Get Started Today!  732-747-9373   

Fotolia 68929807 M new

DeckerWright Corporation Blog

DeckerWright Corporation has been serving the Red Bank area since 1984, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why GIG Internet Doesn't Work

GIG

Verizon recently came out with its Gigabit internet connection service. We have several clients that have gotten the 1 GIG service only to find that they aren’t getting 1 GIG throughput when they run speed tests, including Verizon’s speed test. Why?

There are two main factors in explaining why clients aren’t getting 1 GIG speeds. The first is fine print. In speaking with the Verizon installers implementing 1 GIG service, they explained they certify 1 GIG service with speeds as low as 750 MGs. In visiting the Verizon FiOS web site, in the footnotes and fine print on the 1 GIG Internet speeds page, Verizon states they only guarantee speeds of 750 MGs on the 1 GIG service. That means the 1 GIG service is really Verizon marketing, and not what's getting delivered to customers. 

The second reason is technology. In order for a customer to achieve 1 GIG performance, everything between their device and the website or app they're using needs to support 1 GIG speeds. This is rarely the case. Typical device interface speeds are either 100 MGs (0.1 GIGs) or 1 GIG. Let’s look at a case where every firewall, router, wire and web site service being accessed has 1 GIG interfaces. If you're lucky enough to access that website when no one else is accessing it, you would achieve 1 GIG speeds. As soon as other people access the same internet resource, the 1 GIG pipe becomes shared, effectively reducing the throughput of your connection. To keep it simple, divide the pipe size by the number of simultaneous users to estimate the speed. New technology supports 10 GIG device speeds, but the technology is not widely deployed, and over 95% of the internet connected devices have 1 GIG or slower interfaces. When everyone was accessing the internet with 25 to 100 MG connections, 1 GIG interfaces were sufficient. Suddenly they are not.

The client’s local network and equipment also provide a bottleneck to achieving 1 GIG speeds. Many clients have older firewalls and networking equipment that only support speeds to 100 MGs. 95% of the firewalls we deployed at client locations will not support 1 GIG speeds. Firewalls, routers, switches and network cabling all have to be up to specs in order to achieve 1 GIG bandwidth from your wired devices.

Even after a client upgrades their physical infrastructure to support a 1 GIG connection, they are disappointed with the performance of their wireless devices. Turns out, they will need to upgrade their wireless access points and make sure their wireless devices support the latest 802.11ac standards. Most WiFi operates in the 802.11b/g/n 2.4 Ghz radio spectrum, which is where the majority of access points and wireless devices operate. Many of the newer wireless enabled devices will operate in the 5 Ghz frequency range which supports the 802.11a/n/ac wireless standards. Even if a client has a new access point and device that auto selects the right frequency and communications standard, WiFi technology adjusts the bandwidth according to the signal strength. The worse the WiFi signal, the slower the connection regardless of the WiFi technology.  To achieve 1 GIG on a wireless device, a client needs an 802.11ac access point, with a device that supports 802.11ac and the client must be standing within 10’ of the access point. If the client wonders away, or has walls between them and the access point, the speeds will drop dramatically.

If you're thinking of upgrading your internet connection to 1 GIG, contact DeckerWright Corporation so we can assess your network before you purchase the 1 GIG service to see if your network can support it.

Click HERE for more information on wireless technologies.

0 Comments
Continue reading

Browser Wars - Round 2

browser wars

Since the inception of the World Wide Web in the mid-1990’s, there has been a battle between competing web browsers.  In the early days, the competition was between Netscape and Microsoft.  The competition got so intense, the US Department of Justice stepped in to regulate some of Microsoft’s behavior.  If you can’t remember Netscape, that’s okay, they are no longer in business.  For many years, Internet Explorer was the only browser in town so there was relative browser stability.

Today’s browser war is very different.  The top three browsers today are Microsoft’s Edge (Internet Explorer), Google’s Chrome and Mozilla’s FireFox.  Both Microsoft and Google have nearly unlimited funds to spend on developing their browser technology.  Unlike Netscape in the past that was relying on licensing revenue from people using their browser, Microsoft and Google have different revenue models that provide funding for their browsers.  Both see their browsers as a significant technology in the delivery of their core services.  The third browser, Mozilla’s FireFox, is developed based on Netscape technology assigned to a non-profit organization that doesn’t have the resources to match the big two, so they are always playing catchup.

