IT Support Services

IT Support

Have questions regarding Information Technology or network support and you don’t know who to turn to? Call me today to schedule a free consultation and together we can design a robust business continuity solution for your business.


  • Help desk or end user support (remote and on-site IT Support Services)
  • Business Continuity and server redundancy
  • Computer repair and diagnostic services
  • Malware protection and firewall
  • Software installation
  • Smartphone support
  • Remote Support

Free consultation! For more information, check out our IT Support Services or Contact me!

Why You Must Have A Super Strong Password

Posted by on Apr 24, 2014 in IT Support Blog | Comments Off

Entrepreneur magazine recently published a great infographic focused on why your business must have strong passwords.  There are some eye-opening facts on how long it takes an experienced hacker to crack a very simple password compared to more complex passwords.  Weak passwords leave your business vulnerable to attacks and your data at risk from being stolen.

Check out the infographic below from Who Is Hosting This?

Password Security

With Windows 8.1, Your Investment In Code For Your Legacy Apps Is Ensured.

Posted by on Apr 23, 2014 in IT Support Blog | Comments Off

Windows 8Microsoft has provided us all a way to use our legacy Win32 business apps with their recent Windows 8.1 Update. Now your business can load your own apps on Windows 8.1 machines if you have a Windows Enterprise License.  According to Microsoft, they want to ensure businesses like yours can carry forward the investments you’ve made in code.

If this alone doesn’t convince you to upgrade to Windows 8.1, the following new features surely will:

  • With Microsoft’s new Brokered Windows Runtime, corporate developers and software vendors can use most of their old Win32 code, making writing business apps for Windows 8.1 much less expensive.
  • With 8.1’s new Enterprise Mode, Internet Explorer 11 can render legacy Web apps that were written for IE8.
  • Windows 7 mouse and keyboard features have been incorporated into the Windows 8.1 Update, including the ability to add icons for Modern Windows apps to the taskbar at the bottom of the desktop.
  • From the Start Screen you can customize your desktop, right click on a tile to increase or reduce its size, press shift click to group tiles, and place them together on the Start screen.
  • Plus, a power button ensures no one can turn off your machine without first opening the charms bar, selecting settings, then power, and choosing off. 

To learn more about how Windows 8.1 can benefit your business, contact us by phone or email.

Lacking an Online Presence? Follow These 5 Valuable LinkedIn to Get Your Business Noticed!

Posted by on Apr 21, 2014 in IT Support Blog | Comments Off

LinkedIn Online PresenceWhile most social media sites are designed to allow you to network with friends and family, LinkedIn is a networking site designed to allow you to connect with others in your industry, as well as find and share relevant content. And consider this: 260 million individuals are using LinkedIn, which means it’s highly likely someone will search for your profile to learn more about your business.

LinkedIn is a fantastic way to improve your organizational reputation and showcase your brand, however, it’s important to make sure you’re using LinkedIn properly to achieve the benefits of using a networking site. Of course, it can be difficult to use LinkedIn properly if you’re new to the site. Here’s a few tips to help you make the most out of your LinkedIn profile.

  1. Search for Influencers: Do some research to find the leaders and experts in your industry. Once you’ve found the leaders and experts, engage with these influencers to increase visibility for your brand.
  2. Participate in Groups: Create and join groups relevant to your business. Once you’ve done this, start sharing original content and ask others to engage with your content.
  3. Keep Track of Competitors: Every business will have a few competitors in the market. Keep track of your competitors on LinkedIn! Stay up to date on the news they’re posting and the products they’re releasing.
  4. Look for Prospects: Connect with your prospects on LinkedIn. Look into their sales department and find decision makers to help you reach out to the right person and close a deal.
  5. Don’t be a Salesman: Don’t focus on selling your products and services all the time, instead, spend a lot of time sharing best practices and offering valuable information to help those connected to you.

