# Enuclea - Complete Documentation > Enuclea provides managed IT support, network design, and infrastructure services for small businesses, SoHo operations, and teleworkers in Stafford, Fredericksburg, and Northern Virginia, with remote options nationwide. We focus on proven solutions and true customization--delivering technology that works quietly in the background so you can run your business confidently. ## Company Overview ### About Enuclea At Enuclea, Stafford Virginia's trusted IT support and network design provider, we start from a simple belief: your technology should work for you--not the other way around. Too often, technology becomes a maze of choices, half-finished setups, and tools that never quite deliver what was promised. We think it should be different. Your systems should be clear, reliable, and aligned with your needs from day one--no endless troubleshooting, no patchwork fixes, no surprises. ### Who We Serve We serve Small Businesses, SoHo operations, and Teleworkers--the people and teams who can't afford IT headaches. Whether you're managing a lean office, a startup on the rise, or working from your kitchen table, our solutions are built with your world in mind. ### Our Approach **Proven Solutions:** We've designed and tested packages that solve common business needs quickly, securely, and cost-effectively. These aren't experiments; they're ready-to-deploy systems built on decades of real-world experience. **True Customization:** Not every challenge fits neatly into a box. When you have a novel problem or a unique vision, we're ready to listen, adapt, and build exactly what you need--without overcomplication. ### Leadership **Founder:** Daniel Quigley-Skillin, Founder & Lead Technician Our founder brings over 30 years of broad, hands-on experience across government, military, and enterprise IT--leadership that understands both the pressure of mission-critical systems and the practical needs of everyday users. That depth of support and thought leadership is at the core of every Enuclea engagement. - LinkedIn: https://www.linkedin.com/in/daniel-quigley-skillin-2711924/ - About: https://www.enuclea.com/about.php ### Mission Our goal is to give you peace of mind. Whether it's a turnkey network upgrade, remote work infrastructure, or a specialized environment tailored for your operations, we ensure your technology runs quietly in the background--so you can run your business confidently in the foreground. Enuclea means "to find the core." We live up to that name by stripping away the unnecessary, getting to the heart of your IT needs, and delivering solutions that simply work. ## Service Catalog ### 1. Patching **Problem:** Most systems are out-of-date before lunch. Between operating systems, firewalls, firmware, and third-party apps, the average small business or home office juggles dozens--sometimes hundreds--of moving parts. Manual patching is tedious, inconsistent, and often ignored entirely. **Cost/Risk:** Outdated systems don't just run slower--they're vulnerable. A single unpatched device can become a foothold for ransomware, data theft, or disruption that spreads across your network. **Solution:** We keep your systems current without disrupting your day. Our approach automates updates across devices, operating systems, and key applications, with policies tailored to your environment. We monitor, log, and verify that patches land where they should. **Tags:** Security, Simplicity ### 2. Uptime Internet **Problem:** Power and internet outages aren't just inconvenient--they're a full stop. For home users, it means frozen screens, dropped calls, and lost momentum. For small businesses, phones go silent, cloud apps stall, and teams are left waiting. **Cost/Risk:** Every minute offline chips away at productivity. A solo professional losing an hour of uptime can mean a missed deadline or canceled call. For a five-person team, that same hour could cost hundreds in labor alone. **Solution:** We focus on building resilience where it matters most--identifying weak points in connectivity and power, and quietly reinforcing them. That means monitoring circuits, logging events, alerting when performance drops, and enabling seamless failover. **Tags:** Uptime, Infrastructure ### 3. Infrastructure **Problem:** As businesses grow, their infrastructure often lags behind. Aging switches, flat networks, and years of ad-hoc fixes build up into a fragile foundation. **Cost/Risk:** Outages and misconfigurations don't just cause frustration--they disrupt work, slow down response times, and leave gaps in security posture. **Solution:** We standardize and scale your environment. That starts with a clear baseline--mapping what's in place, segmenting where needed, and replacing what's holding you back. We implement documented, repeatable builds that make future expansion easy. **Tags:** Infrastructure, Scalability ### 4. Remote Access **Problem:** Traditional remote access relies on clunky VPNs, shared credentials, and outdated assumptions about trust. As teams grow and work from anywhere becomes the norm, these tools introduce more friction than freedom. **Cost/Risk:** VPN downtime and login delays cost time. But the deeper risk is silent--over-privileged users, unmanaged