Why are we experiencing so many browser issues?  Website development is based on the industry “standards” that are in place at the point in time a website is developed.  Remember Microsoft’s Silver Light?  Most people can’t.  It was a technology Microsoft was pushing as an alternative to Java.  Proprietary to Microsoft’s browsers, Silver Light never got traction in the market, so Microsoft killed it.  Unfortunately, there were some large websites developed using that technology.  Today we keep a copy of the last release of Silver Light in a safe place so that we can install it with Internet Explorer (IE) 11 for some clients.  Other technologies that have been consumed by the browser wars include Java and Adobe Flash.

Microsoft and Google have little regard for those dependent on their browser technology.  A seeming innocent security update can hobble websites.  What may have been an acceptable security method five years ago doesn’t cut mustard today.   For many clients, we have had to freeze browser versions so apps can continue to function.  Chrome is probably the worst in pushing out updates that break things.  Chrome automatically updates itself whether you want it to or not unless you are running the corporate (Stand Alone) version of the browser.  How plugins are secured and executed in each browser is different causing various problems with websites. 

Needless to say if Google comes up with a “standard” Microsoft doesn’t like, Microsoft won't implement it.  Different Microsoft plugins won’t work with Chrome.  There is a standard settings board that sets standards for browsers.  As with any standards setting board, it moves slowly to make changes.  Microsoft and Google regularly introduce technology in their browsers long before the technology is even presented to the standards board.  Since neither company can knock the other one off financially, the browser wars are going to continue long into the future.  Make sure you have all three browsers loaded on your computer.  You never know which one will work.

Click HERE for more information.

0 Comments
Continue reading

Technology Provisioning

technology purchase

Every business relies on technology to run their business.  Where each company acquires their technology rests on a number of factors, including how much the company values staff time.  The purchasing of technology to place in service requires four phases.  The first phase is figuring out what to purchase.  The second phase is ordering the equipment.  The third phase is preparing the equipment for deployment and the final phase is deploying the equipment into the business.

The first technology purchasing phase entails researching the products available to solve a problem.  For example, a staff member needs a laptop.  The right solution has to factor in how the employee is going to use the laptop, the laptop manufacturer, the product warranty, delivery and price.  With hundreds of products to choose from, dozens of manufactures and an endless number of sources, it typically takes between 1 to 2 hours of research to select a manufacturer, model, source and price per item. 

Ordering the equipment can be complicated depending on the vendor.  Many vendors require being paid up front, or by credit card which can be a problem for public and non-profit entities.   Another common issue with online ordering systems, is they don’t verify product availability until after the order is placed.  This often happens on the Internet where items that are shown as “In Stock” are actually out of stock.  Following up on orders to determine delivery dates also takes up time.  Every order placed consumes about 1 hour of staff time for provisioning and follow-up.

Once the equipment arrives at the company, it has to be prepared for delivery to a staff member.  For a typical laptop, this means removing it from the box, turning it on, and going through the equipment setup wizard.  Once the setup wizard completes, all of the “bloatware” needs to be removed from the computer and any security patches needed to be downloaded and installed.  If there are any applications like anti-virus and Microsoft office, they need to be installed at this time too.  What if the laptop that arrives is either wrong or doesn’t work?  A common problem our clients encounter is ordering a cheap laptop that comes with the wrong version of the Windows 10 operating system.   In our experience in dealing with clients that self-provision, 1 in 4 orders will have a problem requiring 1 to 2 hours of staff time to straighten out and follow up on. 

The final phase of the technology purchasing cycle is deploying the technology to the staff.  If the client has a rigorous setup process, the computer delivered to the staff member should be ready to use.  However, most users have some local settings that they want to retain on the new system.  Migrating user settings and documents (known as the user’s profile) can take from 1 to 3 hours depending on the amount and type of data being transferred. 

DeckerWright Corporation provides technology provisioning services to our clients.  We take the time and stress out of the purchasing process.  We have flexible payment terms including credit card, ACH, check, cash, and purchase orders.  Using our Hardware as a Service (HaaS) program, we can even include the cost of the technology in a client’s monthly service amount.  Leasing options are also available to facilitate the acquisition of new technology.  Prices are competitive, but are higher than the lowest price that may be found on the Internet.  When a company factors in the time spent on the entire provisioning process, spending a little more to purchase through DeckerWright saves a company a lot of time and money.

