Are you looking for IT services in the metro Atlanta area or ongoing Managed IT Services for your business?
Let's see how we can help!
24/7/365 Coverage & Support for your staff with quick access to a live support engineer.
Our managed IT services are designed to lower your IT costs, increase productivity of your staff and reduce downtime for your businesses. We seek true partnership with our clients and try to fully understand their business goals.
Have a problem with your workstations, servers or network equipment such as a firewall, WiFi Access Points or switches?
We will have an engineer on-site same day to resolve the technology problems your business is experiencing.
Want to ditch your server and migrate everything to the cloud?
We can help migrating any of your desktop applications to the cloud such as Sage, Desktop QB and just about anything else that currently runs on your server right now.
We can also help setup a hybrid environment where we utilize both cloud and on-premise servers to ensure seamless integration, increased efficiency and cost savings.
Protect your business from cyber attacks and ensure you meet your industry's level of compliance. We use industry leading technology in cybersecurity to protect your business, email and your data from threat actors.
Work from anywhere on any device. Securely connect to the applications, people and your work desktop with our centralized on-premise and cloud solutions.
Let's See How We Can Help With Your Technology Needs.
SPEAK WITH AN IT CONSULTANT. NOT A SALES GUY!
EXPLAIN YOUR BUSINESS TECHNOLOGY NEEDS
RECEIVE AN ESTIMATE WITH PRICING AND OUR SOLUTION BROKEN OUT IN DETAILS
NO PUSHY SALES GUYS OR FOLLOW UP SPAM MAIL
Let Us Answer Some Of Your Questions!
How Can We Save You Money?
Utilizing our reseller channels we are able to pass on the discounts to our clients for things such as Office 365, telecom VOIP and Internet Service Providers (ISP) to lower your overall overhead. With these savings our services will practically pay for themselves
What's included in Managed IT?
Outside of monitoring of all business crucial systems, you get phone and email tech support, ongoing IT consultation and a technology partner you can rely on for years to come. Not just some "IT guy"
Need On-Site Support ASAP?
No problem! We can normally get one of our engineers to your location on the same day. We service Atlanta, Alpharetta, Marietta, Sandy Springs, Woodstock, Dunwoody, Cumming and all the surrounding areas
Need Help Moving Into Your New Office?
We can assist from the start by setting up ISP at the new office, configuring VOIP phones, ensuring the proper handling of office equipment and setup along with low voltage wiring and data closet cleanup
We got hacked! Can ACIS help?
Recovering from a natural disaster is similar to recovering from a cyberattack. We can to restore data, systems functionality and patch any vulnerabilities in your network and on your systems
Free eBook Download: The Belt Line Bandits - Email Hijacking in the Heart of GA
Explore the story of David, a business owner in Alpharetta whose email compromise led to a $24,000 loss. This book offers a detailed account of his experience and provides practical steps that will improve your security. Learn from David’s misfortune to better protect your own business from similar vulnerabilities. A must-read for any business owner looking to understand and prevent cyber threats.
349
Happy Clients
9999
Cups of Coffee
75
Five Star Reviews
987
Projects
Latest News
Industry news, threats and highlights in the tech world.
New Malware “annoys” you into handing over your credentials
November 5, 2024
New Malware "annoys" you into handing over your credentials You and your team might already be familiar with basic online security—watching out for phishing scams, avoiding suspicious downloads, and never clicking on strange links. But here’s the twist: as fast as we catch on to these threats, cybercriminals evolve even faster. Their latest tactic is sneaky, stealthy, and designed to manipulate you into giving up your Google login details without a second thought. Let’s talk about…
The Hidden Backup Disaster No One’s Talking About!
October 21, 2024
The Hidden Backup Disaster No One’s Talking About! Losing access to your business’s data – even temporarily – can feel like a nightmare straight out of a horror movie. In today's fast-paced business world, downtime and data loss can cripple operations, damage customer trust, and cause significant financial losses. Fortunately, data backup tools exist to create copies of your critical information and store them securely. Should anything go wrong, these backups can be used to restore your files…
Protect Your Atlanta Construction Business from Cyber Attack
September 18, 2024
Attention Atlanta Construction Business Owners: Hackers Are Targeting Your Accounting Systems—Here’s How to Protect Your Business Cybercriminals are increasingly targeting the Foundation accounting software used by many construction companies, including those in Atlanta, to infiltrate business networks through weak passwords and exposed servers. If your business relies on Foundation for managing accounting, payroll, or job costing, it’s critical to act now to protect your data. What’s…
One Simple Step That Could Prevent a Devastating Data Breach
September 10, 2024
One Simple Step That Could Prevent a Devastating Data Breach Microsoft has recently announced a significant change in their security protocols—soon, all Azure sign-ins will require multi-factor authentication (MFA) to enhance user protection. While this update specifically affects users of Microsoft Azure, their cloud computing platform, it's a signal that all businesses, whether they use Azure or not, should take note. Why? Because MFA is one of the most straightforward and highly effective…
Edge’s AI Copilot: Write Better, Faster
August 26, 2024
Edge’s AI Copilot: Write Better, Faster Microsoft is introducing an innovative feature in its Edge browser that’s bound to revolutionize the way you and your employees handle day-to-day tasks. Enter ‘Draft with Copilot,’ a cutting-edge AI-powered tool that can generate text on any topic with just a few clicks, saving you time and streamlining your workflow. Imagine you’re working on a complex report and need to draft a summary. Instead of wrestling with writer’s block, you can use ‘Draft with…
Last Call: Upgrade Windows 11 by October 8th!
