client_satisfaction

PremierePC considers our clients’ needs every step of the way. As a Managed Services Provider (MSP), we interact with a multitude of services; tying it all together creates our client-centered service model.

client_centered

Our client-centered servicing focuses on building relationships with our clients and creating positive experiences by maximizing technology services and product offerings. 

We are aware that YOU are the primary reason PremierePC exists as a Managed Services Provider, and we value each relationship. Your IT provider should not be there to leverage you as a revenue source; they should be there to advise, consult, and resolve. 

If you don’t feel supported by your current IT provider, you may not have an MSP.

You may now be asking, “If I don’t have an MSP, what do I have?”

Many IT companies sell you what looks like a managed services plan, instead they nickel and dime you for everythingThere is nothing proactive happening. They generally offer one or two MSP services, then operate more like an on-demand or breakfix shop. The consulting is limited, and the company is centered around their profit centers, not your success. 

In reality, many of these companies are Value-Added Resellers, or VARs. 

These VARs pose as MSPs; their focus is pushing hardware, padding the cost, and attaching services to these orders. They may look like an MSP in the sense that they can sell and service equipment. However, they are interested solely in pushing product, not the service they provide. A VAR’s revenue margins on hardware are often in competition with the best fit for the client. Service revenue is viewed as just another product to them and has little to do with providing best in class offerings. As a result of this approach, you may end up being oversold on IT and underserviced.  

So, what is a Managed Services Provider? 

An MSP is going to offer a help desk, proactive and reactive services, patching and automations, and integrated consulting. 

In an ideal relationship, the MSP will offer the above while also functioning as a partner and an extension of your business.  

Recent studies show that 31% of MSP clients are primarily seeking an MSP to meet security risks; 15% primarily need cybersecurity services, and 7% are looking for public cloud adoption/migration/support. 

Think about your business, what you NEED, and if your IT provider is meeting, and exceeding, that need. 

Keep in mind, 63% of SMBs experienced a data breach or cyber-attack in 2019. It is imperative your business is prepared.  

So you could either:

Spend your money being oversold and underserviced  

OR 

Invest in your future with a forward-thinking business partner whose sole interest is to maximize your potential through technology

On to PremierePC. Let’s look at what we provide. 

  • Helpdesk Access 8am-5pm
  • Anti-Virus Protection
  • Windows Patching
  • Switch Management
  • Change Management
  • Extended Support Options
  • Hosted VOIP Phone System
  • VPS Hosting
  • Secure DNS
  • Multi Factor Authentication
  • Remote / Depot Support
  • Onsite Support
  • Router Management
  • WiFi Management
  • Third Party Updates
  • Backup and Disaster Recovery (BDR)
  • Managed Cloud Services
  • Enterprise File Sharing
  • Dark Web Monitoring
  • Project Work
  • Forward Thinking Consulting
  • System Monitoring
  • Router as a Service
  • Asset Management
  • Hardware Recommendations
  • Email Security and Compliance
  • Website Hosting
  • Domain Management
  • Security Awareness Training
  • Threat Hunting
Some follow-up questions:
What does this client-centered model look like?

We offer several customizable service plan levels, centered around your business’ size and needs, not a particular service set. 

What is always covered by the service plan?

Our service plans are billed by the supported device. A supported device is a Windows or Apple system which has our network monitoring agent and managed security services enabled. In addition, our team will support other devices on your network at no additional cost. This includes printers, routers, network switches, mobile phones, tablets and just about any other network connected device. 

We offer proactive measures, monitoring and protection you will use on day one, plus access to more. Even our follow-up process is proactive, ensuring you are happy with the resolution of your issue. There is absolute value in having a service provider in your corner that packages essential security services and proactive measures into the offering. 

How is this model different from other models?

When you simply pay by the issue or by the hour, the incentive is shifted towards the service provider. We strongly believe that a service plan creates a valuable relationship that enables both sides to be more productive and integrated. 

PremierePC is transparent with pricing from the beginning. Check out our computer and network support page to view our pricing model. We are interested in ensuring this partnership works for both of us, we have no interest in hiding costs.

We stand behind the value we provide as a fully integrated MSP.

PremierePC partners with you, using forward thinking and intelligent consulting, to improve your network and security stack, mitigating problems before they arise.

Contact us if you’d like to learn more about your current environment or have additional questions.
cisco meraki

Cisco Meraki changed the way we think about network management today. Its out-of-band cloud architecture creates secure, scalable and easy-to-deploy networks that can be managed from anywhere. This can be done from almost any device using web-based Meraki Dashboard and Meraki Mobile App.

