Blog Post

Apple's iOS 17 brings many new accessibility features aimed to lighten cognitive load. Among these features is Assistive Access. "Assistive Access uses innovations in design to distill apps and experiences to their essential features in order to lighten cognitive load" (Apple, 2023). This brings many cognitive accessibility features to the table. Tim Cook aims for Apple to be usable by any one with disabilities. Key Features of Assistive Access "Assistive access includes a customized experience for Phone and FaceTime, which have been combined into a single Calls app, as well as Messages, Camera, Photos, and Music. The feature offers a distinct interface with high contrast buttons and large text labels, as well as tools to help trusted supporters tailor the experience for the individual they support" (Miller, 2023). This makes it much easier to see apps and text on the screen, as well as streamlining the most essential apps. "For example, for users who prefer communicating visually, Messages includes an emoji-only keyboard and the option to record a voice message to share with loved ones" (Miller, 2023). How to Setup Assistive Access on iPhone Make sure you have iOS 17 installed. Step 1: Go to Settings > Accessibility > Assistive Access, tap Set Up Assistive Access, then tap Continue. Step 2: Verify Apple ID. Step 3: Choose layouts for apps. Step 4: Choose and customize apps. Step 5: Verify device passcode. Step 6: Set Assistive Access passcode. Step 7: Learn how to exit assistive access. Step 8: To enter Assistive Access later, go to Settings > Accessibility > Assistive Access, tap Start Assistive Access, then enter the Assistive Access passcode (Apple Support, 2023). These steps can be found in more detail here Need help setting up Assistive Access? Contact Us References Apple. “Apple Introduces New Features for Cognitive Accessibility, Along With Live Speech, Personal Voice, and Point and Speak in Magnifier.” Apple Newsroom, 28 Aug. 2023, apple.com/newsroom/2023/05/apple-previews-live-speech-personal-voice-and-more-new-accessibility-features Miller, Chance. “Apple Previews iOS 17 Accessibility Features: Assistive Access, Personal Voice and Live Speech, More - 9to5Mac.” 9to5Mac, 16 May 2023, 9to5mac.com/2023/05/16/apple-ios-17-accessibility-features “Set up Assistive Access on iPhone.” Apple Support, support.apple.com/guide/assistive-access-iphone/set-up-assistive-access-devcd5016d31/17.0/ios/17.0        ...

You’ve likely seen news coverage of ransomware targeting large companies or hospitals. Maybe you’ve seen Homeland when Claire Danes’ character falls victim to laptop ransomware during a surveillance mission. But did you know that ransomware attackers can also target your smartphone? A smartphone, after all, is a portable computer in your palm. Take a moment to imagine being locked out of your own phone. The hackers could gain access to your saved passwords and emails. You could lose access to your contacts, notes, and images, and even your three years’ worth of effort on Candy Crush. What You Need to Know About Smartphone Ransomware Also known as mobile ransomware, these attacks infect your smartphone. Instead of stealing the actual device, the bad actors take it hostage. They typically encrypt your data and make it so you can’t do anything. It may not be as widely publicized, but there’s already a long list of smartphone ransomware programs. The list continues to grow with examples such as ScarePackage, LeakerLocker, and LockerPin. ScarePackage can infect more than 900,000 phones in a single month. And before you think, “That won’t happen on my iPhone,” know that no smartphone manufacturer is secure. The type of ransomware may vary due to the different operating systems, but you can be at risk on both Android and an iPhone. Unlike other malware, the hackers usually want you to know they’ve gained control. Typically, they will notify you on your lock screen or home screen. You’ll often see a list of demands and a deadline to comply. That said, some mobile ransomware stealthily steals your data. What To Do About Mobile Ransomware The first thing to do? Be cautious. Keep these best practices in mind always: Regularly update your device's operating system and applications to patch any security vulnerabilities. Exercise caution when downloading or installing apps from untrusted sources. Avoid clicking on suspicious links or opening email attachments from unknown senders. Enable app and system updates to ensure you have the latest security patches. If you become a ransomware victim, try to disconnect your device from the internet. Turning off Wi-Fi and mobile data limits communication with the attacker’s server. Avoid paying the ransom. It’s tempting but not recommended. You are counting on hackers to keep their word and provide the encryption key. You can find decryption tools online for less complex ransomware. If the ransomware came from a malicious app, immediately delete that app if you can. What you can do will depend on the specific ransomware variety. In general, it's best to seek professional help. Work with an IT expert who can remove ransomware without further compromising your device. We can also help you restore clean, unaffected backups. Contact us today at 570-235-1946 or by filling out a contact form....

