• Facebook
  • Twitter
  • LinkedIn
  • Rss
  • 864.335.9223
  • Client Portal
  • Get Help
PremierePC
  • Managed IT Services for Business
    • Computer and Network Support
    • Backup and Disaster Recovery
    • Cybersecurity
    • HIPAA Compliance
    • NIST Framework
    • Surveillance Systems
  • Communication and Productivity
    • Business Phone Systems
    • Hosted Business Email
    • Enterprise File Sharing and Collaboration
    • Email Compliance and Security
  • Business Hosting Solutions
    • Domains
    • Managed DNS
    • Virtual Private Servers
    • Shared Web Hosting
    • SSL Certificates
  • Connect
    • Our Team
    • Latest News
    • Sales
    • Support
    • Client Portal
  • Menu Menu
  • Managed IT Services for Business
    • Computer and Network Support
    • Backup and Disaster Recovery
    • Cybersecurity
    • HIPAA Compliance
    • NIST Framework
    • Surveillance Systems
  • Communication and Productivity
    • Business Phone Systems
    • Hosted Business Email
    • Enterprise File Sharing and Collaboration
    • Email Compliance and Security
  • Business Hosting Solutions
    • Domains
    • Managed DNS
    • Virtual Private Servers
    • Shared Web Hosting
    • SSL Certificates
  • Connect
    • Our Team. Their Passion.
    • Latest News
    • Sales
    • Remote Support
    • Client Portal
  • Get Help
  • 864.335.9223

Solution Highlight

Featured IT solutions from the PremierePC team

Solution Highlight

Egnyte Co-Edit: Solving Your Org’s Collaboration Issues

If your organization is anything like ours, and nearly every SMB we have worked with, you share documents. Often.

This typically creates a major issue: having MULTIPLE file versions, each with different data, in the hands of multiple employees – a.k.a. disaster.

Does this sound familiar? Susan has a spreadsheet and shares it with Jen, who makes a few edits and sends it to Matthew. He then works with Susan on the sheet again, but Susan has different data than Matthew. Whose data do you go with? Matthew calls Mike for some insight, who got another version of the sheet from Chelsea. The cycle continues. This creates serious efficiency issues – wasted time, energy, and money on a simple spreadsheet.

And that’s just ONE spreadsheet.

multiple_file_versions

Egnyte has the solution.

Not only does Egnyte automatically create a new version of a file each time a change is saved for an existing document, Egnyte offers Co-Edit.

Egnyte Co-Edit offers seamless co-editing of any document in Microsoft Office or Google Workspace. This eliminates the need for multiple versions, increasing your team’s workflow efficiency. Multiple users can live edit a single document simultaneously and in real-time. This feature ensures the most accurate and up-to-date content while maintaining security and visibility of your data.

Co-Edit can be accessed via the Web UI or Desktop App for ease of use.

Egnyte Co-Edit saves time and allows for your data to remain secure and maintain accountability through Egnyte.

Visit our enterprise file sharing page to learn more about Egnyte.

December 27, 2021
https://www.premierepc.net/wp-content/uploads/intro-how-it-works-1-e1634049588324.png 402 434 Geena Hammond https://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.png Geena Hammond2021-12-27 13:00:042022-06-13 16:51:13Egnyte Co-Edit: Solving Your Org’s Collaboration Issues
Solution Highlight

Is Your Business Making These Critical CyberSecurity Mistakes?

It’s no secret that cyber attacks are on the rise – hackers are attacking at a rate of once per 39 seconds.

Did you know 95% of cybersecurity breaches are caused by human error?

How about that only 5% of companies’ files are properly protected?

Let’s look at five common mistakes made frequently by businesses like yours.

  1. Many SMBs believe they are too small to be a target.

    FALSE. Hackers are not only interested in large organizations. The bad guys know that large companies have more resources, and a more robust cybersecurity stack. Makes sense to target a smaller firm that still handles sensitive payment and bank data for their clients.

  2. Sharing passwords doesn’t seem like big of a deal, right?

    They’re easier to remember, and surely you can trust your coworkers. Think again. There are many issues with this one. Sharing passwords creates giant holes in your security, makes accountability near impossible, you lose control over where your password is stored or used, etc.

  3. Ever click “later” on suggested software updates?

    Ever click “later” 12 times on that same update? You’re not alone. Again, seems like a small decision. However, think about this. Any time there is a security hole found in software, the developer seeks to correct it. They may come out with an update. With that update, they report the security hole they found. Enter hackers; anyone using a previous version of the software now has a known security hole in their system.