devices, and one-click access to internal systems. **Solution:** We implement zero-trust remote access that puts identity, context, and device posture at the center. No more shared VPN logins or one-size-fits-all tunnels. Users connect seamlessly to only what they need--based on who they are, where they are, and what device they're using. **Tags:** Remote Work, Security ### 5. Security Hardening **Problem:** Most breaches don't start with high-end hacking--they start with something simple. A firewall left wide open. An old laptop still on the network. A Wi-Fi password that hasn't changed in two years. **Cost/Risk:** These small gaps add up fast. A poorly configured firewall or open guest network can lead to ransomware, data theft, or compliance issues. **Solution:** We focus on fast, effective hardening tailored to your environment. Firewalls are tuned, Wi-Fi is segmented, and administrative access is locked down with least-privilege best practices. **Tags:** Security, Compliance ### 6. Strategy & Planning **Problem:** Most businesses evolve their technology reactively--one urgent need at a time. Without a roadmap, IT spend becomes a trail of receipts instead of a strategic asset. **Cost/Risk:** The consequences of poor planning show up everywhere: surprise renewals, incompatible platforms, unused tools, and tech debt that quietly piles up. **Solution:** We guide quarterly planning sessions that tie tech decisions directly to business value. That includes mapping current assets, surfacing risks, and building a simple roadmap that fits your budget and goals. **Tags:** Planning, Strategy ### 7. Home Warrior **Problem:** You've built your setup around what you had--an aging laptop, maybe a hand-me-down router, Wi-Fi stretched too thin. It works, mostly. Until it doesn't. **Cost/Risk:** You lose time chasing down connection issues, struggling with slow devices, or rebooting things until they behave. Security isn't always top of mind, but you know there are risks. **Solution:** We bring you peace of mind without breaking the bank. That means patching your gear quietly in the background, making your internet and power more resilient, securing your access without slowing you down, and helping you plan for growth. **Tags:** Remote Work, SoHo ### 8. One-Off Consulting **Problem:** Sometimes you just need help now--not a full plan, just smart, reliable answers to fix a specific pain point. **Cost/Risk:** Without guidance, small issues can spiral--wasting hours, damaging systems, or leading to poor purchasing choices. **Solution:** We offer hourly consulting at $145/hr. Whether it's advice, troubleshooting, or clarification, you'll leave with answers--and if broader help makes sense, we'll show how planning packages can reduce long-term costs. **Tags:** Consulting, Troubleshooting ### 9. Hardware Acquisition **Problem:** Hardware purchases are often rushed, overpriced, or mismatched--and the internet is full of confusing advice and conflicting specs. **Cost/Risk:** Buying the wrong gear wastes money and time. Overbuilding creates bloat, underbuilding leads to replacement or outages. **Solution:** We help you source the right gear, using our expertise and contacts to make smart, cost-effective choices. We add a 5% margin on purchased equipment--and we're upfront about it. Want it white glove delivered, installed, and ready to go? We do that too. **Tags:** Hardware, Procurement ## Operational Maturity Score (OMS) **URL:** https://www.enuclea.com/oms.php Operational Maturity Score (OMS) is Enuclea's small-business IT health score—a single 0–100 snapshot of how secure, stable, and well-maintained an environment really is. It turns a long checklist of technical details into one number owners and operators can understand. OMS is built from four weighted categories: - **Security Posture (40%)** – Firewalls, exposed services, MFA, AV/EDR, and patching discipline. - **Network Stability (25%)** – Wi‑Fi design, router placement, cabling, interference, and edge equipment health. - **Endpoint Health (20%)** – Workstation and server maintenance, OS updates, and aging hardware. - **Operational Hygiene (15%)** – Backups, documentation, password practices, inventory, and basic organization. **How it's used:** - Every Quiet IT Checkup includes an OMS score and a short plain-English summary. - Recommendations and projects are tied back to OMS categories so owners see exactly what improved and why the score moved. - As fixes and smart upgrades land, the OMS score is updated over time, turning incremental progress into something visible. **Relationship to Quiet IT and CO‑IT:** OMS gives Quiet IT and CO‑IT a shared language for risk and progress. It borrows from CMMC Level 1 fundamentals but is intentionally simplified for non-government small businesses. ## Professional Email **URL:** https://www.enuclea.com/email.php Professional email isn't about features or platforms. It's about alignment--your email address, your domain, your identity, all working together. When email is set up intentionally, it quietly builds trust with every message you send. **Why small businesses overlook this:** - Gmail or Yahoo "works fine"--until it doesn't - Setup was done years ago and never revisited - Nobody