In This Period of Economic Crisis, Maybe It’s Time You Took A

Closer Look

At What You’re REALLY Getting for The Money You’re Spending on IT Services And Support

    “We’ve had a great experience with Fusion IT, whenever we’ve had any issues, they’re on it.  We used to have our own in-house IT staff and even after all these years, we still feel there is a greater value in working with Fusion. We now have a whole team of experts who knows computers and who keep us up to date on security and everything else.”Jeffrey Gass, Director of Operations – Senior Neighbors

    From the Desk of: Richard Tyler
    Technology Solutions Advisor, Fusion IT
    Dear Colleague,

    If someone could prove to you that tens of thousands of dollars were being unintentionally “stolen” from your organization – while simultaneously exposing you to hard losses that could stack up to the millions – wouldn’t you want them to tell you about it?

    My name is Richard Tyler of Fusion IT. On the surface, we may appear to be “just another” IT firm, but what we really deliver to CEO’s, CFO’s, and IT Managers like you is a profit-centric approach to IT. Our deliverable is MONEY, EFFICIENCY, and peace of mind (SECURITY). Our approach is unique: We ensure your IT systems and investments actually drive profitable growth and shareholder value, not just “make your computers work.”

    Maybe you’ve heard about us from our West Michigan Live spot-on Wood Radio or recognize one of the clients we currently support, such as J&H Family Stores or Senior Neighbors.

I do realize that my opening claim may seem “sensational,” and that you would be tempted to throw this letter away thinking I’m just another crackpot consultant looking for a paycheck. Maybe you think, “we’re fine.” It’s natural to insist, “Not in MY company,” or to think your IT team or company has you covered.

    But I can assure you of this: Like Sherlock Holmes, I and my team have never failed to find significant and preventable losses that were occurring in the companies we’ve audited – and it’s my firm belief that right now, this very minute, losses are occurring in YOUR organization. You ARE being underserved and left unprotected. If you have even a sneaking suspicion that some of this is true, at what point would it be irresponsible to be “too busy” to investigate it?

I’m So Confident in My Ability to Demonstrate
How You’re Being Underserved That I’ll Guarantee It

Because I’m so confident in what we do, I’m willing to make you the following good-natured bet:

If we are unable to satisfactorily demonstrate how we can improve your bottom line through lower IT costs, improved efficiencies, better workflow, and higher productivity, as well as reveal inadequate cyber security and compliance protections, then I’ll donate $200 to the charity of your choice. It’s that simple.

Why would I do this? Two reasons.

    First, I know your time is extremely valuable and you don’t have time to mess around with companies that don’t have anything of value to offer. By putting my money on the line, you can see how serious I am about not wasting your time.

    Second, with the economic crisis caused by COVID-19, it’s more critical than ever to watch every penny. We’ve spent the last seventeen years perfecting our ability to deliver profit-focused IT – and we’re really good at it. That’s why I simply want the opportunity to prove ourselves.

Here Are A Few Of the Ways Money Is
“Unintentionally” Exiting Your Organization

Grossly Inadequate Data Compliance and Cyber Security Protections

When a cyber-attack happens, the losses stack up and multiply. First, there’s an instant loss of productivity (look what happened at Steelcase this summer – $85M loss!). At best, you’re crippled. In the worse cases, you’re completely shut down, unable to transact, unable to deliver promised products and services to clients and unable to operate. In other cases, thousands if not millions of dollars are drained directly from your accounts without any chance of recovery.

Then you’ have the loss of critical data, reputational damages, potential lawsuits and government fines. The epicenter of this disaster lands DIRECTLY on YOUR desk for YOU to deal with – a problem that WILL significantly undo your best laid plans for growth and progress.

Yet despite this, we have found 8 out of 10 companies that we’ve audited are GROSSLY unprepared and unprotected from a ransomware attack or other major cyber security event EVEN THOUGH they have invested heavily in IT staff and resources. Before we showed them irrefutable evidence of these inadequacies, the CEO was convinced his they had it handled. A ticking time bomb they didn’t know was “live” under their seat.

Chronic IT “Glitches” And Downtime

As the saying goes, “Overhead walks on two legs.” Any CEO knows that unproductive, distracted workers not only kill profitability, but increase the chances of mistakes, missed deadlines, sloppy work, and low morale. A frustrated team is not a productive one.

Yet we find that most CEOs don’t realize just how often their employees are being interrupted and distracted due to recurring IT failures because it’s “hidden” from them. Many are shocked to discover their employees are dealing with chronic IT problems that are constantly getting in the way of serving clients, closing sales, and doing their job, forcing them to stop what they are doing, re-doing the work they just spent hours doing, or NOT doing what they are supposed to do. Just one hour of this a day adds up when multiplied over an entire year and your entire workforce. We resolve ALL of this.

