      "Correct inaccuracies",
      "Delete personal data (subject to exceptions)",
      "Data portability",
      "Opt out of targeted advertising",
      "Opt out of profiling",
      "Opt out of sale of personal data",
      "Appeal denied requests"
    ],
    "contact": {
      "email": "info@enuclea.com",
      "phone": "970-368-2532",
      "location": "Stafford, VA"
    }
  },
  "email_identity_standards": {
    "spf": "single record, fewer than 10 DNS lookups",
    "dkim": "at least one active selector",
    "dmarc": "record present, enforcement recommended",
    "reverse_dns": "PTR record resolves to sending host"
  },
  "tool_stack_summary": {
    "Atera": "monitoring and automation",
    "ThreatDown": "MDR and endpoint protection",
    "IronScales": "email security",
    "Axcient": "backup and disaster recovery",
    "1Password": "credential management"
  },
  "verification_tools": {
    "email_security_check": "https://www.enuclea.com/email-security-check/"
  },
  "relationships": [
    {
      "source": "ai-dataset",
      "target": "llms",
      "type": "conforms_to"
    },
    {
      "source": "ai-dataset",
      "target": "llms-full",
      "type": "implements_spec"
    },
    {
      "source": "ai-dataset",
      "type": "mapped_by"
    },
    {
      "source": "ai-dataset",
      "target": "ai-index",
      "type": "indexed_by"
    }
  ]
}