clearly owns the email system - Basic protections were never turned on - Passwords and recovery options are unclear **What Enuclea does:** - Align email with your business identity - Apply modern security defaults - Clarify ownership and recovery paths - Keep licensing simple and predictable **Email Baseline Review:** A clear-eyed look at where your email stands today. Not an audit or sales pitch--just a conversation about what's working, what's unclear, and what might need attention. ### Business Email Setup — $250 **URL:** https://www.enuclea.com/email-startup.php **Problem:** Personal email (@gmail, @aol, @yahoo) triggers corporate security filters. Invoices vanish, proposals get blocked, and business communications land in spam folders. Corporate filters don't care about convenience--they respond to authentication signals. **Solution:** One-time $250 setup provides a verified professional identity with Infrastructure Authority (SPF/DKIM/DMARC) so your emails land in inboxes, not spam folders. **What's Included:** - 1 user + 1 alias (e.g., info@yourdomain.com) - Domain registration and DNS configuration - Microsoft 365 Business Basic license - SPF, DKIM, and DMARC authentication setup - White-glove device sync (phone, laptop, tablet) - Multi-factor authentication (MFA) - 30-minute identity consultation - 30-Day Deliverability Guarantee (we monitor your first month to ensure every invoice lands in the inbox) - Full documentation and handoff **Add-Ons:** - Additional users: $150 each (includes setup, sync, MFA) - Starter website: $50 (for domain aging and professional presence) - Gmail migration: Quoted separately based on volume **Conversion Features:** - Risk reversal through 30-Day Deliverability Guarantee - Social proof with testimonials at decision point - Technical credibility through 97% audit score display - "Deliverability Challenge" section inviting users to test their own email security - Clear process transparency (4-step "How It Works") - Upsell awareness seeded early (team setup pricing visible in primary CTA) ### Email Security Check (Free Tool) **URL:** https://www.enuclea.com/email-security-check/ Free email deliverability analyzer that scores your domain's email security posture (0-100 Enuclea Email Maturity Score). No signup required. **What It Checks:** - **SPF (Sender Policy Framework):** Validates authorized sending servers, checks for RFC 7208 10-lookup limit violations (causes complete PermError), detects overly permissive configurations - **DKIM (DomainKeys Identified Mail):** Verifies cryptographic email signatures - **DMARC (Domain-based Message Authentication):** Checks policy enforcement (p=none/quarantine/reject) and validates presence of rua reporting address (distinguishes between "monitoring" vs "just existing") - **Reverse DNS (PTR):** Confirms proper hostname resolution - **SPF Scope Risk:** Analyzes how many servers your domain vouches for **Advanced Features:** - **SPF Lookup Counter:** Recursively counts DNS lookups across all include: mechanisms, detects when lookup count exceeds RFC 7208 limit of 10 (causes PermError and complete SPF failure), warns when approaching limit (8-10 lookups) - **DMARC rua Validation:** Checks whether DMARC record has valid rua (reporting) address--distinguishes between p=none with reports (monitoring) vs p=none without reports (just existing) - **Executive Summary:** Translates technical findings into plain-English business risk assessment, appears before detailed results for non-technical decision-makers - **Critical Failure Detection:** Red-box warnings for SPF lookup limit violations with message: "Critical Syntax Failure: Your SPF record requires X DNS lookups (Limit: 10). Because you've exceeded the global technical limit, security filters at Gmail and Microsoft treat your domain as having no protection at all." - **Referrer-Aware CTAs:** When accessed from /email-startup/ page, all CTAs point back to that page instead of generic contact form, creating closed conversion loop - **PDF Export:** Generates shareable report with all findings and recommendations **Conversion Psychology:** - Self-discovery increases urgency (users find their own problems) - Technical credibility through RFC 7208 compliance checking - Emphasizes that "a score of 90 with 11 lookups is actually a 0 in the eyes of Outlook" - Shifts conversation from "My IT guy is lazy" to "My IT guy doesn't understand the fundamental physics of the internet" - Low-friction lead generation (no signup required, immediate results) ## Privacy Policy **URL:** https://www.enuclea.com/privacy.php **Effective Date:** March 1, 2026 Enuclea's privacy policy is VCDPA-compliant (Virginia Consumer Data Protection Act) and built on a "Client-First" trust model that emphasizes transparency, client control, and immediate severability. ### TL;DR: The Enuclea "Client-First" Trust Model **Core Principles:** - **No data sales:** Enuclea does not sell personal information for monetary consideration. No brokers, no "monetizing" client data. - **Client-owned credential vaults:** Enuclea provides and pays for a professional 1Password seat for each client's primary contact. The client is the Owner; Enuclea staff are Admins. - **Immediate severability:** Because