Keep in mind, creating a reputable brand takes time. Don’t get discouraged if you’re not getting optimal results immediately. If you follow these tips and stay consistent, you will improve your organizational reputation and achieve the benefits of using a networking site.

For more tips on using LinkedIn to improve your organizational reputation, give us a call or send us an email. As your trusted IT service organization, we can help you take advantage of all LinkedIn has to offer for your business.

Attention All CIOs: Are You Alleviating These Top 3 Social Media Concerns?

Posted by on Apr 18, 2014 in IT Support Blog | Comments Off

Social Media CIOYour role as a CIO is constantly evolving. As the business world becomes more tech-savvy, your primary focus should be on enabling your business to grow through new technology and improved processes. But how can you ensure organization growth occurs? The most important aspect of organization growth involves aligning IT with business goals.

While most businesses are turning towards social media efforts to create new business opportunities, it’s imperative for you to address security threats and business concerns, in order to achieve the growth and opportunities available through social media.

So what are the top concerns regarding social media? And how can you help to alleviate these concerns? According to a survey conducted by IDG Research, here are the top 3 concerns:

  1. Security

When it comes to social media adoption, business executives are highly concerned about data security and access control. Recent studies show that companies have an average of 178 social media accounts. And that’s a fairly large amount of social media accounts when you consider how many individuals are accessing these accounts. Also, these individuals may or may not be communicating with existing and potential customers on behalf of your organization.

  1. Compliance

The risks associated with noncompliance are severe, from penalty fees to bad press to reputational damage; all business executives fear compliance issues resulting from improper social media usage. When a breach occurs, it’s almost impossible to recover. And while your business may meet current regulatory compliance requirements, regulators are always releasing new regulations.

  1. Reputation

Businesses are starting to utilize social media more than ever before. Most employees have personal experience with social media, however, personal experience doesn’t translate into business experience. When employees post inappropriate content, the consequences include brand reputation and loss of customer confidence.

As a CIO, it’s important to ensure security, compliance, and appropriate social media skills within your organization. A social media policy can help you alleviate concerns while achieving the growth and opportunities available through social media.

To learn more about alleviating these concerns, give us a call or send us an email. We can help you develop and enforce a strict social media policy to protect your organization.

Build a Reliable Reputation in Your Law Firm by Outsourcing Your IT Services.

Posted by on Apr 16, 2014 in IT Support Blog | Comments Off

Law Firm IT ServicesIf you run your own law firm, you understand that it isn’t easy dividing your energy into two sectors which include; focusing on keeping your law firm productive, and trying to fix issues that arise with your IT services. You might not always understand the software required to run billing and accounting needs, or how to properly fix an issue occurring through your network. Just like your law firm needs 100% of your attention in order to succeed, so does your IT; that’s where outsourcing your IT services comes in.

By outsourcing your IT, you are getting an all-in-one package deal; IT professionals will work for you around the clock and keep your law firm IT services up and running smoothly. In areas you may not be experienced in, they will be; they bring many things to the table including IT experience, resources, and professionalism. Many outsource IT companies focus on keeping your company productive, preventing issues from occurring when possible, and avoiding the old break-fix method. This is important to your law firm, you have lots of clients who depend on you and your attention needs to be focused on providing them with the best possible service while still maintaining a properly functioning IT for when you need it.

Benefits of Outsourcing Your IT:

  • Cost Savings: Many IT companies set you up with fixed-monthly plans for overall care of your IT services. This prevents surprise costs of hiring someone to come and fix your IT whenever it breaks down; also saving you money by avoiding downtime and fixing issues before they even occur.
  • Experience: Professional IT providers are experienced, and will know how to properly handle your IT in ways you may know nothing about. They understand how to prevent IT issues from occurring, and will handle your IT following the legal guidelines required. IT service providers have multiple resources on hand and can provide your IT with exceptional care, ensuring it excels for your business.
  • Focus on your business: Outsourcing your IT services allows you to focus on what’s important, including; attending to your client’s needs, ensuring employee productivity, maintaining an organized workplace, and giving you time to do proper research or deliver important legal papers.

