The 5 Biggest Threats to Your Network Security (And What to Do about Them)

April 06, 2017

Falling victim to cybercrime is expensive. The recently released Ponemon Institute study on cybercrime in 2016 found that the average annual losses of companies that are victims of a cyberattack exceed $9.5 million. That’s a lot of money, and while larger companies tend to be the targets of cybercriminals more often, even your small business’s network can be at risk. 

Read More >

Are You Putting Your Company at Risk for a Security Breach?

February 08, 2017

According to the 2016 survey, Managing Insider Risk through Training & Culture, 66% of the IT and security professionals surveyed listed their employees as the weakest link in their security strategy. This is a serious problem when you consider that the average cost of a cyber-attack is over $12 million, and it takes 170 days, on average, for companies to detect a cyber-crime. 

Read More >

The 5 Common IT Mistakes Made by Small Businesses

December 08, 2016

Running a small business is difficult. It often requires owners to wear many different hats within their company making it possible for things to fall through the cracks. All too often, IT is one of those things. Hiring an IT staff is expensive and most small businesses don’t have the budget to do it. However, the IT services available at Partnered Solutions IT are a perfect remedy to this problem. We offer great managed IT services at a fixed monthly rate, and we will make sure you don’t fall into the IT pitfalls such as the following. 

Read More >

How to Protect Yourself from Phishing Scams

February 01, 2016

If you get a suspicious email asking to transfer money or provide confidential information, chances are the sender is a phisher trying to use your information to commit fraud. This past week our IT support department reported two phishing attacks on our clients. In light of these attacks, we wanted to show our clients and followers of our blog how to protect themselves. Here are 4 steps to take if you suspect a phishing scam. 

Read More >

Rolling Checkpoints for Microsoft’s Hyper-V

January 06, 2016

By: Clyde Miller | Associate Director of Managed Services

As any long-time system admin or tech can tell you, backups and redundancy are vital. They make it possible to sleep without worry.

One thing that makes that easier is Microsoft’s Hyper-V. It’s a tool for creating virtual machines (VMs); these are computers that exist within software. This means you can copy and move them as files. One particularly nice thing that’s built into Hyper-V is the ability to make checkpoints for the VMs. These save the virtualized computer in exactly the state they were in when the checkpoint was created. It’s handy when installing new software or changing configurations as it gives you a point in time you can revert back to. So, if you were to get a virus, delete an important application, or misconfigure a new deployment, you can undo those things by applying the checkpoint.


Read More >