www.microtechs.io
Open in
urlscan Pro
2606:4700:20::681a:4a4
Public Scan
Submitted URL: https://sendy.qrcsolutionz.com/l/Izg4umG763YukTDZ376jZqUg/3CSanrffaMAzXn6lpqcTjA/eHGUcZA9sAs78Vrzw9763XuA
Effective URL: https://www.microtechs.io/blog/the-nsa-s-guidelines-on-mobile-security
Submission: On October 07 via api from ZA — Scanned from DE
Effective URL: https://www.microtechs.io/blog/the-nsa-s-guidelines-on-mobile-security
Submission: On October 07 via api from ZA — Scanned from DE
Form analysis
3 forms found in the DOMName: fd-toolbar-search — POST https://www.microtechs.io/
<form name="fd-toolbar-search" data-fd-search-toolbar-form="" method="post" action="https://www.microtechs.io/" class="fd-toolbar__search-form">
<a href="javascript:void(0);" class="fd-toolbar-btn " title="Categories" data-fd-dropdown="toolbar" data-fd-dropdown-offset="[0, 0]" data-fd-dropdown-trigger="click" data-fd-dropdown-placement="bottom-start" data-fd-dropdown-content="action/categories" data-fd-component="com_easyblog" aria-expanded="false">
<span>Categories: </span>
<span class="font-normal" data-fd-search-filter="">All Categories</span>
<i class="fdi fa fa-chevron-down ml-2xs"></i>
</a>
<div class="hidden">
<div id="fd" class="">
<div class="light si-theme-foundry">
<div class="o-dropdown divide-y divide-gray-200 md:w-[400px] " data-fd-dropdown-wrapper="">
<div class="o-dropdown__bd py-sm px-xs overflow-y-auto max-h-[380px] divide-y divide-gray-200 space-y-smx" data-fd-dropdown-body="" data-fd-toolbar-dropdown-menus="">
<div class="px-sm py-sm hover:no-underline text-gray-800">
<div class="space-y-md">
<div class="o-placeholder-loader">
<div class="flex w-full">
<div class=" space-y-xs flex flex-grow flex-col">
<div class="o-placeholder-box w-6/12"></div>
<div class="o-placeholder-box w-7/12"></div>
<div class="o-placeholder-box w-4/12"></div>
<div class="o-placeholder-box w-3/12"></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<input type="hidden" name="category_id" value="" data-fd-search-category-id="">
<label for="fd-search" class="sr-only">Search...</label>
<input type="text" name="query" id="fd-search" class="o-form-control fd-toolbar__search-input " value="" placeholder="Search..." data-search-input="" autocomplete="off" data-fd-component="com_easyblog">
<div class="t-hidden" data-fd-toolbar-dropdown="">
<div id="fd">
<div class="light si-theme-foundry">
<div class="o-dropdown divide-y divide-gray-200 w-full" data-fd-dropdown-wrapper="">
<div class="o-dropdown__hd px-md py-md" data-fd-dropdown-header="">
<div class="font-bold text-sm text-gray-800">Suggested keywords</div>
</div>
<div class="o-dropdown__bd py-sm px-xs overflow-y-auto max-h-[380px] divide-y divide-gray-200 space-y-smx" data-fd-dropdown-body="">
<div class="px-sm py-sm hover:no-underline text-gray-800">
<div class="space-y-md">
<div class="o-placeholder-loader">
<div class="flex w-full">
<div class=" space-y-xs flex flex-grow flex-col">
<div class="o-placeholder-box w-6/12"></div>
<div class="o-placeholder-box w-7/12"></div>
<div class="o-placeholder-box w-4/12"></div>
<div class="o-placeholder-box w-3/12"></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<input type="hidden" name="option" value="com_easyblog">
<input type="hidden" name="controller" value="search">
<input type="hidden" name="task" value="search.query">
<input type="hidden" name="Itemid" value="174">
<input type="hidden" name="ef5d484d21d77c5d834437b6c7acc2e5" value="1">
<div class="fd-toolbar__search-submit-btn">
<button class="
o-btn
o-btn--default fd-toolbar__link fd-toolbar__btn-search
text-sm leading-sm px-sm py-xs
" type="submit">
<i class="fdi fdi fa fa-search "></i> Search </button>
</div>
<div class="fd-toolbar__search-close-btn">
<a href="javascript:void(0);" class="" data-fd-toolbar-search-toggle="">
<i aria-hidden="true" class="fdi fa fa-times"></i>
<span class="sr-only">x</span>
</a>
</div>
</form>
POST /blog
<form class="eb-comment-form reset-form" method="post" action="/blog" data-comment-form="" data-captcha="recaptcha">
<div class="eb-composer-author row-table">
<span class="col-cell cell-tight">
<b class="eb-avatar">
<img src="https://www.microtechs.io/media/com_easyblog/images/avatars/author.png" width="50" height="50" alt="Guest">
</b>
</span>
<div class="col-cell">
<div class="pull-right"> Already Registered? <a href="/home/login?return=aHR0cHM6Ly93d3cubWljcm90ZWNocy5pby9ibG9nL3RoZS1uc2Etcy1ndWlkZWxpbmVzLW9uLW1vYmlsZS1zZWN1cml0eQ==">Login Here</a>
