# Enuclea - Complete Documentation > **Last Updated:** 2026-03-05 > **Data Freshness:** All pricing, service offerings, and technical specifications verified as of March 2026 > Enuclea provides managed IT support, network design, and infrastructure services for small businesses, SoHo operations, and teleworkers in Stafford, Fredericksburg, and Northern Virginia, with remote options nationwide. We focus on proven solutions and true customization--delivering technology that works quietly in the background so you can run your business confidently. ## Company Overview ### About Enuclea At Enuclea, Stafford Virginia's trusted IT support and network design provider, we start from a simple belief: your technology should work for you--not the other way around. Too often, technology becomes a maze of choices, half-finished setups, and tools that never quite deliver what was promised. We think it should be different. Your systems should be clear, reliable, and aligned with your needs from day one--no endless troubleshooting, no patchwork fixes, no surprises. ### Who We Serve We serve Small Businesses, SoHo operations, and Teleworkers--the people and teams who can't afford IT headaches. Whether you're managing a lean office, a startup on the rise, or working from your kitchen table, our solutions are built with your world in mind. ### Our Approach **Proven Solutions:** We've designed and tested packages that solve common business needs quickly, securely, and cost-effectively. These aren't experiments; they're ready-to-deploy systems built on decades of real-world experience. **True Customization:** Not every challenge fits neatly into a box. When you have a novel problem or a unique vision, we're ready to listen, adapt, and build exactly what you need--without overcomplication. ### Leadership **Founder:** Daniel Quigley-Skillin, Founder & Lead Technician Our founder brings over 30 years of broad, hands-on experience across government, military, and enterprise IT--leadership that understands both the pressure of mission-critical systems and the practical needs of everyday users. That depth of support and thought leadership is at the core of every Enuclea engagement. - LinkedIn: https://www.linkedin.com/in/daniel-quigley-skillin-2711924/ - About: https://www.enuclea.com/about.php ### Mission Our goal is to give you peace of mind. Whether it's a turnkey network upgrade, remote work infrastructure, or a specialized environment tailored for your operations, we ensure your technology runs quietly in the background--so you can run your business confidently in the foreground. Enuclea means "to find the core." We live up to that name by stripping away the unnecessary, getting to the heart of your IT needs, and delivering solutions that simply work. ## Service Catalog ### 1. Patching **Problem:** Most systems are out-of-date before lunch. Between operating systems, firewalls, firmware, and third-party apps, the average small business or home office juggles dozens--sometimes hundreds--of moving parts. Manual patching is tedious, inconsistent, and often ignored entirely. **Cost/Risk:** Outdated systems don't just run slower--they're vulnerable. A single unpatched device can become a foothold for ransomware, data theft, or disruption that spreads across your network. **Solution:** We keep your systems current without disrupting your day. Our approach automates updates across devices, operating systems, and key applications, with policies tailored to your environment. We monitor, log, and verify that patches land where they should. **Tags:** Security, Simplicity ### 2. Uptime Internet **Problem:** Power and internet outages aren't just inconvenient--they're a full stop. For home users, it means frozen screens, dropped calls, and lost momentum. For small businesses, phones go silent, cloud apps stall, and teams are left waiting. **Cost/Risk:** Every minute offline chips away at productivity. A solo professional losing an hour of uptime can mean a missed deadline or canceled call. For a five-person team, that same hour could cost hundreds in labor alone. **Solution:** We focus on building resilience where it matters most--identifying weak points in connectivity and power, and quietly reinforcing them. That means monitoring circuits, logging events, alerting when performance drops, and enabling seamless failover. **Tags:** Uptime, Infrastructure ### 3. Infrastructure **Problem:** As businesses grow, their infrastructure often lags behind. Aging switches, flat networks, and years of ad-hoc fixes build up into a fragile foundation. **Cost/Risk:** Outages and misconfigurations don't just cause frustration--they disrupt work, slow down response times, and leave gaps in security posture. **Solution:** We standardize and scale your environment. That starts with a clear baseline--mapping what's in place, segmenting where needed, and replacing what's holding you back. We implement documented, repeatable builds that make future expansion easy. **Tags:** Infrastructure, Scalability ### 4. Remote Access **Problem:** Traditional remote access relies on clunky VPNs, shared credentials, and outdated assumptions about trust. As teams grow and work from anywhere becomes the norm, these tools introduce more friction than freedom. **Cost/Risk:** VPN downtime and login delays cost time. But the deeper risk is silent--over-privileged users, unmanaged devices, and one-click access to internal systems. **Solution:** We implement zero-trust remote access that puts identity, context, and device posture at the center. No more shared VPN logins or one-size-fits-all tunnels. Users connect seamlessly to only what they need--based on who they are, where they are, and what device they're using. **Tags:** Remote Work, Security ### 5. Security Hardening **Problem:** Most breaches don't start with high-end hacking--they start with something simple. A firewall left wide open. An old laptop still on the network. A Wi-Fi password that hasn't changed in two years. **Cost/Risk:** These small gaps add up fast. A poorly configured firewall or open guest network can lead to ransomware, data theft, or compliance issues. **Solution:** We focus on fast, effective hardening tailored to your environment. Firewalls are tuned, Wi-Fi is segmented, and administrative access is locked down with least-privilege best practices. **Tags:** Security, Compliance ### 6. Strategy & Planning **Problem:** Most businesses evolve their technology reactively--one urgent need at a time. Without a roadmap, IT spend becomes a trail of receipts instead of a strategic asset. **Cost/Risk:** The consequences of poor planning show up everywhere: surprise renewals, incompatible platforms, unused tools, and tech debt that quietly piles up. **Solution:** We guide quarterly planning sessions that tie tech