  4. Free Antivirus: you may be thinking, “What a gift! This is surely just as good as any other antivirus.”

    Let’s look at the facts. Free antivirus software offers low detection rates, collects data about your usage, may issue false positives to appear useful, carries bloatware and intrusive ads that slow computers, and suffers from data breaches making them counterproductive.

  5. How often do you train your employees on cyber security?

    Do you have a training protocol or standard operating procedures around this? Employee negligence is the number one cause of data breaches. Some of these actions seem harmless, like connecting to Wi-Fi at Starbucks and checking your email. Reusing your work password, or a variant of that password, across multiple accounts. Some actions could be as simple as clicking a link in an email from a seemingly safe sender. Hackers will even go so far as to drop a USB drive containing malware into the parking lot or hallway of your business; do you feel confident that none of your employees would pick that up and plug it in?

These are just five, in a list of many, common mistakes made by SMBs that leave them open to cyber security attacks.

Don’t wait until it’s too late to formulate a solid defense against these types of attacks.

The average cost of one of these attacks is $200,000.

Can your business afford that?

Click here to learn more.

December 14, 2021
https://www.premierepc.net/wp-content/uploads/cyber-safety-640x414-1-e1623157210613.jpg 414 414 Geena Hammond https://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.png Geena Hammond2021-12-14 14:30:072022-06-15 14:40:22Is Your Business Making These Critical CyberSecurity Mistakes?
Solution Highlight

PremierePC achieves HIPAA Compliance. You can too!

PremierePC Achieves HIPAA Compliance with Compliancy Group

PremierePC has demonstrated its good faith effort toward HIPAA compliance by completing Compliancy Group’s proprietary HIPAA compliance process.

We are pleased to announce that we have taken all necessary steps to prove our good faith effort to achieve compliance with the Health Insurance Portability and Accountability Act (HIPAA). Through the use of Compliancy Group’s proprietary HIPAA solution, The Guard™. we can track our compliance program and have earned our Seal of Compliance™. The Seal of Compliance is issued to organizations that have implemented an effective HIPAA compliance program through the use of The Guard.

HIPAA is made up of a set of regulatory standards governing the security, privacy, and integrity of sensitive healthcare data called protected health information (PHI). PHI is any individually identifiable healthcare-related information. If vendors who service healthcare clients come into contact with PHI in any way, those vendors must be HIPAA compliant.

We have completed Compliancy Group’s Implementation Program, adhering to the necessary regulatory standards outlined in the HIPAA Privacy Rule, Security Rule, Breach Notification Rule, Omnibus Rule, and HITECH.  Compliancy Group has verified our good faith effort to achieve HIPAA compliance through The Guard.

PremierePC is excited to have taken these measures toward compliancy and to offer this program to our clients.

Want to learn more? Give us a call or click here.

November 12, 2021
https://www.premierepc.net/wp-content/uploads/logo_circle.png 192 192 Geena Hammond https://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.png Geena Hammond2021-11-12 10:56:582022-09-20 13:44:08PremierePC achieves HIPAA Compliance. You can too!
Solution Highlight

Egnyte: Meeting both your File Sharing and Security Needs

Is additional file sharing security really that important? I lock my computer and only use my work email to send data. Isn’t that enough?

Good question. It may not be enough. In short, email data can be stolen as it travels un-encrypted over the network. Data could be stored un-encrypted on mail servers, internet mail relays, as well as end devices. Stolen data is then sold on the dark web and there’s no turning back.

Yikes! So how can I store and share my data in a secure way that’s also easy to use?

Let’s look at Egnyte…

 

First, what is Egnyte?

Our enterprise file sharing platform addresses the critical infrastructure needs of businesses – file storage, revisioning, sharing and collaboration – in one secure, centrally managed and easy-to-use solution.

egnyte_file_sharing

Sounds neat.

What does File Sharing look like?

Basic file sharing is easy: simply choose the file, select ‘share’ from the menu. You’ll be given the option to copy a link which you can then easily drop into an email or chat session.

There’s a few further helpful customizations you can layer on to this link:

  1. Link Expiration – choose what date you’d like the link to expire.
  2. Sender notification – select to be notified once the link is used by the recipient.
  3. File name – include the (human readable) file name in the link.
  4. Version – choose to always display the most recent version of the file.

Layer on more security

Want to restrict downloads? Easy, Egnyte allows you to restrict or allow downloads. If you choose to restrict downloads, the user will only be allowed to view the file through a browser.

Need another layer of security? Add simple, effective password protection. Organizations can set policies that require password protection for sensitive files passed outside the organization. The system will automatically generate a password for the sender to relay to the recipient.

