30
Aug
ITR Logo Small

Spotlight: ShareSync

Next Gen Data Backup If you’re in business, the need for good data backup should be readily apparent. Disaster can strike at any moment and losing data can be catastrophic for business. The I.T. Ranger is proud to offer ShareSync among our Cloud Infrastructure services. I.T. Ranger ShareSync brings together robust, secure data backup with sync and share options that …

Read More0
4
May

Super Seven: Speed Up Your Mac

Speed Up OS X Most Mac users scoff at all the Windows users out there clamoring over utilities to help speed up/clean up/optimize their PCs. They laugh heartily at all the sluggish Windows machines out there that can’t even seem to open Notepad with any modicum of efficiency. But Macs are not immune to slow downs and sluggishness, especially if …

Read More0
27
Apr

VoIP is Not Scary

A VoIP Primer Since the days of Alexander Graham Bell, voice communication has traveled over copper wires in the form of tiny electrical signals. Almost 150 years later, we are still using this same technology (commonly referred to as POTS lines – plain old telephone service) to send our voices over landline phones. With the advent of VoIP (voice over internet protocol), …

Read More0
21
Apr

Super Seven: Cloud Tools

Cloud Tools I’ve talked a lot about “cloud services” and moving your data to “the cloud” and how useful “the cloud” can be; when I say “cloud,” you can think “service or platform that you can access from anywhere you have Internet access.”  Today, we’re going to look at my top cloud tools. This was honestly pretty tough because there …

Read More0

About

Who We Are

The I.T. Ranger brings nearly 20 years of IT experience to the table. We are here to help small and medium-sized businesses (SMBs) achieve their full potential. Here at the Ranger, we offer enterprise-grade technology solutions, customized for your organization. We know that SMBs are the real innovators of the business world, therefore, we customize technology that will help your business to thrive, allowing you the freedom to create.

We support our multi-million dollar backend with multiple redundant data centers. These data centers are under 24-hour surveillance with on-site security guards posted. Consequently, your data is always secure. Our cloud infrastructure and business continuity solutions come with 99.999% guaranteed uptime – that means less than six minutes of network downtime per year.

Customer Service CogWe pride ourselves not only on our infrastructure, but especially on our excellent customer service. Our award-winning helpdesk solution enables you to submit and receive updates on your issues, and ensures that we remain accountable to you for a timely resolution. We place high value on our relationships with our clients, and on delivering top-notch, trustworthy service.

The I.T. Ranger has formed strategic partnerships with companies such as Microsoft, Fortinet, Sophos, 3CX, Yeastar and others to bring you the very best enterprise-class solutions for your business.  Contact us today to see how The I.T. Ranger can catapult your business to the next level.

Certified Partner

Services

Kick Old School in the Teeth

old typewriter

Innovative Solutions

Commerce is more dynamic than ever, with rapid changes and fluctuations across industries, corporations and lines of business. In a world of such change, large corporations often struggle to adapt quickly, while small and medium-sized businesses struggle to keep pace.  At The I.T. Ranger, we know that technology can help solve both sides of that equation, with flexible systems built on rock solid architecture. We are innovators who believe that cutting edge technology doesn’t have to make you bleed.

Business Forward

We can help your business – whether 5 or 5,000 – to operate more efficiently with less overhead, reducing capital expenditures and helping your people to focus on what they do best – your business. Since no two businesses are alike, our solutions are custom-designed for your business to help leverage the unique attributes of your company using the latest technology. Our services can streamline your operations, reduce the burden of management and move your business forward with great strides.

Your Business: Fortune 15 Style

The Scenario:

An unsuspecting employee clicks into an email they shouldn’t. In seconds, they get a popup telling them the files on their computer are encrypted and you only need to pay $7,000 to have them decrypted. Even better, because their workstation has network drives mapped to your server, everything on your server gets encrypted as well. Now, those same messages start popping up on computers all around the office. Before you hit an all out panic, you remember that you have a backup system. Whew! You go to check your backups, all  the while thinking that you’ve successfully conquered your first ransomware encounter. The triumphant music fades to horror as you realize you can’t access your backup files because they’re corrupt and no one has bothered to verify them in months. The sinking feeling in your stomach returns and you wonder what you’re going to do.

Now, imagine you’ve employed The I.T. Ranger to manage your technology. With our antivirus solution and one of our unified threat management platforms in place, there’s a very good chance you’ll never even see such a popup. But if you did, after a phone call to us, we would deploy one of our ransomware cleanup tools to remove the infection. And because your file server and workstations have been backing up in real time to our secure data center, you’re able to restore the latest unencrypted versions of all your files in a matter of minutes. That sinking feeling? It only lasts a moment. The ransomware attack? It’s little more than a blip in your work week.

