CDOT Virus – What to know about the SamSam virus & steps to take now

On February 21, 2018 the Colorado Department of Transportation back office operations were hit with the SamSam ramsomware virus. The virus encrypts files on a users system as well as any network data files the users has rights to access.  CDOT made the decision to shut down 2,000 employee computers while they investigate and remediate […]

Read More...

Microsoft Office 365

You’ve been hearing about Microsoft Office 365 for a while now and are wondering if it may be the right fit for your organization – Let’s take a look at what exactly it is and how it compares to a more traditional approach. What is it? Office 365 is Microsoft’s subscription-based plan that allows you […]

Read More...

Service Spotlight: Enfrastructure Services™ (Part 2)

Last month we went over the first portion of what falls under our Enfrastructure Services™ – Network Architecture + Support, Virtualization, Server Migration, Backup & Disaster Recovery, Office365 and Active Directory.  That’s a lot, and it’s only half!  Let’s get into the rest… Remote Connections Expand your network outside of your physical premises making it possible for your […]

Read More...

Service Spotlight: Enfrastructure Services™ (Part 1)

It’s our final Service Spotlight but one that deserves the attention. Enfrastructure Services™ is where some true customization and personalized business solutions can come into play. With expertise in network architecture, virtualization, security and storage our team of senior technical consultants works with you to deliver the solution that best suits your organization. There is […]

Read More...

Service Spotlight: EnableIT™

We’ve talked about some important stuff over the last few months – security, back-up and disaster recovery, keeping your network maintained – and there are just a few more pieces to complete the IT puzzle. The current work environment for many companies looks different than it used to.  More people are coming and going, employees […]

Read More...

WannaCry? | What the most recent malware outbreak taught us.

The WannaCry ransom attack was a worldwide cyberattack targeting computers running Microsoft operating systems. The malware would encrypt data on the infected system as well was all other data on the network that the user had access to – pretty standard cryptoware. What made this attack different is that once a system was infected there […]

Read More...

Service Spotlight: EnstoreIT™

Remember the floods in Colorado in September 2013?  How about last year’s fires that popped up all across the state?  Natural disasters are becoming more frequent, and while it doesn’t always take nature to cause a disaster, it’s just one example of unexpected situations that can occur. Bet you don’t think about IT when you […]

Read More...

Service Spotlight: EnforceIT™

Last month we dove into our cornerstone service, EncompassIT Managed Service.  We’ll continue to take a deeper dive into what it is we do this month as we break down EnforceIT™. What it is EnforceIT™ delivers a complete, managed security solution that protects your organization.  Essentially, this is one of the ‘cyber security’ pieces of […]

Read More...

Service Spotlight: EncompassIT | Breaking It Down

What is EncompassIT™ Managed Service?  What do I really get?  This is a question we’ve heard numerous times, so today we’re going to break it down. EncompassIT™ Managed Service is complete IT Monitoring, Management and Support for your company’s IT Infrastructure including your server(s), network and employee workstations.  It delivers technical support, monitoring and reporting, […]

Read More...

Tech Trends & Topics to Watch in 2017

Tech has always moved fast but it seems like it’s moving faster than ever.  Whether it’s self-driving cars or email hack attacks – the landscape is ever evolving.  Trying to predict what is to come is futile, but that doesn’t mean we can’t be diligent and stay aware of changes as they occur. Here are […]

Read More...