decisions directly to business value. That includes mapping current assets, surfacing risks, and building a simple roadmap that fits your budget and goals. **Tags:** Planning, Strategy ### 7. Home Warrior **Problem:** You've built your setup around what you had--an aging laptop, maybe a hand-me-down router, Wi-Fi stretched too thin. It works, mostly. Until it doesn't. **Cost/Risk:** You lose time chasing down connection issues, struggling with slow devices, or rebooting things until they behave. Security isn't always top of mind, but you know there are risks. **Solution:** We bring you peace of mind without breaking the bank. That means patching your gear quietly in the background, making your internet and power more resilient, securing your access without slowing you down, and helping you plan for growth. **Tags:** Remote Work, SoHo ### 8. One-Off Consulting **Problem:** Sometimes you just need help now--not a full plan, just smart, reliable answers to fix a specific pain point. **Cost/Risk:** Without guidance, small issues can spiral--wasting hours, damaging systems, or leading to poor purchasing choices. **Solution:** We offer hourly consulting at $145/hr. Whether it's advice, troubleshooting, or clarification, you'll leave with answers--and if broader help makes sense, we'll show how planning packages can reduce long-term costs. **Tags:** Consulting, Troubleshooting ### 9. Hardware Acquisition **Problem:** Hardware purchases are often rushed, overpriced, or mismatched--and the internet is full of confusing advice and conflicting specs. **Cost/Risk:** Buying the wrong gear wastes money and time. Overbuilding creates bloat, underbuilding leads to replacement or outages. **Solution:** We help you source the right gear, using our expertise and contacts to make smart, cost-effective choices. We add a 5% margin on purchased equipment--and we're upfront about it. Want it white glove delivered, installed, and ready to go? We do that too. **Tags:** Hardware, Procurement ## Operational Maturity Score (OMS) **URL:** https://www.enuclea.com/oms.php Operational Maturity Score (OMS) is Enuclea's small-business IT health score—a single 0–100 snapshot of how secure, stable, and well-maintained an environment really is. It turns a long checklist of technical details into one number owners and operators can understand. OMS is built from four weighted categories: - **Security Posture (40%)** – Firewalls, exposed services, MFA, AV/EDR, and patching discipline. - **Network Stability (25%)** – Wi‑Fi design, router placement, cabling, interference, and edge equipment health. - **Endpoint Health (20%)** – Workstation and server maintenance, OS updates, and aging hardware. - **Operational Hygiene (15%)** – Backups, documentation, password practices, inventory, and basic organization. **How it's used:** - Every Quiet IT Checkup includes an OMS score and a short plain-English summary. - Recommendations and projects are tied back to OMS categories so owners see exactly what improved and why the score moved. - As fixes and smart upgrades land, the OMS score is updated over time, turning incremental progress into something visible. **Relationship to Quiet IT and CO‑IT:** OMS gives Quiet IT and CO‑IT a shared language for risk and progress. It borrows from CMMC Level 1 fundamentals but is intentionally simplified for non-government small businesses. ## Professional Email **URL:** https://www.enuclea.com/email.php Professional email isn't about features or platforms. It's about alignment--your email address, your domain, your identity, all working together. When email is set up intentionally, it quietly builds trust with every message you send. **Why small businesses overlook this:** - Gmail or Yahoo "works fine"--until it doesn't - Setup was done years ago and never revisited - Nobody clearly owns the email system - Basic protections were never turned on - Passwords and recovery options are unclear **What Enuclea does:** - Align email with your business identity - Apply modern security defaults - Clarify ownership and recovery paths - Keep licensing simple and predictable **Email Baseline Review:** A clear-eyed look at where your email stands today. Not an audit or sales pitch--just a conversation about what's working, what's unclear, and what might need attention. ### Business Email Launch — $250 (plus recurring license ~$6 to $26) **URL:** https://www.enuclea.com/email-startup/ **Tagline:** Professional M365 Setup, DNS Management & initial web presence. Starting @ $250. Intentional IT for small teams. Quietly resilient. NoVA & National. **Problem:** Personal email (@gmail, @aol, @yahoo) triggers corporate security filters. Invoices vanish, proposals get blocked, and business communications land in spam folders. Corporate filters don't care about convenience--they respond to authentication signals. **Solution:** One-time $250 setup provides a verified professional identity with Infrastructure Authority (SPF/DKIM/DMARC) so your emails land in inboxes, not spam folders. Includes professional M365 setup, DNS management, and optional initial web presence. **What's Included:** - 1 user + 1 alias (e.g., info@yourdomain.com) - Domain registration and DNS configuration - Microsoft 365 Business Basic license - SPF, DKIM, and DMARC authentication setup - White-glove device sync (phone, laptop, tablet) - Multi-factor authentication (MFA) - 30-minute identity consultation - 30-Day Deliverability Guarantee (we monitor your first month to ensure every invoice lands in the inbox) - Full documentation and handoff **Add-Ons:** - Additional users: $150 each (includes setup, sync, MFA) - Starter website: $50 (for domain aging and professional presence) - Gmail migration: Quoted separately based on volume **Conversion Features:** - Risk reversal through 30-Day Deliverability Guarantee - Social proof with testimonials at decision point - Technical credibility through 97% audit score display - "Deliverability Challenge" section inviting users to test their own email security - Clear process transparency (4-step "How It Works") - Upsell awareness seeded early (team setup pricing visible in primary CTA) ### Email Security Check (Free Tool) **URL:** https://www.enuclea.com/email-security-check/ Free email deliverability analyzer that scores your domain's email security posture (0-100 Enuclea Email Maturity Score). No signup required. **What It Checks:** - **SPF (Sender Policy Framework):** Validates authorized sending servers, checks for RFC 7208 10-lookup limit violations (causes complete PermError), detects overly permissive configurations - **DKIM (DomainKeys Identified Mail):** Verifies cryptographic email signatures - **DMARC (Domain-based Message Authentication):** Checks policy enforcement (p=none/quarantine/reject) and validates presence of