</div>
<strong>Guest</strong>
<div class="text-small text-muted">Monday, October 07 2024</div>
</div>
</div>
<div class="eb-comment-notice" data-comment-notice=""></div>
<div class="eb-comment-editor">
<input type="hidden" id="title" name="title" value="" data-comment-title="">
<div class="form-group">
<div>
<div id="markItUpComment" class="markItUp">
<div class="markItUpContainer">
<div class="markItUpHeader">
<ul>
<li class="markItUpButton markItUpButton1 markitup-bold"><a href="" accesskey="B" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Bold [Ctrl+B]">Bold</a></li>
<li class="markItUpButton markItUpButton2 markitup-italic"><a href="" accesskey="I" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Italic [Ctrl+I]">Italic</a></li>
<li class="markItUpButton markItUpButton3 markitup-underline"><a href="" accesskey="U" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Underline [Ctrl+U]">Underline</a></li>
<li class="markItUpSeparator">---------------</li>
<li class="markItUpButton markItUpButton4 markitup-url"><a href="" accesskey="L" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Hyperlink [Ctrl+L]">Hyperlink</a></li>
<li class="markItUpButton markItUpButton5 markitup-picture"><a href="" accesskey="P" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Picture [Ctrl+P]">Picture</a></li>
<li class="markItUpSeparator">---------------</li>
<li class="markItUpButton markItUpButton6 markitup-bullet"><a href="" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Bulleted list">Bulleted list</a></li>
<li class="markItUpButton markItUpButton7 markitup-numeric"><a href="" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Numeric list">Numeric list</a></li>
<li class="markItUpButton markItUpButton8 markitup-list"><a href="" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="List item">List item</a></li>
<li class="markItUpSeparator">---------------</li>
<li class="markItUpButton markItUpButton9 markitup-quote"><a href="" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Quotes">Quotes</a></li>
<li class="markItUpButton markItUpButton10 markitup-clean"><a href="" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Clean">Clean</a></li>
<li class="markItUpSeparator">---------------</li>
<li class="markItUpButton markItUpButton11 markitup-happy"><a href="" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Happy">Happy</a></li>
<li class="markItUpButton markItUpButton12 markitup-smile"><a href="" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Smile">Smile</a></li>
<li class="markItUpButton markItUpButton13 markitup-surprised"><a href="" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Surprised">Surprised</a></li>
<li class="markItUpButton markItUpButton14 markitup-tongue"><a href="" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Tongue">Tongue</a></li>
<li class="markItUpButton markItUpButton15 markitup-unhappy"><a href="" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Unhappy">Unhappy</a></li>
<li class="markItUpButton markItUpButton16 markitup-wink"><a href="" data-fd-tooltip-placement="top" data-fd-tooltip="" data-fd-tooltip-title="Wink">Wink</a></li>
</ul>
</div>
<div class="markItUpExpanding"><textarea id="comment" name="comment" class="form-control textarea markItUpEditor" rows="5" data-comment-editor="" data-comment-bbcode="1"></textarea></div>
<div class="markItUpFooter">
<div class="markItUpResizeHandle"></div>
</div>
</div>
</div>
</div>
</div>
<div class="form-group">
<input type="text" class="form-control" id="esname" name="esname" placeholder="Name" data-comment-name="">
</div>
<div class="form-group">
<div class="col-cell cell-half">
<input type="text" class="form-control" name="esemail" id="esemail" placeholder="E-mail" data-comment-email="">
</div>
<div class="col-cell cell-half">
<input type="text" class="form-control" name="url" id="url" placeholder="Website" data-comment-website="">
</div>
</div>
<div class="eb-checkbox">
<input type="checkbox" name="subscribe-to-blog" id="subscribe-to-blog" value="1" data-comment-subscribe="">
<label for="subscribe-to-blog"> Subscribe to the blog (Please fill in your email address to subscribe to updates from this post.) </label>
</div>
<div class="eb-comment-recaptcha">
<p>
<b>Captcha Image</b>
</p>
<div class="eb-recaptcha-wrapper">
