Managed Services

Latest Posts from Our Blog

Hardware/Uptime Monitoring

What is Hardware/Uptime Monitoring?

By Robert Cleveland | April 20, 2021
Categories: , , ,

Hardware monitoring is a feature of the motherboard, sometimes as a separate chip on the motherboard, that monitors different aspects of the system. for potential issues. It can measure variables such as the output voltage of the power supply, the speed of the fans that are connected directly to the motherboard header, and the internal…

Read More
What are Managed IT Services?

What are Managed IT Services?

By Justin Oliver | July 28, 2020
Categories: , , , , , , ,

What are Managed IT Services? The Technology Services Industry Association (TSIA) defines managed services as “the practice of outsourcing day-to-day technology management responsibilities to a third party as a strategic method for improving operations and accelerating a return on their technology investment”, typically for a fixed price. It is the proactive monitoring of computer and…

Read More
Managed Anti-Virus/Anti-Malware

Why is Patch Management Important For Cyber Security?

By SandStorm IT | July 14, 2020
Categories: , , , ,

Before we jump into why patch management is important, we should define what patches are and what patch management is. What are patches? Patches are software code fixes that repair broken functionality, add new functionality, or fixes security holes in software.  Patches have been around a long time.  You’ve likely been patching Windows workstations going…

Read More
endpoint Malware protection

Do I still need endpoint Malware protection?

By SandStorm IT | June 22, 2020
Categories: , , , , , ,

If you’ve used a computer anytime over the past 20 years, you’ve probably been infected by a virus, malware, or some other malicious piece of software.  You may have been lucky and been able to get it cleaned off without much trouble or maybe you weren’t so lucky and lost data.  Think about today, what…

Read More
Managed Anti-Virus/Anti-Malware

What is Security as a Service (SECaaS)?

By John Hammett | April 20, 2020
Categories: , ,

What is SECaaS? Security as a Service (SECaaS) describes an offering in which a technology solution provider manages both hardware and software on a monthly or annual subscription basis, with the goal being to provide an externally managed, comprehensive, and affordable IT security solution for businesses of all sizes. SECaaS solutions often include Anti-Virus software,…

Read More
SandStorm IT

SandStorm IT Response to the COVID-19 / Coronavirus Pandemic

By Doyle Sanders | March 18, 2020
Categories: , , , , , , , ,

To All Customers and Friends, In response to the COVID-19 / Coronavirus pandemic and the nationally and state-declared state of emergency, SandStorm IT wants to share the plans and precautions we are taking.   We remain committed to continuing to provide the necessary services and support to all of our customers while maintaining a safe…

Read More
best ways to combat computer infections

What are the best ways to combat computer infections?

By Matt Ballard | January 20, 2020
Categories: , , , , , ,

The best way to combat computer infections is to NEVER connect to the internet. Of course, this is not a desired or viable option for most people. But unfortunately, the internet is the most common way of receiving or transmitting infections. Luckily, a mix of the right software and knowledge can go a long way…

Read More
Got a popup on your Windows 7 PC

Got a popup on your Windows 7 PC? Here’s what it means and what you can do.

By Jeff Fowler | January 17, 2020
Categories: ,

So, you have the “Your Windows 7 PC is out of support” popup? Rest assured, it’s not some kind of malware or false warning, it’s legitimately from Microsoft. Around 29.7% of the PC’s in the world still use Windows 7. The message that pops up on boot is pretty ominous but it’s exactly what will…

Read More
What makes a strong password?

What makes a strong password?

By SandStorm IT | October 14, 2019
Categories: , , ,

With all the data breaches we see on the news these days, it can sometimes be scary to trust companies with your sensitive information. However, in many cases, sensitive data is gained by an attacker taking advantage of users implementing weak passwords. Today, we will look at some examples of weak/strong passwords and what you…

Read More
TWO FACTOR AUTHENTICATION

What is Two Factor Authentication?

By SandStorm IT | September 30, 2019
Categories: , ,

Two Factor Authentication, commonly abbreviated 2FA, is a second layer of authentication in addition to your password used to keep your accounts safe. Typically, a code is sent to your phone (by text or application) every time you sign into your account. You enter this code after you receive it to finish the login process.…

Read More

Connect w/ Us:

Subscription