Imagine your business technology:

  • Your communications platform allows you to not only make phone calls from your office extension anywhere in the world, it provides advanced conference calling, chat and webmeeting features so you can collaborate with clients, vendors and staff across the hall or across the world – at a fraction of the cost of traditional systems.
  • Your email runs in the cloud, encrypted against prying eyes and securely archived for industry compliance.
  • Your server and all its applications run from a secure data center with redundant cooling, power and Internet connections – always on, always available from wherever you are.
  • Every service has a downtime of less then six minutes per year (99.999% uptime)  with no hardware for you to maintain other than your local area network.
  •  We deploy our services on the same platforms as Fortune 15 companies without the Fortune 15 overhead.

Battle-tested Onboarding

The I.T. Ranger Onboarding Concierge will design a migration plan to reduce disruption and minimize downtime. We will work with you and any other vendors (teleco providers, email hosts, IT consultants) to test your network, transfer services and move data with as little disruption to your operation as possible. In addition, we’ll set proper expectations and keep you informed every step of the way.

Clear Support Procedures

Before you sign on the dotted line, we’ll give you extensive documentation on our support procedures, availability, turnaround time and point of contact. We’ll make sure you’re comfortable with every aspect of our support. With our advanced ticketing system, whenever you contact us, we will generate a support ticket so that we maintain a record of progress, clear documentation and accountability.

Secure & Compliant

Security breaches and data leaks are an almost daily occurrence. That’s why it’s important (critical depending on your industry) that your infrastructure meets or exceeds the sometimes dizzying array of rules that define regulatory compliance. All of The I.T. Ranger services that pertain to your data meet or exceed regulatory compliance across a variety of industries. To find out more, go to our Regulatory Compliance section.

Launch Managed Services Quote

Blog

How to Outsmart a Phishing Email

Phishing Epidemic The Definition Phishing – The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. A Classic and Evolving Threat I remember my first encounter with a phishing scam. It was almost 15 years ago and centered around an email designed …

Posted in Editorial, How-To, Security | Leave a comment

ALERT: Microsoft Word Vulnerability

We are writing to inform you of a significant zero-day exploit targeting Microsoft Word that allows an attacker to install malicious software on your computer. This affects all versions of Word, including fully patched Office 365 and Office 2016. If you receive a Microsoft Word attachment in an email, we strongly recommend that you do not open it until Microsoft …

Posted in Alerts | Leave a comment

Office Depot Support Scam

Convenient Does Not Equal Good We love the interactions we have with our clients – it’s what makes doing business really enjoyable. We cringe, however, when we hear that they took one of their PCs to a big box retailer for repair instead of coming to us. Granted, PC repair is not at the forefront of our services, but we …

Posted in Editorial | Leave a comment

What’s Your CyberSecurity Response Plan?

We’ve Left the Light on For You Small Businesses + Unpreparedness = Easy Cyber Attack According to a recent survey, almost 80% of small businesses in the United States do not have a cyber attack response plan. That means there’s no contingency if those businesses get hit by a computer virus, phishing scam or ransomware, even though more than half …

Posted in Editorial, Security, Tech Trends | Leave a comment

Alert: Yahoo Mail Breach

Biggest Breach Ever Hot on the heels of Verizon’s announced purchase of Yahoo, it has just been disclosed today, that Yahoo was the victim of a massive security breach. If security was not at the forefront of your mind, it should be now. In what many people are calling one of (if not the biggest) data breach ever, Yahoo! has …

Posted in Alerts | Leave a comment

Spotlight: ShareSync

Next Gen Data Backup If you’re in business, the need for good data backup should be readily apparent. Disaster can strike at any moment and losing data can be catastrophic for business. The I.T. Ranger is proud to offer ShareSync among our Cloud Infrastructure services. I.T. Ranger ShareSync brings together robust, secure data backup with sync and share options that …

Posted in Recommendations, Spotlight | Leave a comment

Rise of the Machines

Artificial Intelligence The very moniker “artificial intelligence” alone should give us pause. Like “fake reasoning” or “fabricated knowledge” the actual term should conjure pictures of absurdity. Instead, sci-fi media and tech companies have made artificial intelligence something at which to marvel, aspire to and – if the movies are to be believed – feared. I think we’ve seen so many …