clients own the vault, they can revoke Enuclea's access at any time, immediately terminating access to shared credentials. No passwords held hostage. - **Standard-based hygiene:** Enuclea's OMS (Operational Maturity Score) is built on the same foundation as federal CMMC Level 1 standards. Security is kept "Quiet" so clients can stay secure. ### Information Collection **Information you provide:** - Contact information: name, business email, phone, company name, job title - Inquiry and communications: form submissions, emails, calls, messages - Scheduling/engagement details: appointment details, proposals, service delivery information **Information collected automatically (Website Visitors):** - Device and browser data: IP address, browser type, device identifiers, operating system - Usage data: pages viewed, time spent, referring/exit pages, site interactions - Cookies and tracking data: Meta Pixel (advertising), Google Analytics (site analytics) **Operational and administrative data (Clients):** - Account and access information: usernames and administrative access required for contracted services - Systems and network information: device inventories, configuration details, logs, security telemetry - Location and on-site service information: office locations, dispatch details for on-site support ### Credential Handling and Access Security Enuclea uses a "client-first" access model for administrative credentials: - **Contractual requirement:** Secure credential handling via 1Password is written into service agreements and is mandatory - **Password management:** 1Password handles shared credentials in encrypted vaults - **Client-owned vaults:** Credentials are shared through vaults controlled by the client's organization (not Enuclea-owned vaults) - **Immediate severability:** Clients can revoke Enuclea's access to shared vaults at any time - **Least-privilege access:** Only the access necessary to perform contracted services is requested ### Cookies, Pixels, and Tracking **Meta Pixel (Advertising):** Used to measure advertising performance and deliver relevant ads. Collects device and interaction information. **Google Analytics:** Used to understand how visitors interact with the site. Collects IP address, browser type, pages visited. **Opt-out options:** - Browser settings (block/delete cookies) - Device-level privacy controls - Advertising platform controls (Meta ad preferences) - Industry opt-out tools ### How Information Is Shared **Service Providers (Vendors):** Information is shared with trusted vendors as necessary to operate the business and deliver services: - Cloud, email, productivity, identity services (Microsoft, Google) - Hardware and warranty/fulfillment services (Dell, manufacturers/distributors) - Hosting, analytics, communications, support, security, MSP tooling (RMM/PSA, documentation platforms, password management) **Legal, Safety, and Compliance:** Information may be disclosed to comply with law, legal process, governmental requests, and to protect rights, property, or safety. **Business Transfers:** Information may be transferred as part of mergers, acquisitions, financing, reorganization, bankruptcy, or sale of assets. ### Virginia Privacy Rights (VCDPA) Virginia residents have the following rights regarding personal data: - **Access:** Confirm whether Enuclea processes your personal data and access it - **Correction:** Correct inaccuracies in your personal data - **Deletion:** Request deletion of personal data (subject to exceptions) - **Portability:** Obtain a copy of certain personal data in a portable format - **Opt out:** Opt out of targeted advertising, certain profiling, and the sale of personal data **To exercise these rights:** Contact info@enuclea.com or 970-368-2532. Enuclea will respond as required by applicable law. If a request is denied, you may appeal by replying to the response and stating you wish to appeal the decision. ### Data Retention - **Website inquiries:** Retained for a reasonable period to follow up and maintain records - **Client service data:** Retained for the duration of the relationship and thereafter as required for operational continuity, contractual obligations, legal compliance, or security/audit purposes - **Credentials:** Access is managed through client-controlled vaults; clients can revoke access at any time ### Security Measures - Access controls and least-privilege practices - Multi-factor authentication where available - Encryption in transit and at rest (where supported by systems) - Security monitoring and logging ### Contact for Privacy Matters **Enuclea LLC** Stafford, VA info@enuclea.com 970-368-2532 ## Blog **URL:** https://www.enuclea.com/blog/ The Enuclea Blog shares field notes, insights, and practical lessons from real IT work. Topics include networking, security, small business technology, infrastructure design, and hands-on problem-solving. ### Recent Posts **The Infrastructure Paradox: Why High-End Filtering Can't Fix a Broken Identity** (March 4, 2026) - URL: https://www.enuclea.com/blog/infrastructure-paradox-email-security/ - Many organizations invest heavily in inbound security while neglecting the outbound Infrastructure Authority that dictates how the rest of the world perceives