Time is essential when it comes to law firms; you want your time to be divided properly by focusing on what’s important. Outsourcing your IT services allows you to excel in all other areas of your law firm, bringing in more profit and increasing your professional reputation.

Call us or email us to start outsourcing your IT services today. As your trusted legal IT experts, we will help get you set up so you can get back to building a reliable and professional reputation in your law firm. 

Are you still denying your Business Increased Productivity by not Outsourcing your IT support?

Posted by on Apr 14, 2014 in IT Support Blog | Comments Off

Outsourcing your IT supportIf you are still relying on an employee within the business to fix issues you are having with your IT, you’re denying your business the chance to perform at its 100%. By outsourcing your IT to the professionals, you are adding so much more value to your business and here are some reasons why:

1.     You’re leaving it to the professionals

By relying on an employee who is not qualified when it comes to IT, you’re not assuring the problem is fixed, or if it’s even done right. This can bring on some serious complications in some cases; turning small issues into bigger issues, and allowing them to re-occur. Outsourcing your IT is leaving it to the professionals who know what they are doing, and can keep your business up and running smoothly. Most IT professionals concentrate more towards on keeping your IT running and preventing issues before they occur, then just the standard break-fix method. You can lower your downtime and keep it that way ensuring your business stays productive.

2.     Saves You Money

Aside from the obvious of saving money by reducing downtime, you can also be saving money by outsourcing rather than having a professional sit around in your business waiting for an issue to come along. Outsource IT businesses are equipped to keep your business up and running with 24/7 support; fixing problems when you aren’t even aware, or even sleeping for example. Rather than spending endless amounts of money for someone to just fix problems when they happen, causing you to lose even more money for downtime, or paying for their benefits and vacation/sick days, leave it to an outsource IT company to provide you with around the clock guaranteed support for a fixed monthly price.

3.     Around the Clock IT Support

By outsourcing your IT, you are paying for around the clock professional IT support. Experts are always working for you making sure your business is functioning properly and preventing issues from causing you downtime. They work both remotely and onsite; most of your IT issues can be fixed through your network, but if it is more complicated or physical, they will send a professional to your place of business to fix it as soon as they can.

Outsourcing your IT to professionals lets you focus on what’s important and running your business as bet as you can. You aren’t expected to run a business and be a professional when it comes to your IT, that’s why it’s important you hire an expert and make sure your IT is getting the care it deserves.

Social Media Do’s & Don’ts For 2014

Posted by on Apr 11, 2014 in IT Support Blog | Comments Off

Check out this great infographic from Magiclogix. Click on the graphic below to expand.


Think Your Favorite Websites Are Safe? Think Again! Heartbleed Puts Your Data at Risk for Theft

Posted by on Apr 11, 2014 in IT Support Blog | Comments Off

heartbleedHave you heard about Heartbleed?

Google and security firm Codenomicon recently released details about the dangerous security flaw, also known as Heartbleed, in OpenSSL Web servers. OpenSSL is used to secure communications between servers and clients on the Internet. Heartbleed enables hackers to access websites and steal sensitive data from affected versions of OpenSSL.

If you’ve already heard about Heartbleed, you’ve probably applied the patch and changed your passwords for all of your online accounts. If not, it’s imperative to contact your local IT Company to apply the patch on all computers in your office. Also, change your passwords immediately! Your sensitive information, including passwords and credit-card numbers, is at risk for theft.

Check Your Favorite Websites for Heartbleed Vulnerability!

Heartbleed impacts a variety of common websites. If you haven’t checked for vulnerability, your sensitive information could be at risk. Here’s a few tools to check your favorite websites:

You can also check CNet’s list of websites that have been patched to prevent the security flaw from stealing information. If you’re visiting websites on this list, contact the company to ask if they’ve patched their software and installed new SSL certificates. Once you’ve verified this, change your passwords to protect your sensitive information.