August 16, 2024
Last Call: Upgrade Windows 11 by October 8th! If you’re currently using Windows 11, it's crucial to be aware of an upcoming deadline set by Microsoft. The tech giant has announced that all users must upgrade to Windows 11 version 23H2 by October 8th, 2024. After this date, older versions of Windows 11 will no longer receive essential security updates, putting your systems—and potentially your entire business—at significant risk. Why Is This Update So Important? This deadline isn't just…
Beware: Malware Lurking in Chrome Extensions!
July 19, 2024
Beware: Malware Lurking in Chrome Extensions! Google Chrome is a popular choice for businesses due to its extensive range of extensions that enhance productivity and browsing experience. From blocking ads to managing tasks, Chrome extensions are essential tools. However, their widespread use also presents significant risks. The Hidden Dangers of Extensions Chrome extensions can be incredibly beneficial, but they also pose potential threats. Just like downloading apps on your phone, adding…
How To Guide: Get Employees to Report Cyber Issues
June 25, 2024
How To Guide: Get Employees to Report Cyber Issues Getting your team to report security issues quickly is something that’s important for your business… but maybe something that might not have crossed your mind before. You might think that with so many security tech tools, you're covered. But guess what? Your employees are your first line of defense, and they’re irreplaceable when it comes to spotting and reporting security threats. Imagine this: One of your employees receives a…
CDK Global Hack: How to migrate to another DMS
June 22, 2024
Navigating DMS Migration: A Smooth Transition from CDK Global In the wake of the recent cybersecurity breach at CDK Global, many dealerships are reassessing their reliance on this Dealer Management System (DMS). The incident has underscored the importance of robust data security and operational reliability. Transitioning to a new DMS can safeguard your dealership from future disruptions. At AlphaCIS, we specialize in guiding dealerships through seamless DMS migrations. Here’s an in-depth guide…
Team Copilot: Your New AI Partner for Better Teamwork
June 14, 2024
Team Copilot: Your New AI Partner for Better Teamwork Ever wish your team had a smart assistant to keep everything on track? Meet Team Copilot, the newest AI-powered tool from Microsoft that’s about to change the way your team works together. Scheduled for release later this year, it’s part of Microsoft’s growing suite of AI tools designed to boost productivity, but this time with a focus on teamwork. What Is Team Copilot? Think of Team Copilot as your team’s digital collaborator. If you’re…
Secure Your Small Business with Biometrics and Passkeys
June 5, 2024
Secure Your Small Business with Biometrics and Passkeys In today's digital age, safeguarding our data, whether it's business secrets or personal information, is paramount. Traditionally, passwords have been the primary method of securing sensitive information. Are Passwords Still Effective? Recent reports reveal that despite the increasing awareness of data privacy and security, many people continue to rely on passwords, with only a small percentage adopting biometrics like…
Atlanta Accountants: Secure Client Data with FTC Rules!
May 23, 2024
Understanding the FTC Safeguards Rule and Its Impact on Accounting Firms in Metro Atlanta In the bustling business environment of Metro Atlanta, accounting firms face unique challenges in protecting customer data. To help address these challenges, the Federal Trade Commission (FTC) introduced the Safeguards Rule in 2003. This rule provides a robust framework for financial institutions, including accounting firms, to secure customer information. Here’s what accounting firms in Metro Atlanta need…
Why Atlanta Businesses Choose Microsoft 365 Over G-Workspace
May 19, 2024
Why Atlanta Businesses Choose Microsoft 365 Over G-Workspace No matter what your business does, a portion of your workforce needs a productivity and collaboration suite to get work done. This essential set of tools, once known as an office suite (with Microsoft Office dominating the market), has significantly evolved over the past decade. Cloud services have steadily taken over, and businesses have increasingly demanded more collaborative capabilities. Google Suite emerged and eventually…
Tired of Password Overload? Discover the Ultimate Hack!