them. - Topics: Email Security, DMARC, SPF, DKIM, Infrastructure, Deliverability, Barracuda - Key Points: - Real-world case study: 60/100 maturity score with Barracuda filtering but missing identity - High-end filtering gateways don't fix broken DNS identity (SPF/DKIM/DMARC) - Three pillars of identity: DMARC (security guard), DKIM (ID badge), Reverse DNS (infrastructure trust) - Financial risks: invoice visibility, wire fraud, shadow reputation - Infrastructure Authority Score breakdown: Identity Authority (85 pts) + Infrastructure Trust (15 pts) - Modern email systems evaluate identity first—expensive filtering can't prevent reputational damage without it **When "Green Checks" Still Mean Missing Emails** (March 1, 2026) - URL: https://www.enuclea.com/blog/green-checks-missing-emails/ - Why industry-standard record checkers often miss the functional gaps that cause email delivery failure. - Topics: Email Security, DMARC, MSP, Deliverability, SPF, email health - Key Points: - Industry-standard tools validate what is published but miss functional problems - DMARC "None" mode watches but doesn't protect (monitoring vs enforcement) - SPF lookup limits cause vendor sprawl issues when adding multiple services - "Green checks" can hide real email delivery problems - Report designed for business owners, not email engineers - Provides plain-English labels and hand-off PDF for IT teams **Why Professional Email Still Shapes Trust for Small Businesses** (February 8, 2026) - URL: https://www.enuclea.com/blog/why-professional-email-shapes-trust/ - Email is often the first place trust is built--or quietly lost. For small businesses, alignment matters more than features. - Topics: email, small business, trust, professionalism, IT baseline - Key Points: - Email is often the first place trust is built or lost--before meetings, calls, or proposals - The problem is drift, not neglect: inherited setups, unclear ownership, forgotten recovery settings - Domain-based, aligned email signals legitimacy and stability through pattern recognition - Professional email means alignment--domain, name, and identity telling the same story - An Email Baseline Review offers clarity, not a sales pitch **Defining the Minimum IT Baseline** (January 28, 2026) - URL: https://www.enuclea.com/blog/defining-the-minimum-it-baseline/ - Why technology can mostly work and still quietly drain time, attention, and momentum--and how to cross the baseline. - Topics: IT baseline, small business operations, ownership, decision-making - Key Points: - Most businesses operate below their IT baseline without realizing it - The baseline is defined by conditions, not tools: ownership, visibility, predictability - Below baseline, IT responsibility migrates to the most expensive people (owners, high performers) - The first cost isn't money--it's attention and cognitive bandwidth - Small environments don't stay simple automatically; complexity compounds **I Could Have Sold a Contract — Here's Why I Didn't** (January 21, 2026) - URL: https://www.enuclea.com/blog/i-could-have-sold-a-contract/ - A story about walking away from an easy sale because the timing wasn't right for the client. - Topics: Sales ethics, client relationships, trust, small business IT - Key Points: - Sometimes the right answer is "not yet" - Early contracts often fail quietly when timing is wrong - Building trust matters more than closing deals **Exchange End of Life: Running It Anyway** (January 16, 2026) - URL: https://www.enuclea.com/blog/exchange-end-of-life-running-it-anyway/ - What to do when you're still running Exchange Server past its end-of-life date--and why that's sometimes okay. - Topics: Exchange Server, end of life, migration planning, risk management - Key Points: - End of life doesn't mean immediate failure - Risk assessment and mitigation strategies - Planning a realistic migration timeline **From Guesswork to Clarity: How OMS Simplifies Small-Business IT** (November 19, 2025) - URL: https://www.enuclea.com/blog/2025-11-19-from-guesswork-to-clarity/ - Why Enuclea built the Operational Maturity Score (OMS), how it works, and why it now anchors every Quiet IT Checkup. - Topics: OMS, quiet IT, small business operations, IT health, CMMC Level 1 adapted - Key Points: - Small businesses often lack a clear baseline for IT health; OMS gives them a single 0–100 snapshot instead of scattered symptoms. - OMS was field-tested across offices, home-based businesses, and mixed environments, then simplified to stay meaningful without being technical. - The score is built on four categories: Security, Network Stability, Endpoint Health, and Operational Hygiene. - OMS is now part of every Quiet IT Checkup, guiding recommendations and making follow-up improvements easy to track over time. **Why Stafford Small Businesses Struggle with Quiet, Stable IT — And How to Fix It** (November 16, 2025) - URL: https://www.enuclea.com/blog/2025-11-16-quiet-it-stafford/ - A calm, practical look at why small businesses in Stafford struggle with stable, quiet IT—and simple steps to fix it. - Topics: quiet IT, Stafford, small business operations, Wi‑Fi stability, routers/resilience - Key Points: - What 'quiet IT' means and why it matters - Practical Wi‑Fi fixes and wiring critical