Is Your Laptop Overheating? Does your laptop have overheating issues?? Electronic components, including large capacity batteries, become warm in use.? Your laptop should never become too hot to handle though.? When a laptop turns hot to the touch or starts to sound like a jet engine, it's likely overheating. Modern laptops use nearly silent fans to cool components and keep the system is comfortable and safe to use.? In some cases, the sound the computer makes is the best tool you have to diagnose its running condition.? Excessive heat causes the fans to work harder and faster to compensate.? This jet engine sound is one of the first clues you have to indicate all may not be well. Why So Hot Because of their compact size and portability, laptop computers are particularly prone to overheating problems.? Their tiny footprint puts electronic parts closer together, creates less room for cooling vents and adds a heat generating battery which introduces more hot air into the system. Most laptops have small fans that suck in cool air,?passing it over metal fins to exchange heat from the case. The resulting hot air exhaust is expelled through vents back into the room.? This process prevents heat building up inside the machine.? The constant air cycle keeps the laptop running cool no matter the workload placed on it. This process can be interrupted by any number of factors during operation.? Alongside cool air, computer fans can also suck in dust, stray hairs, even cigarette smoke too.? Smoke in particular contains thick tar which coats the fins, fan blades, and internal components. Foreign debris inside the machine prevents components from working at their best.? Tar, dust, and hair slows down the internal fan and coats the heat generating components and cooling fins.? This coating prevents air exchange and keeping components warm as if they were under a blanket. Causes of Overheating Sometimes the way a laptop is used can cause it to overheat too.? Resting a laptop on thick carpets, blankets, or soft furnishings can block vents, preventing the fans from sucking cold air in or blowing hot air out. Leaving the machine running on carpet or furnishings can cause overheating issues and introduce extra dust into the components too. The best place to rest a laptop while in use is on a hard surface such as a desk, table, or lap tray.? This allows air free access to the vents and helps prevent dust and hairs getting inside the machine. You may also consider using a laptop cooling fan stand Overheating Results As the computer starts running hotter for longer, its fan will attempt to compensate by running faster and more often.? This results in the "jet engine" noise many users report when their computer is struggling to keep up. Unfortunately, once dust, hair, or tar has already found its way into the machine it is notoriously difficult to clean out.? The only way to reset the machine to run cool and quiet is to disassemble the base and clean out its components. Much like a car engine, computer components have a designed temperature range in which they can safely and reliably operate without any issues.? Extended periods of running above the temperature they are designed for can cause damage, sudden failures, and drastically shorten the designed lifespan of the computer. Unlikely Causes Often times seemingly random blue screen computer crashes can be traced back to components that have been overheating inside the computer.? As heat builds up, vulnerable components start to fail, sometimes temporarily, in the hotter temperatures. By the time the computer is rebooted and cooled down the issue is seemingly resolved.? Back in operation, the computer heats up once more and eventually crashes again.? These irregular crashes are highly inconvenient and can sometimes cause data loss too. However, these symptoms are minor compared to a complete write-off of the machine.? For some users, the first sign that their machine is too hot to run safely is when the motherboard is burnt out or their data storage has been irreparably lost. Check out this YouTube video made by HP Support that goes over How to Prevent Overheating an HP Laptop: If your laptop is running hot to the touch or has started to sound loud or irregular, bring it to us for a thorough clean. Visit our Contact Page or give us a call at 570-235-1946. ...