File access can further be limited to specific email addresses. Egnyte allows the sender to select ‘specific recipients’ and input their email addresses. This prevents the recipient from forwarding the link to others.

Egnyte can encrypt a document in transit and on the user’s device by the sender layering on ‘encrypted downloads’ to the selected file. The file will then remain encrypted on the receiver’s device and is only decrypted while being viewed. If necessary, the sender can also revoke permissions to view the file after sharing.

The importance of collaboration is evident in any business – anything that improves workflow and efficiency is easily received by employers. However, security is just as, if not more, important. Security breaches can take out an entire organization in a matter of moments. Securing your data and sharing that data in an intelligent, secure way is instrumental to mitigating your cybersecurity risks.

Learn more here.

October 14, 2021
https://www.premierepc.net/wp-content/uploads/intro-how-it-works-1-e1634049588324.png 402 434 Geena Hammond https://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.png Geena Hammond2021-10-14 11:12:582022-06-13 16:51:33Egnyte: Meeting both your File Sharing and Security Needs
Solution Highlight

Brand 365 with Company Logo, Increase Security

Your employees are your greatest asset. 

Did you know, they can also be your greatest risk?

Your organization’s data is at the hand of each person within your company.

Anyone with a company email can risk your security.

So… what to do about it.

Introducing branded email logins.

Many attackers use phishing emails to prompt users to enter their credentials on compromised pages. Often, users will enter these credentials because the pages look very similar to a legitimate login page.

One frequently used phishing scheme is the Microsoft 365 sign in page. If attackers can gain the email credentials of an employee, they now have an entry point into your entire organization.

We can help mitigate this risk.

By applying your company logo to the login screen, you are offering a visual cue to your employees that this is legitimate. This visual cue will help employees differentiate real login pages from malicious prompts for credentials.

Give us a call today to learn more about your security stack, and how we can help you increase your overall security posture.

August 20, 2021
https://www.premierepc.net/wp-content/uploads/microsoft-to-ditch-nokia-e1619541991640.jpg 333 333 Geena Hammond https://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.png Geena Hammond2021-08-20 16:29:322022-06-13 16:50:03Brand 365 with Company Logo, Increase Security
Solution Highlight

Secure File Sharing AND Requests… What Your SMB is Missing

[Bracket]

 

Included with Bracket is our encrypted file transfer service, Bracket Share.

 

share files

request files

customize

 

Bracket Share links are customizable, so users can make them easy to remember and share.

You can have Bracket email people an invitation to share. These can display your personalized profile, so your contacts feel more confident about sharing their sensitive data.

Anyone with your Share link can share encrypted files and messages when it’s convenient for them. No account required.

Senders who share through the Share link are securely validated via inbox authentication to prevent abuse.

Bracket can handle files up to 1GB in size with up to 25 files allowed per message. Large files are good to go when sending from Bracket’s webmail interface or Bracket Share.

Click Here to Learn More

 

 

August 12, 2021
https://www.premierepc.net/wp-content/uploads/Annotation-2020-09-10-154055.png 602 690 Geena Hammond https://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.png Geena Hammond2021-08-12 11:50:472021-08-12 12:58:48Secure File Sharing AND Requests… What Your SMB is Missing
Solution Highlight

What’s New With GoTo?

Our business phone and fax system combines a hosted PBX with advanced voice and fax features, reliable VOIP service with unlimited calling and VOIP phones.

All of this sits on top of an intelligently managed network by PremierePC.

 

GoTo Hosted Phones

Announcing: NEW PHONE PLANS

We are excited to announce, will be offering the following Hosted Phones plans: Basic, Standard+, and Premium+.

Basic

Feature-limited, business phone system with messaging and basic video conferencing. 20 seat max.

Standard+

Fully integrated business solution for phones, messaging and video plus password management and basic events.

Premium+

Your remote employee workbench. Empower your entire workforce regardless of their location: Unified Communications, IT support, Contact Center, Virtual Events and Enterprise Password Security.

We are excited to offer more flexible phone plans for your organization.

Join the “work from anywhere” revolution with the bundle that scales to meet your needs. Click here for more info.

July 14, 2021
https://www.premierepc.net/wp-content/uploads/hosted-phones-greenville-sc-e1626289871402.png 491 712 Geena Hammond https://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.png Geena Hammond2021-07-14 13:00:522023-06-29 12:37:40What’s New With GoTo?
Solution Highlight

VPN? What’s that?