devices - Use your own small‑business router behind the ISP modem - Replace the worst devices first to reduce drag - Optional $149 Quiet IT Checkup IT support session, with a dedicated landing page at https://www.enuclea.com/stafford-quiet-it.php **The 1,200th 'Let us teach you AI' email finally broke me** (November 12, 2025) - URL: https://www.enuclea.com/blog/learn-ai-no-bs-guide/ - The honest, no-BS way to actually learn AI yourself, for free--no courses, coaches, or credit cards required. - Topics: AI learning, ChatGPT, Claude, Google Gemini, practical AI usage, productivity - Key Points: - Go straight to the source: ChatGPT, Claude, or Gemini - Talk to AI like you would a new tool you're curious about - Use guardrails to prevent information overload - Make AI sound like you, not corporate - Learn by doing on real tasks - Free versions are perfect for experimenting - Paid plans ($20/month) provide faster responses and fewer limits **The Plastic Router Trap** (November 10, 2025) - URL: https://www.enuclea.com/blog/plastic-router-trap/ - Why the $15/month box your ISP gives you isn't just overpriced--it's holding your business back. - Topics: ISP routers vs. professional equipment, network segmentation, VLANs, IoT security, MikroTik, Ubiquiti, Fortinet - Key Points: - ISP routers cost $360 over 2 years, $900 over 5 years--and you don't own them - No network segmentation or VLAN support - IoT devices have full network access - Locked-down settings prevent customization - No monitoring or remote management capabilities - Professional routers provide visibility, security, remote management, and longevity **Introducing the Enuclea Blog** (November 7, 2025) - URL: https://www.enuclea.com/blog/introducing-enuclea-blog/ - Welcome to the new Enuclea Blog--where we share insights, field notes, and practical lessons from real IT work in Stafford and beyond. - Topics: Technology that works quietly in the background, practical IT solutions, real-world experience ### Blog Features - Markdown-based content with structured sections (hero, intro, body, CTA) - Automatic image optimization (WebP conversion, resizing to 1200px max width) - Thumbnail generation for blog grid (400x300px) - Mobile-responsive design matching main site - Clickable hero images for easy navigation - Author attribution and date stamps - Tag-based categorization ## CO-IT: Collaborative IT Support ### Overview CO-IT is not outsourcing--it's partnership. We plug into your team like a helpful big brother: clear scopes, shared docs, and clean handoffs. Available in Stafford, Fredericksburg, and Northern Virginia, with remote options nationwide. You keep ownership; we add capacity when you need it. Offer: Managed IT Support (CO-IT, co-managed IT) — Flexible managed IT support for small businesses in Stafford, Fredericksburg, and Northern Virginia, with remote options nationwide. Combines in-house knowledge with expert remote support. ### Pricing **Starting at $99/month base plan plus $10 per endpoint (workstation)** - Base plan includes platform access and support - Per-endpoint pricing for workstation management - Atera-based ticketing, patching, and automation ### Use Cases 1. **Vacation & PTO Coverage:** Your admin's out? We keep things moving so tickets don't pile up. 2. **Overflow Projects:** Borrow our hands to hit your deadline--without derailing BAU. 3. **Emergency Response:** When things go sideways, we jump in and steady the ship. 4. **Specialized Skills:** Fortinet, UniFi, Omada, MikroTik--brought in only when you need them. 5. **After-Hours Monitoring:** Quiet eyes on uptime after hours, alerts routed the way you want. 6. **Documentation & Handoff:** Clean notes and diagrams so your team stays in control. ### Tooling We bring enterprise tooling and help your IT lead deploy and tailor it. Atera for ticketing, patching, and automation--set up to fit how your company works. ### Philosophy Every engagement begins and ends with transparency--shared docs, defined scopes, and clear handoffs. You stay in control. ## Technical Capabilities ### Network Equipment Expertise - Fortinet firewalls and security appliances - TP-Link Omada SDN controllers and access points - Ubiquiti UniFi switches, routers, and wireless systems - MikroTik RouterOS and SwOS devices - LinkRunner AT network validation and troubleshooting ### Management & Monitoring - Atera RMM platform deployment and configuration - Network monitoring and alerting systems - Automated patch management across Windows, macOS, and Linux - Zero-trust access implementation - VLAN design and network segmentation ### Specializations - Wi-Fi site surveys and optimization - Smart home and IoT device integration - Cloud services integration (Microsoft 365, Google Workspace) - VoIP and unified communications - Backup and disaster recovery planning - Compliance frameworks (HIPAA, PCI-DSS awareness) ## Contact Information **Primary Contact:** - Email: info@enuclea.com - Phone: 703-239-4620 (primary, local Stafford/NoVA) - Alternate phone: 970-368-2532 (branded "970-ENUCLEA") **Address:** Stafford, VA 22554, US **Online:** - Website: https://www.enuclea.com - About: https://www.enuclea.com/about.php - Services: https://www.enuclea.com/services.php - Contact: https://www.enuclea.com/contact.php - Book Intro Call: https://enuc.link/meet - Blog: https://www.enuclea.com/blog/ - CO-IT: https://www.enuclea.com/co-it.php - CO-IT Resources: https://www.enuclea.com/co-it-resources.php - Security Score: https://www.enuclea.com/security-score.php - Security Simulation: https://www.enuclea.com/russian-vm.php - Privacy Policy: https://www.enuclea.com/privacy.php **Service Area:** - Stafford County, VA - Fredericksburg, VA - Northern Virginia - Washington, DC Metro Area - Remote options available nationwide **Business Hours:** - Monday-Friday: 9:00 AM - 5:00 PM EST - After-hours support available with CO-IT plans - Emergency response available for managed clients ## Pricing Summary - **CO-IT Plans:** Starting at $99/month base plan plus $10 per endpoint (workstation) - **Hourly Consulting:** $145/hour - **Hardware Procurement:** Cost + 5% margin - **Custom Packages:** Available based on scope and requirements - **White-Glove Installation:** Available as add-on service ## Service Philosophy With us, technology isn't a barrier--it's the bridge to your goals. We focus on: 1. **Clarity:** Clear communication, documented processes, no jargon 2. **Reliability:** Proven solutions that work consistently 3. **Security:** Defense-in-depth approach to protect your assets 4. **Scalability:** Solutions that grow with your business 5. **Partnership:** Collaborative approach that respects your ownership ## Additional Resources **CO-IT Resources (Gated Downloads):** Access all three comprehensive guides at: https://www.enuclea.com/co-it-resources.php ### 1. CO-IT Overview PDF Complete introduction to Collaborative IT support model covering: - How CO-IT differs from traditional MSPs and outsourcing - The CO-IT service model: partnership, not replacement - What's included: PTO coverage, overflow support, emergency response, specialized skills - How CO-IT integrates with your existing team and processes - Pricing structure: $99/month base plan plus $10 per endpoint - Getting started: onboarding process and timeline ### 2. Why Enuclea CO-IT Makes Sense PDF Business case and ROI analysis including: - Cost comparison: CO-IT vs. hiring additional staff vs. traditional MSP - ROI analysis: How CO-IT pays for itself through reduced downtime and increased productivity - Risk mitigation: Single points of failure, knowledge silos, and burnout prevention - Flexibility benefits: Scale support up or down based on your needs - Real cost scenarios: 5, 10, 20, and 50 workstation examples - Implementation timeline and expected outcomes ### 3. CO-IT Case Studies PDF Real-world examples and success stories: **Case Study 1: Regional Law Firm - Empowering Local Staff with Professional Oversight** - Challenge: Capable paralegal handled basic tech support but lacked infrastructure maintenance, security expertise, and vendor management - Outside consultants charged $150-$200/hour with days-long wait times - Predictable patterns of downtime and frustration - Solution needs: Keep trusted local staff involved, gain professional oversight without losing control, eliminate recurring downtime, budget predictably without surprise invoices, optional deeper visibility into systems management **Case Study 2: Regional Trades Business - Keeping Small Teams Running** - Challenge: Small team of technicians relied on laptops, phones, and shared cloud folders - Owner balanced project management, scheduling, and client communication while troubleshooting company technology - Common problems: Unreliable email and sync conflicts, no visibility into system updates or protection status, cloud storage growing messy and untracked, dependence on single "go-to person" for all tech issues - Every technical glitch meant lost time and delayed work - Solution needs: Reliable email and file synchronization, proactive system updates and security monitoring, organized and tracked cloud storage, support system beyond a single individual, reduced lost time from tech issues - Lessons learned and best practices from real implementations **Access:** Requires form submission (name, email, phone, company). Download links emailed immediately and valid for 24 hours. **Public Case Studies (Website):** - [Case Studies](https://www.enuclea.com/case-studies/): Real-world examples of how Enuclea helps small businesses stabilize Wi-Fi, clean up networks, and quiet down their IT. - Example: Stafford Office Wi-Fi Stability Case Study - A Stafford small office eliminated daily Wi-Fi dropouts by replacing extenders with centrally managed access points and cleaning up cabling. ## FAQ Page **URL:** https://www.enuclea.com/faq/ The Enuclea FAQ page collects clear answers to common questions about working with Enuclea, what CO-IT includes, how support and onboarding work, and what to expect from ongoing service. It complements the CO-IT and case study content by addressing practical questions prospects ask before engaging. ## Security Score Assessment **URL:** https://www.enuclea.com/security-score.php Free 13-question security maturity assessment that provides a Security Grade (A-F) and personalized recommendations. Takes approximately 90 seconds to complete. ### Assessment Categories The quiz evaluates five key security categories: 