Want to manage your network on the go?

Meraki devices can be managed with a browser-based interface or app. This allows for quick deployment, unlimited scalability, and remote troubleshooting.

What do you think about modern Wi-Fi solutions?

Next-gen wireless solutions provide more capacity and higher performance in dense, demanding environments, delivering enhanced application experience.

Do you have remote employees?

We can build IPSec VPN tunnels between your sites, or for your remote employees. Additionally, there are Meraki products we can deploy for remote work situations.

Got QOS Issues?

Meraki gives us access to deep packet inspection, traffic shaping policies, and cloud-based application signatures.

Interested in a smarter network?

With VLANs, we can build different virtual local area networks to microsegment your network, allowing for a smarter and more effective traffic flow and overall more secure network.

Do you hate downtime?

Meraki products come with lifetime warranty and next-day advanced replacement. Cisco Meraki’s simplified software and support licensing model also combines all software upgrades, centralized systems management, and phone support under a single, easy-to-understand model.

Learn more about the Meraki Cloud Architecture here

Did this sound like a foreign language?

Contact PremierePC today; let us do the heavy lifting and help you navigate and manage the ever more complicated IT landscape.

Ever experience a client call running over and you need to get on the road?

Have you taken a call in your car on the way to work and need to transfer to your desk phone when you get there?

GoTo offers three ways to answer any call: the desktop app, mobile app, and the physical desk phone. This can be extremely convenient for you if you move around the office, take calls on the road, work remotely, etc. A useful feature many users are unaware of is the ability to switch active calls between devices.

Calls can be flipped that are active, waiting in queue, in the process of being transferred, or even calls that have not yet been answered.

Currently, there are no permission checks. Keep in mind if there are multiple active calls, you can’t pick which one flips.

Follow these steps to flip a call:

GoToConnect Desktop

  1. While on an active call on another device, open GoToConnect desktop or web.
  2. Hover over Your active call on another device in the left sidebar and then click to complete the switch to the desktop app.
    • The call will be automatically ended on the original device. This change will be transparent to the other party.

GoToConnect Mobile

  1. While on an active call on another device, open GoToConnect mobile.
  2. Tap Active Call at the top of your screen.
  3. Tap Take the call to complete the switch to the mobile app.

Desk phone

  1. While on an active call, dial *77 from the desk phone.
    • The call will automatically end on the original device. This change will be transparent to the other party.

Want another pro tip? When a colleague’s phone is ringing, you can pick up the call by dialing *97 from your phone then entering the colleague’s extension.

Interested in VOIP phones? Contact PremierePC today.

New year, new you.

You may be asking, “What’s the secret to protecting my business against cybercrime?”

The answer: a layered approach incorporating security software, a security driven IT support staff, and employee training.

PremierePC can check each of those boxes.

First, let’s take a deeper look into cybercrime.

Cybercrime uses impersonation, fear, threats, lies, and other manipulation tactics to gain a victim’s trust or trick them to sharing sensitive data.

Impersonation in cybercrime is especially dangerous due to cybercriminals’ expert ability to hide in plain site and create legitimate-looking websites and emails.

Cybercriminals are also able to host malicious content on legitimate sites.

Phishing attempts are also able to, at times, slip through DNS and endpoint protection. This is where employee training is your last defense. Humans are consistently the weakest link in the cybersecurity chain of defense. Therefore, social engineering risks are far greater without a security driven IT support staff willing and able to train your employees.

Everyone, from receptionists to executives, are potential victims of an impersonator. In fact, help desk and call center employees are especially vulnerable because they are trained to be forthcoming with information.

Action items:

  1. Instruct employees to delete any requests for financial information or passwords. When in doubt, call the person who “sent” the request and conduct these transactions in person or over the phone.
  2. Use cybersecurity software with real-time anti-phishing services. If you’re suspicious of any links or emails, don’t click! Contact your IT provider first.
  3. Follow IT security best practices by patching software and securing email servers.
  4. Regularly participate in up-to-date Security Awareness Training and phishing simulations for employees.

Sound like too much? Contact PremierePC and we will be happy to walk with you through every step.

We love this time of year. It’s filled with fun, family, fellowship, food, and unfortunately phishing…

Scammers love this time of year too. The holiday shopping frenzy makes for easy phishing attack and hacking victims. PremierePC is here to help you learn how to protect yourself so you can have a great holiday season.