The workforce is becoming more and more remote each day, while we are accessing sensitive data from unprotected locations like our home and public Wi-Fi.

And the bad guys are always lurking.

So how can we protect ourselves and our data from unwanted third parties?

VPN to the rescue!

A VPN, or virtual private network, gives online privacy and anonymity by creating a private network from a public internet connection. Fancy, huh?

The VPN masks your IP address so online actions are virtually untraceable.

It also creates a secure and encrypted tunnel for all data to pass through, providing more privacy than a secured Wi-Fi hotspot.

Think: checking emails, looking at your bank account balance, shopping online, paying bills, etc.  How often are you doing these things without a secured connection?

A few things to examine when it comes to VPN selection:

Do they respect your privacy? Do they run the most current protocol? Do they set data limits? Where are the servers located? Will you be able to set up VPN access on multiple devices? How much will it cost?

If you’re feeling overwhelmed, we get it. This is a lot to navigate if you’re not experienced in the IT space. Let us handle that. 

When you partner with PremierePC, you get forward-thinking, intelligent consulting every step of the way. Click here to learn more.

May 16, 2021
https://www.premierepc.net/wp-content/uploads/what-is-a-vpn-tunnel_thumb800-e1620996400507.jpg 440 440 Geena Hammond https://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.png Geena Hammond2021-05-16 11:00:582023-03-13 11:46:08VPN? What’s that?
Solution Highlight

GoToConnect: What’s New?

GoToConnect has recently released some features and updates!

Block phone numbers on GoToConnect Mobile.

  1. From the GoToConnect mobile home screen, tap the gear icon.
  2. Go to Call Settings > Blocked Numbers then click +.
  3. Enter the Phone number criteria for the block.
    • Enter a ten-digit phone number
    • Or enter a number using * to broaden the call filter. Example: 800* will block all calls from 1-800 numbers, *4437 will block all calls from numbers ending in 4437.
  4. Enter a Description and then tap Done.

You can manage the blocked numbers from clicking the gear icon > Call settings > Blocked Numbers.

Use Visual Call Parking on GoToConnect web and desktop.

Virtually park calls on hold and answer them. With visual call parking you can view which call parking spots are in use on your system from GoToConnect web and desktop.

Before you begin: To use visual call parking, a system admin must enable this feature for you (don’t know how? Click here.)

Note:

  • To view visual call parking spots, click your name in the top left, click Settings and then check the box for Display parked call spots.
  • The Parked calls section in the left sidebar will only be displayed when there are calls parked on your system.
  1. While on an active call, click Park.
  2. In the new window, select the call parking spot you’d like to use or type a custom parking spot (any number of digits, but it cannot start with 0) and then click Park Call. If you park a call to an occupied spot, the call will be transferred back to you.
    Tip: There is an unlimited number of parking spots available, and they can be assigned manually or by the system.
  3. To answer a parked call, click the desired call from Parked calls in the left sidebar and then click Call.
    Note: Parked calls will remain on hold until someone answers them or Call Parking Timeout lapses (the call is then routed back to the original person who parked the call).

Don’t have GoToConnect? Learn more about our Hosted Phones services here.

April 22, 2021
https://www.premierepc.net/wp-content/uploads/logo_circle-2.png 114 114 Geena Hammond https://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.png Geena Hammond2021-04-22 10:30:512023-06-29 12:38:11GoToConnect: What’s New?
Solution Highlight

What is Client-Centered Service?

PremierePC considers our clients’ needs every step of the way. As a Managed Services Provider (MSP), we interact with a multitude of services; tying it all together creates our client-centered service model.

client_centered

Our client-centered servicing focuses on building relationships with our clients and creating positive experiences by maximizing technology services and product offerings. 

We are aware that YOU are the primary reason PremierePC exists as a Managed Services Provider, and we value each relationship. Your IT provider should not be there to leverage you as a revenue source; they should be there to advise, consult, and resolve. 

If you don’t feel supported by your current IT provider, you may not have an MSP.

You may now be asking, “If I don’t have an MSP, what do I have?”

Many IT companies sell you what looks like a managed services plan, instead they nickel and dime you for everything. There is nothing proactive happening. They generally offer one or two MSP services, then operate more like an on-demand or break–fix shop. The consulting is limited, and the company is centered around their profit centers, not your success. 

In reality, many of these companies are Value-Added Resellers, or VARs. 

These VARs pose as MSPs; their focus is pushing hardware, padding the cost, and attaching services to these orders. They may look like an MSP in the sense that they can sell and service equipment. However, they are interested solely in pushing product, not the service they provide. A VAR’s revenue margins on hardware are often in competition with the best fit for the client. Service revenue is viewed as just another product to them and has little to do with providing best in class offerings. As a result of this approach, you may end up being oversold on IT and underserviced.  

