The backup that's never been tested. The Microsoft 365 environment nobody fully understands. The former employee whose account might still be active. Whatever the IT problem is that you've been putting off — Graham Pearson will work on it directly for 2 hours, at no cost, and you keep the result.
"I know we should deal with this, but I don't want to commit to a contract just to get someone to look at it."
That's exactly why this offer exists. Two hours. Real work done. No contract required.
Pick a time. Graham confirms in 2 hours. The IT problem you've been carrying gets addressed.
Not assessed. Not recommended. Fixed — configured, corrected, and verified during the 2 hours. You decide which one Graham focuses on when you book.
Stale user accounts removed. MFA enforced across every account. Admin access audited. Shared mailboxes organized. License usage reviewed so you're not paying for unused seats. Anti-phishing policies enabled in Defender. Most M365 environments have significant security and cleanup work that has never been done.
DMARC, DKIM, and SPF records configured correctly in your DNS so attackers cannot spoof your domain. Anti-phishing filtering reviewed. Most Goshen businesses have at least one of these three records missing or misconfigured — meaning your domain can be impersonated in business email compromise attacks right now.
Graham performs an actual restore test — not a review of whether backup software is running. Most backup systems showing green have never had a recovery test performed. If the restore fails, Graham diagnoses the configuration error and fixes it on the spot. If it succeeds, you have documented confirmation your data is genuinely recoverable.
Open firewall ports identified and unnecessary ones closed. Guest WiFi separated from your business network if not already. Remote access methods reviewed for RDP exposure. DNS settings checked. Basic network hygiene most businesses have never had a professional review — and several common misconfigurations fixed on the spot.
Former employees who still have active accounts. Vendors with access no longer needed. Admin rights on workstations that should be standard user. Shared passwords used by multiple team members on critical systems. These are the gaps that make breaches easy — and most of them are fixable in 2 hours.
Voicemail-to-email configured. Auto-attendant menus updated. Call routing reviewed for your actual workflow. Microsoft Teams phone integration set up correctly if applicable. If your team uses Teams for calls and meetings but not effectively — or if your phone system hasn't been touched since it was installed — 2 hours of focused configuration makes a real difference.
Most Goshen business owners who land on this page already know something is off with their IT. The backup that runs automatically but has never been verified. The former employee's account that might still be active. The Microsoft 365 setup the last person who touched it left half-configured.
They haven't fixed it yet — not because they don't care, but because every path forward seems to require a commitment they're not ready to make. Calling an IT company means a proposal. A proposal means a contract. A contract means switching from whatever they're doing now — and that feels risky.
The 2 Complementary Hours remove every one of those barriers. No proposal. No contract. No implied commitment to continue. Graham works on the specific problem you bring to the session for 2 hours. The result belongs to you. What happens next is entirely your decision.
Representative examples of 2-hour sessions with Goshen and Elkhart County businesses. Details changed for privacy.
A Goshen manufacturer's backup software showed green every morning for 18 months. Nobody had ever performed a restore test. During the 2-hour session, Graham attempted a restore on a recent backup set — and it failed. The restore destination path had changed after a server migration 8 months earlier and was never corrected. Graham reconfigured the backup job, ran a successful restore test, and documented the verified recovery process. The manufacturer left the session with a working backup and confirmation that all 18 months of backup history was also recoverable once the path was corrected.
A CPA firm had been sending client emails for 6 years with no DMARC, DKIM, or SPF records configured. Their domain was spoofable — anyone could send an email appearing to come from their firm. During the 2 hours, Graham configured all three DNS records, set DMARC to monitoring mode to capture existing spoofing attempts, and enabled anti-phishing policies in their Microsoft 365 tenant. The firm left the session with a domain that could no longer be impersonated — protecting their clients and their professional liability simultaneously.
A healthcare practice brought one question to their session: 'Is our patient data actually secure?' Graham ran a user account audit and found 11 accounts associated with former employees — three with active passwords unchanged since the employees left, and two with full access to shared patient document folders. All 11 were disabled during the session. The two with sensitive document access were flagged with HIPAA risk documentation. A new employee offboarding procedure was drafted on the spot. What arrived as a vague question left as three specific, documented fixes.
Every one of these sessions started with a business owner who had been carrying the problem for months. All three left with something permanently better about their IT environment.
Claim Your 2 HoursNo pitch • No commitmentThink about the specific IT issue that has been sitting on the back burner the longest. The thing your team works around. The thing you know needs attention but hasn't seemed urgent enough to pay a stranger to look at.
That is exactly what the 2 hours are for. Graham will work on that specific problem — configuring, fixing, and implementing — not assessing and recommending. The result belongs to your business. No invoice follows. No contract is implied.