Information technology (IT) has more than its fair share of acronyms. Often, it’s a matter of one letter differentiating the options. So, when it comes to MSPs and MSSPs, what’s the distinction? With MSP and MSSP you compare managed service providers with managed security service providers. But since MSPs also work to secure your IT infrastructure, the names alone don’t tell you enough. ?   Key Differences Between an MSP and MSSP Distinguishing between these two can help determine which one better suits your business. The following helps you compare the options. Scope of Services MSPs and MSSPs focus on different aspects of IT management. MSPs typically manage, update, and maintain IT infrastructure and applications. They ensure business technology runs smoothly. They perform network and system health monitoring, as well as proactive maintenance. MSSPs specialize in security to protect networks, systems, and data from cyber threats. They protect your business from potential security breaches and support regulatory compliance. Practical example: An MSP might manage email, backup and recovery, or software updates, whereas the MSSP would offer services such as threat monitoring, vulnerability scanning, or incident response. Skill Set/Experience MSPs offer a more generalized understanding of IT and security best practices. They can oversee your IT operations either as a partner or your outsourced IT department. The MSSP’s experts typically specialize more in cybersecurity. They identify and mitigate complex security risks. Practical example: An MSP might have general IT technicians on staff. An MSSP's team specializes in areas such as penetration testing, threat intelligence, or compliance. Service Level Agreements (SLAs) MSPs and MSSPs meet different needs, so their SLAs are distinct. Expect an MSP to focus on response times, system uptime, or ticket resolution. The MSSP's SLA might relate more to incident metrics, such as detection and response times. Practical example: An MSP may guarantee a response time of four hours to resolve a system issue. The MSSP may guarantee to detect and respond to a security incident within 30 minutes. Cost Structure Expect different pricing structures depending on the service scope and expertise required. MSPs typically charge a fixed monthly fee based on the number of devices or services managed. This often costs significantly less than working with an MSSP. MSSPs may charge a combination of fixed and variable fees based on the number of security events, incident response, or forensic investigations. Practical example: An MSP might charge $50 per device per month. The MSSP might charge a flat fee of $5000 per month. You might also pay extra fees for remediating security incidents. Deciding on the Best Provider If your business primarily needs help with routine IT tasks, an MSP might be the best fit. Businesses with limited budgets or smaller-scale needs may also find MSPs more cost-effective. When you have sensitive data or compliance requirements, you could need an MSSP. MSSPs often have a deeper understanding of standards such as HIPAA, PCI-DSS, or GDPR. Choosing the wrong provider can waste resources and leave you potentially vulnerable. Contact our experts at 570-235-1946 or visit our Contact Page. We can help you make informed decisions about your IT management and security needs....

“What’s that password again? Wait, I changed it … Harrumph. I don’t remember!” We’ve all been there, sometimes many times a day. Password autofill on our Web browsers felt like the sun was shining on our online activity again. Sorry to tell you, but this convenience may not be entirely safe. Most browsers will ask after you’ve entered a new password into a site or changed a password if you want it stored for you. That way, when you revisit that site, the browser can autofill the access credentials for you. It saves you the struggle of trying to keep all your passwords straight. The problem is that some sites, including legitimate sites, can be compromised with a hidden form. You’ll never see it, but your browser will. So, it will autofill that form, and in clear, unencrypted text. This allows bad actors to capture your username and password without your knowledge. Another risk? Irresponsible digital marketers may use hidden autofill forms to track your online activity. That’s done without your consent. Using browser autofill with a password manager can also cause confusion, especially if your browser autofills, whereas the manager asks before filling in forms. Using both at the same time you also run the risk of duplicating passwords, which could make it difficult to track your passwords and increase the risk of security breach. ? How to disable autofill You can protect your passwords by disabling autofill on any browser you use: On Microsoft Edge, go to Settings, then Profiles, then Passwords, and disable “Offer to save passwords.” On Google Chrome, go to Settings, then Passwords, and disable “Offer to save passwords.” On Firefox, open Settings, then Privacy & Security, then Logins and Passwords, and “Autofill logins and passwords.” On Safari, from the Preferences window, select and turn off Auto-fill. Can I keep using password managers? A password manager, such as LastPass or 1Password, typically provides more security than browser autofill. Password managers have strong encryption algorithms to protect your login credentials, which means that even if your device is compromised, your passwords are safe. Still, if the manager autofills your credentials, you face the same risks. Most password managers have autofill disabled by default. That’s good. Leave preemptive autofill off. You might see it called “Autofill on page load.” Keep that turned off, too. Our advice? Use a password manager that requires you to click a box before it fills in your credentials. This action avoids your information from automatically populating a hidden form. Securing your online activity is an ongoing challenge. Our geeks can help identify ways you can protect your privacy and data online. Contact us today at 570-235-1946 or visit our Contact Page....

