We Are Your Technology Partner

Founded in 1983, we provide information technology based solutions for small-to-medium sized businesses and a diverse professional clientele. Whether general consulting, planning & design, training, complete system implementation, or technical support — we have a simple, focused goal: make a difference. From notebooks to networks; from accounting to office productivity to medical practice management; we address all of the information processing needs of our clients.

Which Internet Security Product is Best For You?

There are many products on the marketplace; from fee to free. Is it necessary to pay for malware protection when you can download a free product? Do you need more than one product to thoroughly protect your business from malware? If you need more than one of these products, do they all "play nice" with each other?

We can answer these questions and many more about the importance of protecting your business information from prying eyes as well as employee carelessness. Just ask!

Follow Hyperlinks With Care

One of the easiest ways to get infected is through a little mouse-click. Be prudent as you consider clicking a link on a webpage or in an email. Does it direct you off of the original domain you accessed or the one with which you are familiar?

Anti-malware software can help protect us, but we are still driving and we are in control of our destiny. Ask yourself: "Do I need to follow this link? Is there any risk? Is this PC mission-critical?"

So ... How do I close that Rogue Antivirus pop-up?

Sometimes referred to as "scareware", this program often appears in a fake window reporting to you that you already have hundreds (or thousands) of viruses on your PC. The unsuspecting user is then encouraged to purchase an antivirus product designed specifically to address the problems.

At this point, we have at least two facts: anything you click on this rogue window will be a mistake, and the attempted purchase of such is actually the worst decision that could be made because then the perpetrator will have all of your credit card data on the card you use for this transaction.

Subscribe to Front page feed