May 13, 2024
Tired of Password Overload? Discover the Ultimate Hack! Feeling like you’re in a never-ending circus act trying to manage all your passwords? You’re definitely not alone. Recent reports show that about 1 in 4 of us are in the same boat, struggling with the sheer number of passwords we need to keep track of. But it’s not just the quantity that’s a problem—it’s also the security risks that come along with it. Let’s be real, most of us aren’t cyber security wizards. We often end up with weak,…
Why Atlanta Businesses Need More Than Annual Cybersecurity Training
May 7, 2024
Why Atlanta Businesses Need More Than Annual Cybersecurity Training Hey Atlanta! With our city fast becoming a bustling tech hub, it's more important than ever to ensure our local businesses are up to speed on cyber threats. As cyber attacks continue to rise nationally, Atlanta companies need to be proactive in safeguarding their data. But here’s the catch: the standard once-a-year cybersecurity training isn’t quite cutting it. Traditionally, these annual trainings have been marked on the…
Newest Copilot: A Game-Changer for MSFT Teams Productivity
April 25, 2024
If you're interested in streamlining your team's productivity, Microsoft Teams' latest updates to Copilot might catch your attention. During a bustling Teams meeting, capturing every idea can be a challenge, even for the quickest note-taker. Copilot addresses this by transcribing conversations and analyzing live chats to highlight key points, ensuring nothing important slips through the cracks. The new features extend beyond just note-taking. Copilot now allows users to retract a sent chat…
Atlanta Businesses: The Risk of Malware is on the Rise!
April 19, 2024
Attention Metro Atlanta Businesses: The Risk of Malware is on the Rise! Let's dive into an urgent and crucial topic for today's business landscape: Malware threats. It's not the best news, but it's essential to be informed. Malware attacks are increasingly targeting small and medium-sized businesses (SMBs) in our area, and the consequences can be severe. This means it's more important than ever to understand how to protect your enterprise. So, what is malware? Imagine malware as the digital…
Supercharge Productivity with These Microsoft Edge Hacks
April 14, 2024
Supercharge Your Productivity with These Microsoft Edge Hacks As a busy business owner or manager, you're always on the lookout for ways to streamline your workflow and get more done. While your web browser may seem like just a tool for accessing the internet, Microsoft Edge on Windows 11 is packed with features that can truly supercharge your productivity. Let me share five of my favorite Microsoft Edge tricks that will have you working smarter, not harder. Split Screen for…
These 4 methods will save thousands in case of a data breach
April 16, 2023
These 4 methods will save thousands in case of a data breach! No business wants to experience a data breach - it's like a digital nightmare come to life. Unfortunately, with today's cyber landscape, it's increasingly difficult to avoid them altogether. In fact, according to IBM Security's 2022 Cost of a Data Breach Report, a staggering 83% of organizations have suffered more than one data breach. Data breaches can hurt a business in many ways - from the immediate cost of remediation to lost…
Change this right away in your org: LastPass breach lessons
March 3, 2023
Change this right away in your org: LastPass breach lessons LastPass had a major breach where thousands of accounts had their information exposed Spear phishing was involved Engineer who had encryption keys had his computer compromised Using a keylogger hackers gained access to LastPass AWS servers Below are steps that you can take to prevent this from happening in your business Let's take a lesson from LastPass. If you have not heard yet, there was a major breach last year where encrypted…
These easy steps will secure your mobile devices
February 24, 2023
These easy steps will secure your mobile devices Cybersecurity experts revealed a shocking statistic recently. Malware attacks had amplified by an astonishing 500% during the opening months of 2022. This is particularly concerning considering many people still haven't taken any steps to safeguard their smartphones. For years now, the power of mobile phones has grown exponentially, to the point where they can do many of the same things as a computer. Despite this fact, people have been known to…
Protecting Your Business: Simple Guide to Endpoint Security
January 27, 2023
Summary Companies of all sizes have a variety of endpoints, such as computers, mobile devices and servers. Endpoint security is necessary to protect against malicious attacks from hackers. 64% of organizations have experienced one or more compromising endpoint attacks. Solutions for addressing password vulnerabilities include training employees, MFA and biometrics Stop malware infection before OS boot Regularly update endpoint security software and firmware Use modern device…
Easy cybersecurity guide: increase security, lower overhead
January 20, 2023
Answering these cybersecurity questions correctly will lower your insurance rate and make your business more secure Do you have a formal Cybersec policy for all employees and is it enforced? Is multifactor authentication enforced companywide? Do you have a formal Disaster Recovery Plan? Who has elevated permission or Administrator access to the system? How are passwords safeguarded? Are you running a company-wide advanced threat detection and protection, and can you prove…
Easy way you can prep your business technology (IT) for 2023
January 4, 2023
Easy way you can prep your business technology (IT) for 2023
This process will protect your business from ex-employees
December 9, 2022
This process will protect your business from ex-employees Every employee in the modern workplace creates a digital footprint. This starts as soon as they're hired, with a company email address and application logins. They may even update their LinkedIn page to show their connection to your company. When an employee leaves a company, it's important to go through a process of, "decoupling" them from the company's technology assets. This digital offboarding is vital to cybersecurity. To avoid…
Easy tricks anyone can use to memorize complex passwords
November 22, 2022
Easy tricks anyone can use to memorize complex passwords Why you shouldn't follow the minimum password strength requirements! A password is normally one, (and sometimes the only wall), preventing an attacker from gaining access to your systems or data. Most of what are considered strong passwords require: 8 characters One Capital One Lower Case Number Symbol Here is an interesting fact, a password of this complexity can be cracked in 48 minutes, using a couple of the latest graphic cards.…
5 Mistakes Companies are Making in the Digital Workplace
October 20, 2022
5 Mistakes Companies are Making in the Digital Workplace Employees are increasingly working remotely, and as a result, companies are struggling to keep up with the changing landscape of the digital workplace. From unauthorized app use to remote work-related stress, we will discuss 5 mistakes companies are making in the digital workplace. The pandemic has forced companies worldwide to change the way they operate. No longer can everyone work in the office like before; many organizations had to…
6 easy IT policies all companies should implement right away
September 21, 2022
6 easy IT policies all companies should implement right away! Many small businesses make the mistake of skipping over policies. They believe that formalities are not necessary. They will simply inform staff what is expected when it comes up, believing this to be sufficient. However, this attitude might lead to problems for small and mid-sized business owners. Employees are not mind readers; they may misinterpret your intentions. If you don't have any rules in place, you risk being in a bad…