Spots are limited because this is Graham's direct time. When the month's sessions are full, the next availability opens the following month.
Choose a time. Graham confirms within 2 hours and sends a short prep question so work begins immediately.
📅
2 Complementary Hours booking
"MA3SP has a deep knowledge in the tech world and extensive educational background that sets them apart. Their proactive approach has minimized downtime and ensures our systems run smoothly."
"Ma3SP exceeded our expectations with personalized support and proactive monitoring. Their cybersecurity solutions keep our data safe and backup plans ensure we never lose critical information."
"I am very thankful for Graham and Ma3SP. Graham is focused on making sure we are utilizing our systems fully and finding ways to save money, time, and resources for our business."
The difference between a free consultation and 2 hours of hands-on IT work is the difference between a brochure and a result.
There is no catch. Two hours of Graham Pearson's direct work on your specific IT problem at no charge. No credit card required. No invoice after the session. No contract implied. Graham works on your IT, you keep the result, and the transaction is complete — unless you choose to continue, which is always your decision and timeline.
That is the most common situation people bring to the session. Graham's first 10–15 minutes are a quick read of your environment to identify where the most urgent issue actually lives. Most businesses with a vague sense that 'something is off' have 2–4 specific fixable issues Graham can identify and begin addressing within the first 20 minutes. Walk in with the vague feeling — that is enough to start.
Yes — M365 configuration, security, and cleanup is one of the most common session uses. Specific tasks done in a 2-hour M365 session: enforce MFA across all accounts, audit and remove stale user accounts, review admin access rights, configure anti-phishing and anti-malware policies in Defender, set up or correct email security DNS records (DMARC/DKIM/SPF), review SharePoint and OneDrive sharing permissions, and optimize license assignments. Most M365 tenants have significant security and cleanup work that has never been done.
The free 12-point IT checkup is a diagnostic — it tells you what the situation is across 12 categories with a plain-language report. The 2 Complementary Hours are active work — Graham fixes the specific issue the checkup identified. Many businesses start with the free checkup to understand their situation, then claim the 2 hours to act on the most urgent finding. Both are independent offers — either can be the right first step depending on whether you want a diagnosis first or you already know what needs fixing.
At the end of the session, Graham briefly describes what a Ma3SP managed IT engagement would look like for your specific environment — because you've seen how he works and you deserve to know what the ongoing option is. That conversation takes about 5 minutes. After that, the decision is entirely yours. No follow-up calls. No email drip. No pressure. Most businesses that want to continue know it within the first 30 minutes of the session — the managed IT conversation is simply acknowledging what they've already decided.
Graham completes as much as possible in the 2 hours and documents clearly what remains — what was done, what is left, and the specific next steps — so you can act on it independently or decide to engage Ma3SP to complete it. Nothing gets left in a worse state than when it started. If the issue is genuinely too complex for 2 hours, you will know the full scope of it by the end of the session in a way you didn't before — which is itself a valuable outcome.
When you book the 2 Complementary Hours, Graham Pearson is the person who shows up. Not an associate. Not a technician assigned from a queue. The MBA-holding owner of Ma3SP who has been protecting Goshen and Elkhart County businesses for over 30 years.
That matters for this specific offer because context is everything in a 2-hour hands-on session. Graham knows the specific software combinations common in Goshen manufacturing. He knows the compliance requirements for Elkhart County healthcare practices. He knows the attack patterns targeting Indiana CPA firms during tax season. The 2 hours of work he does reflect 30 years of that context — not a generic best-practice checklist read off a screen.
His tagline is "Your Hometown Technology Professional with a Heart of an Educator" — and the educator part is what makes the 2-hour session genuinely different. Graham explains every action he takes during the session in plain English so you understand what changed, why it matters, and what to watch for afterward. You do not leave the session dependent on Ma3SP to interpret the results. You leave understanding your own IT environment better than you have before.
Graham Pearson, MBA
Owner & Technology Advisor
Ma3SP Technology — Goshen, Indiana
The same platforms used by the region's largest organizations — configured for Goshen and Elkhart County small businesses at no cost during the 2-hour session.
★ Replace text labels with actual partner logo images
Every month, a limited number of Goshen and Elkhart County businesses claim their 2 complementary hours. Graham works on their specific IT issue — M365 cleanup, email security, backup verification, network review, account audit — and they leave with something genuinely better about their technology environment. No pitch. No contract. No invoice. Just 2 hours of real work on a real problem, by the person who has been protecting northern Indiana businesses for 30 years.
Mon–Fri 8AM–6PM | Sat 8AM–2PM | [email protected]
Each Ma3SP offer is a different entry point — pick the one that matches where you are today.
★ Update offers 3–5 links as those funnel pages are built