<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="https://www.ultimateitguys.com"  xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>Ultimate IT Guys - Service</title>
 <link>https://www.ultimateitguys.com/tags/service</link>
 <description></description>
 <language>en</language>
<item>
 <title>Enhanced Network Protection</title>
 <link>https://www.ultimateitguys.com/content/enhanced-network-protection</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/medium/public/firewall.png?itok=dNfo7MzB&quot; width=&quot;220&quot; height=&quot;138&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/tags/advanced-service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Advanced Service&lt;/a&gt;      &lt;/li&gt;
          &lt;li class=&quot;field-item odd&quot;&gt;
        &lt;a href=&quot;/tags/service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Service&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
</description>
 <pubDate>Tue, 20 Mar 2018 15:59:58 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">179 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/enhanced-network-protection#comments</comments>
</item>
<item>
 <title>Network Security Assessment</title>
 <link>https://www.ultimateitguys.com/content/network-security-assessment</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/medium/public/Security%20Assessment.png?itok=xTqvUlIz&quot; width=&quot;220&quot; height=&quot;206&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size:22.0pt&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Tahoma&amp;quot;,sans-serif&quot;&gt;&lt;img alt=&quot;Company at Risk?&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/images/companyatrisk1.jpg&quot; style=&quot;width: 468px; height: 180px; float: right;&quot;&gt;9 out of 10 computer networks have potentially serious IT problems sitting undetected.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size:22.0pt&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Tahoma&amp;quot;,sans-serif&quot;&gt;Network Security Assessment&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:105%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family:&amp;quot;Arial&amp;quot;,sans-serif&quot;&gt;As a leading provider of IT services,&lt;/span&gt;&lt;/i&gt;&lt;b&gt; &lt;/b&gt;&lt;span style=&quot;font-family:&amp;quot;Arial&amp;quot;,sans-serif&quot;&gt;we would like to meet with your team and provide a no-obligation health assessment of your computer network and business technology. We will analyze your network to identify vulnerabilities that could leave your organization at risk of a business interruption.&amp;nbsp; Depending on what we uncover, we will also make suggestions on ways to prevent unauthorized access, augment security systems, better lock down sensitive data, become more mobile and, in general, get more out of your existing technology infrastructure.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size:16.0pt&quot;&gt;Our Unique Process Has Many&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size:16.0pt&quot;&gt;Benefits Over Other Assessments&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;margin:0in 0in 0.0001pt 0.5in&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;No software installed, so no one needs to know, including your current IT provider.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin:0in 0in 0.0001pt 0.5in&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;No agents or probes living on your network for days, weeks, or longer&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin:0in 0in 0.0001pt 0.5in&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;An average, mid-sized network is scanned quickly, taking around 30 minutes per PC to get the job done&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;Here’s What You Get&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;This 6-8 page Executive Summary will provide you with an overview of the devices on the network along with a network Risk Score and analysis of each potential issue we uncover. We will review this document with you, discuss the findings, in detail, and answer any questions you may have.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;table align=&quot;left&quot; class=&quot;Table&quot; style=&quot;width:576.8pt; background:gray; border-collapse:collapse; margin-left:6.75pt; margin-right:6.75pt; border:none&quot; width=&quot;769&quot;&gt;
&lt;tbody&gt;
&lt;tr style=&quot;height:21.8pt&quot;&gt;
&lt;td style=&quot;border-bottom:solid windowtext 1.0pt; background:#ff9600; width:107.3pt; border-top:none; border-left:none; border-right:solid windowtext 1.0pt; padding:0in 5.4pt 0in 5.4pt; height:21.8pt&quot; valign=&quot;top&quot; width=&quot;143&quot;&gt;
&lt;p align=&quot;center&quot; class=&quot;MsoNoSpacing&quot; style=&quot;text-align:center; margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size:16.0pt&quot;&gt;&lt;span style=&quot;color:#f2f2f2&quot;&gt;Category&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;border:none; border-bottom:solid windowtext 1.0pt; background:#ff9600; width:469.5pt; padding:0in 5.4pt 0in 5.4pt; height:21.8pt&quot; valign=&quot;top&quot; width=&quot;626&quot;&gt;
&lt;p align=&quot;center&quot; class=&quot;MsoNoSpacing&quot; style=&quot;text-align:center; margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size:16.0pt&quot;&gt;&lt;span style=&quot;color:#f2f2f2&quot;&gt;What We Uncover&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height:21.8pt&quot;&gt;