What is Zero-Click Malware? You know not to open an email attachment from someone you don’t know. You also avoid downloading unexpected files or questionable popups when you go online. But did you know there’s malware that requires zero action from you? Zero-click malware can infect your device without any interaction on your part. Traditional malware required the user to click a link, download a file, or execute a program. It often relies on phishing and social engineering to fool you into taking action. Zero-click malware exploits vulnerabilities in your operating system (OS) or applications. It uses carefully crafted, undetected code to access and execute a payload automatically, and there’s no trigger. If one is present on the system you’re using, you’ll navigate right into it. This makes zero-click malware attacks all the more dangerous. After all, they happen without your knowledge or consent. Meanwhile, attackers can use zero-click malware to: gain access to sensitive data, such as passwords or financial information; take control of your device; impersonate you and send out messages on your behalf; carry out additional attacks. Understanding Zero-Click Zero-click attacks exploit bugs, misconfigurations, or design flaws in an application or OS. They can come in many forms as attackers: target email applications and messaging apps such as WhatsApp or iMessage; build malicious websites; hack and infect legitimate websites; exploit vulnerabilities in network protocols or services. In one well-publicized example, Amazon CEO Jeff Bezos suffered a zero-click attack. A WhatsApp message compromised his texts, instant messages, and potentially even voice recordings. Another well-known attack targeted the WhatsApp accounts of journalists, activists, and human rights defenders in several countries. The attackers installed the Pegasus spyware on the targeted device simply by placing a phone call to the device, even if the user did not answer the call. The malware could extract messages, photos, contacts, and other sensitive data from the device, as well as activate the device's camera and microphone to record the user's surroundings. How to Protect Against zero-click malware Protect against zero-click malware by keeping your device's software up to date. These attacks are often designed to exploit unknown vulnerabilities in software, enabling automatic updates can help ensure you run the latest, most secure software. Also, install and use security tools such as antivirus software and firewalls, which help detect and prevent the malware from infecting your device, and remain cautious about clicking on links or downloading files from unknown sources. Further reduce your risk by using strong passwords and two-factor authentication. Plus, limit your device exposure to public Wi-Fi networks and unknown devices. In case of a zero-click malware or other types of data breach, regularly back up your data, too. Store backups on a separate device that uses strong encryption and two-factor authentication, or use a secure cloud storage service. Not sure about the strength of your online protections? We can help secure your devices. Contact us today at 570-235-1946 or visit our Contact Page....

Working from home is not for everyone - we've all heard that said before - but many of us worldwide are now being forced to work from home. It can be challenging, especially when you have to adapt in the midst of all the other uncertainties COVID-19 has brought. These strategies can help you stay focused when working remotely. Reserve your office space Set up a temporary home office. Pick a space, if you can, that is away from distractions and has a door that you can close. Try to organize this space so that you feel more as if you're going into the office. Clear those personal bills and photo albums waiting for assembly from your desk. Creating a distinct space can help with the mental association that you are going to work. You'll also find it easier to focus if you dress as you would for work. Shower, and put on makeup if you normally do. Getting out of your pajamas and putting on your "game face" puts you more in work mode. Stick with your routines Keeping a similar schedule can help, too. If you go to the office at a certain time every day, that's when you should show up at your home workstation. If you took breaks at consistent times when on-site, do the same at home. This helps tell your brain it's business as usual, even when you're working in the laundry room on a folding card table! You may not be able to go out and grab a coffee or eat lunch out with colleagues, but you can still go have a cup in the kitchen or order lunch from a local business that's delivering - help them to stay in business too! If you used to write emails first thing, do that still. If your team had a weekly conference call Wednesdays at 11, try to keep that, too. You can use voice or video conferencing to stay in touch while remaining at a safe distance. Avoid distractions This is going to mean different things for people. Working from home with children is tough, especially as you're now supposed to be supervising their online learning. Giving them a dedicated space for schoolwork can help to keep them motivated and away from you. You might tell younger children to expect your attention at breaks (e.g. "I'll play three rounds of Candyland when the big hand reaches 12 and the little hand reaches 3"). The news and social media are other traps for those working from home. No one is watching over your shoulder, and it's easy to think, "I'll just check …" That's how you lose 30 minutes of productivity watching pandas wrestle on a zoo-cam. Still struggling? You could consider setting up one operating system account for work and another for personal use creating different browser profiles. And if you're still getting distracted, you could install a browser plug-in that forces you to stay on track. Keep deadlines Setting deadlines can help you stay motivated. The longer you have to get something done, the slower you'll work - it's inevitable. So, maintain some pressure by setting tight, but realistic targets. Share your deadlines with other colleagues using an online task management tool. This can help with accountability. Be patient This is a stressful time, and you're being asked to deal with many changes. So, you need to be patient. Working in sprints could help your motivation and attention span. You might set a timer and focus completely on work until the bell chimes. One theory is that the most productive people take a 17-minute break every 52 minutes, but you'll want to see what works for you. Another approach is to say you'll do 30 minutes of good work on that thing you're avoiding. Worst case: you get only 30 minutes of it done. At least you're further ahead. But you might find it only takes 30 minutes to complete or that you're so close to finishing that you keep going and get the job done. Have the right tech Make sure you have the right tools to do your job. Working from home is challenging enough, so make it easier with reliable internet and Wi-Fi connections, and access to the required files. Need help with working from home? We can't actually be there to cheer you on and keep you motivated, but our tech experts can get you set up with the most efficient home office solutions. Contact Now...