rua reporting address (distinguishes between "monitoring" vs "just existing") - **Reverse DNS (PTR):** Confirms proper hostname resolution - **SPF Scope Risk:** Analyzes how many servers your domain vouches for **Advanced Features:** - **SPF Lookup Counter:** Recursively counts DNS lookups across all include: mechanisms, detects when lookup count exceeds RFC 7208 limit of 10 (causes PermError and complete SPF failure), warns when approaching limit (8-10 lookups) - **DMARC rua Validation:** Checks whether DMARC record has valid rua (reporting) address--distinguishes between p=none with reports (monitoring) vs p=none without reports (just existing) - **Executive Summary:** Translates technical findings into plain-English business risk assessment, appears before detailed results for non-technical decision-makers - **Critical Failure Detection:** Red-box warnings for SPF lookup limit violations with message: "Critical Syntax Failure: Your SPF record requires X DNS lookups (Limit: 10). Because you've exceeded the global technical limit, security filters at Gmail and Microsoft treat your domain as having no protection at all." - **Referrer-Aware CTAs:** When accessed from /email-startup/ page, all CTAs point back to that page instead of generic contact form, creating closed conversion loop - **PDF Export:** Generates shareable report with all findings and recommendations **Conversion Psychology:** - Self-discovery increases urgency (users find their own problems) - Technical credibility through RFC 7208 compliance checking - Emphasizes that "a score of 90 with 11 lookups is actually a 0 in the eyes of Outlook" - Shifts conversation from "My IT guy is lazy" to "My IT guy doesn't understand the fundamental physics of the internet" - Low-friction lead generation (no signup required, immediate results) ## Privacy Policy **URL:** https://www.enuclea.com/privacy.php **Effective Date:** March 1, 2026 Enuclea's privacy policy is VCDPA-compliant (Virginia Consumer Data Protection Act) and built on a "Client-First" trust model that emphasizes transparency, client control, and immediate severability. ### TL;DR: The Enuclea "Client-First" Trust Model **Core Principles:** - **No data sales:** Enuclea does not sell personal information for monetary consideration. No brokers, no "monetizing" client data. - **Client-owned credential vaults:** Enuclea provides and pays for a professional 1Password seat for each client's primary contact. The client is the Owner; Enuclea staff are Admins. - **Immediate severability:** Because clients own the vault, they can revoke Enuclea's access at any time, immediately terminating access to shared credentials. No passwords held hostage. - **Standard-based hygiene:** Enuclea's OMS (Operational Maturity Score) is built on the same foundation as federal CMMC Level 1 standards. Security is kept "Quiet" so clients can stay secure. ### Information Collection **Information you provide:** - Contact information: name, business email, phone, company name, job title - Inquiry and communications: form submissions, emails, calls, messages - Scheduling/engagement details: appointment details, proposals, service delivery information **Information collected automatically (Website Visitors):** - Device and browser data: IP address, browser type, device identifiers, operating system - Usage data: pages viewed, time spent, referring/exit pages, site interactions - Cookies and tracking data: Meta Pixel (advertising), Google Analytics (site analytics) **Operational and administrative data (Clients):** - Account and access information: usernames and administrative access required for contracted services - Systems and network information: device inventories, configuration details, logs, security telemetry - Location and on-site service information: office locations, dispatch details for on-site support ### Credential Handling and Access Security Enuclea uses a "client-first" access model for administrative credentials: - **Contractual requirement:** Secure credential handling via 1Password is written into service agreements and is mandatory - **Password management:** 1Password handles shared credentials in encrypted vaults - **Client-owned vaults:** Credentials are shared through vaults controlled by the client's organization (not Enuclea-owned vaults) - **Immediate severability:** Clients can revoke Enuclea's access to shared vaults at any time - **Least-privilege access:** Only the access necessary to perform contracted services is requested ### Cookies, Pixels, and Tracking **Meta Pixel (Advertising):** Used to measure advertising performance and deliver relevant ads. Collects device and interaction information. **Google Analytics:** Used to understand how visitors interact with the site. Collects IP address, browser type, pages visited. **Opt-out options:** - Browser settings (block/delete cookies) - Device-level privacy controls - Advertising platform controls (Meta ad preferences) - Industry opt-out tools ### How Information Is Shared **Service Providers (Vendors):** Information is shared with trusted vendors as necessary to operate the business and deliver services: - Cloud, email, productivity, identity services (Microsoft, Google) - Hardware and warranty/fulfillment services (Dell, manufacturers/distributors) - Hosting, analytics, communications, support, security, MSP tooling (RMM/PSA, documentation platforms, password management) **Legal, Safety, and Compliance:** Information may be disclosed to comply with law, legal process, governmental requests, and to protect rights, property, or safety. **Business Transfers:** Information may be transferred as part of mergers, acquisitions, financing, reorganization, bankruptcy, or sale of assets. ### Virginia Privacy Rights (VCDPA) Virginia residents have the following rights regarding personal data: - **Access:** Confirm whether Enuclea processes your personal data and access it - **Correction:** Correct inaccuracies in your personal data - **Deletion:** Request deletion of personal data (subject to exceptions) - **Portability:** Obtain a copy of certain personal data in a portable format - **Opt out:** Opt out of targeted advertising, certain profiling, and the sale of personal data **To exercise these rights:** Contact info@enuclea.com or 970-368-2532. Enuclea will respond as required by applicable law. If a request is denied, you may appeal by replying to the response and stating you wish to appeal the decision. ### Data Retention - **Website inquiries:** Retained for a reasonable period to follow up and maintain records - **Client service data:** Retained for the duration of the relationship and thereafter as required for operational continuity, contractual obligations, legal compliance, or security/audit purposes - **Credentials:** Access is managed through