&lt;td style=&quot;border-bottom:solid windowtext 1.0pt; background:#ffd966; width:107.3pt; border-top:none; border-left:none; border-right:solid windowtext 1.0pt; padding:0in 5.4pt 0in 5.4pt; height:21.8pt&quot; valign=&quot;top&quot; width=&quot;143&quot;&gt;
&lt;p align=&quot;right&quot; class=&quot;MsoNoSpacing&quot; style=&quot;text-align:right; margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;Hardware:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;border:none; border-bottom:solid windowtext 1.0pt; background:#ffd966; width:469.5pt; padding:0in 5.4pt 0in 5.4pt; height:21.8pt&quot; valign=&quot;top&quot; width=&quot;626&quot;&gt;
&lt;ul&gt;
&lt;li class=&quot;MsoNoSpacing&quot; style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Servers, Workstations, Printers, and non-AD devices (like switches/routers/printers).&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNoSpacing&quot; style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Old computers which are still joined to the domain and have not been removed.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height:35.95pt&quot;&gt;
&lt;td style=&quot;border-bottom:solid windowtext 1.0pt; background:#ffe599; width:107.3pt; border-top:none; border-left:none; border-right:solid windowtext 1.0pt; padding:0in 5.4pt 0in 5.4pt; height:35.95pt&quot; valign=&quot;top&quot; width=&quot;143&quot;&gt;
&lt;p align=&quot;right&quot; class=&quot;MsoNoSpacing&quot; style=&quot;text-align:right; margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;Software:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;border:none; border-bottom:solid windowtext 1.0pt; background:#ffe599; width:469.5pt; padding:0in 5.4pt 0in 5.4pt; height:35.95pt&quot; valign=&quot;top&quot; width=&quot;626&quot;&gt;
&lt;ul&gt;
&lt;li class=&quot;MsoNoSpacing&quot; style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Systems with missing Patches/Service Packs/Security Updates.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNoSpacing&quot; style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Local accounts (per-system) with weak/insecure passwords.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNoSpacing&quot; style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Systems with missing Anti-Virus, Anti-Spyware, or firewall misconfiguration.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height:38.65pt&quot;&gt;
&lt;td style=&quot;border-bottom:solid windowtext 1.0pt; background:#ffd966; width:107.3pt; border-top:none; border-left:none; border-right:solid windowtext 1.0pt; padding:0in 5.4pt 0in 5.4pt; height:38.65pt&quot; valign=&quot;top&quot; width=&quot;143&quot;&gt;
&lt;p align=&quot;right&quot; class=&quot;MsoNoSpacing&quot; style=&quot;text-align:right; margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;Configuration:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;border:none; border-bottom:solid windowtext 1.0pt; background:#ffd966; width:469.5pt; padding:0in 5.4pt 0in 5.4pt; height:38.65pt&quot; valign=&quot;top&quot; width=&quot;626&quot;&gt;
&lt;ul&gt;
&lt;li class=&quot;MsoNoSpacing&quot; style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Security policy inconsistency across network servers/computers.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNoSpacing&quot; style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Outbound system access that should be blocked.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNoSpacing&quot; style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Lack of Content filtering (Social Media, Entertainment, Pornography, Illegal Downloads).&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height:21.35pt&quot;&gt;
&lt;td style=&quot;border-bottom:solid windowtext 1.0pt; background:#ffe599; width:107.3pt; border-top:none; border-left:none; border-right:solid windowtext 1.0pt; padding:0in 5.4pt 0in 5.4pt; height:21.35pt&quot; valign=&quot;top&quot; width=&quot;143&quot;&gt;
&lt;p align=&quot;right&quot; class=&quot;MsoNoSpacing&quot; style=&quot;text-align:right; margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;Accessibility:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;border:none; border-bottom:solid windowtext 1.0pt; background:#ffe599; width:469.5pt; padding:0in 5.4pt 0in 5.4pt; height:21.35pt&quot; valign=&quot;top&quot; width=&quot;626&quot;&gt;
&lt;ul&gt;
&lt;li class=&quot;MsoNoSpacing&quot; style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Misconfiguration of user access to Network Shares.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNoSpacing&quot; style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Detailed breakdown of AD Security Group Membership.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height:36.85pt&quot;&gt;
&lt;td style=&quot;border:none; background:#ffd966; width:107.3pt; border-right:solid windowtext 1.0pt; padding:0in 5.4pt 0in 5.4pt; height:36.85pt&quot; valign=&quot;top&quot; width=&quot;143&quot;&gt;
&lt;p align=&quot;right&quot; class=&quot;MsoNoSpacing&quot; style=&quot;text-align:right; margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;Security Risks:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;border:none; background:#ffd966; width:469.5pt; padding:0in 5.4pt 0in 5.4pt; height:36.85pt&quot; valign=&quot;top&quot; width=&quot;626&quot;&gt;
&lt;ul&gt;