With the world grappling with a health pandemic, scams are shocking. Regrettably, bad actors are everywhere, always looking for opportunities, and they're seeing one in the corona virus. This article outlines what you need to watch out for and how to stay cyber safe. The last thing you want to read right now is that there's another threat out there - sorry, but it's true. Cybercriminals take advantage of fear. They take timely concerns and use them to target victims. Using the anxiety and upheaval around coronavirus is their mission. So far, several coronavirus-related attempts to cyberscam people have been reported. There are examples of: emails that appear to come from government health departments; offering a tax refund to get people to click on malicious links; memos to staff that appear to come from large employers; COVID-19 test offerings from private companies; fake websites promising to sell face masks or hand sanitizer; soliciting donations to help fund a vaccine. Scams to Watch Out For Another concern is the number of bogus websites registered with names relating to COVID-19. The site can look legit but is set up to steal information or infect the victim's computer with malware. You may get an email promising the attached information offers coronavirus safety measures, or information shared by the World Health Organization (WHO) if you click on the link, or a similar email pretending to be from a reputable news source, such as the Wall Street Journal (WSJ). In another example, an email impersonating a healthcare company's IT team asked people to register for a seminar "about this deadly virus." Anyone who didn't question why IT was organizing the meeting clicked to register. By filling out the form, they gave their details to hackers. What to Do Against Corona Virus Scams Be cautious. It's understandable that you're anxious, but don't let that stop you from taking cyber precautions. You should still: be wary of anything that tries to play on your emotions and urges immediate action; question where emails are coming from - remain vigilant even if the communication appears to come from a reliable source; hover over links before clicking them to see where they will take you - for example, in the WSJ example, the Web address was for the "worldstreetjournal"; avoid downloading anything you didn't ask for; doubt any deals that sound too good to be true ("a mask that stops the virus 99.7% of the time!"); ignore any communications requesting your personal information; don't be suckered by fraudulent pleas for charity. Global health organizations generally do not send out emails with advice. Instead, navigate directly to that reputable health institution for real news. Covid-19 related scams If you're still not sure about the validity of the communication, check it out. Do so by calling or using another medium to get in touch with the "source" of the received message. While there is not yet a vaccine for COVID-19, you can put anti-virus protection on your computer. Also, make sure that you've applied all available security updates to keep your software safe. We hope you'll take care and stay healthy both physically and online in these tough times. Need help installing security software and keeping your technology safe? Our cybersecurity experts can give your home a tech immunization. Contact us now!...

Windows 7 is Dying Windows 7 reaches its "end of life". This means that Microsoft will no longer be working on it, causing it to become extremely unsafe and more inefficient, similar to how versions such as Windows XP and Windows Vista already are. Starting in 2020, Windows 7 will be a target for hackers like no other, putting your data and personal security at risk. The solution? Upgrade to Windows 10! It's faster, safer, more powerful, and overall a great decision to make for anyone using an older operating system. Windows 10 is the latest and greatest from Microsoft, receiving new features and performance improvements all the time. Windows 10 is set to reach its end of life state in 2025, so all of its users will continue to receive constant support for another six years! See if your computer meets the minimum specifications to run windows 10 Security: Windows 10 is by far the most secure version ever released. This is in part due to the fact that it's newer, smarter, and more aware of modern security threats. However, a large portion of the security of Windows 10 comes from continuous security updates from Microsoft. These updates come so frequently that your computer will install them automatically. Constant security updates are crucial to the safety of an operating system. It's time to upgrade. Speed: You may think that because Windows 10 is newer and has more features than Windows 7, it may run slower. This is not true! Windows 10 not only brought new and helpful features to the table, but it also increased the speed of several things like startup time, time taken to wake from sleep, and general computer performance speed. Even on older machines, Windows 10 speeds up computers by being a more efficient operating system than Windows 7. Features: It goes without saying that a new version of anything comes with new features. Windows 10 is no exception, as it's chock-full of new things relating to user assistance, visual design, ease of access, and computer maintenance. An operating system has never been so easy to navigate with the addition of Microsoft's new AI assistant, Cortana. A Siri-like program that can answer various questions about the operating system, general knowledge, or your data that you've input into it such as contacts and calendar events. The new design of Windows 10 is also sleeker than ever, taking the top spot on many people's lists of most attractive operating systems. This is all accomplished while still retaining that old and reliable Windows 7 layout of things. You won't have to wonder where most things are in Windows 10, because Microsoft didn't waste time by reorganizing every utility just so users would have to re-learn where to find things. The content and design of the latest Windows operating system is more solid, consistent, and robust than ever. Worried about the transfer? If you’re concerned about having to learn to use a new operating system, don’t be. Windows 10 is largely similar to Windows 7 in its layout, and Windows 10 is equipped with a much greater range of helpful tools to assist all users in navigating their computers. Additionally, the upgrade from Windows 7 can be completely seamless, maintaining all of your programs and personal files in exactly the same place as they were. At NEPA Geeks, we guarantee that the process will be as simple and as stress-free as possible. Need help making the switch? Call us at 570-235-1946, and we'll handle it all from backing up your data, to protecting your computer by upgrading it to the latest version of Windows. You won't look back. Contact ...