Do not click on links in emails.

If you’re not sure of the sender, or you didn’t request the email, do not click on any links or open any attachments. Instead, contact the company via their website or phone and ask for more information.

Beware of urgency.

Scammers will play on the fear of missing out on something, like a big holiday sale or a deadline for a bill. Resist any pressure to “act now.”

Watch for emails asking for private information.

Legitimate organizations will never request personal information via email. Do not email information such as passwords, credit card numbers, social security numbers, etc.

Research the website.

Scammers are getting better at creating fake websites that look real. Do your research before submitting payment to any sites.

Know your Wi-Fi.

Using public Wi-Fi creates many potential areas for hackers to breach and grab your data or sensitive information. Do not make purchases using public Wi-Fi networks like coffee shops, libraries, hotels, etc.

Keep track of orders.

Scammers will send fake delivery failure notices or package tracking emails to sway you into clicking a link or submitting personal information. Always keep track of what you’ve ordered and who will be delivering it. If you receive one of these emails, call the delivery service or as your post office.

Some of the best ways to avoid scams is continued education and a comprehensive security plan for your business. Contact PremierePC today to see how your security stacks up.

holidays_laptop_buying_guide

laptop_buying_guide_gift_computing

Thinking of gifting a new laptop this holiday season to yourself, your employees, or a loved one?

Lost in a sea of tech specs with no idea of what to do?

PremierePC is here to help!

Here’s a list of specs to look for, what they mean, and what we recommend.

Platform

Windows – most flexible operating system, runs on more laptops than Chrome OS or Mac OS X.

Mac – limited line of computers, tend to run more expensive, less flexibility.

Chromebook – least expensive, however this functions more like a tablet than a laptop. Chromebooks use the Chrome web browser as the primary user interface and run applications rather than software and are highly limited in their feature set.

What we recommend: Windows

CPU

The CPU is the central processing unit of a computer where instructions are taken from programs and applications to perform calculations.

Typically, a faster CPU means applications will run faster.

What we recommend: Intel Core i5 and above. (Choose i7 and above if you tend to run many applications at once, edit or create media, or run high-end games.)

Storage

The Hard Drive contains everything the CPU is going to need to do its job, including the operating system, apps, and files. There are two types:

  1. Spinning hard disk drives (HDD) drives read and write data with a head similar to a vinyl record album. HDDs are less expensive, however they are mechanical and fragile.
  2. Solid-state drives (SSD) are a bit more expensive but offer at least three times the speed and a much faster laptop overall. SSDs require less power and increase overall battery life and are shock resistant.

What we recommend: 500GB SSD

Memory

RAM, random access memory, stores just the portion of the data from the hard drive that the CPU needs at any given moment. If you run multiple applications at once, you will use more of your RAM. Therefore, more RAM means a faster machine.

8GB of RAM may be sufficient for day-to-day computing, allowing for fully loading Windows, a few productivity apps, and a web browser.

However, if you run multiple applications at once, you will need 16GB of RAM.

What we recommend: 16GB RAM

Other specs to look for

Displays running full HD (1920 x 1080) will look sharp and not consume too much of your battery life.

Decide if you want a full size (15-17″) laptop with a number pad or a 14″ portable laptop.

Understand your laptop’s docking station capabilities and options.

Touch screen capabilities are widely available in many laptops.

Integrated graphics chips are typically sufficient unless you are doing high-res video editing or gaming.

Ensure your laptop has the ports necessary for connections you need.

8+ hours of battery life is ideal.

Test out or research the keyboard and trackpad.

Research the brand. Don’t buy simply because you found a cheaply priced computer.

Our top laptop recommendations: Lenovo Thinkpad E14 or E15

You’ll end up wasting money in the long-run if you don’t do your research! Call PremierePC today for a laptop recommendation.

Microsoft teams is a communication platform in the 365 family of products, offering chat, videoconferencing, file storage, and application integration.

So what’s new?

The ability to create ad hoc breakout rooms will be available starting next month.

Microsoft says this is one of the most requested Teams features.

Meeting organizers will be able to split up participants into smaller groups to facilitate brainstorming sessions or workgroup discussions.

Presenters can then hop between breakout rooms, make announcements to all breakout rooms, and close the rooms to return everyone to the main meeting.

New Jive Communications integration, streamlining your phone calls.

Teams now allows people to start calls for the Jive platform from inside of Teams.

Microsoft is partnering with meditation app Headspace on a customizable “virtual commute” feature.