&lt;li class=&quot;MsoNoSpacing&quot; style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Old user account which still have access and have not been properly disabled.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNoSpacing&quot; style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Internal systems with open ports that pose a potential security risk.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNoSpacing&quot; style=&quot;margin:0in 0in 0.0001pt&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;External issues which put your network at risk of business disruption or data loss.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/tags/advanced-service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Advanced Service&lt;/a&gt;      &lt;/li&gt;
          &lt;li class=&quot;field-item odd&quot;&gt;
        &lt;a href=&quot;/tags/service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Service&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
</description>
 <pubDate>Mon, 19 Mar 2018 02:04:20 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">177 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/network-security-assessment#comments</comments>
</item>
<item>
 <title>Everywhere Protection</title>
 <link>https://www.ultimateitguys.com/content/everywhere-protection</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/medium/public/evry-ware-backup-%231.png?itok=P6QKkgGr&quot; width=&quot;220&quot; height=&quot;143&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;p style=&quot;margin-right:0pt; margin-top:0pt; margin-bottom:6pt; text-align:left&quot;&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span lang=&quot;en-US&quot; style=&quot;font-size:16.0pt&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;language:en-US&quot;&gt;Our lives today are so connected to our technology. We are always connected and tend to work even when we are outside of the office. Everywhere Protection has you covered at work, at home, &amp;amp; on the go. You are secure everywhere and all the time.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&quot;margin-right:0pt; margin-top:0pt; margin-bottom:6pt; text-align:left&quot;&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span lang=&quot;en-US&quot; style=&quot;font-size:16.0pt&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;language:en-US&quot;&gt;Our partner’s protection network&amp;nbsp; processes more than 25 Billion&amp;nbsp;transactions per day and blocks over 300 Million threats per day.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&quot;margin-right:0pt; margin-top:0pt; margin-bottom:6pt; text-align:left&quot;&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&quot;margin-right:0pt; margin-top:0pt; margin-bottom:6pt; text-align:left&quot;&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span lang=&quot;en-US&quot; style=&quot;font-size:16.0pt&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;language:en-US&quot;&gt;This quality of protection is normally only available to the largest of the Fortune 500 companies.&amp;nbsp; Now you can use the same protection that Microsoft, Dell, HP and Google use to protect their networks &amp;amp; devices.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&quot;margin-right:0pt; margin-top:0pt; margin-bottom:6pt; text-align:left&quot;&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri; font-size: 10pt; letter-spacing: 0.2pt; word-spacing: 1.1pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&quot;margin-right:0pt; margin-top:0pt; margin-bottom:6pt; text-align:left&quot;&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span lang=&quot;en-US&quot; style=&quot;font-size:20.0pt&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;language:en-US&quot;&gt;Advanced protection for all of your devices; PC, Mac, Laptop, Tablet or phone.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&quot;margin-right:0pt; margin-top:0pt; margin-bottom:6pt; text-align:left&quot;&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span lang=&quot;en-US&quot; style=&quot;font-size:20.0pt&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;language:en-US&quot;&gt;Covers up to 5 devices per user&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&quot;margin-right:0pt; margin-top:0pt; margin-bottom:6pt; text-align:left&quot;&gt;&lt;span style=&quot;font-size:16px;&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Your Secure Web Gateway in the cloud for&amp;nbsp;any user, anywhere, on any device Our Everywhere&amp;nbsp;Security Protection provides enforcement of Web policy and state-of-the-art threat&amp;nbsp;protection for your business users. Service options range from easy-to-deploy DNS filtering to multilayered&amp;nbsp;defense-in-depth, protecting you from a broad range of threats including malicious&amp;nbsp;URL requests,&amp;nbsp;phishing attacks, viruses, zero-day malware, botnets, and much more.&amp;nbsp;&amp;nbsp;Benefits include:&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&quot;margin-right:0pt; margin-top:0pt; margin-bottom:6pt; text-align:left&quot;&gt;&lt;span style=&quot;font-size:16px;&quot;&gt;&lt;span style=&quot;line-height:119%&quot;&gt;&lt;span style=&quot;font-family:Calibri&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;strong&gt;Internet Security at Cloud Speed&lt;/strong&gt;—The IT landscape has changed dramatically,&amp;nbsp;with data and applications moving to the cloud and employees who are mobile and&amp;nbsp;connected everywhere—essentially, the corporate perimeter is disappearing, and&amp;nbsp;traditional security appliances are increasingly outgunned. Only security operating&amp;nbsp;100% from a global, elastic, multi-tenant cloud can deliver the instantaneous&amp;nbsp;intelligence and processing power adequate to today’s threat landscape—including&amp;nbsp;inspection of SSL traffic.