6 Technologies You Shouldn’t Use Anymore. Checkout #5!!
September 19, 2022
6 Technologies You Shouldn't Use Anymore. The pace at which technology develops is unquestionably rapid. Tools that were once must-haves, such as Internet Explorer and Adobe Flash, become antiquated. New tools take the place of old ones. Vulnerabilities in outdated technology can leave computers and networks open to breaches and malware infections. While older technology may still operate properly on your systems, this does not imply it is safe to use. Software and hardware that are no longer…
Employee Left- How to secure Wi-Fi from previous employee
August 15, 2022
Employee Left- How to secure Wi-Fi from previous employee Did you know that if someone has the password, they have complete access to your network? In general, I see that these passwords seldom change. Employees come and go, but the Wi-Fi password at most businesses is solid and unchanging for many years. Generally speaking, the way 99% of the networks are setup are as follows: You have your LAN - (physical network of firewall and switches) Internal Wi-Fi - A network that extends the physical…
This free Microsoft tool massively increased my productivity
July 20, 2022
This free Microsoft tool massively increased my productivity If you are like me, you probably ditched your 2 monitor setup for an ultra wide, or perhaps 2 ultrawide. If you did jump on this trend then you quickly realized that you have a lot more real-estate to manage and organize when working with multiple windows on our computer. With ultrawide screen monitor, you probably already know that lining up 3 windows next to each other can be a task that takes time from your productivity.
How to get your Managed IT Services for free
June 16, 2022
How to get your Managed IT Services for free There's no doubt that running a business is expensive. From the cost of goods and services, to the price of office space and employee salaries, there are a lot of expenses associated with keeping a company up and running. Bills, such as cable, internet, and telephones can sometimes add hundreds, if not thousands of dollars, depending on the location to your bottom line. One of our client’s has been using a traditional bonded T1 service through…
Who needs managed IT services(MSP)? Not this guy…
June 2, 2022
Who needs managed services? Not this guy... "Why do I need to pay for an MSP? It's not like my computer breaks often..." Typically, what I hear from clients, is that they that look at an MSP as just another utility bill, like your phone or internet. It's really much more than just another overhead expense. A good MSP relieves you, your management, and your staff, from the technical aspect of your business. It allows everyone to focus on their jobs, knowing that supporting technology will work…
How to quickly setup your office network the correct way
May 11, 2022
How to quickly setup your office network the correct way .player101781 .plyr__controls, .player101781 .StampAudioPlayerSkin{ border-radius: px; overflow: hidden; } .player101781{ margin: 0 auto; } .player101781 .plyr__controls .plyr__controls { border-radius: none; overflow: visible; } .skin_default .player101781 .plyr__controls { overflow: visible; } Your browser does not support the audio element.…
How to quickly secure your network from rogue IoT devices
May 6, 2022
The easy way to secure you IoT devices and systems .player101783 .plyr__controls, .player101783 .StampAudioPlayerSkin{ border-radius: px; overflow: hidden; } .player101783{ margin: 0 auto; } .player101783 .plyr__controls .plyr__controls { border-radius: none; overflow: visible; } .skin_default .player101783 .plyr__controls { overflow: visible; } Your browser does not support the audio element.…
Separate duties for employees or end up like this…
April 21, 2022
Separate duties for employees or end up like this... With war in Ukraine raging on, the cyber warfare between the Russians and the West continues to see an increase in Russian cybercrime. We deal with a lot of clients that employ external developers for specific projects. What we frequently discover is that these external developers and internal operations have little separations of responsibility. For example: Here is an illustration of something we just experienced with a customer. They are…
10 Ways you can fight against Russia’s cyberattacks
April 12, 2022
10 Ways you can fight against Russia's cyberattacks I had the pleasure of attending the Tech Execs Summit in Forsyth. They brought several speakers that had a lot of insight into how and why Russia's cyberwar is impacting local businesses. We are no longer threatened by the one man show that just got lucky and was able to hack into your system and get $500 in ransom out of you. These hacking organizations are ran as a business in Russia, as in they have office space, they have employees, they…
5 things: When selecting best IT Services Co. in Alpharetta
March 28, 2022