Click HERE for more information.

0 Comments
Continue reading

WiFi...Great Technology When It Works!

WiFi

The explosion of the Internet of Things (IoT) and mobile devices has put an increasing load on existing WiFi networks.  Originally engineered to provide access to a few laptops and mobile devices, WiFi networks are now being tasked with streaming video from cameras, and a host of other IoT devices, impacting a WiFi infrastructure that was not engineered for the load.  Another big problem with business WiFi, is most small and medium sized businesses are in multi-tenant office space with many businesses.  Sitting at my desk, I have 18 different WiFi networks I could connect to.  The more access points that occupy a frequency, the more they interfere with each other degrading WiFi performance.

Another common problem we see with client’s WiFi networks is that they are not engineered to provide the right level of security based on the evolving usage profile.  Many business WiFi networks work in two worlds, the world of using WiFi to access a client’s business network to do work, and WiFi to allow clients and employees to access the internet with their mobile devices.  New IoT applications may have different network security requirements.  When planning out a WiFi network, security must be part of the design consideration.  You don’t want clients or guests to be connected to the company’s business network.  They should be isolated on a guest network with only internet access allowed.  Conversely, computers that need to be connected to the company’s network via WiFi should be. 

The last problem with WiFi networks is the usage of the public frequencies of 2.4 Ghz and 5 Ghz.  The 2.4 Ghz frequency is particularly subject to interference from other technology like wireless phones, microwaves, alarm systems and electric motors that can broadcast on this frequency.  The 5 Ghz frequency is less heavily used by other manufacturers, and does better in facilities with more walls and obstructions based on its wavelength.  The trade-off for the improved quality, is distance.  A 5 Ghz transmitter only goes about half the distance of a 2.4 Ghz transmitter. 

If the WiFi in your company is not performing up to expectations, contact DeckerWright Corporation for a consultation and a site survey

Click HERE for more information.

0 Comments
Continue reading

Should There Be Independent Cloud Backups?

cloudbackup

As the move to the cloud continues, one nagging question remains. Should there be an independent backup of cloud resources?  The answer is YES for a number of reasons.

Although it doesn’t happen often, there is a chance that the cloud service provider being used goes out of business. This shouldn’t be a concern if the cloud company is Microsoft or Amazon, but it should be a concern if it is a local Internet Service Provider, web hosting company or a vertical application hosting company. Several times a year we get panic filled calls from clients who just received notice that their service provider is closing their doors. On several occasions the client found out when they could no longer access their web site or data. Microsoft is famous for ending services or technology and leaving the clients hanging. There is a risk associated with the cloud service provider ending business operations or suspending services being used. Having backups reduces this risk.

Another reason for having independent backups of cloud resources is to provide recovery points farther back in time. While Microsoft doesn’t document the Office 365 retention policy, it is generally accepted that they will retain two weeks of data. Although Microsoft keeps the data, the recovery is restricted to the recovery options built into the applications, like the recovery of deleted files in Outlook. Microsoft does have various backup methodologies built into the Azure cloud, so it is possible to backup Microsoft hosted cloud services to other Microsoft cloud infrastructure. At Amazon you are not so lucky. Amazon does not backup ANYTHING. If a company has a server hosted at Amazon and the server crashes, unless it is backed up to some other resource, everything is lost.  Lack of any backup is part of Amazon’s marketing plan that encourages clients to buy more Amazon resources for redundancy and backups – a brilliant marketing plan! There is a risk associate with the backup policies of the cloud service provider. Before moving to a cloud resource, a company needs to fully understand this risk.

Other data retention issues may be important to regulated entities and government agencies. Most regulated entities and government agencies have data retention requirements that range between 7 to 10 years. These long data retention periods are seldom met by cloud hosting companies. In these cases, an independent third-party backup would be a requirement.

The method for restoring data should also be clearly understood before a restore is necessary. Here are some questions that should be addressed by the cloud service provider:

  • Can individual files, folders, or mail boxes be recovered?
  • In database restoration, does the whole database need to be recovered or can individual records be recovered?
  • Can a full volume be recovered?
  • Does the recovery require booting up a full working image of the resource to recover the desired data?