&amp;nbsp; Our partner, Cyren operates the industry’s largest global security cloud&amp;nbsp;—they process over 25 billion transactions a day from over 1 billion users in over 180&amp;nbsp;countries.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-size:16px;&quot;&gt;&lt;strong&gt;Zero-Day Malware Protection&lt;/strong&gt;—Advanced Threat Protection&amp;nbsp;module applies cloud-scale advanced malware analysis, including industry-first&lt;br&gt;Cloud Sandbox Array technology, to analyze and block the latest generation of&amp;nbsp;highly evasive cyber threats.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-size:16px;&quot;&gt;&lt;strong&gt;Always Up to Date, Everywhere&lt;/strong&gt;—With Cyren’s security cloud protecting your&amp;nbsp;traffic, your web security is always the latest and best, for all your users and at all&amp;nbsp;your business locations—or wherever your users happen to be. When our global&amp;nbsp;intelligence network detects a threat, that defense is incorporated in real time into&amp;nbsp;our security cloud and immediately protects all users—there are no time-consuming&amp;nbsp;updates to “roll out”.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-field-file field-type-file field-label-above&quot;&gt;&lt;h3 class=&quot;field-label&quot;&gt;File:&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;span class=&quot;file&quot;&gt;&lt;img class=&quot;file-icon&quot; alt=&quot;PDF icon&quot; title=&quot;application/pdf&quot; src=&quot;/modules/file/icons/application-pdf.png&quot; /&gt; &lt;a href=&quot;https://www.ultimateitguys.com/sites/default/files/Everywhere%20Protection.pdf&quot; type=&quot;application/pdf; length=1383669&quot;&gt;Everywhere Protection.pdf&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/tags/advanced-service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Advanced Service&lt;/a&gt;      &lt;/li&gt;
          &lt;li class=&quot;field-item odd&quot;&gt;
        &lt;a href=&quot;/tags/service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Service&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
</description>
 <pubDate>Thu, 15 Mar 2018 14:33:47 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">176 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/everywhere-protection#comments</comments>
</item>
<item>
 <title>Backup</title>
 <link>https://www.ultimateitguys.com/content/backup</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/medium/public/CloudBackup.png?itok=4vz2H9zU&quot; width=&quot;203&quot; height=&quot;220&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;Our off-site backup service is secure and worry free for you. We monitor the backup jobs and watch for any issues, so you don’t have to worry with it. This offers a much better alternative to using a USB hard drive that can fail and usually runs software that is not very reliable. The real measure of a backup solution is, do you have a good backup and can you successfully restore it. We have successfully restored every customer that has needed their backup.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/tags/base-service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Base Service&lt;/a&gt;      &lt;/li&gt;
          &lt;li class=&quot;field-item odd&quot;&gt;
        &lt;a href=&quot;/tags/service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Service&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
</description>
 <pubDate>Thu, 08 Mar 2018 21:00:23 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">175 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/backup#comments</comments>
</item>
<item>
 <title>Remote Access</title>
 <link>https://www.ultimateitguys.com/content/remote-access</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/medium/public/remote-access.png?itok=NEZmyYmQ&quot; width=&quot;212&quot; height=&quot;220&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;We can set you up to securely access your computer at the office while you are at home or traveling.  You can work on your computer just like you were sitting at your desk and you can even chose to print at your office or your remote location.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/tags/base-service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Base Service&lt;/a&gt;      &lt;/li&gt;
          &lt;li class=&quot;field-item odd&quot;&gt;
        &lt;a href=&quot;/tags/service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Service&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
</description>
 <pubDate>Thu, 08 Mar 2018 18:29:36 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">174 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/remote-access#comments</comments>
</item>
<item>
 <title>Dark Web Monitoring</title>
 <link>https://www.ultimateitguys.com/content/dark-web-monitoring</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/medium/public/darkweb.png?itok=zPrfKOKy&quot; width=&quot;178&quot; height=&quot;220&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;div style=&quot;float: right;padding-left: 10px;&quot;&gt;