5 things: When selecting best IT Services Co. in Alpharetta This post will discuss the factors to consider while selecting an MSP for your business. Choosing an MSP is a big step in deciding to outsource or enhance your IT needs, and there are many things to think about when it comes to how it fits with your company's goals. Let's assume you're a firm of 20 employees in Alpharetta, Georgia. You previously utilized an "IT Person," to take care of day to day fixes here and there, but as your…
Data breach the new extortion method: backups are not enough
March 12, 2022
Data breach the new extortion method: backups are not enough
Top 3 cybersecurity trends to prepare for in 2022
February 21, 2022
With the COVID pandemic mostly behind us, we are faced with the reality that the workplace has forever been changed. Security is on the top minds of most business owners and CIO’s out there. Here are the new trends that we will see more of in the coming year. Location Independent Security is no longer relying on a centralized firewall Let’s rewind back to 2019, every employee comes into the office, they login to their desktop computer that was assigned to them, they work until 5pm, then, they…
What makes a good network map, and why you should care
February 17, 2022
What makes a good network map, and why you should care Do you have a network map? Chances are that if you work in networking, you do. Or did you know what a network map was before reading this article? The term is used very often and hardly anyone knows what it means. This article is intended to give an explanation of what a network map is, and why you should have one. First of all, what is a network map? A network map is a visual representation of your current and planned topology – the layout…
What John did to lose his data storing it in the wrong place
February 13, 2022
What John did to lose his data storing it in the wrong place I’ve worked with many clients in different industries; however, what I noticed is always common in majority of the businesses that we take on as clients is the lack of uniformity and processes. This includes how data is stored, handled, and transmitted. The lack of standardization creates a huge problem when it comes to keeping up with backups, ensuring there is even a backup, and also causes problems when training new employees on…
Before & after the cybersecurity training
February 7, 2022
Before & after the cybersecurity training Let's pose a scenario: Your top client receives an email from you that sounds awfully suspicious, it may go like, "Hey, I sent you the document you requested. Click this link to download the PDF." If your clients are smart, they would quickly reply to you if they think something is strange about the email. They would want to confirm if you actually sent the email. Imagine what would happen if your mailbox was either spoofed or compromised. Attackers…
3 steps to safeguard your Network Attached Storage (NAS)
February 2, 2022
Network Attached Storage (NAS) devices can be great resources on your network when it comes to centralized storage accessible to all devices on the network. The issue is that this centralized entity may be accessed from outside the network. This past week, QNAP NAS devices have been targeted by a .deadbolt ransomware. Owners will wake up to find their data has been locked with a .deadbolt extension and ransom demands of $1,100 in bitcoin are being made so that they may unlock their data.
Security settings to change right away on your Macs
January 28, 2022
Security settings to change right away on your Macs Apple users are still just at risk of phishing attacks as any other user on any device. Although Macs come with XProtest and Gatekeeper designed to keep users safe, socially engineered attacks still don't prevent end users from handing over their credentials. If you are using your Mac for work, here are some of the things I recommend users to do on their Mac computers right away. Best practice Mac security settings to implement right away…
Quick Disaster Recovery plan to implement now for 2022
January 24, 2022
Quick Disaster Recovery plan to implement now for 2022 You have heard the words Business Continuity and Disaster Recovery being thrown around; however, I know a fiery earthquake or the great flood might not be the top of your concern. Sadly, a disaster in today's world comes in the form of cybercrime. According to TMC.net, 50% of companies that experience a cyber attack go out of business within 6 months of the attack. This is not surprising when you consider the number of preventable data…
How hackers are getting around Microsoft Defender
January 18, 2022
How hackers are getting around Microsoft Defender Microsoft presents Windows Defender as a one-solution fits all, however as we learned that is certainly not the case in the cybersecurity world. Cybersecurity should be tailored towards a particular business, there is rarely one size fits all approach here. Microsoft Defender lets users add locations or network locations to the list of excluded areas to be scanned for malware/viruses. Users commonly add folders and paths to Microsoft Defender in…
Are you sending your credentials to a MitM without knowing it?