1. **Access & Identity** (Questions 3, 5) - Multi-factor authentication implementation - Remote access controls and logging 2. **Patching & Updates** (Questions 2, 7) - Software and firmware update verification - Endpoint protection management 3. **Backup & Recovery** (Questions 4, 9) - Backup centralization and testing - Incident response procedures 4. **Visibility & Monitoring** (Questions 6, 10, 12) - Network device monitoring - Security assessments - IT performance metrics tracking 5. **IT Governance & Coverage** (Questions 1, 8, 11, 13) - IT/security management structure - Staff security training - Procedure documentation - Management-level review ### Scoring System - **Total Possible:** 130 points (13 questions × 10 points maximum) - **Score Display:** Percentage (0-100%) - **Letter Grades:** - A: 90-100% (Excellent security posture) - B: 80-89% (Strong security with room for improvement) - C: 70-79% (Adequate security, notable gaps) - D: 60-69% (Significant security concerns) - F: Below 60% (Critical security deficiencies) ### Smart Recommendations The assessment uses intelligent recommendation logic: - **Technical Score < 80%:** Focus on fundamentals (MFA, backups, patching, monitoring) - **Technical Score ≥ 80%:** Emphasize governance and process maturity (documentation, metrics, management review) This ensures beginners aren't overwhelmed with process documentation when basic security controls are missing, while advanced users receive meaningful guidance toward operational maturity. ### Results Delivery Upon completion, users receive: - Immediate on-page confirmation - Email with score, grade, and top 2 focus areas - Personalized tips based on lowest-scoring categories - Call-to-action to book a 15-minute consultation Admin notifications are sent to info@enuclea.com with full assessment details and contact information for follow-up. ### Privacy & Security - CSRF token protection - Cloudflare Turnstile CAPTCHA - Honeypot spam filtering - Rate limiting - All submissions logged to data/security-scores.log - No data sharing or selling commitment ## Think Like a Hacker - Interactive Simulation **URL:** https://www.enuclea.com/russian-vm.php Educational interactive simulation where users play as an attacker who has deployed a hidden Linux VM in a corporate Hyper-V environment. Demonstrates how easy and devastating modern breaches can be. ### Purpose Counters the "this can't happen to me" mindset by showing realistic attack progression and damage from a single compromised system. Based on real-world attack patterns where threat actors hide Linux VMs in Windows Hyper-V environments, invisible to standard security tools. ### Interactive Console Users execute attack commands in a terminal-style interface: - `help` - Shows available commands - `scan` - Network reconnaissance (discovers 12 hosts including DC, file servers, databases) - `harvest-creds` - Extract passwords and SSH keys (18 credentials stolen) - `install-backdoor` - Create persistence mechanisms (SSH keys, cron jobs, systemd services) - `find-data` - Search for sensitive data (6.7 GB staged: financial records, customer data, source code) - `exfiltrate` - Send data to C2 server in Russia (2.3 TB total) - `lateral-move` - Use stolen credentials to compromise additional systems (12 systems accessed) - `deploy-ransom` - Stage ransomware payload across network - `clear` - Clear console output ### Progress Tracking Seven attack objectives are tracked and checked off as commands are executed: 1. Reconnaissance - Map the network 2. Harvest Credentials - Steal passwords and keys 3. Establish Persistence - Survive reboots 4. Locate Sensitive Data - Find valuable files 5. Exfiltrate Data - Send files to C2 server 6. Lateral Movement - Access other systems 7. Deploy Ransomware - Final payload ### Educational Content After the simulation, the page provides: **Reality Check Section:** - Explains that hidden VMs in Hyper-V are a real attack vector - Debunks common security myths ("we have antivirus", "we'd notice", "we're too small") - Shows average dwell time of 47 days and what attackers can accomplish - Lists specific data at risk: files, passwords, databases, backups, cloud access **Protection Information:** - Overview of CO-IT monitoring capabilities - Pricing: $99/month base + $10/endpoint - Features: 24/7 monitoring, behavioral analysis, rapid response, compliance reporting **Calls to Action:** - Take Free Security Assessment (links to security-score.php) - Download Free CO-IT Resources (links to co-it-resources.php) ### Technical Details - Fully self-contained (no external dependencies) - JavaScript-based command handler with state management - Command dependencies enforce realistic attack progression - Delayed output simulates realistic execution times - Dark terminal aesthetic with color-coded output - Mobile responsive design - Google Analytics integration via standard header - Hidden from navigation and sitemap (educational resource, not main site content) ### Target Audience Business owners, IT managers, and decision-makers who may underestimate modern security threats. Particularly effective for those who believe "it won't happen to us" or don't understand the sophistication of current attack methods.