&lt;iframe allow=&quot;autoplay; encrypted-media&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/p7XpSLkVHno?rel=0&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h2&gt;The Dark Web&lt;/h2&gt;
&lt;p&gt;Have you watched the news, TV, or a movie recently?&amp;nbsp; Then you probably have heard&amp;nbsp;someone mention the Dark Web.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;The Dark Web - What is it and why do I care?&lt;/h3&gt;
&lt;p&gt;Dark Web is a subset of the internet, where as the name implies there is a lot of shady activity.&amp;nbsp; The Dark Web has several purposes, but the main thing to be concerned about is that it is home to many hacker communities and organized crime groups.&amp;nbsp; Almost anything imaginable is for sale on the Dark Web.&amp;nbsp; Of importance to us is that much of the information that has been stolen in the data breaches that you hear about in the news is for sale on the Dark Web.&lt;/p&gt;
&lt;h3&gt;Why do I Care about the Dark Web?&lt;/h3&gt;
&lt;p&gt;The main reason that you should care about the Dark Web is because chances are that your information is for sale by hackers on the Dark Web.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Most people have been a victim of a Third Party Data Breach such as Experian, Equifax, Yahoo, or Uber.&amp;nbsp; This information includes things like your name, address, phone number, email address, passwords, security question/answers, social security numbers, credit card numbers, many other personal details.&amp;nbsp; According to many experts and our own research, about 60 to 80% of people have some of their information for sale on the black market by hackers.&amp;nbsp; This black market of information is located in many places on the Dark Web.&amp;nbsp; If your information is on the Dark Web, you are at a much higher risk for being a target for spear phishing attacks, identity theft, ransomware and other really bad stuff that you do not want happening to you.&lt;/p&gt;
&lt;h3&gt;OK, I Care, but What Should I Do?&lt;/h3&gt;
&lt;p&gt;Fill out the form on this page and we will check your email address against the records on the Dark Web and send you a complimentary report of our findings.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Depending on what we find, there are several possible actions to take to clean up the security mess.&amp;nbsp; We can help you repair the damage to your personal and business information.&amp;nbsp; We can help you be safe again and stay safe going forward.&lt;/p&gt;
&lt;p&gt;If you are part of a business, consider a Security Assessment or adding on-going data breach risk scanning to see how vulnerable your network and computers are to losing information to hackers.&lt;/p&gt;
&lt;p&gt;Also, consider our Dark Web Monitoring Service.&amp;nbsp; This monitors your business or personal information to see if it shows up for sale on the Dark Web.&amp;nbsp; Taking swift action is critical to staying safe.&lt;/p&gt;
&lt;p&gt;Our service is designed to help organizations detect and mitigate cyber threats that leverage stolen email addresses and passwords. Dark Web ID leverages a combination of human and artificial intelligence that scours botnets, criminal chat rooms, blogs, Websites and bulletin boards, Peer to Peer networks, forums, private networks, and other black-market sites 24/7, 365 days a year to identify stolen credentials and other personally identifiable information (PII).&lt;/p&gt;
&lt;/div&gt;
&lt;link href=&quot;//cdn-images.mailchimp.com/embedcode/classic-10_7.css&quot; rel=&quot;stylesheet&quot; type=&quot;text/css&quot;&gt;
&lt;!--End mc_embed_signup--&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/tags/advanced-service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Advanced Service&lt;/a&gt;      &lt;/li&gt;
          &lt;li class=&quot;field-item odd&quot;&gt;
        &lt;a href=&quot;/tags/service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Service&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
</description>
 <pubDate>Tue, 06 Mar 2018 20:29:33 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">172 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/dark-web-monitoring#comments</comments>
</item>
<item>
 <title>Business Email</title>
 <link>https://www.ultimateitguys.com/content/business-email</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/medium/public/email.png?itok=Sue28loj&quot; width=&quot;220&quot; height=&quot;183&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;h3 style=&quot;margin: 0in 0in 8pt;&quot;&gt;&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span style=&quot;tab-stops: 210.75pt;&quot;&gt;&lt;span style=&quot;line-height: 107%;&quot;&gt;&lt;span style=&quot;font-family: Calibri,sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 16pt;&quot;&gt;&lt;span style=&quot;line-height: 107%;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,serif;&quot;&gt;Business quality Email is more secure &amp;amp; more reliable.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style=&quot;margin: 0in 0in 8pt;&quot;&gt;&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span style=&quot;tab-stops: 210.75pt;&quot;&gt;&lt;span style=&quot;line-height: 107%;&quot;&gt;&lt;span style=&quot;font-family: Calibri,sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;line-height: 107%;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,serif;&quot;&gt;You can have your own business quality Email account for just pennies per day.