December 30, 2021
Are you sending your credentials to MitM without knowing it? About a month ago, we reported that some phishing kits had added the capability of intercepting SMS-based 2FA tokens. Since then, we decided to look for more such tools and found a whopping 1200+ web-based phishing kits in our research, which are capable of intercepting 2FA when it is used by unsuspecting users. These toolkits enable any wimpy "hacker" to utilize the MitM (Man-in-the-Middle) attacks. After many major tech companies…
Why you should care about the Log4J vulnerability
December 21, 2021
Why you should care about the Log4J vulnerability Apache is an HTTP server that is open-source, cross platform and represents about 33% of all websites on the internet and countless applications that utilize parts of it. Log4J is a Java logging library used by the Apache server and many of those applications. A vulnerability was recently discovered in Log4J that could allow an attacker to execute malicious code on the target system. The vulnerability specifically affects versions 2.x and 3.x of…
Tricks to diagnose and restore your internet connection
December 10, 2021
Tricks to diagnose internet connection from your seat I ask this question on interviews when checking to see if a technician knows basic networking, and you would be surprised how many do not! I will help you out without getting technical, explaining how packets are sent, and how IP addresses work. This is a tutorial with real life situations and a step by step process you can take to solve it. So, you come into the office and you are greeted with the following error stating there is no…
James received a message, “what’s this link you sent me??”
December 7, 2021
James received a message, "What's this link you sent me??" James received a reply back from his co-worker telling him that he sent them a drobox link that looked suspicious. The next day another person complained to James telling him he sent them a google doc that is asking to login and they just wanted to clarify what it was. James quickly realized someone got a hold of his company email password and has been sending spam out of his mailbox. He quickly did what he thought was the most…
These 2 simple things could save your business from a cyberattack
December 6, 2021
These 2 simple things could save your business from a cyberattack It's interesting when I hear from CEO's and business owners the usual "We are not big enough to get hacked," or "Why would anyone want to target us?" What I always tell our clients is that the threat actors don't care what you do, they don't care how much money you make, all they care about is that you make it, all they care about is that you have an open system, or you fell prey to a phishing, or spear phishing attack, and they…
MSP tips for SMB – Enterprise backup on budget for your organization
November 29, 2021
MSP tips for SMB - Enterprise backup on budget for your organization Some may think when selecting a Managed Services Provider MSP, that we have access to some magic secrete sauce programs, or develop things in house to help secure or backup or manage your systems. We use the same software available to most business owners! Keep in mind I am in no way shape or form getting paid by any of these companies or services that I talk about below, so I just want to make it clear that this is strictly…
How do you migrate to Office 365? Smoothly…
November 26, 2021
How do you migrate to Office 365? Smoothly... If you are on a different hosted platform of exchange, it takes careful planning, staging, and execution and communication with end users. Understanding the environment and gathering as much information as possible is the first critical step. This ensures no surprises happen later or you come to a step where you aren't sure how to proceed. We must first answer some questions prior to migration Are we only moving email boxes or other office…
Still not on Office 365? Here is a good reason to switch…
November 23, 2021
Still not on Office 365? Here is a good reason to switch... Reasons why you should migrate to Office 365 if you are still on another platform. By now I don’t have to explain the benefits of exchange email and why its much better than SMTP and POP3. What is Exchange or Office 365 email? Let's just put it this way, if you want a centralized location for your emails that you are accessing with multiple devices, your cell phone, computer, tablet etc. All emails read on any device will be kept and…
8 things to do in case your systems have been breached
November 19, 2021
8 things to do in case your systems have been breached Finding out that your company has been the latest unwitting victim of a ransomware attack capable of restricting computer systems and encrypting data if a ransom is not paid to cybercriminals would be a nightmare for many corporations. There is no such thing as a magic wand that can make a ransomware assault disappear without some down time, sweating, and getting your IT team involved in restoring systems. 1. Do Not open the ransom…
Quickly check the Dark Web for your leaked credentials… without checking the Dark Web
November 16, 2021
Quickly check the Dark Web for your leaked credentials… without checking the Dark Web Ever wonder if your most used username and password is floating out there in the dark web, but don't want to install a Tor browser, start visiting questionable underground websites, downloading data dumps by hacking groups and spending hours running queries to find your username and password present in these databases? You are in luck because Google did all the hard legwork for you. Chrome is a…
So you think 2FA is protecting you… That’s cute
November 8, 2021
So you think 2FA is protecting you... That's cute The phone rings, a voice on the other end states, "Welcome to Chase Fraud protection department, we have recently receive a charge from E Constants online retailer for $74.32. If this was not you, please press 1." A few seconds later the phone buzzes and it's a text message from 227895 number which is the same number you always receive the verification code from. You quickly type it in to confirm that it is in fact you. The voice continues:…
What your “IT Guy” won’t tell you. MIGHT hurt you…
November 3, 2021
What your “IT Guy” won’t tell you. MIGHT hurt you… I'm sure there's more than one IT person who's reading this wondering what they've done to be scrutinized. But here it goes.... Things that are common with "IT Guys" I will first list out some of the concerns that you should think about, and then we can dive deeper into them… Single Point of Failure Poor Documentation Security Risk Can't be the” Jack of all Trades” Single Point of Failure I can't stress enough how important this point…
If you have Office 365, you should utilize Azure AD to protect your firm for free!