There has been an explosion of new services becoming available to backup cloud resources.  Industry best practices dictate that backups should be made to independent third-party backup locations that use different software, storage and infrastructure so that a catastrophic failure at the primary hosting location will not affect the backups and the ability to recover.  The independent backup location should be coupled with an ability to either directly or indirectly support a recovery if there's a catastrophic failure with the primary cloud host.  DeckerWright can assist in building a cost effective backup of a company’s cloud resources.

Click HERE for more information on Office 365 data retention - see section 6.

0 Comments
Continue reading

Protecting the Internet of Things

IoT

The largest growth of devices connected to the Internet are not computers, but devices designed to perform a specific function. These devices include cameras, smart phones, light bulbs, Amazon Echos, garage door openers, TVs, automobiles, sound systems, programmable logic controllers (PLCs), HVAC systems, elevators, security systems, ovens, refrigerators, thermostats, water heaters, heart monitoring systems and more. These devices are part of the Internet of Things (IoT) that is flooding the Internet with new devices. This explosion of new devices is creating massive new security concerns.

All of the IoT devices share a common foundation - modified versions of the Linux operating system. The popularity of Linux is because most versions of Linux are free with access to the source code. The operating systems are then highly modified to adapt to nearly any device. While this flexibility has caused an explosion of devices that we can not monitor and manage over the Internet, it also possesses security problems since at their core, every IoT device is a Linux computer with usernames, passwords and vulnerabilities.

The New Jersey Cyber Security and Communications Integration Cell (NJCCIC) provides security focused companies like DeckerWright Corporation weekly and emergency updates on the state of cyber threats. The reporting of cyber threats on IoT devices has grown exponentially over the last year. Why is that? First, there has been an explosion of new IoT devices, the more attack surfaces. Second, IoT manufacturers are not typically well versed in cyber security . As a result, IoT devices are often released with little regard for security after the basic device functions are proven to work. Third, most IoT devices are never upgraded with new "firmware". As a manufacturers have become more tuned into the security risks associated with their products, they have been issuing "firmware" updates to patch security holes. When was the last time anyone upgraded the firmware in their network camera? Fourth, as cyber criminals begin to notice the vulnerability of IoT devices, they are developing methods for identifying IoT devices and are publishing successful exploits on the dark web. We are only seeing the first generation of exploits targeting IoT devices. Expect the next generation to be much more targeted and ferocious.

Unfortunately, anti-virus (AV) software companies don't have any solutions for protecting IoT devices. Even with a common Linux operating system base, the Linux systems are so highly customized that AV software companies have no way to write software to protect them.

Here are some ways to protect your IoT devices from being compromised by cyber criminals.

  • Always place your IoT device behind a firewall that can be used to monitor and restrict access to the IoT device.
  • At least every six months, check your IoT devices firmware to make sure you are running the most current version.
  • If possible, only setup IoT devices behind firewalls with NO internet access.
  • ALWAYS change the default password on the device to a complex password or a pass phrase.

Our industry is scrambling to come up with ways to monitor and protect IoT devices on networks. The best defense we have today are Security Information and Event Management (SIEM) systems which can quickly identify suspicious network activity and alert cyber security experts. Since the devices will never be smart enough to defend themselves, we must rely on perimeter technology, advanced monitoring and proper device setup to protect the ever growing population of IoT devices.

Click HERE for more information.

0 Comments
Continue reading

Windows 7 End of Life

Windows-7-RIP

When was Windows 7 launched by Microsoft? If you don’t know the answer then read on.

Windows 7 has been a staple of corporate computing for many years. Surviving two successive operating system launches from Microsoft, Windows 8 and Windows 8.1, Windows 7 has provided a stable and flexible platform for corporate computing. If Windows 7 is so good, why is Microsoft ending support for it?

One could be skeptical and say it is to force upgrades and therefore make more money. To some extent, this is a true statement. Another more important reason is that Windows 7’s software architecture limited Microsoft’s ability to support both mobile and cloud computing.  Enter Windows 10 operating system that spans the desktop and mobile computing market with features built-in for the cloud. In order to achieve Microsoft’s cloud vision, the Windows 7 operating system needs to be replaced.