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span style=&quot;line-height: normal;&quot;&gt;&lt;span&gt;&lt;span style=&quot;font-family: Calibri,sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;&lt;span style=&quot;color: rgb(226, 26, 44);&quot;&gt;BUSINESS EMAIL BENEFITS&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;margin: 0in 0in 0pt 0.5in;&quot;&gt;&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span style=&quot;line-height: normal;&quot;&gt;&lt;span&gt;&lt;span style=&quot;font-family: Calibri,sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;Large Mailboxes &amp;amp; Bigger Attachments&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0in 0in 0pt 0.5in;&quot;&gt;&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span style=&quot;line-height: normal;&quot;&gt;&lt;span&gt;&lt;span style=&quot;font-family: Calibri,sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;Synch Email with your phone or tablet&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0in 0in 0pt 0.5in;&quot;&gt;&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span style=&quot;line-height: normal;&quot;&gt;&lt;span&gt;&lt;span style=&quot;font-family: Calibri,sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;No Advertisements&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0in 0in 0pt 0.5in;&quot;&gt;&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span style=&quot;line-height: normal;&quot;&gt;&lt;span&gt;&lt;span style=&quot;font-family: Calibri,sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;More Professional&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0in 0in 8pt 0.5in;&quot;&gt;&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span style=&quot;line-height: normal;&quot;&gt;&lt;span&gt;&lt;span style=&quot;font-family: Calibri,sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;We use 4 layers of Spam Filtering and Virus Scanning to keep your email safe and secure&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;margin: 0in 0in 8pt;&quot;&gt;&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span style=&quot;line-height: normal;&quot;&gt;&lt;span style=&quot;tab-stops: 210.75pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;Research shows that companies using business quality Email have 75% fewer problems with viruses and scams.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/tags/base-service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Base Service&lt;/a&gt;      &lt;/li&gt;
          &lt;li class=&quot;field-item odd&quot;&gt;
        &lt;a href=&quot;/tags/service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Service&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
</description>
 <pubDate>Tue, 13 Feb 2018 22:24:28 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">165 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/business-email#comments</comments>
</item>
<item>
 <title>Remote Support</title>
 <link>https://www.ultimateitguys.com/content/remote-support</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/medium/public/remotesupport_0.png?itok=FwX4AdQ2&quot; width=&quot;220&quot; height=&quot;198&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;h3&gt;&lt;strong&gt;What is Remote Support? &lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;It means that we are able to help you with issues without having to physically come to your office. This saves you both time and money. We use a piece of software that allows us to securely connect to your computer to see what you are seeing and even make changes for you, just like we were sitting at your computer with you. We also use this same tool for helping run monitoring and preventative maintenance jobs on your computer.&lt;/p&gt;
&lt;p&gt;Remote support is helpful for the quick questions like:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What is this strange message on my screen?&lt;/li&gt;
&lt;li&gt;Is this a real update or a scam message?&lt;/li&gt;
&lt;li&gt;I&#039;m having trouble getting to my email today&lt;/li&gt;
&lt;li&gt;My screen is upside down.&amp;nbsp; How do I get it back to normal?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We can also remote in to help you install new software or upgrade exisiting software, troubleshoot problems or just help guide you through something that you have never done before.&amp;nbsp; It is just like having your own IT Guy looking over your shoulder helping you.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/tags/base-service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Base Service&lt;/a&gt;      &lt;/li&gt;
          &lt;li class=&quot;field-item odd&quot;&gt;
        &lt;a href=&quot;/tags/service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Service&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
</description>
 <pubDate>Tue, 13 Feb 2018 22:23:04 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">164 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/remote-support#comments</comments>
</item>
<item>
 <title>Anti-Virus</title>
 <link>https://www.ultimateitguys.com/content/anti-virus</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/medium/public/antivirus-transparent.png?itok=Lx8GVigh&quot; width=&quot;192&quot; height=&quot;220&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;We provide you with top of the line business class anti-virus software that is capable of detecting and stopping today&#039;s threats.&lt;/p&gt;