Posted in Editorial, Tech Trends | Leave a comment

Windows 10 Upgrade How-To

After yesterday’s post, I’ve had several questions on how the Windows 10 upgrade is done and what the logistics are. Here’s the skinny on the nuts and bolts of the upgrade and what you can look forward to. I’ve personally upgraded almost a dozen PCs, varying from high-end tablets, to low-end tablets to laptops and desktops. I’ve yet to have …

Posted in Geek Speak, How-To | 1 Comment

The Upgrade to Windows 10

Windows 10 has been Here for a Year. Time to Upgrade? It’s been almost a year since Windows 10 rolled out. For those of you who just got back from a lone cave in the middle of a fourth world country, let me bring you up to speed: Windows 10 is the successor to Windows 8 and is Microsoft’s latest and …

Posted in Editorial | Leave a comment

Six Months in With Windows Mobile

The Phone That Could Blast from the Past Long, long ago, I owned a Windows Mobile smartphone – the Palm Treo 700w.  It was like a full-blown Windows XP, shrunk down to the size of a 2.5″ screen.  It was okay – not stellar, just okay.  If I had needed some of the more key features of Windows back then …

Posted in Editorial | Leave a comment

Contact Us

The I.T. Ranger

Phone:

800.335.3590

Class Registration

security_banner

Cybersecurity eCourse

The I.T. Ranger Cybersecurity Course for Business is uniquely designed for business owners, employees and entrepreneurs to become equipped to protect and defend themselves and in the rapidly changing and dynamic threat landscape. There is no other course online specifically geared for businesses with practical tools, training and resources to counter today’s cyberthreats.

Threats cannot be ignored:

  • 2015 saw 1,000 ransomware attacks per day
  • 2016 grew to 4,000 ransomware attacks per day
  • 2017 grew to more than 8,000 ransomware attacks per day
  • In just the last quarter of 2016, 18 million new malware threats were discovered
  • Mac malware grew a staggering 714% in 2016

Education is the #1 defense in the fight against malware:

Human error is the #1 cause of network security breaches. While there are some breaches that are “inside jobs,” many breaches could be mitigated simply by providing training to employees. Trained employees know what to look for, how to deal with threats they encounter and are more vigilant about data protection and security.

During the six week course, you’ll get:

Definitions

Develop a clear picture of key concepts without all the geek speak.

Tools

Go hands-on with practical tools to handle the dynamic threat landscape.

Insights

Gain up-to-the-minute information on new threats and developing trends.

Resources

Receive ongoing resources to leverage in your organization.

Opportunity

Exercise what you learn through interactive demonstrations & challenges.

 

You’ll also have the opportunity to:

  • Ask questions directly to your instructor
  • Dialogue with other students
  • Attend live webinars
  • Receive training from some of the top experts in the field of cybersecurity
  • Gauge your cyber-readiness through quizzes, tests and resource materials
  • Get equipped with practical knowledge you can use at work and at home

At the end of the course, you will receive a certificate of completion and ongoing access to even more valuable resources.

Other cybersecurity courses can cost several hundred dollars or more and none of them are as tailored for the business community.

We are offering our course for $197, but if you enroll between now and  November 7, 2017, you’ll pay just $97. We want to make this course as affordable as possible to get the word out on best practices for staying safe online.

Enrollment is limited to 50 participants. Class begins January 18, 2017.

Use the button below to enroll through out secure checkout facility:

 

About

Who We Are

The I.T. Ranger brings nearly 20 years of IT experience to the table. We are here to help small and medium-sized businesses (SMBs) achieve their full potential. Here at the Ranger, we offer enterprise-grade technology solutions, customized for your organization. We know that SMBs are the real innovators of the business world, therefore, we customize technology that will help your business to thrive, allowing you the freedom to create.

We support our multi-million dollar backend with multiple redundant data centers. These data centers are under 24-hour surveillance with on-site security guards posted. Consequently, your data is always secure. Our cloud infrastructure and business continuity solutions come with 99.999% guaranteed uptime – that means less than six minutes of network downtime per year.

Customer Service CogWe pride ourselves not only on our infrastructure, but especially on our excellent customer service. Our award-winning helpdesk solution enables you to submit and receive updates on your issues, and ensures that we remain accountable to you for a timely resolution. We place high value on our relationships with our clients, and on delivering top-notch, trustworthy service.

The I.T. Ranger has formed strategic partnerships with companies such as Microsoft, Fortinet, Sophos, 3CX, Yeastar and others to bring you the very best enterprise-class solutions for your business.  Contact us today to see how The I.T. Ranger can catapult your business to the next level.

