What is a managed services provider (MSP)? Why choose an MSP to support your business? Find out why businesses that partner with Go2IT are more secure, have less down-time and are more
There has been a tremendous rise in the number of malicious attacks, including email accounts being compromised, malware attacks, and password hijacking. We are seeing 3 main types of attacks although others are possible as this malicious human interference is always changing. Vendor or Customer email accounts becoming compromised. Once the attacker has access to a user’s email account, they will send emails to the user’s clients or contacts requesting changes of bank account payments. These emails will come from legitimate accounts of people and vendors that you know, as the attacker has actually broken into the account and is sending email on behalf of that person. They will usually hide their tracks, so the user doesn’t notice. Emails embedded with a link that when clicked, will take you to what looks like a OneDrive, or other Microsoft service, and ask you to fill in your password. They then log these passwords and use it to try to break into your accounts. Again, these may come from legitimate senders that you know, but their account has been compromised. Emails that look like they came from IT DEPARTMENT, Microsoft, Office 365, Exchange, or other systems that say your mailbox is full, or your account will be turned off. These are not real and will again try to have you click a link that will ask for your password. Below are some guidelines that need to be followed in order to pr
There is considerable uncertainty in today’s world including online hackers and ransomware to the COVID19 pandemic that is still ongoing. Unfortunately, many SMBs do not realize that it is only a matter of time before their IT infrastructure and data might fail or fall victim to malicious human interference. When that happens, SMBs not only lose revenue, they can also lose customer confidence as their reputation suffers. Additionally, there can be legal ramifications is customer data is stolen. All SMBs needs to have a disaster recovery plan in place prior to experiencing any of these issues. The Go2IT Group can help create a disaster recovery plan for your business using the methods described below. Risk Assessment and Business Impact Analysis What critical IT assets does your business own whose exposure to loss would be a detriment to business operations? What are the business processes that utilize these assets? What possible threats could affect the ability of those business functions to operate? Step 1: Identify Assets – Inventory of Hardware and Software The Go2IT Group can help with identifying assets including servers, network infrastructure, sensitive documents, client information, phone systems, printers, etc. It is important to keep the asset list update to date with any new assets being added. Assets can be prioritized by importance level such as critical, major and minor. Step 2: Ide
In the last several months, our country’s businesses have experienced upheavals that they were not necessarily prepared for and the impact will likely continue for some time. The Go2IT Group made immediate changes for our internal employees in March when Ohio’s schools closed, including having internal employees work remotely from home. This has allowed for us to stay safe while being able to maintain the same level of support for our clients. The Go2IT Group is currently working towards returning to normal operating procedure and we will continue to evaluate onsite visit requests on a case by case basis. We will continue to provide emergency support but will follow the guidelines established by the State of Ohio to protect the health and safety of our staff. We are still able to assist our Residential Service customers by appointment only. We have a touchless drop off procedure in place as well as the drop off location being held to the highest of standards by following the State of Ohio’s protocols. Our Field Services division continues to assign and place technicians across the country for various projects and positions, in accordance with each state’s and customer’s guidelines. We have seen an increase in requests for service within the last week and believe this will continue. If you are an experienced computer technician and would like to be contacted for opportunities, please submit your resume for
IT Firm that can remedy any ransomware needs. If you were attacked by ransomware please reach out to our IT firm to assist in fixing the
Server 2008 and 2008 R2, Microsoft Exchange 2010 End of Life
Windows 7 End of Life is Coming. What you need to know and what to do about it.
Go2IT is excited to announce the acquisition of North Coast Computers, a professional IT Services firm based out of Avon Lake, Ohio. North Coast offers Managed IT Services, IT Consulting, and Break/Fix Services. By combining these two organizations, Go2IT further enhances its service offerings and emerges as a clear leader in the Managed IT Services market in Cleveland, Ohio. For Jon Jones, Vice President of Go2IT, the deal made perfect sense. “Our service line closely matches that of North Coast Computers, and with a customer base heavily focused on the westside of Cleveland, Ohio, we knew this was an incredible opportunity to expand our footprint and add some really great resources to our team.” In addition to adding to its Managed Services portfolio, Go2IT will also be adding a Retail division that North Coast built over many years. “Customers can bring in their personal PC’s, Laptops and Tablets directly into our Westlake, Ohio facility and have it repaired at a discounted price. We’re very excited to be able to offer this service to residents in Westlake and the surrounding community.” Go2IT is located at 26260 Center Ridge Rd., Westlake, OH at the corner of Center Ridge Rd and Canterbury