Comprehensive IT Solutions
Big Water Technologies offers tailored business IT support solutions covering managed services, phone systems, cybersecurity, cloud services, and more.
Security and Compliance Experts
You can rest assured knowing we're security and compliance experts with the ability to protect your network while ensuring your environment exceeds regulatory requirements.
Exceptional Customer Service
Our team has been in the industry since the 1970s - allowing us to offer you informed, strategic insight while maintaining a high level of customer service.
Commitment to Client Success
You're far too busy to worry about technology. That's why your success is our success. We make IT work for you - so you can drive growth.
We currently use Big Water for our managed phone service and they are great! We have had issue with managed phone service providers in the past but Jenn is super responsive when we have an issue or need a new line added or removed. I would not hesitate to recommend Big Water for managed phone services, low voltage or other technology needs!
COLLEEN BUDDE
Franchise Owner at Office Evolution Troy
We’re proud to earn top marks from our clients through Crewhu’s customer feedback program. Every response helps us improve - and confirms that our team is making a real difference through responsive, friendly, and effective IT support. When our clients succeed, we succeed - and that’s what drives everything we do.

John Lowery
CEO, Big Water Tech
At BigWater Technologies, safeguarding the integrity and security of your IT system is non-negotiable. We're dedicated to optimizing your technology to enhance efficiency and power.
If you've felt burned by managed IT support providers in the past, rest assured, we prioritize fostering lasting client relationships over maximizing profits. Our focus is on maximizing the potential of your current IT infrastructure while keeping costs in check – possibly even reducing them.
Contact us at (248) 220-7714 to kick-start crucial IT discussions tailored to businesses like yours. Let's redefine your IT experience together.
Simplified IT Management
BIGview offers proactive corporate IT support and IT management services of technology assets on a subscription basis.
VoIP & Hybrid Phone Systems
Desktop & Mobile App, as well as Service Management with flexible VoIP service.
Vendor Neutral Management
We provide a thorough needs assessment, available provider review, order management, issue management, and regular bill reviews.
Comprehensive Equipment Support
We take care of your network security, switching, WiFi, servers, computers, video conferencing, and more.
Installation & Support
Low voltage cabling, paging, and camera systems designed to fit the needs of your team.
Ongoing Evaluation and Planning
Stay focused on the success of your company with regular proactive business reviews.
Protect Your Business from Cyber Threats
Proactive monitoring, threat detection, and compliance-focused security solutions that safeguard your systems, data, and operations around the clock.
Responsive User Assistance
Fast, reliable technical support that resolves user issues, reduces downtime, and keeps your team productive.

Delivering exceptional customer service is at the heart of our managed IT support services. Discover why businesses throughout Southfield and Metro Detroit rely on Big Water Tech for dependable IT and computer support.
Start by assessing your Cyber Score to understand your business’s online security. This score provides clarity, replacing uncertainty with insight, so you know exactly where you stand and what needs improvement.
Use your Cyber Score to develop a clear, actionable Cyber Roadmap. This plan highlights vulnerabilities and provides precise steps to strengthen your security, saving you time and resources. Schedule a meeting with Big Water Tech so we can help you create a clear, strategic path to cyber resilience.
Put your Roadmap into action with a step-by-step approach to stronger protection. Demonstrate your commitment to safeguarding customer data while equipping your IT team with a focused, cost-effective security strategy.

Our blog shares practical guidance, expert takes, and real-world lessons drawn from the front lines of IT services & solutions. Stay informed, stay protected, and make smarter decisions for your business or organization.