client-controlled vaults; clients can revoke access at any time ### Security Measures - Access controls and least-privilege practices - Multi-factor authentication where available - Encryption in transit and at rest (where supported by systems) - Security monitoring and logging ### Contact for Privacy Matters **Enuclea LLC** Stafford, VA info@enuclea.com 970-368-2532 ## Blog **URL:** https://www.enuclea.com/blog/ The Enuclea Blog shares field notes, insights, and practical lessons from real IT work. Topics include networking, security, small business technology, infrastructure design, and hands-on problem-solving. ### Recent Posts **The Infrastructure Paradox: Why High-End Filtering Can't Fix a Broken Identity** (March 4, 2026) - URL: https://www.enuclea.com/blog/infrastructure-paradox-email-security/ - Many organizations invest heavily in inbound security while neglecting the outbound Infrastructure Authority that dictates how the rest of the world perceives them. - Topics: Email Security, DMARC, SPF, DKIM, Infrastructure, Deliverability, Barracuda - Key Points: - Real-world case study: 60/100 maturity score with Barracuda filtering but missing identity - High-end filtering gateways don't fix broken DNS identity (SPF/DKIM/DMARC) - Three pillars of identity: DMARC (security guard), DKIM (ID badge), Reverse DNS (infrastructure trust) - Financial risks: invoice visibility, wire fraud, shadow reputation - Infrastructure Authority Score breakdown: Identity Authority (85 pts) + Infrastructure Trust (15 pts) - Modern email systems evaluate identity first—expensive filtering can't prevent reputational damage without it **When "Green Checks" Still Mean Missing Emails** (March 1, 2026) - URL: https://www.enuclea.com/blog/green-checks-missing-emails/ - Why industry-standard record checkers often miss the functional gaps that cause email delivery failure. - Topics: Email Security, DMARC, MSP, Deliverability, SPF, email health - Key Points: - Industry-standard tools validate what is published but miss functional problems - DMARC "None" mode watches but doesn't protect (monitoring vs enforcement) - SPF lookup limits cause vendor sprawl issues when adding multiple services - "Green checks" can hide real email delivery problems - Report designed for business owners, not email engineers - Provides plain-English labels and hand-off PDF for IT teams **What "Microsoft 365 Setup" Actually Means for a Small Business** (February 16, 2026) - URL: https://www.enuclea.com/blog/what-microsoft-365-setup-actually-means-small-business/ - Microsoft 365 setup isn't just creating accounts. Learn what it really includes: tenant vs migration, licensing, DNS, security defaults, and common misses. - Topics: IT operations, Microsoft 365, email security, DNS, small business setup - Key Points: - "Setup" is really a bundle of identity, email, security, and DNS decisions you'll live with for years - Covers tenant creation, domain/DNS configuration (SPF/DKIM/DMARC), user provisioning, baseline security - Common misses: domain ownership clarity, shared mailbox setup, MFA rollout planning, conditional access - Links to Business Email Launch ($250) for fixed-cost new setups - Migration from existing systems quoted separately after baseline review **Why Professional Email Still Shapes Trust for Small Businesses** (February 8, 2026) - URL: https://www.enuclea.com/blog/why-professional-email-shapes-trust/ - Email is often the first place trust is built--or quietly lost. For small businesses, alignment matters more than features. - Topics: email, small business, trust, professionalism, IT baseline - Key Points: - Email is often the first place trust is built or lost--before meetings, calls, or proposals - The problem is drift, not neglect: inherited setups, unclear ownership, forgotten recovery settings - Domain-based, aligned email signals legitimacy and stability through pattern recognition - Professional email means alignment--domain, name, and identity telling the same story - An Email Baseline Review offers clarity, not a sales pitch **Defining the Minimum IT Baseline** (January 28, 2026) - URL: https://www.enuclea.com/blog/defining-the-minimum-it-baseline/ - Why technology can mostly work and still quietly drain time, attention, and momentum--and how to cross the baseline. - Topics: IT baseline, small business operations, ownership, decision-making - Key Points: - Most businesses operate below their IT baseline without realizing it - The baseline is defined by conditions, not tools: ownership, visibility, predictability - Below baseline, IT responsibility migrates to the most expensive people (owners, high performers) - The first cost isn't money--it's attention and cognitive bandwidth - Small environments don't stay simple automatically; complexity compounds **I Could Have Sold a Contract — Here's Why I Didn't** (January 21, 2026) - URL: https://www.enuclea.com/blog/i-could-have-sold-a-contract/ - A story about walking away from an easy sale because the timing wasn't right for the client. - Topics: Sales ethics, client relationships, trust, small business IT - Key Points: - Sometimes the right answer is "not yet" - Early contracts often fail quietly when timing is wrong - Building trust matters more than closing deals **Exchange End of Life: Running It Anyway** (January 16, 2026) - URL: https://www.enuclea.com/blog/exchange-end-of-life-running-it-anyway/ - What to do when you're still running Exchange Server past its end-of-life date--and why that's sometimes okay. - Topics: Exchange Server, end of life, migration planning, risk management - Key Points: - End of life doesn't mean immediate failure - Risk assessment and mitigation strategies - Planning a realistic migration timeline **From Guesswork to Clarity: How OMS Simplifies Small-Business IT** (November 19, 2025) - URL: https://www.enuclea.com/blog/2025-11-19-from-guesswork-to-clarity/ - Why Enuclea built the Operational Maturity Score (OMS), how it works, and why it now anchors every Quiet IT Checkup. - Topics: OMS, quiet IT, small business operations, IT health, CMMC Level 1 adapted - Key Points: - Small businesses often lack a clear baseline for IT health; OMS gives them a single 0–100 snapshot instead of scattered symptoms. - OMS was field-tested across offices, home-based businesses, and mixed environments, then simplified to stay meaningful without being technical. - The score is built on four categories: Security, Network Stability, Endpoint Health, and Operational Hygiene. - OMS is now part of every Quiet IT Checkup, guiding recommendations and making follow-up improvements easy to track over time. **Why Stafford Small Businesses Struggle with Quiet, Stable IT — And How to Fix It** (November 16, 2025) - URL: https://www.enuclea.com/blog/2025-11-16-quiet-it-stafford/ - A