It uses automation technology to help users close out tasks and designate work for the following day, log their sentiment about the work day, and then directs them into a guided meditation process.

The company cites a 2017 study by Microsoft researchers that demonstrated the improvement in productivity that came from winding down from work at the end of the day.

Its more recent research finds that the blurred lines between work and home are hurting their feelings of well-being.

Teams is getting new “Together Mode” backdrops, and custom layouts for presentations. 

The new backdrops show participants in shared virtual spaces including conference rooms and a coffee shop.

Custom layouts will let presenters determine how their content appears to meeting participants, including the ability to superimpose their own video feed on top of the slide they’re showing.

As collaboration technology needs continue to rise, Microsoft offers secure and trusted opportunities for success. Want to learn more? Contact PremierePC today!

Email encryption via Bracket offers an added layer of security to your email platform ensuring compliance in difficult industries like Health Care and Financial Services.

User-friendly encrypted email with no plugins or apps. Simply wrap brackets around the subject in any email client and Bracket handles the rest.

New with Bracket 3

Secure file transfer

Included with Bracket is our encrypted file transfer service, Bracket Share. This gives every Bracket user their own personalized file transfer page with an easy URL (Share link) they can give to anyone. Shared files and messages show up in the Bracket inbox just like a regular message.

  • Customizable link

    Bracket Share links are customizable, so users can make them easy to remember and share.

  • Personalized invites

    You can have Bracket email people an invitation to share. These can display your personalized profile, so your contacts feel more confident about sharing their sensitive data.

  • Anyone can share… anytime

    Anyone with your Share link can share encrypted files and messages when it’s convenient for them. No account required.

  • Sender validation

    Senders who share through the Share link are securely validated via inbox authentication to prevent abuse.

  • Send large files with easeDon’t worry about bounced emails with large attachments. Bracket can handle files up to 1GB in size with up to 25 files allowed per message. Large files are good to go when sending from Bracket’s webmail interface or Bracket Share.

Want to take the solution for a spin? We are able to offer Bracket 3 for free until end of 2020 to all net new Bracket users (new users only, no existing domains).

Call us today to try it out!

864.335.9223

PremierePC - Managed IT

Matthew addresses : What is the dark web? Why should I monitor the dark web? What happens if my company’s information is already present on the dark web? How can PremierePC help my business?

View our Dark Web Video on Youtube

Click here, fill out the form, and access your free report today!

Are you only relying on your email platform’s baked in spam filtering? You could be leaving yourself open to a range of threats.

What is email filtering?

Most major email providers use built in settings to move emails to “junk” or “spam.” These settings work great for unwanted advertising. However, they are not as effective in blocking incoming phishing emails that are designed to steal your personal information. These settings also do not prevent users from visiting websites known to contain malware.

Additional email security and compliance services can be layered on to block phishing emails and prevent users from visiting problematic sites.

How does it work?

Email filtering analyzes incoming emails for common trigger words, problematic content or design of the email, previously flagged IP addresses or senders, etc. Emails from unknown senders containing links or attached documents may also set off these phishing filters.

Phishing filters will typically move flagged emails to an additional inbox and place them “on hold” until you release, block, or allow it.

Releasing an email sends it to your normal inbox to be opened. In the future you will have to continue approving emails from the sender. If an email is blocked, then the email is rejected and the sender will be now be blocked from sending you future emails.

What are other ways to protect my network?

  • Implement Two-Factor (2FA) / Multi-Factor (MFA) solutions: These solutions add an additional layer of protection to your users.
  • Recognize signs of a scam: Engage your team in regular security training and phishing simulations.
  • Strengthen password security: Use a password manager and limit repeating passwords across different accounts
  • Maintain up to date hardware and software: Work with your IT firm to ensure you are using the most up to date and secure platforms

Remember that email filtering is only a portion of a whole cybersecurity plan used to keep your company safe.

How can PremierePC help?

PremeirePC is partnered with MailProtector (here in Greenville) to offer a range of email security and compliance services.


Elevate your email security to the cloud and stop spam and viruses for good. Let our team of email security experts protect your users around the clock.
Filter outbound email traffic with the policies you define. Prevent spam proliferation and keep damaging or sensitive data from being leaked via email.
Email encryption via Bracket offers an added layer of security to your email platform ensuring compliance in difficult industries like Health Care and Financial Services.

 

Learn more about our email security and compliance offerings and overarching cybersecurity support.

All services sold by the user by the month, no long-term commitments or up-front fees. Services are limited to managed service plan clients.