For Michigan firm owners who don't have time to become IT experts but are still the ones signing the form
You're a managing partner. Or the firm owner. Or the one person whose name ends up on everything that matters.
Including the cyber insurance questionnaire.
You don't have time to become a cybersecurity expert. You're running a practice, managing clients, keeping the lights on. So when the renewal comes around, you hand it to your office manager or IT person, they check some boxes, and you sign it.
Here's the problem: those boxes now carry legal weight. Insurers aren't just asking questions anymore: they're verifying answers. And if something goes wrong, they're not asking your IT person what happened. They're asking you.
This guide is for firm owners who need to understand what they're attesting to without becoming the IT department.
It means multi-factor authentication on every system that touches client data. Not just email.
Your office manager probably checked "yes" because you have MFA on Microsoft 365. That's a start. But insurers are asking about the full picture: remote access, cloud apps, your practice management software, client portals, accounting platforms.
If any of those allow password-only access, you have a gap. And that gap becomes your problem when a claim gets filed.
The question to ask your IT person: "Can someone log into any of our systems with just a password? Show me."
Yes. And this one trips up more small firms than almost anything else.
"Everyone uses the same login" feels efficient when you're a 12-person shop. Less confusion, faster onboarding. But shared logins mean no accountability. When something goes wrong, and eventually something will, you can't prove who did what.
Insurers specifically ask: Do all users have individual accounts? Is MFA enabled on each? Can you produce audit logs showing who accessed what?
Shared logins fail all three.
The question to ask: "Do we have any shared logins? QuickBooks? The office email? Vendor portals?" If the answer involves "everyone knows the password," that's the gap.
Logs that show who accessed what, when, and from where. Especially for anything containing client data.
You don't need to understand log files. You just need to know they exist, they're turned on, and they're kept for at least 90 days.
Many firms have logging available but not enabled. Or enabled but overwritten every 30 days. That's not good enough anymore.
The question to ask: "If we had an incident tomorrow, could you show me who accessed what system last month? Can you pull that report right now?"
It means software that watches your computers for threats, not just old-school antivirus.
Here's where firm owners get burned: you upgraded to Microsoft 365 Business Premium because someone said it included security tools. It does. But out of the box, most of those tools are turned off or running on default settings that don't protect anything.
You're paying for the toolkit. Nobody configured it.
It's like buying a security system for your office and never setting the alarm code. The sticker's on the door. The sensors are in place. Nothing's actually armed.
The question to ask: "We have Business Premium: what's actually turned on? Show me the dashboard."
Your claim gets denied. And you may face additional liability for misrepresentation.
This is the part most firm owners don't realize: when you sign that questionnaire, you're attesting, legally, that those controls are in place. Not planned. Not "we're working on it." In place, right now, with evidence.
"Our IT person said it was handled" isn't a defense. Neither is "we were planning to do that."
The question to ask yourself: "For every 'yes' on this form, could I show an auditor the proof? Right now?"
Someone who knows what's in place not what's planned. And ideally, not the same person who set everything up.
The pattern I see constantly: the IT person fills out the questionnaire, and they're also the one who configured the systems. They're grading their own homework. Nobody's verifying.
You don't need to fill it out yourself. But you need to know what you're signing. And you need someone checking the work before your name goes on it.
The question to ask: "Before I sign this, can you show me documentation for the items we're saying 'yes' to?"
You don't have time to audit your own systems. But you can ask five questions before you sign the next renewal:
MFA: "Can anyone log into anything with just a password?"
Individual accounts: "Do we have any shared logins anywhere?"
Logs: "If something happened, could you show me who accessed what last month?"
Tools vs. configuration: "What security tools are actually turned on, not just licensed?"
Proof: "For every 'yes' on this form, can you show me the evidence?"
If the answers are vague, that's your gap. And it's better to find it now than during a claim.
You built your firm on trust. Your clients trust you with their most sensitive information: legal matters, medical records, financial data. Your insurer is asking whether that trust is backed by real controls.
The firms handling renewals confidently aren't the ones with the biggest IT budgets. They're the ones where the person signing the form actually knows what's been attested to and can prove it.
You don't need to become an IT expert. You just need to ask the right questions before your name goes on the dotted line.
Keep IT Simple. Prove before you claim.
Big Water Technologies helps Michigan firm owners prepare for cyber insurance renewals, so you can sign with confidence, not crossed fingers. If you want to know what you're actually attesting to before your next renewal, let's talk.
Simple IT Management & Support
BIGview offers proactive management of technology assets on a subscription basis. BIGview is a service based offering designed specifically for your organization's requirements.
Hosted Voice
Desktop & Mobile App, SIP Firewall, and Service Management with flexible VoIP service. Powerful call control on a local business number you can access from anywhere.
Disaster Recovery & Backup
An automated data backup and restore system providing powerful tools to protect your organization's data. It doesn’t require any human assistance beyond the initial installation.
Managed Cloud Environment
Protecting your data is incredibly important. Our BIGcloud Server is highly secure, extremely reliable, easy to scale, and has simple and affordable pricing.
Managed File Sharing
BIGshare Managed Cloud Sharing is a secure, HIPAA & PCI compliant solution. Our BIGshare comes standard with backup and DRaaS all with unlimited storage for one simple price.
Managed Security
BIGprotect is a comprehensive fully-managed security solution. It provides a powerful way to protect your organization’s network .
Voice & Data Protection
BIGguard is a protection plan for your voice and data communications equipment. It provides a powerful way to protect your organization’s voice and data investment.
Security Assessment & Reporting
Elevate your security posture with our assessment and reporting solutions. Gain comprehensive insights into your organization's security landscape.
Spend less time on IT problems and more time growing your business. Let’s get to know each other and determine how our partnership could grow. With us as your trusted MSP on your side, you can develop a strong barrier against cybercrime, stronger communication strategies, and a better technology plan for the future.
Call (248) 220-7714 today or fill out the form below to schedule your appointment. We’re ready to jumpstart your IT journey.