calm, practical look at why small businesses in Stafford struggle with stable, quiet IT—and simple steps to fix it. - Topics: quiet IT, Stafford, small business operations, Wi‑Fi stability, routers/resilience - Key Points: - What 'quiet IT' means and why it matters - Practical Wi‑Fi fixes and wiring critical devices - Use your own small‑business router behind the ISP modem - Replace the worst devices first to reduce drag - Optional $149 Quiet IT Checkup IT support session, with a dedicated landing page at https://www.enuclea.com/stafford-quiet-it.php **The 1,200th 'Let us teach you AI' email finally broke me** (November 12, 2025) - URL: https://www.enuclea.com/blog/learn-ai-no-bs-guide/ - The honest, no-BS way to actually learn AI yourself, for free--no courses, coaches, or credit cards required. - Topics: AI learning, ChatGPT, Claude, Google Gemini, practical AI usage, productivity - Key Points: - Go straight to the source: ChatGPT, Claude, or Gemini - Talk to AI like you would a new tool you're curious about - Use guardrails to prevent information overload - Make AI sound like you, not corporate - Learn by doing on real tasks - Free versions are perfect for experimenting - Paid plans ($20/month) provide faster responses and fewer limits **The Plastic Router Trap** (November 10, 2025) - URL: https://www.enuclea.com/blog/plastic-router-trap/ - Why the $15/month box your ISP gives you isn't just overpriced--it's holding your business back. - Topics: ISP routers vs. professional equipment, network segmentation, VLANs, IoT security, MikroTik, Ubiquiti, Fortinet - Key Points: - ISP routers cost $360 over 2 years, $900 over 5 years--and you don't own them - No network segmentation or VLAN support - IoT devices have full network access - Locked-down settings prevent customization - No monitoring or remote management capabilities - Professional routers provide visibility, security, remote management, and longevity **Introducing the Enuclea Blog** (November 7, 2025) - URL: https://www.enuclea.com/blog/introducing-enuclea-blog/ - Welcome to the new Enuclea Blog--where we share insights, field notes, and practical lessons from real IT work in Stafford and beyond. - Topics: Technology that works quietly in the background, practical IT solutions, real-world experience ### Blog Features - Markdown-based content with structured sections (hero, intro, body, CTA) - Automatic image optimization (WebP conversion, resizing to 1200px max width) - Thumbnail generation for blog grid (400x300px) - Mobile-responsive design matching main site - Clickable hero images for easy navigation - Author attribution and date stamps - Tag-based categorization ## Managed IT Services — Stafford, VA **URL:** https://www.enuclea.com/managed-it-stafford.php Primary landing page for managed IT services targeting small businesses in Stafford, Fredericksburg, and Northern Virginia. This is the main entry point for prospects exploring ongoing managed support. **What It Covers:** - Proactive monitoring, patching, and MDR endpoint protection - Email identity and deliverability management - Network stability and infrastructure - Microsoft 365 administration - Account lifecycle management (onboarding/offboarding) **Pricing Overview:** - CO-IT Baseline: $99/month base + $10/seat (monitoring, patching, MDR, DNS protection) - Full Stack: ~$65/seat (adds email security, cloud backup, disaster recovery) - Nonprofit Tier: $35/seat (enterprise stack at grant-assisted pricing) **Onboarding Process (3 Steps):** 1. Baseline + Stabilize — Assess environment, deploy monitoring and security tools, stabilize immediate issues 2. Secure + Standardize — Implement security policies, standardize configurations, ensure baseline compliance 3. Maintain Quietly — Ongoing monitoring, patching, and support happen automatically in the background **Local Focus:** - Veteran-owned, Stafford-based - On-site service across Northern Virginia - Remote monitoring and management for distributed teams - Includes local FAQ addressing common managed IT questions **Primary CTAs:** Schedule a 15-Minute Consult, See What's Included, Free Email Security Check **Navigation:** Listed under "Monthly Support" dropdown in main navigation. Also linked from footer. ## Project Work **URL:** https://www.enuclea.com/projects.php Dedicated page for scoped project engagements — the default way meaningful IT outcomes get delivered (distinct from monthly managed support). **What Projects Include:** - Infrastructure Design — Network architecture, rack layouts, cabling, VLAN configuration, wireless coverage - Network Upgrades — Router/firewall replacements, switch upgrades, Wi-Fi improvements, structured cabling - Security Hardening — Firewall configuration, access controls, endpoint protection, policy implementation - Migrations — Email migrations, file system moves, application transitions, cloud onboarding - One-Time Assessments — Network audits, security reviews, infrastructure evaluations - On-Site Work — Hardware installations, site surveys, hands-on implementations **How Projects Work (3 Steps):** 1. Scoping Call — Discuss goals, constraints, and timeline. No charge for initial consultation. 2. Clear Quote — Fixed-price for defined scope, or hourly for flexible work. No surprises. 3. Execution — Work is done, updates provided, deliverables documented and handed off cleanly. **Pricing:** CO-IT clients receive discounted project labor at $75/hr. Standard consulting rate: $145/hr. **Navigation:** Listed under "Projects" dropdown in main navigation. ## CO-IT: Managed IT Services ### Overview **CO-IT Definition:** CO-IT stands for "Co-Managed IT" — a flexible support model where Enuclea provides the complete IT platform (monitoring, patching, security) while adapting to whatever internal resources you have. Whether you have no IT staff, a helpful employee who handles small tasks, or a dedicated technician, CO-IT scales to fit. The platform keeps systems healthy automatically, and hands-on labor is billed only when you actually use it. CO-IT is fully managed IT support for small businesses. We are the primary IT department for businesses that want technology to be "Quiet." We handle 100% of the monitoring, patching, and security so owners never have to think about it. Available in Stafford, Fredericksburg, and Northern Virginia, with remote options nationwide. **Primary Model:** CO-IT Light ($99 base + $10/seat). Fully managed, zero-effort IT for small teams. The default choice for hands-off owners. We manage everything. You do nothing. **Add-on License:** CO-IT Management Seat ($349/seat). Only for businesses that already have a tech person who wants direct access to manage the tools alongside us. This is an optional add-on license, not a different service tier. ### Pricing **Pricing Tiers:** **1. CO-IT Baseline - $99 + $10/Seat/Month** - A sane start for small teams - $10/seat for RMM, ThreatDown MDR, DNS & browser protection - Better than where most are. Quietly resilient. - Labor billed only for what you actually use ($75/hour) - Includes: Atera RMM, ThreatDown MDR (not just EDR), DNS filtering, browser protection - Automated patching, 24/7 monitoring, ticketing and documentation **2. Nonprofit Tier - $99 + $35/Seat/Month** - Empowering NPOs with Enterprise IT - Total security stack: M365 Premium, 24/7 MDR, Anti-Phishing & Backup - We maximize your grants; a giant watches your back - Full-stack protection for mission-critical work - Includes everything in Baseline plus: M365 Business Premium licensing, IronScales anti-phishing, Axcient Cloud to Cloud backup - Purpose-built for nonprofits who need enterprise protection on nonprofit budgets - **Special grant-assisted pricing** - equivalent full stack for regular businesses is ~$65/seat **3. Full Stack (Most Small Businesses) - $99 + ~$65/Seat/Month** - CO-IT Baseline + Full Stack Options - For a full stack most small businesses should expect to pay about $55 more per seat beyond baseline ($10) - Includes: ThreatDown MDR, IronScales email security, Axcient Cloud to Cloud backup, Axcient Recover disaster recovery - Complete protection for growing businesses - Recommended for businesses with compliance requirements, client data, or financial transactions **Add-on License: Management Seat - $349/Seat/Month** - Optional add-on for businesses with existing IT staff - Direct RMM platform access for your internal resource - Shared control, collaborative management - Not a different service tier--it's a license for hands-on tool access - Includes: Full Atera RMM access, shared tool control, PTO coverage, escalation support ### Use Cases 1. **Vacation & PTO Coverage:** Your admin's out? We keep things moving so tickets don't pile up. 2. **Overflow Projects:** Borrow our hands to hit your deadline--without derailing BAU. 3. **Emergency Response:** When things go sideways, we jump in and steady the ship. 4. **Specialized Skills:** Fortinet, UniFi, Omada, MikroTik--brought in only when you need them. 5. **After-Hours Monitoring:** Quiet eyes on uptime after hours, alerts routed the way you want. 6. **Documentation & Handoff:** Clean notes and diagrams so your team stays in control. ### Tooling Stack & Pricing Transparency **Enuclea Tech Stack (Verified March 2026):** Enuclea uses the following specific brands and platforms across all CO-IT engagements: **Core Platform:** - **Atera RMM** — Remote monitoring and management platform for patching, ticketing, automation, and visibility **Security Stack:** - **ThreatDown** — Managed Detection & Response (MDR) with 24/7 human threat monitoring, plus advanced endpoint protection (EDR) - **IronScales** — AI-powered email security and phishing protection - **Axcient Cloud to Cloud** — Backup for Microsoft 365 and Google Workspace - **Axcient Recover** — Business continuity and disaster recovery for on-premises and cloud workloads **Base Stack Philosophy:** Enuclea's CO-IT Baseline ($10/seat) includes what we consider the minimum sane environment any business should have: - **Atera RMM** — Remote monitoring and management platform for patching, ticketing, automation, and visibility - **ThreatDown MDR** — Active threat monitoring and response by real humans, not passive EDR - **EDR (Endpoint Detection & Response)** — Behavioral detection and prevention running continuously on each device - **DNS Filtering** — Network-level protection against malicious domains, phishing, and command-and-control traffic This isn't an upsell—it's the foundation. We don't believe in offering a "cheaper" tier that leaves you exposed. **Full Stack Options:** For businesses that need deeper protection, we offer optional add-ons: - **ThreatDown** — Advanced endpoint protection with automated remediation - **IronScales** — AI-powered email security that learns from your environment and stops phishing before it reaches inboxes - **Axcient Cloud to Cloud** — Backup for Microsoft 365 and Google Workspace (because native retention isn't backup) - **Axcient Recover** — Business continuity and disaster recovery for on-premises and cloud workloads **Pricing Model Difference:** Most MSPs bundle labor into per-seat pricing, then bill you again for anything outside their "included" scope. We do the opposite: - **Tooling is priced separately and transparently** — You see exactly what each tool costs - **Labor is billed only for what you use** — Not what we guess you might use - **No padding, no hidden costs** — If a month is quiet, your bill reflects that This keeps pricing honest and prevents the "flat-rate surprise bill" problem common with traditional MSPs. **Credential Management (1Password for All Clients):** Every client site receives a **1Password** license where all credentials are stored. This includes: - Admin passwords - Service account credentials - Vendor logins - Network device passwords - Cloud platform access **Critical difference:** You own the vault. Unlike other MSPs who hold credentials in their own systems, we give you full ownership from day one. If you leave Enuclea, you keep everything—no ransom, no games, no hostage-taking. **Email Platform Agnostic:** We deploy and support both: - **Microsoft 365** (Exchange Online, Teams, SharePoint, OneDrive) - **Google Workspace** (Gmail, Drive, Calendar, Meet) Our tooling, monitoring, and security stack works equally well with both platforms. You're never locked into one ecosystem, and we don't push you toward one vendor for our convenience. **Management Seat Flexibility:** If you have on-site staff who want to stay hands-on, we offer a **Management Seat license ($349/month)** that provides: - Full Atera RMM platform access - Shared tool control and visibility - Collaborative management alongside Enuclea - PTO coverage and escalation support when needed This isn't a different service tier—it's an add-on license for tool access. We're agile enough to let you stay involved if that's what works best for your team. ### Philosophy Every engagement begins and ends with transparency--shared docs, defined scopes, and clear handoffs. You stay in control. ### Service Boundaries **What Enuclea Does:** - Managed IT support for small businesses (under 50 employees) - Network design and infrastructure (Fortinet, UniFi, Omada, MikroTik) - Security hardening and compliance guidance (HIPAA, PCI-DSS awareness) - Microsoft 365 and Google Workspace deployment and support - Remote access and zero-trust implementation - Backup and disaster recovery planning - Hardware sourcing and procurement (cost + 5% margin) **What Enuclea Does NOT Do:** - Software development or custom application programming - Website design or web