The Three Stages of IT Support

IT services companies range from one-person operations to large corporations.  Which type is best suited for you depends on the size and complexity of your operation.

Read More


Nice Try, Move Along

With the consistent use of scare tactics in informational blogs and docuseries now-a-days, it’s easy to be fearful and disheartened at all the possibilities of harm to your business; but sometimes we all need to be reminded of how good prevails.

Read More


Phishing for Answers?

The age of digital information has created a playground of possible ways for cybercriminals to attack and hold your information for their gain. Only through a combined knowledge of tools and information can a business owner or employee truly be able to protect themselves from these ever growing and adapting threats. Keeping up to date with Microsoft’s defense packages, employing a safety net of anti-virus programs, and having an up-to-date…

Read More


A Bandwidth of Thieves

The age of digital information has created a playground of possible ways for cybercriminals to attack and hold your information for their gain. Only through a combined knowledge of tools and information can a business owner or employee truly be able to protect themselves from these ever growing and adapting threats. Keeping up to date with Microsoft’s defense packages, employing a safety net of anti-virus programs, and having an up-to-date…

Read More


Datto and Autotask Have Teamed Up

The recent merger of Datto and Autotask under the same ownership generates a powerful synergy that benefits customers. I say that as someone with hands-on experience on both technologies. Autotask is a feature-rich, device-management software enabling IT staff to automatically patch, configure, and monitor hundreds of workstations and servers.

Read More


The DRAAS Industry

A hot buzzword today is "business continuity" - keeping operations going no matter what. Backup recovery is a critical component of the overall business continuity mission, and the cloud is a major player in these solutions. Most clients opt for a "hybrid" approach, storing data both locally and on the Internet, and DRAAS providers typically offer cloud syncing solutions in addition to on-site dedicated backup hardware.

Read More


Top 10 Questions You Should Be Asking About Your Current IT Support

Have you ever stopped to ask yourself what would happen if you decided to move on from your company’s existing IT support? Do you know the passwords to your servers, routers, wireless access points etc.? Do you have enough information about your infrastructure that you could hand that information to another provider and be up and running the same day? At Analytics we find it surprising how much information IT professionals keep to themselves.…

Read More


Cyber Security Threat: Meltdown & Spectre

Microsoft, and other vendors, have released emergency updates to protect against vulnerabilities discovered in the last day or two related to a serious security flaw. These updates are to combat two known threats called Meltdown and Spectre.

Read More


How to Prevent Malware

Malware (short for “malicious software”) is the catch-all term encompassing all the unwanted software that can invade your programs, files, and networks. There are many types of malware – viruses, trojans, spyware, worms, ransomware, and RATs (remote access tools) are some of the most common.

Read More


How to Choose an Outsourced IT Provider

There’s a tremendous demand for outsourced IT services and opportunities for differentiation – both in terms of service levels and vertical specialization.

Read More