November 2, 2021
If you have Office 365, you should utilize Azure AD to protect your firm Office 365 is Microsoft's cloud productivity suite, with comparable features to Google's G Suite. It includes online versions from many of the most-used Office applications, including Word, Excel, and PowerPoint. A basic version of Azure AD is included FREE of charge with your Office 365 subscription! One compelling feature of Office 365, that your firm may not know about, is Azure Active Directory (Azure AD),…
The biggest cybersecurity threat in 2021 and 2022 affecting all businesses
November 1, 2021
What is the biggest cybersecurity threat to businesses in 2021 and 2022 that affects all businesses The types of cyber attacks that pose the most serious threat vary depending on the business. There are many different kinds of attacks that hackers might launch, including phishing attempts, ransomware, distributed denial-of-service (DDoS), and more. However, not all threats are created equal. For example, a ransomware attack is usually much more harmful than a DDoS attack because ransomware…
What is the cost for managed IT services in Atlanta?
October 28, 2021
What is the cost for managed IT services in Atlanta? What is the cost for managed IT services in Atlanta in 2023? The answer to this question varies depending on the companies and services they offer. Most MSPs will sound the same when it comes to the service and their promises however; every offering is different and you will be hard pressed to find two MSPs that use the same tools in their offerings stack. An offerings stack is basically the technology your MSP uses to deliver their…
What 5 minutes of interruption can do to your workflow
October 21, 2021
What 5 Minutes of Interruption Can Do To Your Workflow I think it’s safe to say that everyone agrees, time is money. Interruption in our tasks can add up very quickly. For example, a study done at The University of California by Gloria Mark, says that it takes about 25 minutes to return to the original task after an interruption. There are multiple studies that also confirm, distractions don't just eat up time during the distraction, they completely derail any sort of productivity for almost 30…
How Invisible IT Costs Add up fast & How to Calculate Them
October 20, 2021
How invisible IT costs add up quickly and how to calculate them When you hear Managed Service Providers (MSP) companies talk about saving you money, making things more efficient etc., etc., (insert more IT jargon here). What does this all mean? Hiring an IT support provider costs companies money right? So how do they claim to solve world problems and save your business money? Let's start by defining what an MSP is, the promises that MSPs make, how they plan to save you money, and how to tell…
How Lisa had her paycheck stolen – Phishing Attack
October 14, 2021
How Lisa had her paycheck stolen - Phishing Attack Here is how Lisa had her paycheck stolen. Lets walk through the events leading up to it and how it actually happened! BECKY FROM HR Received an email from an employee named Lisa requesting to change her paycheck to be deposited into a different bank account. Becky sent a reply with an attached document labeled “ACH Bank Change Form” to change the bank where the money is going to be transferred into this Friday for payroll. She received an email…
Retrofit your computer with biometric for $80
October 8, 2021
In the spirit of October Security month. We have used biometrics to unlock our phones, pay at the grocery stores, log in to our bank accounts for many years now. It only makes sense that this level of security makes it into mainstream day-to-day use on our desktops and laptops. Although many devices already include this feature such as a fingerprint reader, Yubicon now offers a retrofit for older devices to utilize biometrics instead of passwords. Check out this $80 USB key that doubles as a…
What it was like for a CPA firm to survive a cyberattack
October 5, 2021
What it was like for a CPA firm to survive a cyberattack I met Joe at a networking event, he is a CPA and owns his own Public Accounting Firm. Over time we became friends and I assisted his MSP (Managed Services Provider) on several IT projects. He employs 12-15 accountants depending on the time of the year. One Friday, Joe noticed that his systems were running a little slow. Being that it was a Friday afternoon, and having had dinner plans in a few hours with his family and a few friends, he…
Skip the line! Install Windows 11 and don’t wait for automatic update!
October 5, 2021
Outside of a controversial Start Menu, windows 11 appears to be mostly familiar to everyone. You can checkout the new features from Microsoft. However if you don't want to wait until the new update arrives to your computer as an automatic update. Don't worry, just head over to Microsoft and download the new update. This link will take you straight to MS page where you can download the update for FREE! You can create installation media like a USB drive or create an ISO. Really easy. If you are…
Network closet cleanup. How to save money & organize data closet
September 30, 2021
Network closet cleanup. How to save money & organize data closet If your data closets look like a rats nest with unorganized unlabeled wires everywhere, congrats, you are in with the majority! Most of our clients that we come across have a similar issue. Its easy for multiple vendors, your staff and everyone else having their hand in the network closet. No one really wants to fix it since its viewed as an unnecessary and expensive endeavor to…
Microsoft Explains why Windows 11 will be soo much faster!