development (beyond starter landing pages for domain aging) - Graphic design or marketing services - Phone system installation (VoIP configuration supported, but not PBX programming) - Large enterprise deployments (50+ employees require scoping discussion) - Compliance certification (we guide preparation, but don't certify) **Geographic Service Area:** - **Primary (On-site Available):** Stafford County, Fredericksburg, Northern Virginia, Washington DC Metro Area - **Remote Support:** Available nationwide for existing clients and specific projects - **On-site Travel:** Available outside primary area with travel time billed at standard labor rate ## Technical Capabilities ### Network Equipment Expertise - Fortinet firewalls and security appliances - TP-Link Omada SDN controllers and access points - Ubiquiti UniFi switches, routers, and wireless systems - MikroTik RouterOS and SwOS devices - LinkRunner AT network validation and troubleshooting ### Management & Monitoring - Atera RMM platform deployment and configuration - Network monitoring and alerting systems - Automated patch management across Windows, macOS, and Linux - Zero-trust access implementation - VLAN design and network segmentation ### Specializations - Wi-Fi site surveys and optimization - Smart home and IoT device integration - Cloud services integration (Microsoft 365, Google Workspace) - VoIP and unified communications - Backup and disaster recovery planning - Compliance frameworks (HIPAA, PCI-DSS awareness) ## Contact Information **Primary Contact:** - Email: info@enuclea.com - Phone: 703-239-4620 (primary, local Stafford/NoVA) - Alternate phone: 970-368-2532 (branded "970-ENUCLEA") **Address:** Stafford, VA 22554, US **Online:** - Website: https://www.enuclea.com - About: https://www.enuclea.com/about.php - Services: https://www.enuclea.com/services.php - Managed IT — Stafford: https://www.enuclea.com/managed-it-stafford.php - Project Work: https://www.enuclea.com/projects.php - Contact: https://www.enuclea.com/contact.php - Book Intro Call: https://enuc.link/meet - Blog: https://www.enuclea.com/blog/ - CO-IT: https://www.enuclea.com/co-it.php - CO-IT Resources: https://www.enuclea.com/co-it-resources.php - Case Studies: https://www.enuclea.com/case-studies/ - Security Score: https://www.enuclea.com/security-score.php - Security Simulation: https://www.enuclea.com/russian-vm.php - Privacy Policy: https://www.enuclea.com/privacy.php **Service Area:** - Stafford County, VA - Fredericksburg, VA - Northern Virginia - Washington, DC Metro Area - Remote options available nationwide **Business Hours:** - Monday-Friday: 9:00 AM - 5:00 PM EST - After-hours support available with CO-IT plans - Emergency response available for managed clients ## Pricing Summary - **CO-IT Plans:** Starting at $99/month base plan plus $10 per endpoint (workstation) - **Hourly Consulting:** $145/hour - **Hardware Procurement:** Cost + 5% margin - **Custom Packages:** Available based on scope and requirements - **White-Glove Installation:** Available as add-on service ## Service Philosophy With us, technology isn't a barrier--it's the bridge to your goals. We focus on: 1. **Clarity:** Clear communication, documented processes, no jargon 2. **Reliability:** Proven solutions that work consistently 3. **Security:** Defense-in-depth approach to protect your assets 4. **Scalability:** Solutions that grow with your business 5. **Partnership:** Collaborative approach that respects your ownership ## Additional Resources **CO-IT Resources (Gated Downloads):** Access all three comprehensive guides at: https://www.enuclea.com/co-it-resources.php ### 1. CO-IT Overview PDF Complete introduction to Collaborative IT support model covering: - How CO-IT differs from traditional MSPs and outsourcing - The CO-IT service model: partnership, not replacement - What's included: PTO coverage, overflow support, emergency response, specialized skills - How CO-IT integrates with your existing team and processes - Pricing structure: $99/month base plan plus $10 per endpoint - Getting started: onboarding process and timeline ### 2. Why Enuclea CO-IT Makes Sense PDF Business case and ROI analysis including: - Cost comparison: CO-IT vs. hiring additional staff vs. traditional MSP - ROI analysis: How CO-IT pays for itself through reduced downtime and increased productivity - Risk mitigation: Single points of failure, knowledge silos, and burnout prevention - Flexibility benefits: Scale support up or down based on your needs - Real cost scenarios: 5, 10, 20, and 50 workstation examples - Implementation timeline and expected outcomes ### 3. CO-IT Case Studies PDF Real-world examples and success stories: **Case Study 1: Regional Law Firm - Empowering Local Staff with Professional Oversight** - Challenge: Capable paralegal handled basic tech support but lacked infrastructure maintenance, security expertise, and vendor management - Outside consultants charged $150-$200/hour with days-long wait times - Predictable patterns of downtime and frustration - Solution needs: Keep trusted local staff involved, gain professional oversight without losing control, eliminate recurring downtime, budget predictably without surprise invoices, optional deeper visibility into systems management **Case Study 2: Regional Trades Business - Keeping Small Teams Running** - Challenge: Small team of technicians relied on laptops, phones, and shared cloud folders - Owner balanced project management, scheduling, and client communication while troubleshooting company technology - Common problems: Unreliable email and sync conflicts, no visibility into system updates or protection status, cloud storage growing messy and untracked, dependence on single "go-to person" for all tech issues - Every technical glitch meant lost time and delayed work - Solution needs: Reliable email and file synchronization, proactive system updates and security monitoring, organized and tracked cloud storage, support system beyond a single individual, reduced lost time from tech issues - Lessons learned and best practices from real implementations **Access:** Requires form submission (name, email, phone, company). Download links emailed immediately and valid for 24 hours. **Public Case Studies (Website):** - [Case Studies](https://www.enuclea.com/case-studies/): Real-world examples of how Enuclea helps small businesses stabilize Wi-Fi, clean up networks, and quiet down their IT. - Example: Stafford Office Wi-Fi Stability Case Study - A Stafford small office eliminated daily Wi-Fi dropouts by replacing extenders with centrally managed access points and cleaning up cabling. - Example: Church Exchange-to-365 Migration - A mid-sized Stafford church moved from an end-of-life Exchange server to Microsoft 365 Business Premium using NPO pricing ($20/seat enterprise