<div id="recaptcha_6703d0944002f" data-recaptcha-item="">
<div style="width: 304px; height: 78px;">
<div><iframe title="reCAPTCHA" width="304" height="78" role="presentation" name="a-6u3qi1jon3rd" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Ld3Si0UAAAAAAUBHA6QAwwb1CoX51X5g71gDJ66&co=aHR0cHM6Ly93d3cubWljcm90ZWNocy5pbzo0NDM.&hl=en&v=xds0rzGrktR88uEZ2JUvdgOY&theme=light&size=normal&cb=ggh2pzdzlahu"></iframe>
</div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
</div>
</div>
<div class="form-action">
<button class="btn btn-primary" data-comment-submit="">Submit Your Comment</button>
</div>
</div>
<input type="hidden" name="id" value="1130" data-comment-blog-id="">
<input type="hidden" name="parent_id" id="parent_id" value="0" data-comment-parent-id="">
<input type="hidden" name="comment_depth" id="comment_depth" value="0" data-comment-depth="">
<input type="hidden" name="email" id="email" value="" data-comment-email="">
</form>
POST /blog
<form action="/blog" method="post" id="login-form">
<fieldset class="userdata">
<p id="form-login-username">
<label for="modlgn-username">Username</label>
<input id="modlgn-username" type="text" name="username" class="inputbox" size="18">
</p>
<p id="form-login-password">
<label for="modlgn-passwd">Password</label>
<input id="modlgn-passwd" type="password" name="password" class="inputbox" size="18">
</p>
<p id="form-login-remember">
<label for="modlgn-remember">Remember Me</label>
<input id="modlgn-remember" type="checkbox" name="remember" class="inputbox" value="yes">
</p>
<input type="submit" name="Submit" class="button readon" value="Log in">
<input type="hidden" name="option" value="com_users">
<input type="hidden" name="task" value="user.login">
<input type="hidden" name="return" value="aHR0cHM6Ly93d3cubWljcm90ZWNocy5pby9ibG9nL3RoZS1uc2Etcy1ndWlkZWxpbmVzLW9uLW1vYmlsZS1zZWN1cml0eQ==">
<input type="hidden" name="ef5d484d21d77c5d834437b6c7acc2e5" value="1">
<ul>
<li>
<a href="/forgot-password">
Forgot your password?</a>
</li>
<li>
<a href="/home/login?view=remind">
Forgot your username?</a>
</li>
</ul>
</fieldset>
</form>
Text Content
Microtechs * Home * Login / Logout * Create an Account * My Documents * Sitemap * About Us * Who We Are * Our Difference * IT Industry Secret * Testimonials * Employment * Refer a Colleague or Friend * IT Services * Managed IT Services * Managed Services * IT Consulting * Comprehensive IT Support * Remote Monitoring & Maintenance * IT Vendor Management * Co-Managed IT * VMware * 24/7 Help Desk * Microsoft Hyper-V * Desktop Monitoring and Management * Infrastructure Support Services * Professional Server Support * Staffing Services * IT Security Services * Network Security * Unified Threat Management * Content Filtering * Spam Protection * Security Cameras * SOPHOS Security Solutions * Email Encryption * Cisco-Certified Solutions * Fully Hosted Security as a Service * Access Control Solutions * Enterprise Mobility Management Solutions * Cloud Computing Services * Cloud IT Solutions * Hosted Microsoft Exchange * Hosted Server * Hosted Desktop * Hardware Virtualization * Cloud Backup & File Sharing * Dropbox Cloud Storage * Microsoft Azure * Cloud Hosted VoIP * Amazon Web Services * Data Warehousing * Industry Specific * Healthcare IT * EMR * IT for Law * Manufacturing IT * Point-of-Sale Technologies * IT for Education * Residential Computer Repair * IT for Accountants * Retail IT * Human Resources as a Service * Data Services * Backup & Disaster Recovery * Data Retrieval from Hard Drive * Disaster Recovery as a Service * Hardware Services * Hardware as a Service * Computer Repair * Cabling and Wiring * Wireless Services * High-Speed Internet Consulting * Official HP Dealer * Printer Management * Official Dell Dealer * Apple Computer Repair * Lenovo Official Reseller * Office Relocation Services * Mobile Device Repair * Printer and Copier Support * Software Services * Microsoft Office 365 * G Suite by Google * Microsoft SharePoint * Microsoft SQL Server * Microsoft Partner Network * CRM * Document Management * Identity Management * Intranet Solutions * Business Communication * VoIP * Mobile Solutions * Fax Server * Conferencing * Mobile Device Management * VirtualTone * Digital Signage * Unified Communications * Conferencing and Collaboration * Media & Internet Services * Website Design * InSite ID for Websites * Understanding IT * Understanding Automation * Understanding