So, what is a Managed Services Provider? 

An MSP is going to offer a help desk, proactive and reactive services, patching and automations, and integrated consulting. 

In an ideal relationship, the MSP will offer the above while also functioning as a partner and an extension of your business.  

Recent studies show that 31% of MSP clients are primarily seeking an MSP to meet security risks; 15% primarily need cybersecurity services, and 7% are looking for public cloud adoption/migration/support. 

Think about your business, what you NEED, and if your IT provider is meeting, and exceeding, that need. 

Keep in mind, 63% of SMBs experienced a data breach or cyber-attack in 2019. It is imperative your business is prepared.  

So you could either:

Spend your money being oversold and underserviced  

OR 

Invest in your future with a forward-thinking business partner whose sole interest is to maximize your potential through technology

On to PremierePC. Let’s look at what we provide. 

  • Helpdesk Access 8am-5pm
  • Anti-Virus Protection
  • Windows Patching
  • Switch Management
  • Change Management
  • Extended Support Options
  • Hosted VOIP Phone System
  • VPS Hosting
  • Secure DNS
  • Multi Factor Authentication
  • Remote / Depot Support
  • Onsite Support
  • Router Management
  • WiFi Management
  • Third Party Updates
  • Backup and Disaster Recovery (BDR)
  • Managed Cloud Services
  • Enterprise File Sharing
  • Dark Web Monitoring
  • Project Work
  • Forward Thinking Consulting
  • System Monitoring
  • Router as a Service
  • Asset Management
  • Hardware Recommendations
  • Email Security and Compliance
  • Website Hosting
  • Domain Management
  • Security Awareness Training
  • Threat Hunting
Some follow-up questions:
What does this client-centered model look like?

We offer several customizable service plan levels, centered around your business’ size and needs, not a particular service set. 

What is always covered by the service plan?

Our service plans are billed by the supported device. A supported device is a Windows or Apple system which has our network monitoring agent and managed security services enabled. In addition, our team will support other devices on your network at no additional cost. This includes printers, routers, network switches, mobile phones, tablets and just about any other network connected device. 

We offer proactive measures, monitoring and protection you will use on day one, plus access to more. Even our follow-up process is proactive, ensuring you are happy with the resolution of your issue. There is absolute value in having a service provider in your corner that packages essential security services and proactive measures into the offering. 

How is this model different from other models?

When you simply pay by the issue or by the hour, the incentive is shifted towards the service provider. We strongly believe that a service plan creates a valuable relationship that enables both sides to be more productive and integrated. 

PremierePC is transparent with pricing from the beginning. Check out our computer and network support page to view our pricing model. We are interested in ensuring this partnership works for both of us, we have no interest in hiding costs.

We stand behind the value we provide as a fully integrated MSP.

PremierePC partners with you, using forward thinking and intelligent consulting, to improve your network and security stack, mitigating problems before they arise.

Contact us if you’d like to learn more about your current environment or have additional questions.
April 14, 2021
https://www.premierepc.net/wp-content/uploads/Customer-Satisfaction-Icon-1.png 900 900 Geena Hammond https://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.png Geena Hammond2021-04-14 11:47:452023-03-13 11:44:41What is Client-Centered Service?
Page 3 of 6‹12345›»

Stay in the know.

Sign-up to join our monthly newsletter.

Categories

  • Office Updates
  • Q and A
  • Solution Highlight
  • TechBytes

Managed IT Services

Computer and Network Support

Backup and Disaster Recovery

Cybersecurity

NIST Framework

Surveillance Systems

HIPAA Compliance

Communication and Productivity

Business Phone Systems

Enterprise File Sharing

Hosted Business Email

Email Compliance and Security

Get In Touch

16 W Pointe Blvd, Mauldin, SC
864.335.9223

Contact Sales | Open a Case

About

Meet the Team | Latest News

PremierePC Technology Group, LLC BBB Business Review
HIPAA Seal of Compliance

A fully integrated IT solutions provider for local business clients. Serving the Upstate of South Carolina including Greenville, Spartanburg and Anderson counties.
Physical Address: 16 W Pointe Blvd, Mauldin, SC 29662 | 864.335.9223 | Payment Remittance: PO Box 5293 Greenville, SC 29606
Copyright © 2006 – 2023 PremierePC Technology Group. All Rights Reserved. | Terms and Conditions | Privacy Policy

Scroll to top