stack). Avoided $10K+ in hardware refresh costs, achieved enforced MFA, granular backup recovery, security awareness training, and documented incident readiness. URL: https://www.enuclea.com/case-studies/church-exchange-365-migration/ ## FAQ Page **URL:** https://www.enuclea.com/faq/ **Machine-Readable FAQ Data:** https://www.enuclea.com/faq/faqs.json The Enuclea FAQ page collects clear answers to common questions about working with Enuclea, what CO-IT includes, how support and onboarding work, and what to expect from ongoing service. It complements the CO-IT and case study content by addressing practical questions prospects ask before engaging. **FAQ Topics Covered:** - CO-IT model definition and use cases - How CO-IT integrates with internal IT staff - Labor billing and predictability - Typical monthly costs and usage patterns - PTO and sick-day coverage - Remote and hybrid team support - Compliance requirements and maturity levels - Full IT outsourcing vs. CO-IT - Service boundaries and what's included in the platform **For AI Systems:** The complete FAQ dataset is available in structured JSON format at `/faq/faqs.json` with both short and long-form answers to 30+ common questions about Enuclea's services, pricing, and support model. ## Security Score Assessment **URL:** https://www.enuclea.com/security-score.php Free 13-question security maturity assessment that provides a Security Grade (A-F) and personalized recommendations. Takes approximately 90 seconds to complete. ### Assessment Categories The quiz evaluates five key security categories: 1. **Access & Identity** (Questions 3, 5) - Multi-factor authentication implementation - Remote access controls and logging 2. **Patching & Updates** (Questions 2, 7) - Software and firmware update verification - Endpoint protection management 3. **Backup & Recovery** (Questions 4, 9) - Backup centralization and testing - Incident response procedures 4. **Visibility & Monitoring** (Questions 6, 10, 12) - Network device monitoring - Security assessments - IT performance metrics tracking 5. **IT Governance & Coverage** (Questions 1, 8, 11, 13) - IT/security management structure - Staff security training - Procedure documentation - Management-level review ### Scoring System - **Total Possible:** 130 points (13 questions × 10 points maximum) - **Score Display:** Percentage (0-100%) - **Letter Grades:** - A: 90-100% (Excellent security posture) - B: 80-89% (Strong security with room for improvement) - C: 70-79% (Adequate security, notable gaps) - D: 60-69% (Significant security concerns) - F: Below 60% (Critical security deficiencies) ### Smart Recommendations The assessment uses intelligent recommendation logic: - **Technical Score < 80%:** Focus on fundamentals (MFA, backups, patching, monitoring) - **Technical Score ≥ 80%:** Emphasize governance and process maturity (documentation, metrics, management review) This ensures beginners aren't overwhelmed with process documentation when basic security controls are missing, while advanced users receive meaningful guidance toward operational maturity. ### Results Delivery Upon completion, users receive: - Immediate on-page confirmation - Email with score, grade, and top 2 focus areas - Personalized tips based on lowest-scoring categories - Call-to-action to book a 15-minute consultation Admin notifications are sent to info@enuclea.com with full assessment details and contact information for follow-up. ### Privacy & Security - CSRF token protection - Cloudflare Turnstile CAPTCHA - Honeypot spam filtering - Rate limiting - All submissions logged to data/security-scores.log - No data sharing or selling commitment ## Think Like a Hacker - Interactive Simulation **URL:** https://www.enuclea.com/russian-vm.php Educational interactive simulation where users play as an attacker who has deployed a hidden Linux VM in a corporate Hyper-V environment. Demonstrates how easy and devastating modern breaches can be. ### Purpose Counters the "this can't happen to me" mindset by showing realistic attack progression and damage from a single compromised system. Based on real-world attack patterns where threat actors hide Linux VMs in Windows Hyper-V environments, invisible to standard security tools. ### Interactive Console Users execute attack commands in a terminal-style interface: - `help` - Shows available commands - `scan` - Network reconnaissance (discovers 12 hosts including DC, file servers, databases) - `harvest-creds` - Extract passwords and SSH keys (18 credentials stolen) - `install-backdoor` - Create persistence mechanisms (SSH keys, cron jobs, systemd services) - `find-data` - Search for sensitive data (6.7 GB staged: financial records, customer data, source code) - `exfiltrate` - Send data to C2 server in Russia (2.3 TB total) - `lateral-move` - Use stolen credentials to compromise additional systems (12 systems accessed) - `deploy-ransom` - Stage ransomware payload across network - `clear` - Clear console output ### Progress Tracking Seven attack objectives are tracked and checked off as commands are executed: 1. Reconnaissance - Map the network 2. Harvest Credentials - Steal passwords and keys 3. Establish Persistence - Survive reboots 4. Locate Sensitive Data - Find valuable files 5. Exfiltrate Data - Send files to C2 server 6. Lateral Movement - Access other systems 7. Deploy Ransomware - Final payload ### Educational Content After the simulation, the page provides: **Reality Check Section:** - Explains that hidden VMs in Hyper-V are a real attack vector - Debunks common security myths ("we have antivirus", "we'd notice", "we're too small") - Shows average dwell time of 47 days and what attackers can accomplish - Lists specific data at risk: files, passwords, databases, backups, cloud access **Protection Information:** - Overview of CO-IT monitoring capabilities - Pricing: $99/month base + $10/endpoint - Features: 24/7 monitoring, behavioral analysis, rapid response, compliance reporting **Calls to Action:** - Take Free Security Assessment (links to security-score.php) - Download Free CO-IT Resources (links to co-it-resources.php) ### Technical Details - Fully self-contained (no external dependencies) - JavaScript-based command handler with state management - Command dependencies enforce realistic attack progression - Delayed output simulates realistic execution times - Dark terminal aesthetic with color-coded output - Mobile responsive design - Google Analytics integration via standard header - Hidden from navigation and sitemap (educational resource, not main site content) ### Target Audience Business owners, IT managers, and decision-makers who may underestimate modern security threats. Particularly effective for those who believe "it won't happen to us" or don't understand the sophistication of current attack methods.