September 15, 2021
This 12 min video explains all the features of upcoming Windows 11 and what will make it soo much faster than windows 10. Its pretty impressive that microsoft listened to the feedback of the beta tester program and made the suggested improvements. The real interesting feature is how you will no longer put your computer to sleep / power it down. It will work similar to what your phone does when it is not touched for a few min. The screen will turn off and the only thing that will remain powered…
Stop ransomware with these TWO steps
September 15, 2021
Stop ransomware with these TWO steps In a world where you can sign up as Ransomware As A Service its no surprise that its soo profitable and soo lucrative that everyone must take the steps to ensure they are protected, because everyone is a target. Windows 10 and 11 comes with many security features that you might not know about that can help in protecting your systems. Although 3rd party AntiVirus solution is advisable, taking these simple TWO steps can further increase the security of your…
500,000 Fortinet VPN Credentials Just Got Leaked
September 10, 2021
500,000 Fortinet VPN Credentials Got Leaked on Hackers Forum The list of Fortinet VPN credentials was released by a malicious actor known as "Orange," who is the administrator of the recently launched RAMP hacking forum and a past leader of the Babuk Ransomware initiative. Almost 500,000 Fortinet VPN login names and passwords that were scraped in an exploit on multiple devices a year ago. Orange split off to form RAMP and is now thought to be a representative of the new Groove ransomware…
Read this before you hire an IT support company…
August 18, 2021
CLICK PLAY TO LISTEN TO THIS ARTICLE [audio src="https://www.alphacis.com/wp-content/uploads/2021/08/Murf-7.mp3" /] When your business needs to move beyond what you can DIY on your own, it might be time to start thinking about outsourcing your IT. Every company has a different set of needs and various levels of expertise that is needed. You should evaluate which outsourcing service is best for your organization to minimize risk and overhead. This article will talk about the things to consider when evaluating…
Remove NAS from Active Directory (AD) Right Away!
August 6, 2021
If you are able to connect to your Network Attached Storage Device with your Active Directory credentials it might be a good idea to change the way your NAS authenticates. Ransomware attacks on the rise its hard to think of a work environment where inside the network should be thought of as unsecure space. Unfortunately with social engineered attacks, such as phishing and new exploits being found daily it’s the reality in 2021. Once the hackers gain access to the network, they can encrypt local…
Do This Now to Reduce Cyber Insurance Policy Costs
July 21, 2021
When it comes to insurance reducing exposures is what underwriters generally focus on to determine the premium costs: Are you storing sensitive data? Are you running credit cards through your terminals? Is your staff trained in security? Do you run backup software and do you test these backups periodically? Are you using firewalls and AV software and is it up to date and managed? Do you have a 3rd party company or internal employees that specialize in managed your network and security?……
Why Your Business Will Need Next Generation Firewall (NGFW)
July 10, 2021
What is a next-generation firewall (NGFW)? A next-generation firewall (NGFW) is a network security appliance capable of inspecting traffic at the protocol level. An NGFW can enable companies to block unauthorized access, prevent malware from entering the network and securely accelerate business applications. This takes things one step further with not just inspecting packets going in and out of the network, but breaks things down further depending on the applications. What is the difference…
ALL CPA firms should register .CPA Domain while it’s still available!
July 5, 2021
AICPA launched a new CPA-specific top level domain (TLD) that will help you build trust and reach your clients in a more secure way. This verification process ensures that only those who meet certain requirements can register for this TLD, which adds another safeguard and level of trust for potential clients. If your practice hasn't jumped on getting their .CPA domain yet I suggest you do this right away. Unlike .com .net .org or many others that anyone can register for, .CPA MUST in fact be a…
Cybercriminals Are Now Targeting CPA and Accounting Firms 🔐
June 29, 2021
Cybercriminals Are Now Targeting CPA and Accounting Firms Reasons for targeting accounting firms is almost obvious. Consider if you are trying to get sensitive information such as bank accounts, access to retirement and investment accounts, social security and EIN numbers. What industry would you turn to as a hacker ? The answer is clear, ✅ CPA and accounting firms. Unfortunately, too many of these firms have much of this sensitive client information sitting on a network drive or local…
5 Ways Dealerships Can Save Money On I.T. Costs
June 16, 2021
1. Stick with one vendor for managing I.T. Think of services with a major cable company or Internet provider. It’s always cheaper when you bundle multiple services, like internet and T.V., and/or phone. This concept is also true when it comes to selecting an I.T. services vendor. Much like a Dr., you would not want a brain surgeon operating on your heart. This is also true when it comes to IT providers as well. An I.T. company that dabbles in 20 different industries more than likely…
Do these 3 things right now to prevent ransomware on your systems!
June 9, 2021
Do these 3 things right now to prevent ransomware on your systems! Quick and simple, ransomware works by encrypting your hard drive and any device connected to your computers. This makes all of your files inaccessible and you will see text documents in every folder with instructions on how to pay the ransom to get your files decrypted. A fun fact about ransomware is that in 2020 the attacks increased by 130%. If you break down that number, 81% of the total infected are enterprises, and 62% of…
Fire your IT guy if they do any of these things…
June 7, 2021
Why you should fire your IT guy Over time things change, people change, and your organization's needs change as well. Here are some of the things to look out for with your current IT guy. Complacency Number one reason to fire your IT guy is complacency. Just like politicians holding the same public office position for 20+ years, they get use to the easy life! Doing things “the way they have always been done” is one of the easiest ways to spot complacency! “The way things have been…