Delete Your Web Browsers’ History, Cache, and Cookies to Remove Saved Passwords!

Once you’ve verified your favorite websites and changed your passwords, delete your web browsers’ history, cache, and cookies to remove saved passwords. While this is time-consuming, it’s critical to protect your sensitive information. Also, review your bank and credit-card statements for suspicious activity. Heartbleed enables hackers to access websites and steal financial information. If you do notice suspicious activity, call your bank to report the activity.

To learn more about Heartbleed, give us a call or send us an email. As your trusted IT security team, we can help you stay up to date on the latest threats to your information security.


Urgent Notice: The Latest Security Flaw May Be Stealing Your Confidential Data!

Posted by on Apr 10, 2014 in IT Support Blog | Comments Off

SSL SecurityOn April 8th, 2014, Google and security firm Codenomicon released details about a security flaw in OpenSSL Web servers. The security flaw, also known as “heartbleed”, enables hackers to access websites and steal massive amounts of data from vulnerable versions of OpenSSL.

Warning: Heartbleed Impacts Websites Potentially Used by Your Employees

As a business owner, it’s critical to take action immediately to prevent data loss and/or theft. Heartbleed impacts a variety of common websites potentially used by your employees, including the following:

  • Comixology
  • Imgur
  • OculusVR
  • Yahoo
  • Flickr

And that’s just the beginning! An estimated two-thirds of Web servers use OpenSSL, which means Heartbleed could impact social networking websites, company websites, commerce websites, and even government websites. While these websites are commonly used, employees must be extremely cautious. Heartbleed allows cybercriminals to access and steal passwords, healthcare data, and banking information.

Now you’re probably wondering, “what can be done to protect confidential information while using affected websites?” We’ve downloaded Fixed OpenSSL to prevent data loss and/or theft resulting from Heartbleed.

Please Contact Us To Help Secure Your Confidential Information

The fix must be installed on your operating systems, networked appliances, and software to secure your confidential information. Please contact us so we can install the fix for all users in your office.

To learn more, give us a call or send us an email. We can help you stay protected against the latest security threats.

Beware of the “Ring and Run” Telephone Scam! Keep Your Eyes Open for These Area Codes

Posted by on Apr 10, 2014 in IT Support Blog | Comments Off

Telephone ScamCybercriminals are taking advantage of your curiosity with the latest telephone scam! If your telephone rings and the call appears to be from area code 473, don’t answer the call. This scam, designed to charge you outrageous rates for answering the phone, has been around for years. And it’s striking again so beware.

Many victims believe the area code 473 is domestic, however, it’s not. The area code 473 is actually signifying an international call, which will be extremely expensive to answer or call back. In fact, cybercriminals ensure the number appears as a premium service number, so you will be charged $20+ for the first minute after answering the phone. So what kind of tactics are used to make sure you answer the phone?

  • The caller will ring once and disconnect to intrigue you.
  • The caller will wait for you to answer then make sounds of distress and hang-up.

Both of these tactics are used to lure you into their scam. This scam primarily targets victims throughout the United States. The cybercriminals responsible for this scam tend to avoid using Canadian numbers. If your phone rings from the area code 473, don’t fall victim to your curiosity. As they say, curiosity killed the cat, but in this case, curiosity leads to a shocking phone bill!

The Evolution of the “Ring and Run” Scam

Prior to the wide-spread popularity of the Internet and cellphones, 900 numbers and pagers were incredibly popular. The “ring and run” scam used these numbers to call victims, however, people discovered the scam and avoided answering or returning calls from 900 numbers. The extensive amount of new area codes has led to an increase in “ring and run” scams. It’s difficult to recognize the difference between a domestic number and an international number.

You can stay safe by avoiding phone calls from the following international area codes:

  • 809
  • 473
  • 284
  • 649
  • 876

For a more extensive list of international area codes used in this scam, visit

To learn more about the “ring and run” telephone scam, give us a call or send us an email. We can help you stay up to date on the latest scams targeting your area.