&lt;p&gt;We don&#039;t just install the anti-virus and walk away. We are able to monitor the anti-virus to make sure that it is working. When it detects a problem, we know about it and are able to make sure that it removes all traces of the problem.&lt;/p&gt;
&lt;p&gt;Our anti-virus solution also has advanced features that work to&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Stop Ransomware&lt;/li&gt;
&lt;li&gt;Filter out bad or undesireable websites&lt;/li&gt;
&lt;li&gt;Prevent data loss&lt;/li&gt;
&lt;li&gt;Scan encrypted traffic&lt;/li&gt;
&lt;li&gt;Detect intruders or suspicious activity&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you are using consumer anti-virus to protect your computer, you are just fooling yourself with a false sense of security.&amp;nbsp; The consumer anti-virus software that you get at the local discount store or bargain shop online just don&#039;t have what it takes to actually keep your business safe.&amp;nbsp; Don&#039;t buy your security software at the same place that you get your underwear and kitty litter.&amp;nbsp; They don&#039;t know anything about computer security.&amp;nbsp; If you are in business, then you need business class security software.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/tags/base-service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Base Service&lt;/a&gt;      &lt;/li&gt;
          &lt;li class=&quot;field-item odd&quot;&gt;
        &lt;a href=&quot;/tags/service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Service&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
</description>
 <pubDate>Tue, 13 Feb 2018 16:56:49 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">163 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/anti-virus#comments</comments>
</item>
<item>
 <title>Preventative Maintenance</title>
 <link>https://www.ultimateitguys.com/content/preventative-maintenance</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/medium/public/preventative-maintenance.png?itok=zVSK4G70&quot; width=&quot;220&quot; height=&quot;220&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;h3&gt;&lt;strong&gt;Why do I need to cleanup my computer?&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Keeping your computer cleaned up helps your computer to run at its best. All computers naturally get slower over time. A slow computer means less productivity and more problems. Usually the problems are not readily noticeable, because the slow down happens over time and not all at once. A major cause of this slowdown is from temporary files that your web browser and programs create while you are working, reading email or surfing the internet. By removing these temporary files periodically your computer will run faster and have fewer problems.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;What does Preventative Maintenance mean? &lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The idea is to get ahead of the issues and fix them before they have a chance to become a big problem.&lt;/p&gt;
&lt;p&gt;We do this by:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Monitoring for potential problems and issues so they can be dealt with before they become a big problem&lt;/li&gt;
&lt;li&gt;Periodically check and run updates for Windows • Periodically check and run updates for other programs (Google Chrome, Adobe Reader, Java, etc)&lt;/li&gt;
&lt;li&gt;Cleanup temporary and other junk files&lt;/li&gt;
&lt;li&gt;Cleanup junk programs that have been accidentally installed&lt;/li&gt;
&lt;li&gt;Check the hard drive for errors and organize the files on the hard drive for faster access. This is commonly referred to as Defragging the hard drive.&lt;/li&gt;
&lt;li&gt;Basic Risk Scanning checks for problems that would cause your computers to be out of compliance with PCI (credit card) or HIPAA rules. This is a simplified, automated version of the Enhanced Risk Scans and reports that we manually ran during the HIPAA discovery.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;By having Preventative Maintenance, your computer runs better and is safer. This means you can get your work done and have a less stressful computer experience.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Why do I need Preventative Maintenance? &lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Maintenance helps keep your computer safe and running at its best.&lt;/p&gt;
&lt;p&gt;Keeping your computer updated helps you to stay more secure and decreases the chance of being a victim of viruses, malware, hacking, and scams. Most updates for Windows or your programs are usually to fix a security hole. An up to date computer also will have fewer problems, so you can work more efficiently.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/tags/base-service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Base Service&lt;/a&gt;      &lt;/li&gt;
          &lt;li class=&quot;field-item odd&quot;&gt;
        &lt;a href=&quot;/tags/service&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Service&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
</description>
 <pubDate>Tue, 13 Feb 2018 16:51:56 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">162 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/preventative-maintenance#comments</comments>
</item>
</channel>
</rss>
