PremierePC considers our clients’ needs every step of the way. As a Managed Services Provider (MSP), we interact with a multitude of services; tying it all together creates our client-centered service model.


Our client-centered servicing focuses on building relationships with our clients and creating positive experiences by maximizing technology services and product offerings. 

We are aware that YOU are the primary reason PremierePC exists as a Managed Services Provider, and we value each relationship. Your IT provider should not be there to leverage you as a revenue source; they should be there to advise, consult, and resolve. 

If you don’t feel supported by your current IT provider, you may not have an MSP.

You may now be asking, “If I don’t have an MSP, what do I have?”

Many IT companies sell you what looks like a managed services plan, instead they nickel and dime you for everythingThere is nothing proactive happening. They generally offer one or two MSP services, then operate more like an on-demand or breakfix shop. The consulting is limited, and the company is centered around their profit centers, not your success. 

In reality, many of these companies are Value-Added Resellers, or VARs. 

These VARs pose as MSPs; their focus is pushing hardware, padding the cost, and attaching services to these orders. They may look like an MSP in the sense that they can sell and service equipment. However, they are interested solely in pushing product, not the service they provide. A VAR’s revenue margins on hardware are often in competition with the best fit for the client. Service revenue is viewed as just another product to them and has little to do with providing best in class offerings. As a result of this approach, you may end up being oversold on IT and underserviced.  

So, what is a Managed Services Provider? 

An MSP is going to offer a help desk, proactive and reactive services, patching and automations, and integrated consulting. 

In an ideal relationship, the MSP will offer the above while also functioning as a partner and an extension of your business.  

Recent studies show that 31% of MSP clients are primarily seeking an MSP to meet security risks; 15% primarily need cybersecurity services, and 7% are looking for public cloud adoption/migration/support. 

Think about your business, what you NEED, and if your IT provider is meeting, and exceeding, that need. 

Keep in mind, 63% of SMBs experienced a data breach or cyber-attack in 2019. It is imperative your business is prepared.  

So you could either:

Spend your money being oversold and underserviced  


Invest in your future with a forward-thinking business partner whose sole interest is to maximize your potential through technology

On to PremierePC. Let’s look at what we provide. 

  • Helpdesk Access 8am-5pm
  • Anti-Virus Protection
  • Windows Patching
  • Switch Management
  • Change Management
  • Extended Support Options
  • Hosted VOIP Phone System
  • VPS Hosting
  • Secure DNS
  • Multi Factor Authentication
  • Remote / Depot Support
  • Onsite Support
  • Router Management
  • WiFi Management
  • Third Party Updates
  • Backup and Disaster Recovery (BDR)
  • Managed Cloud Services
  • Enterprise File Sharing
  • Dark Web Monitoring
  • Project Work
  • Forward Thinking Consulting
  • System Monitoring
  • Router as a Service
  • Asset Management
  • Hardware Recommendations
  • Email Security and Compliance
  • Website Hosting
  • Domain Management
  • Security Awareness Training
  • Threat Hunting
Some follow-up questions:
What does this client-centered model look like?

We offer several customizable service plan levels, centered around your business’ size and needs, not a particular service set. 

What is always covered by the service plan?

Our service plans are billed by the supported device. A supported device is a Windows or Apple system which has our network monitoring agent and managed security services enabled. In addition, our team will support other devices on your network at no additional cost. This includes printers, routers, network switches, mobile phones, tablets and just about any other network connected device. 

We offer proactive measures, monitoring and protection you will use on day one, plus access to more. Even our follow-up process is proactive, ensuring you are happy with the resolution of your issue. There is absolute value in having a service provider in your corner that packages essential security services and proactive measures into the offering. 

How is this model different from other models?

When you simply pay by the issue or by the hour, the incentive is shifted towards the service provider. We strongly believe that a service plan creates a valuable relationship that enables both sides to be more productive and integrated. 

PremierePC is transparent with pricing from the beginning. Check out our computer and network support page to view our pricing model. We are interested in ensuring this partnership works for both of us, we have no interest in hiding costs.

We stand behind the value we provide as a fully integrated MSP.

PremierePC partners with you, using forward thinking and intelligent consulting, to improve your network and security stack, mitigating problems before they arise.

Contact us if you’d like to learn more about your current environment or have additional questions.

In observance of Good Friday,

our office will be closed April 2nd, 2021.


cisco meraki

Cisco Meraki changed the way we think about network management today. Its out-of-band cloud architecture creates secure, scalable and easy-to-deploy networks that can be managed from anywhere. This can be done from almost any device using web-based Meraki Dashboard and Meraki Mobile App.

Want to manage your network on the go?

Meraki devices can be managed with a browser-based interface or app. This allows for quick deployment, unlimited scalability, and remote troubleshooting.

What do you think about modern Wi-Fi solutions?