  4 Advantages of Managed IT over In-House IT It’s tempting to hire an in-house IT technician to take care of your network. Instead, consider the advantages of managed IT. If you’re like most businesses, you’re always on the lookout for ways to save money while improving results. This means expanding your staff to include a team of tech specialists. This can be an unnecessary expense that leaves you with highly paid employees with a lot of downtime. For SMEs who are looking for the best of both worlds, we recommend Managed IT services. Put simply, Managed IT is our solution which gives you a team of specialist technicians and network experts. Naturally, you’d rather see your IT budget working to support your growth and kept as low as possible. We don’t simply maintain and repair your systems, we proactively monitor to avoid downtime and work with you to ensure your IT increases productivity and efficiency. Whether you already have in-house IT and are auditing the value, or are curious about what having IT support might be like for your business, we’ve put together a few factors to consider before making your choice: Availability: Most employees work 9-5, but what happens if something goes wrong with your systems outside these hours? Your in-house technician won’t appreciate being woken at 1am for emergency repairs. It’s more likely that they simply won’t answer the call (or hear it), or if they do, expect some hefty contract renegotiation come 9am. Managed IT is very different as we expect problems after hours and have support technicians ready. We know that every minute of downtime is affecting your revenue, plus your business reputation, so we prioritize getting your systems up and running asap. As a bonus, with our Managed IT these types of disasters are rarer as we’re constantly monitoring and correcting problems before they occur. Total cost: One of the things that may have attracted you to having an in-house technician is the cost. But while you may be able to pay them a lower hourly rate, there are extra costs like hiring, training, ongoing training, healthcare and retirement. Once you start adding up the cost of an in-house technician, you might find it’s eating up your IT budget and leaving you scrambling to fill gaps you didn’t expect. Upgrades get delayed, opportunities missed, and IT expenses become a sore point. In comparison, Managed IT is one fixed monthly rate including access to specialists across all software applications and technology. Ongoing Training: Your technician will spend weeks away upgrading their skills. Those training costs quickly add up. With a salaried technician, you’ll have to pay all ongoing training and certification costs, plus travel costs for industry conferences. We know how important it is to remain current, certified and skilled in new technologies, so we spend the money to invest in ourselves so we can serve you better. We’re part of industry related communities and attend multiple conferences each year, all at our own expense. Different goals: For most employees, a higher wage is the goal and many will job-hop to achieve that. A salaried tech may be looking for the first opportunity to leave and get paid more, often leveraging all the training you’ve just provided. In these modern times, switching jobs regularly is expected, with an average of only 3 years in each position. Considering how much it cost your business to acquire, train and upskill your technician, 3 years is an unreasonable ROI. Our goals couldn’t be more different - we only aim to keep you a happy customer for as long as we can! In the end, your business needs to find the right balance between profit and expertise. When you partner with our Managed IT, you’re securing availability, ever-increasing expertise and commitment to your success. We work closely with you to provide the very best support and protect you costly disasters, taking preemptive action to keep you safe and operational. There’s no doubt Managed IT is a better decision than hiring an in-house technician, and we’d be delighted to prove it to you. Talk to us about Managed IT for your business. Call us at 570.235.1946 or visit our Contact Page...