Microsoft is ending support for Windows 7 on January 14, 2020. What does this mean? It means that Microsoft will no longer be distributing “patches” to fix program and security issues identified in Windows 7. Every day after January 14, 2020, the risk to owners of Windows 7 computers goes up. A simple way to calculate the risk is start at zero on January 14, 2020 and add 2 every week. By the end of 2020, the risk factor on Windows 7 would equal 100, meaning security holes would have been identified, documented and exploited by criminals that have no fixes. Ransomware or other malicious software that finds its way to a Windows 7 computer could quickly compromise it. The main factor in successful attacks against computers by criminals is lack of patching on the computer. For regulated industries like healthcare or companies covered by Payment Card Industry requirements, the switch to Windows 10 is mandatory to remain in compliance. 

The launch of Windows 8 introduced the world to Microsoft’s vision of touch computing. Broadly rejected by the market, Windows 8 quickly became Windows 8.1 followed by Windows 10. Windows 10 brought back the Windows 7 desktop user experience that Windows 8 took away. By combining the new features, Microsoft needed to support mobile computing and the cloud, with the user’s ability to maintain the beloved Windows 7 desktop - Microsoft hit on a winning combination.  For anyone hesitant to move to Windows 10 because they only have seen the tile user interface, be assured that Windows 10 can be configured to enter a Windows 7 desktop mode.

Ready for the answer on Windows 7’s birth date?  Windows 7 was launched by Microsoft on October 22, 2009.

Click HERE for more information on Windows 7 retirement.

0 Comments
Continue reading

Windows 10 Upgrade Options

WindowsUpgrade

With the end of Windows 7 less than a year away, we have been getting many calls on how to move from Windows 7 to Windows 10.   There are three options we are presenting to our clients.  They include: 1. Use Windows 10 upgrade rights that may have come with your computer; 2. Upgrade the computer to Windows 10 operating system by purchasing Windows 10; or 3. Replace the Windows 7 computer with a new computer with Windows 10.

Here's the logic we're using to determine the best method for getting a company’s computers on Windows 10 operating system.  The first question - how old is the computer?  If the computer was built in 2017 or 2018 (less than two years old), upgrading the operating system to Windows 10 is an option.  This option gets better if the computer shipped with Windows 10 upgrade rights.  If the computer has Windows 10 upgrade rights, it will be clearly displayed on a sticker on the computer.  If the computer doesn’t have a sticker documenting Windows 10 upgrade rights, the computer doesn’t have upgrade rights.  A client using this option will need to provide DeckerWright Corporation with the manufacturer provided media and Windows 10 license key. 

Why are computers older than two years old bad candidates for being upgraded?  Computer manufacturers change the internal devices of their computers all the time.  A computer purchased three years ago may have devices like video, network and sound that are not supported with manufacturer drivers for Windows 10.  Taking the time to research driver issues to determine if drivers are available is wasted time.  As a result, we have established an upgrade policy that if the computer’s purchase date is older than January 1, 2017, it is not a candidate for being upgraded by DeckerWright Corporation.

If your computer qualifies for an upgrade but you don’t have an upgrade license for Windows 10, how do you get it?  DeckerWright Corporation sells Original Equipment Manufacturer (OEM) versions of Windows 10 installed on a new solid state drive.  The other option for getting Windows 10, is to upgrade an Office 365 license to Microsoft 365.  The Microsoft 365 license includes Exchange Online, Desktop Office 2019 and Windows 10 operating system.  The Microsoft 365 subscription is $20 per month.  If for some reason you drop the Microsoft 365 subscription, the Windows 10 operating system will be put in a zombie state after the subscription ends. 

The last option is replacing the computer with a new computer.  We provide our clients with this full range of options and include additional services to migrate user desktops, favorites, email, documents and other data.  Keep in mind that either the upgrade to Windows 10 or new Windows 10 computers will need to have software re-installed necessitating access to the media and software licensing for any application installed on the Windows 7 computers.  DeckerWright Corporation can take away the pain of upgrading to Windows 10.

Click HERE for more details.

0 Comments
Continue reading

Verifying Messages

CyberCriminal

Cyber attacks have grown much more sinister and cunning over the past year. Cyber criminals are using multiple methods of messaging to get an unsuspecting user to respond and thereby allowing the cyber criminal the means to deploy their malware on your computer system. Here are some examples of recent threats:

  • Email Messages - Cyber criminals compromise or spoof an employee's or trusted senders email account and send out a plausible email sending the recipient to a website, a file link or download. If the recipient follows the directions, they allow the cyber criminal to install malware on their computer.
  • Phone Calls - Cyber criminals have become adept at "spoofing" phone numbers to make a call appear to be from a trusted source. If you receive a call from one of your vendors (eg, credit card company or bank) and they begin to ask for account of user credential information - HANG UP.
  • Text Messages - Cyber criminals are sending carefully crafted text messages with links that can compromise mobile devices. Following the link can install software on the device that allows cyber criminals access.
  • Social Media Messages - Messages from social media platforms can obtain links to websites controlled by cyber criminals. These may be a completely fictitious website, or a website that has been compromised by the cyber criminal to distribute malware to unsuspecting victims. Malware is often disguised as a document to be downloaded on an interesting topic.