Next-gen wireless solutions provide more capacity and higher performance in dense, demanding environments, delivering enhanced application experience.

Do you have remote employees?

We can build IPSec VPN tunnels between your sites, or for your remote employees. Additionally, there are Meraki products we can deploy for remote work situations.

Got QOS Issues?

Meraki gives us access to deep packet inspection, traffic shaping policies, and cloud-based application signatures.

Interested in a smarter network?

With VLANs, we can build different virtual local area networks to microsegment your network, allowing for a smarter and more effective traffic flow and overall more secure network.

Do you hate downtime?

Meraki products come with lifetime warranty and next-day advanced replacement. Cisco Meraki’s simplified software and support licensing model also combines all software upgrades, centralized systems management, and phone support under a single, easy-to-understand model.

Learn more about the Meraki Cloud Architecture here

Did this sound like a foreign language?

Contact PremierePC today; let us do the heavy lifting and help you navigate and manage the ever more complicated IT landscape.

PremierePC has a full-time opportunity for a motivated, self-starting Technical Support Specialist who has a keen eye for detail.

The Technical Support Specialist is an entry level position which will assist in simple break-fix technology situations, onsite visits, drop off and issue diagnosis, and running remote optimizations and routines. Most importantly, we are looking for an individual who is eager to learn, highly customer-focused, patient, an effective communicator, and has a positive attitude. Excellent understanding of general and high-level concepts of PC computing and networking is required. 


  • A.S. degree and 2 years’ experience in PC Support/Network Administration or a minimum of 3 years’ experience and relevant certifications.
  • One of the following certifications at minimum (A+, Networking+, Security+).
  • 1-year practical experience with a call center or technical support preferred.
  • Previous experience in IT, customer service, and other related fields.

About PremierePC Technology Group:

We are a small business that provides managed IT services for other small businesses. We work closely with these clients to advise and help make sure all their technology needs are met. Developing and maintaining these relationships will be the key element of your job. PremierePC focuses on a culture of teamwork, learning and growing together toward the common goal of maximizing potential through technology.

Working Environment:

The majority of the team works from our physical Mauldin office. Several team members are also full-time work from home. WFH is offered to those that require it on an as needed basis. Ideally, the TSS would be a full-time physical resource.

Interested? Click here to learn more and apply.


Unfortunately, malware is a hot topic these days. SMBs are a target for the bad guys, and your data could be at risk.

So let’s make sure we know what malware is, what forms it can take, and how to mitigate these risks.


Malware is a piece of software designed to cause damage to a computer, server, or network of computers – this is the umbrella term for malicious software.


A computer virus modifies the system files of the host computer to execute malicious code and infect other files. This is the only form of malware that modifies other files on a computer. Viruses can be attached to emails and then downloaded by the end user.


This type of malware encrypts data in an information system and demands payment in exchange for regaining access. These types of attacks have increased drastically during the COVID-19 pandemic, think 72% or more. However, many ransomware variants refuse to unencrypt data and some even delete the files after ransom is paid. Ransomware is often spread through spam emails.


This malicious software looks and behaves like legitimate software but contains malicious code. The most common entry point of a trojan is from pop-up banners on websites that indicate that the user’s computer is infected with viruses and needs antivirus software to clean it up. The “antivirus software” user download contains malicious code designed to gain backdoor access to systems, steal sensitive data, or spy on user or network activities. The important thing to remember about trojans is that the user must take some action for this to take root in the computer.


Spyware tracks the activities of the user on the infected computer including keystrokes, passwords, pin codes, payment-related information, personal messages, and other identifiable information. This can come in the form of adware – a malicious advertisement designed to force clicks from users – spoofing emails, and freeware – bundled with other software. Spyware can infect a device when a user agrees to the terms and conditions of a legitimate software program – so always read the fine print!


Worms are able to replicate themselves in different computers in the same network as the infected computer. Software backdoors, vulnerabilities in operating systems, and flash drives all provide opportunities for worms to gain access. Once a worm has gained access, it will replicate itself, spreading from device to device, with no action from the end user. These worms can then be used to initiate a DDoS attack, steal data, or give attackers control over the system.


Bots are hybrid forms of malware, often originating in spam messages, than can execute automated tasks through remote instruction. Many bots are used for legitimate purposes, but can also be appropriated for nefarious actions. A large set of these bots creates a botnet, a swarm of bots, attacking a number of systems in sync, making them capable of large-scale attacks.


Now what

  • Understand the risks
  • Educate yourself and employees on malware and prevention strategies
  • Build your security stack
  • Stay up to date on cyber criminal’s attack methods
  • Contact PremierePC today

Ever experience a client call running over and you need to get on the road?

Have you taken a call in your car on the way to work and need to transfer to your desk phone when you get there?