Certified Partner

Services

Kick Old School in the Teeth

old typewriter

Innovative Solutions

Commerce is more dynamic than ever, with rapid changes and fluctuations across industries, corporations and lines of business. In a world of such change, large corporations often struggle to adapt quickly, while small and medium-sized businesses struggle to keep pace.  At The I.T. Ranger, we know that technology can help solve both sides of that equation, with flexible systems built on rock solid architecture. We are innovators who believe that cutting edge technology doesn’t have to make you bleed.

Business Forward

We can help your business – whether 5 or 5,000 – to operate more efficiently with less overhead, reducing capital expenditures and helping your people to focus on what they do best – your business. Since no two businesses are alike, our solutions are custom-designed for your business to help leverage the unique attributes of your company using the latest technology. Our services can streamline your operations, reduce the burden of management and move your business forward with great strides.

Your Business: Fortune 15 Style

The Scenario:

An unsuspecting employee clicks into an email they shouldn’t. In seconds, they get a popup telling them the files on their computer are encrypted and you only need to pay $7,000 to have them decrypted. Even better, because their workstation has network drives mapped to your server, everything on your server gets encrypted as well. Now, those same messages start popping up on computers all around the office. Before you hit an all out panic, you remember that you have a backup system. Whew! You go to check your backups, all  the while thinking that you’ve successfully conquered your first ransomware encounter. The triumphant music fades to horror as you realize you can’t access your backup files because they’re corrupt and no one has bothered to verify them in months. The sinking feeling in your stomach returns and you wonder what you’re going to do.

Now, imagine you’ve employed The I.T. Ranger to manage your technology. With our antivirus solution and one of our unified threat management platforms in place, there’s a very good chance you’ll never even see such a popup. But if you did, after a phone call to us, we would deploy one of our ransomware cleanup tools to remove the infection. And because your file server and workstations have been backing up in real time to our secure data center, you’re able to restore the latest unencrypted versions of all your files in a matter of minutes. That sinking feeling? It only lasts a moment. The ransomware attack? It’s little more than a blip in your work week.

Imagine your business technology:

  • Your communications platform allows you to not only make phone calls from your office extension anywhere in the world, it provides advanced conference calling, chat and webmeeting features so you can collaborate with clients, vendors and staff across the hall or across the world – at a fraction of the cost of traditional systems.
  • Your email runs in the cloud, encrypted against prying eyes and securely archived for industry compliance.
  • Your server and all its applications run from a secure data center with redundant cooling, power and Internet connections – always on, always available from wherever you are.
  • Every service has a downtime of less then six minutes per year (99.999% uptime)  with no hardware for you to maintain other than your local area network.
  •  We deploy our services on the same platforms as Fortune 15 companies without the Fortune 15 overhead.

Battle-tested Onboarding

The I.T. Ranger Onboarding Concierge will design a migration plan to reduce disruption and minimize downtime. We will work with you and any other vendors (teleco providers, email hosts, IT consultants) to test your network, transfer services and move data with as little disruption to your operation as possible. In addition, we’ll set proper expectations and keep you informed every step of the way.

Clear Support Procedures

Before you sign on the dotted line, we’ll give you extensive documentation on our support procedures, availability, turnaround time and point of contact. We’ll make sure you’re comfortable with every aspect of our support. With our advanced ticketing system, whenever you contact us, we will generate a support ticket so that we maintain a record of progress, clear documentation and accountability.

Secure & Compliant

Security breaches and data leaks are an almost daily occurrence. That’s why it’s important (critical depending on your industry) that your infrastructure meets or exceeds the sometimes dizzying array of rules that define regulatory compliance. All of The I.T. Ranger services that pertain to your data meet or exceed regulatory compliance across a variety of industries. To find out more, go to our Regulatory Compliance section.

Launch Managed Services Quote

Blog

How to Outsmart a Phishing Email

Phishing Epidemic The Definition Phishing – The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. A Classic and Evolving Threat I remember my first encounter with a phishing scam. It was almost 15 years ago and centered around an email designed …

Posted in Editorial, How-To, Security | Leave a comment

ALERT: Microsoft Word Vulnerability

We are writing to inform you of a significant zero-day exploit targeting Microsoft Word that allows an attacker to install malicious software on your computer. This affects all versions of Word, including fully patched Office 365 and Office 2016. If you receive a Microsoft Word attachment in an email, we strongly recommend that you do not open it until Microsoft …

Posted in Alerts | Leave a comment

Office Depot Support Scam

Convenient Does Not Equal Good We love the interactions we have with our clients – it’s what makes doing business really enjoyable. We cringe, however, when we hear that they took one of their PCs to a big box retailer for repair instead of coming to us. Granted, PC repair is not at the forefront of our services, but we …

Posted in Editorial | Leave a comment

What’s Your CyberSecurity Response Plan?