Ransomware * Understanding Shadow IT * Understanding Your Virtual Identity * Understanding the Modern Office * IT Threat Glossary * Understanding Business Continuity * Understanding Windows 10 * Introducing Windows 10 * Windows Server 2003: End of Life * Understanding the Internet of Things * Understanding Network Security * Understanding SOX * Understanding BYOD * Understanding PCI DSS * Windows XP End of Life * Understanding HIPAA * Cloud Computing * News & Events * News & Press Releases * Events Calendar * Blog * Contact Us * Support * How to Request Support * Help Desk * Join a Meeting * Remote Support Tool (415) 246-0101 * Home * Login / Logout * Create an Account * My Documents * Sitemap * About Us * Who We Are * Our Difference * IT Industry Secret * Testimonials * Employment * Refer a Colleague or Friend * IT Services * Managed IT Services * Managed Services * IT Consulting * Comprehensive IT Support * Remote Monitoring & Maintenance * IT Vendor Management * Co-Managed IT * VMware * 24/7 Help Desk * Microsoft Hyper-V * Desktop Monitoring and Management * Infrastructure Support Services * Professional Server Support * Staffing Services * IT Security Services * Network Security * Unified Threat Management * Content Filtering * Spam Protection * Security Cameras * SOPHOS Security Solutions * Email Encryption * Cisco-Certified Solutions * Fully Hosted Security as a Service * Access Control Solutions * Enterprise Mobility Management Solutions * Cloud Computing Services * Cloud IT Solutions * Hosted Microsoft Exchange * Hosted Server * Hosted Desktop * Hardware Virtualization * Cloud Backup & File Sharing * Dropbox Cloud Storage * Microsoft Azure * Cloud Hosted VoIP * Amazon Web Services * Data Warehousing * Industry Specific * Healthcare IT * EMR * IT for Law * Manufacturing IT * Point-of-Sale Technologies * IT for Education * Residential Computer Repair * IT for Accountants * Retail IT * Human Resources as a Service * Data Services * Backup & Disaster Recovery * Data Retrieval from Hard Drive * Disaster Recovery as a Service * Hardware Services * Hardware as a Service * Computer Repair * Cabling and Wiring * Wireless Services * High-Speed Internet Consulting * Official HP Dealer * Printer Management * Official Dell Dealer * Apple Computer Repair * Lenovo Official Reseller * Office Relocation Services * Mobile Device Repair * Printer and Copier Support * Software Services * Microsoft Office 365 * G Suite by Google * Microsoft SharePoint * Microsoft SQL Server * Microsoft Partner Network * CRM * Document Management * Identity Management * Intranet Solutions * Business Communication * VoIP * Mobile Solutions * Fax Server * Conferencing * Mobile Device Management * VirtualTone * Digital Signage * Unified Communications * Conferencing and Collaboration * Media & Internet Services * Website Design * InSite ID for Websites * Understanding IT * Understanding Automation * Understanding Ransomware * Understanding Shadow IT * Understanding Your Virtual Identity * Understanding the Modern Office * IT Threat Glossary * Understanding Business Continuity * Understanding Windows 10 * Introducing Windows 10 * Windows Server 2003: End of Life * Understanding the Internet of Things * Understanding Network Security * Understanding SOX * Understanding BYOD * Understanding PCI DSS * Windows XP End of Life * Understanding HIPAA * Cloud Computing * News & Events * News & Press Releases * Events Calendar * Blog * Contact Us * Support * How to Request Support * Help Desk * Join a Meeting * Remote Support Tool MICROTECHS BLOG Microtechs has been serving the Mill Valley area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses. Home Categories Tags Categories: All Categories Search... Suggested keywords Search x Search THE NSA’S GUIDELINES ON MOBILE SECURITY Microtechs Blog Security Daniel Shea Friday, September 13 2024 0 Comments The United States National Security Agency, or NSA, is well known for its expertise in cybersecurity. So, when the NSA releases practices to help keep mobile devices more secure, it's smart to pay attention to what it says. Let’s examine a few of their shared practices and see what we can learn. WHAT DOES THE NSA RECOMMEND FOR MOBILE DEVICE SECURITY? All of the advice here, and more, comes from a free download that the NSA has provided that explores the many features of today’s mobile devices and how, if a user isn’t