GoTo offers three ways to answer any call: the desktop app, mobile app, and the physical desk phone. This can be extremely convenient for you if you move around the office, take calls on the road, work remotely, etc. A useful feature many users are unaware of is the ability to switch active calls between devices.

Calls can be flipped that are active, waiting in queue, in the process of being transferred, or even calls that have not yet been answered.

Currently, there are no permission checks. Keep in mind if there are multiple active calls, you can’t pick which one flips.

Follow these steps to flip a call:

GoToConnect Desktop

  1. While on an active call on another device, open GoToConnect desktop or web.
  2. Hover over Your active call on another device in the left sidebar and then click to complete the switch to the desktop app.
    • The call will be automatically ended on the original device. This change will be transparent to the other party.

GoToConnect Mobile

  1. While on an active call on another device, open GoToConnect mobile.
  2. Tap Active Call at the top of your screen.
  3. Tap Take the call to complete the switch to the mobile app.

Desk phone

  1. While on an active call, dial *77 from the desk phone.
    • The call will automatically end on the original device. This change will be transparent to the other party.

Want another pro tip? When a colleague’s phone is ringing, you can pick up the call by dialing *97 from your phone then entering the colleague’s extension.

Interested in VOIP phones? Contact PremierePC today.

Introducing Google Workspace

Google Workspace, formerly known as G Suite, encompasses Gmail, Docs, Meet, Sheets, and Calendar.

Some new features will include:

  • Google has added a new “Business Plus” level with more device management features.
  • A Chat window can spawn a new document for everybody in the group without needing a new tab.
  • In Google Docs, you can immediately start a video call in the same window for everyone who is active in the document.
  • Google Workspace apps will let users bring up small previews of other documents embedded in the thing they’re working on.
  • Google will expand the use of smart chips, little contact cards that can pop up when you @-mention somebody in a document.
  • Create a doc directly from a chat window.
  • Start a video call from within a presentation.

Some of these changes will begin rolling out immediately, others coming in the next few months. 

Click here and access the Google Workspace Admin help center to learn more.


71% of ransomware attacks target small-to-medium sized businesses.

Average ransom demand: $116,324

How would this affect your business?

So… what is ransomware?

Ransomware is a form of malware that encrypts a victim’s files.

At the end of the process, the files cannot be decrypted without a mathematical key known only by the attacker.

The attacker then demands a ransom to release access to this data back to the victim.

And why are SMBs targeted?

Typically, these companies spend much less on securing their computing systems and information than larger firms.

This makes it easier for malicious actors to compromise their systems.

Attackers will also use extortion campaigns, duping victims to download ransomware malware or droppers that will infect the compromised machine with ransomware.

The top three vertical markets that are targeted include: healthcare, professional services, and financial institutions.

Got it. But how does PremierePC mitigate these risks?

PremierePC handles all IT related matters; think of us as your personal IT department.

We are well versed in how to educate clients, mitigate risks, and stay up to date on the latest developments in IT, including ransomware attacks.

We make sure there are no open RDP ports for brute force attacks.

We also keep your data backed up in the cloud. In the event of an attack, we can potentially access your data in the cloud without having to pay the ransom.

Contact PremierePC today to better understand your environment and increase your security stack.

New year, new you.

You may be asking, “What’s the secret to protecting my business against cybercrime?”

The answer: a layered approach incorporating security software, a security driven IT support staff, and employee training.

PremierePC can check each of those boxes.

First, let’s take a deeper look into cybercrime.

Cybercrime uses impersonation, fear, threats, lies, and other manipulation tactics to gain a victim’s trust or trick them to sharing sensitive data.

Impersonation in cybercrime is especially dangerous due to cybercriminals’ expert ability to hide in plain site and create legitimate-looking websites and emails.

Cybercriminals are also able to host malicious content on legitimate sites.

Phishing attempts are also able to, at times, slip through DNS and endpoint protection. This is where employee training is your last defense. Humans are consistently the weakest link in the cybersecurity chain of defense. Therefore, social engineering risks are far greater without a security driven IT support staff willing and able to train your employees.

Everyone, from receptionists to executives, are potential victims of an impersonator. In fact, help desk and call center employees are especially vulnerable because they are trained to be forthcoming with information.

Action items:

  1. Instruct employees to delete any requests for financial information or passwords. When in doubt, call the person who “sent” the request and conduct these transactions in person or over the phone.
  2. Use cybersecurity software with real-time anti-phishing services. If you’re suspicious of any links or emails, don’t click! Contact your IT provider first.
  3. Follow IT security best practices by patching software and securing email servers.
  4. Regularly participate in up-to-date Security Awareness Training and phishing simulations for employees.

Sound like too much? Contact PremierePC and we will be happy to walk with you through every step.

To celebrate the New Year, our office will be closed Thursday, December 31st and Friday, January 1st.

We look forward to assisting you on Monday, January 4th.

From all us of here at PremierePC, we wish you and yours a Happy New Year!