“Maverick” Spending, Poor Utilization and Undisciplined Planning

Many companies we’ve audited have a mishmash of patch-work technology pieced together like an old quilt. A “Frankenstein” monster lumbering along. Nothing matches, nothing works as efficiently as it should and the entire IT system is awash in inefficiencies, duplicate and redundant resources and outdated technologies (and not necessarily the fault of your internal IT staff!). Over time, pieces are added like band aides instead of being elegantly designed as a whole to maximize productivity and lower the total cost of ownership. Our approach is to eliminate ALL of this and ensure a well-crafted plan is put in place to maximize productivity, security, and efficiencies.

Internal IT staff not focused on “right stuff” to grow your business

Internal IT staff that we have worked have complained that they get distracted with the “my mouse is broke” type of calls and don’t have time to focus on the REAL IT issues that really effect the bottom line. During times like this quite often it is not feasible to add additional staff that would remove the “drudgery” burden off from your Internal IT.   We currently work with a lot of clients in what we call “Co-Managed IT” where we come along side your Internal IT person and give them room to breathe (and yes, they can now take a vacation without having the phone glued to their hip!) and we can do it at a cost that is less than adding another entry level IT person!  In addition to the help, we give them in answering the day to day calls we come alongside them and give them an additional sounding board for ideas that they produce to improve the operation of IT in your business.

Curious? Let’s Schedule A Brief
10-Minute Call to Discuss

    The next step is simple: call my office at 616-287-1633 and reference this letter to schedule a brief 10 to 15-minute initial consultation. My team will look for your call and will put you through immediately. You may also send me an e-mail to or book a date and time that is convenient for you by selecting it on my calendar here.

On this call we can discuss your unique situation, any concerns you have and of course, answer any questions you have about us. If you feel comfortable moving ahead, we’ll schedule a convenient time to conduct our proprietary Cyber Business Risk Assessment and IT Optimization Plan.

This Assessment can be conducted with any level of privacy needed. At the end of the Assessment, you’ll know:

  • Where you are overpaying (or getting underserved) for the services and support you are currently getting from your current IT company or team.
  • Whether or not your systems and data are truly secured from hackers and ransomware, and where you are partially or totally exposed.
  • If your data is actually being backed up in a manner that would allow you to recover it quickly in the event of an emergency or ransomware attack.
  • Where you are unknowingly violating PCI, HIPPA, NIST or SOC2 for example (if these apply to you).
  • How you could lower the overall costs, that you have shared with us, of IT while improving communication, security, and performance, as well as the productivity of your employees.

    Fresh eyes see things that others cannot – so at a minimum, our free Assessment is a completely cost and risk-free way to get a credible third-party validation of the security, stability, and efficiency of your IT systems.

At the End of This Assessment, One Of
3 Things Will Happen

    Option 1 is that you’ll love the plan we provide (and may be shocked by what we uncover) but may decide to implement it on your own. If that’s the case, we’ll wish you the best of luck and hope you’ll keep us in mind for future projects.

    Option 2 is that you’ll love the plan and will want my team’s help in implementing it. If that’s the case, we’ll knock it out of the park … and that’s a promise I’ll guarantee.

    Or finally, in the unlikely and unprecedented event that you feel like you wasted your time and we have NOT demonstrated, to your satisfaction, how to lower your IT costs, once you have shared them with us, and dramatically improve your situation, we will send a check for $200 to your charity of choice, no questions asked.

Think about it: the “worst” that can happen is you get $200 to your favorite charity for having an independent, credible third party validate the security, efficiency, and stability of your IT systems. To get started, please call or e-mail me to schedule a quick initial phone consultation to answer your questions and see if you’d like to proceed. I will call you in a couple of days to ensure you’ve received this letter and to discuss how (if?) you’d like to proceed.

Awaiting your response,

    Richard Tyler

Richard Tyler, Technology Solutions Advisor
Fusion IT
    Phone: 616-287-1633

Interesting Image

Discovery Call Request



Important! We hate spam as much (or more!) than you and promise to NEVER rent, share, or abuse your e-mail address and contact information in any way.

“Fusion IT support provides freedom to focus on business!”

Fusion IT has become an integral part of our team here at eAgile, which has allowed us to focus solely on our customers! As a seasoned IT veteran, I have had the experience of working with large and small companies and I have worked with many IT firms, but Fusion IT has been the easiest and most complete partner I’ve worked with in several decades! 

Curt Tackmann,
IT Manager