careful, these features can be used to undermine that device’s security. While some are pretty well-known (at least, for cybersecurity best practices), some are those that many might not consider. COMMON MOBILE DEVICE SECURITY SAFEGUARDS * Passwords/PINs—We’ve been known to discuss the importance of secure passwords and personal identification numbers, and it seems the NSA shares our opinion. Their advice is to lock devices automatically after five minutes of inactivity and wipe all data after ten incorrect attempts to input a six-digit access code. * Software updates—According to the NSA, all updates to mobile device operating systems and applications should be installed “as soon as possible." * Application selectivity—The NSA also warns against providing any one application with too much data, leaving apps open while not in use, and installing more applications than are strictly necessary. The agency also states that only official application stores should be used to download applications. * Location services—These capabilities should be disabled whenever they are not actively being used, as should connections like Wi-Fi and BluetoothⓇ. ADVANCED MOBILE DEVICE SECURITY SAFEGUARDS * Speak softly—The NSA recommends that you avoid discussing sensitive topics near your mobile devices without the protection of encrypted secure voice capabilities. * Pick a protective case—When selecting a case for your mobile device, the NSA recommends one with a camera shield for when you are not using the camera that blocks the room’s ambient audio. * Leave the device alone—As tempting as it may be for some to jailbreak or root their mobile device to install unapproved applications or delve deeper into the OS, the vulnerabilities this introduces are not worth the benefits, so this should be avoided. * Be specific about accessories—According to the NSA, only trusted accessories should be connected to a mobile device, never public ones. This includes public charging stations. IT IS EASY TO LEAVE YOURSELF VULNERABLE TO THREATS With cyberattacks constantly marching on to capitalize on vulnerabilities, steal data, and hurt businesses, it is more critical than ever that your business’ technology is properly and comprehensively secured. We can help. Call us at (415) 246-0101 to learn more about what we can do to improve your productivity and security. Tags: Security Best Practices Mobile Device These Signs Tell You a Hard Drive is On Its Way Ou... Two Productivity Bottlenecks You Need to Confront About the author Daniel Shea When he is not helping businesses with their IT needs, Daniel is in the computer lab. Testing new tech solutions that can be added to the tool belt. If you ever have any tech or business question, Daniel is ready to help you find the answer. Author's recent posts More posts from author Friday, October 04 2024 Realistic Expectations Make Business Easier Wednesday, October 02 2024 Sextortion Scams are on the Rise with Extra Creepy Behavior Monday, September 30 2024 Explaining VoIP and How It Saves Money Comments No comments made yet. Be the first to submit a comment Already Registered? Login Here Guest Monday, October 07 2024 * Bold * Italic * Underline * --------------- * Hyperlink * Picture * --------------- * Bulleted list * Numeric list * List item * --------------- * Quotes * Clean * --------------- * Happy * Smile * Surprised * Tongue * Unhappy * Wink Subscribe to the blog (Please fill in your email address to subscribe to updates from this post.) Captcha Image Submit Your Comment Blog Categories Microtechs Blog Technology Security Business Tip of the Week Best Practices Miscellaneous How To Cloud IT Blog Alerts Off Topic/Fun Uncategorized Mobile? Grab this Article! Tag Cloud Workplace Tips Productivity Security Smartphones Business Workplace Strategy User Tips Mobile Device Google Android Mobile Devices Microsoft Managed IT Services Computer IT Services Hosted Solutions Small Business Hardware Software Cloud Efficiency Network Security IT Support Innovation Business Computing Phishing Data Internet Cybersecurity Communication Hackers Malware Privacy Collaboration Users Tip of the Week Ransomware Best Practices Technology Email Blog Archive 2024 January (14) February (12) March (13) April (13) May (14) June (12) July (13) August (13) September (13) October (2) November December 2023 January (13) February (12) March (14) April (12) May (14) June (13) July (13) August (13) September (13) October (14) November (18) December (12) 2022 January (13) February (12) March (13) April (13) May (13) June (13) July (13) August (14) September (13) October (13) November (13) December (12) 2021 January (13) February (12) March (14) April (13) May (13) June (13) July (13) August (13) September (13) October (13) November (13) December (14) 2020 January (14) February (12) March (13) April (13) May (13) June (13) July (14) August (13) September (13) October (13) November (13) December (13) 2019 January (13) February (12) March (13) April (13) May (14) June (12) July (14) August (13) September (13) October (13) November (13) December (13) 2018 January (14) February (12) March (13) April (13) May (13) June (13) July (16) August (14) September (12) October (14) November (13) December (13) 2017 January February March April May June July August (7) September October (7) November (13) December (13) Account Login Username Password Remember Me * Forgot your password? * Forgot your username? News & Updates Microtechs launches new website! Microtechs is proud to announce the launch of our new website at https://www.microtechs.io. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients. Read More Contact Us Learn more about what Microtechs can do for your business. (415) 246-0101 Microtechs 100 Shoreline Hwy Bldg B Ste 100 Mill Valley, California 94941 Copyright 2024 Microtechs. All Rights Reserved. Microtechs * Home * Login / Logout * Create an Account * My Documents * Sitemap * About Us * Who We Are * Our Difference * IT Industry Secret * Testimonials * Employment * Refer a Colleague or Friend * IT Services * Managed IT Services * Managed Services * IT Consulting * Comprehensive IT Support * Remote Monitoring & Maintenance * IT Vendor Management * Co-Managed IT * VMware * 24/7 Help Desk * Microsoft Hyper-V * Desktop Monitoring and Management * Infrastructure Support Services * Professional Server Support * Staffing Services * IT Security Services * Network Security * Unified Threat Management * Content Filtering * Spam Protection * Security Cameras * SOPHOS Security Solutions * Email Encryption * Cisco-Certified Solutions * Fully Hosted Security as a Service * Access Control Solutions * Enterprise Mobility Management Solutions * Cloud Computing Services * Cloud IT Solutions * Hosted Microsoft Exchange * Hosted Server * Hosted Desktop * Hardware Virtualization * Cloud Backup & File Sharing * Dropbox Cloud Storage * Microsoft Azure * Cloud Hosted VoIP * Amazon Web Services * Data Warehousing * Industry Specific * Healthcare IT * EMR * IT for Law * Manufacturing IT * Point-of-Sale Technologies * IT for Education * Residential Computer Repair * IT for Accountants * Retail IT * Human Resources as a Service * Data Services * Backup & Disaster Recovery * Data Retrieval from Hard Drive * Disaster Recovery as a Service * Hardware Services * Hardware as a Service * Computer Repair * Cabling and Wiring * Wireless Services * High-Speed Internet Consulting * Official HP Dealer * Printer Management * Official Dell Dealer * Apple Computer Repair * Lenovo Official Reseller * Office Relocation Services * Mobile Device Repair * Printer and Copier Support * Software Services * Microsoft Office 365 * G Suite by Google * Microsoft SharePoint * Microsoft SQL Server * Microsoft Partner Network * CRM * Document Management * Identity Management * Intranet Solutions * Business Communication * VoIP * Mobile Solutions * Fax Server * Conferencing * Mobile Device Management * VirtualTone * Digital Signage * Unified Communications * Conferencing and Collaboration * Media & Internet Services * Website Design * InSite ID for Websites * Understanding IT * Understanding Automation * Understanding Ransomware * Understanding Shadow IT * Understanding Your Virtual Identity * Understanding the Modern Office * IT Threat Glossary * Understanding Business Continuity * Understanding Windows 10 * Introducing Windows 10 * Windows Server 2003: End of Life * Understanding the Internet of Things * Understanding Network Security * Understanding SOX * Understanding BYOD * Understanding PCI DSS * Windows XP End of Life * Understanding HIPAA * Cloud Computing * News & Events * News & Press Releases * Events Calendar * Blog * Contact Us * Support * How to Request Support * Help Desk * Join a Meeting * Remote Support Tool