How can you protect yourself from becoming a victim?  The first rule of cyber security is trust no one.  If you aren’t expecting to receive a message containing a link or file download, suspect the message is from a cyber criminal.  

The second rule is to verify the authenticity of the message using a different messaging method to a trusted address.  For example, if you receive an email with a link to a file from a trusted sender, but were not expecting the link, reach out to the sender to confirm the authenticity of the request.  DO NOT simply reply to the email asking if the email is okay.  If the cyber criminal has compromised the sender’s email account, they may be the ones responding to you that the email is okay.  Use an alternative messaging method like a phone call or text message to the sender to confirm the message’s authenticity.  Never respond to a sender by replying to the email, calling the number or filling out a form from a link in a suspicious message.  Always go to your contact list and reach out to the sender with a known safe message method.  If you get an email from your credit card company, never call the number in the email, always call the number on the back of your credit card.  This trusted verification process is similar to multi-part authentication used during logins.  Verify to a second, trust source before proceeding.

The third rule is to NEVER download and install either a plug-in or software from any website that is not fully trusted.  DO NOT trust web sites from trade associations and third party experts in your industry.  Website development for small business often use web developers who are not well versed in how to harden websites from being hacked leaving holes cyber criminals can exploit.  Be suspicious of any link that takes you to a location you have never been to before.  Verify the file download by contacting the entity to confirm its safety and authenticity before downloading anything. 

Cyber criminals continue to evolve their techniques for attacking businesses.  As always, knowledge is our best and last line of defense against their success.

Click HERE for more details.

0 Comments
Continue reading

Why Cyber Crime?

CyberCrime

Cyber-crime like other criminal enterprises is a business.  Whether the criminal enterprise is selling drugs, gambling, or prostitution there is an underlying business model where sales minus expenses yields profits for the criminal enterprise.  As state and local governments encroach on the criminal enterprise businesses including gambling (casinos and sports betting) and drugs (marijuana sales), criminal enterprises are looking for new growth opportunities.

What makes cyber-crime so attractive to criminal enterprises?  There are a variety of reasons cyber-crime continues to grow at double digit rates.  These include low barriers to enter, low capital costs to enter the business, and very low risk of prosecution.  If a criminal enterprise’s lines of business are being legislated out of existence, a logical reallocation of capital would be into cyber-crime.  The Dark Web is rich with web sites that for a fee, provide the software, control console and e-mail lists to put you in the crypto-locker business.  Add in a network operations center in a friendly government jurisdiction to avoid prosecution, and you have a formula for making large sums of money.  The establishment of a cyber-crime business unit is significantly less expensive, and easier then setting up a distribution network for drugs in a new region.  Make a few key hires of technical talent and the criminal enterprise is on its way.  Cyber-crime offers the perfect opportunity to expand quickly with fewer people and less risk.

The market in Cyber Crime is relatively small and fragmented today.  As older established criminal enterprises reallocate capital and enter the market expect the growth rate to slow.  With that slowing growth there will be signs of consolidations in the industry.  Unlike corporate America where consolidations are marked by mergers and acquisitions, criminals use more forceful methods to dislodge competitors.  So far, there have been few reports of cyber-criminals having turf wars.  One sign of the cyber-crime market maturing will be reports of cyber-criminals using cyber weapons to attack each other all around the world, and for executives of “tech” companies around the world to go missing. 

Expect the criminal threats to continue to grow into the foreseeable future with law enforcement and technology companies always playing catch-up.

Click HERE for more details.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Latest Blog

Verizon recently came out with its Gigabit internet connection service. We have several clients that have gotten the 1 GIG service only to find that they aren’t getting 1 GIG throughput when they run speed tests, including Verizon’s speed test. Why?There are two main factors...

Account Login