About

Who We Are

The I.T. Ranger brings nearly 20 years of IT experience to the table. We are here to help small and medium-sized businesses (SMBs) achieve their full potential. Here at the Ranger, we offer enterprise-grade technology solutions, customized for your organization. We know that SMBs are the real innovators of the business world, therefore, we customize technology that will help your business to thrive, allowing you the freedom to create.

We support our multi-million dollar backend with multiple redundant data centers. These data centers are under 24-hour surveillance with on-site security guards posted. Consequently, your data is always secure. Our cloud infrastructure and business continuity solutions come with 99.999% guaranteed uptime – that means less than six minutes of network downtime per year.

Customer Service CogWe pride ourselves not only on our infrastructure, but especially on our excellent customer service. Our award-winning helpdesk solution enables you to submit and receive updates on your issues, and ensures that we remain accountable to you for a timely resolution. We place high value on our relationships with our clients, and on delivering top-notch, trustworthy service.

The I.T. Ranger has formed strategic partnerships with companies such as Microsoft, Fortinet, Sophos, 3CX, Yeastar and others to bring you the very best enterprise-class solutions for your business.  Contact us today to see how The I.T. Ranger can catapult your business to the next level.

Certified Partner

Cybersecurity for Business

Never has security been more important for your business. The Internet has integrated and connected business like never before, allowing collaboration and communication across the globe. But with all that convenience comes massive amounts of data – your data – traveling across the globe. Whether it’s a voice-over-IP phone call, financial transaction, file transfer or social media post, you data passes through dozens of networks on the way to its destination.

This means three things for your business:

  1. You don’t always have control of your own data
  2. Your data can be compromised at multiple points in transit
  3. You likely will never know if your data has been intercepted or manipulated – until it’s too late.

Opportunities for hackers are even more pronounced inside your business. Insufficient security infrastructure, untrained staff and social engineering too often leave the door wide open for hackers to compromise or destroy your business data. In 2018 attackers compromised data at T-Mobile, Facebook and Google. Even worse the city of Atlanta was crippled for weeks following a ransomware attack, shutting down electronic police reporting, city utility websites and the court records system. But these are high profile incidents. The reality is more than half of all cyberattacks target smaller companies.

To protect your business, you must focus on three things:

  1. Staff training – strong passwords, social engineering awareness and proactive security policies
  2. Security infrastructure – firewalls, antivirus, unified threat management appliances
  3. Monitoring – the best infrastructure and training is meaningless without proper monitoring and oversight

When coupled with a robust data backup and recovery solution, these security measures can allow your business to operate with the highest level of confidence. Protection does not guarantee that you’ll never be a victim of a cyberattack, but with a data recovery solution in place, it means that you have the power to turn a potentially crippling attack into little more than a blip in your operation.

The I.T. Ranger offers a three-tiered approach to protecting your business:

  1. Staff – We train your staff to recognize the most common cybersecurity threats, including phishing emails and potentially unwanted programs.
  2. Infrastructure – We use some of the most robust and innovative cybersecurity technology provided by Sophos. We also utilize enterprise-class data backup and recovery with the ability to restore individual files or entire machines.
  3. Support – We provide 24/7/365 monitoring of your security infrastructure and offer rapid response in the event of attack.

Blog

How to Outsmart a Phishing Email

Phishing Epidemic The Definition Phishing – The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. A Classic and Evolving Threat I remember my first encounter with a phishing scam. It was almost 15 years ago and centered around an email designed …

Posted in Editorial, How-To, Security | Leave a comment

ALERT: Microsoft Word Vulnerability

We are writing to inform you of a significant zero-day exploit targeting Microsoft Word that allows an attacker to install malicious software on your computer. This affects all versions of Word, including fully patched Office 365 and Office 2016. If you receive a Microsoft Word attachment in an email, we strongly recommend that you do not open it until Microsoft …

Posted in Alerts | Leave a comment

Office Depot Support Scam

Convenient Does Not Equal Good We love the interactions we have with our clients – it’s what makes doing business really enjoyable. We cringe, however, when we hear that they took one of their PCs to a big box retailer for repair instead of coming to us. Granted, PC repair is not at the forefront of our services, but we …

Posted in Editorial | Leave a comment

What’s Your CyberSecurity Response Plan?

We’ve Left the Light on For You Small Businesses + Unpreparedness = Easy Cyber Attack According to a recent survey, almost 80% of small businesses in the United States do not have a cyber attack response plan. That means there’s no contingency if those businesses get hit by a computer virus, phishing scam or ransomware, even though more than half …

Posted in Editorial, Security, Tech Trends | Leave a comment

Alert: Yahoo Mail Breach

Biggest Breach Ever Hot on the heels of Verizon’s announced purchase of Yahoo, it has just been disclosed today, that Yahoo was the victim of a massive security breach. If security was not at the forefront of your mind, it should be now. In what many people are calling one of (if not the biggest) data breach ever, Yahoo! has …

Posted in Alerts | Leave a comment

Spotlight: ShareSync

Next Gen Data Backup If you’re in business, the need for good data backup should be readily apparent. Disaster can strike at any moment and losing data can be catastrophic for business. The I.T. Ranger is proud to offer ShareSync among our Cloud Infrastructure services. I.T. Ranger ShareSync brings together robust, secure data backup with sync and share options that …

Posted in Recommendations, Spotlight | Leave a comment

Rise of the Machines

Artificial Intelligence The very moniker “artificial intelligence” alone should give us pause. Like “fake reasoning” or “fabricated knowledge” the actual term should conjure pictures of absurdity. Instead, sci-fi media and tech companies have made artificial intelligence something at which to marvel, aspire to and – if the movies are to be believed – feared. I think we’ve seen so many …

Posted in Editorial, Tech Trends | Leave a comment

Windows 10 Upgrade How-To

After yesterday’s post, I’ve had several questions on how the Windows 10 upgrade is done and what the logistics are. Here’s the skinny on the nuts and bolts of the upgrade and what you can look forward to. I’ve personally upgraded almost a dozen PCs, varying from high-end tablets, to low-end tablets to laptops and desktops. I’ve yet to have …

Posted in Geek Speak, How-To | 1 Comment

The Upgrade to Windows 10

Windows 10 has been Here for a Year. Time to Upgrade? It’s been almost a year since Windows 10 rolled out. For those of you who just got back from a lone cave in the middle of a fourth world country, let me bring you up to speed: Windows 10 is the successor to Windows 8 and is Microsoft’s latest and …

Posted in Editorial | Leave a comment

Six Months in With Windows Mobile

The Phone That Could Blast from the Past Long, long ago, I owned a Windows Mobile smartphone – the Palm Treo 700w.  It was like a full-blown Windows XP, shrunk down to the size of a 2.5″ screen.  It was okay – not stellar, just okay.  If I had needed some of the more key features of Windows back then …

Posted in Editorial | Leave a comment