We’ve Left the Light on For You Small Businesses + Unpreparedness = Easy Cyber Attack According to a recent survey, almost 80% of small businesses in the United States do not have a cyber attack response plan. That means there’s no contingency if those businesses get hit by a computer virus, phishing scam or ransomware, even though more than half …

Posted in Editorial, Security, Tech Trends | Leave a comment

Alert: Yahoo Mail Breach

Biggest Breach Ever Hot on the heels of Verizon’s announced purchase of Yahoo, it has just been disclosed today, that Yahoo was the victim of a massive security breach. If security was not at the forefront of your mind, it should be now. In what many people are calling one of (if not the biggest) data breach ever, Yahoo! has …

Posted in Alerts | Leave a comment

Spotlight: ShareSync

Next Gen Data Backup If you’re in business, the need for good data backup should be readily apparent. Disaster can strike at any moment and losing data can be catastrophic for business. The I.T. Ranger is proud to offer ShareSync among our Cloud Infrastructure services. I.T. Ranger ShareSync brings together robust, secure data backup with sync and share options that …

Posted in Recommendations, Spotlight | Leave a comment

Rise of the Machines

Artificial Intelligence The very moniker “artificial intelligence” alone should give us pause. Like “fake reasoning” or “fabricated knowledge” the actual term should conjure pictures of absurdity. Instead, sci-fi media and tech companies have made artificial intelligence something at which to marvel, aspire to and – if the movies are to be believed – feared. I think we’ve seen so many …

Posted in Editorial, Tech Trends | Leave a comment

Windows 10 Upgrade How-To

After yesterday’s post, I’ve had several questions on how the Windows 10 upgrade is done and what the logistics are. Here’s the skinny on the nuts and bolts of the upgrade and what you can look forward to. I’ve personally upgraded almost a dozen PCs, varying from high-end tablets, to low-end tablets to laptops and desktops. I’ve yet to have …

Posted in Geek Speak, How-To | 1 Comment

The Upgrade to Windows 10

Windows 10 has been Here for a Year. Time to Upgrade? It’s been almost a year since Windows 10 rolled out. For those of you who just got back from a lone cave in the middle of a fourth world country, let me bring you up to speed: Windows 10 is the successor to Windows 8 and is Microsoft’s latest and …

Posted in Editorial | Leave a comment

Six Months in With Windows Mobile

The Phone That Could Blast from the Past Long, long ago, I owned a Windows Mobile smartphone – the Palm Treo 700w.  It was like a full-blown Windows XP, shrunk down to the size of a 2.5″ screen.  It was okay – not stellar, just okay.  If I had needed some of the more key features of Windows back then …

Posted in Editorial | Leave a comment

Contact Us

The I.T. Ranger

Phone:

800.335.3590

Class Registration

security_banner

Cybersecurity eCourse

The I.T. Ranger Cybersecurity Course for Business is uniquely designed for business owners, employees and entrepreneurs to become equipped to protect and defend themselves and in the rapidly changing and dynamic threat landscape. There is no other course online specifically geared for businesses with practical tools, training and resources to counter today’s cyberthreats.

Threats cannot be ignored:

  • 2015 saw 1,000 ransomware attacks per day
  • 2016 grew to 4,000 ransomware attacks per day
  • 2017 grew to more than 8,000 ransomware attacks per day
  • In just the last quarter of 2016, 18 million new malware threats were discovered
  • Mac malware grew a staggering 714% in 2016

Education is the #1 defense in the fight against malware:

Human error is the #1 cause of network security breaches. While there are some breaches that are “inside jobs,” many breaches could be mitigated simply by providing training to employees. Trained employees know what to look for, how to deal with threats they encounter and are more vigilant about data protection and security.

During the six week course, you’ll get:

Definitions

Develop a clear picture of key concepts without all the geek speak.

Tools

Go hands-on with practical tools to handle the dynamic threat landscape.

Insights

Gain up-to-the-minute information on new threats and developing trends.

Resources

Receive ongoing resources to leverage in your organization.

Opportunity

Exercise what you learn through interactive demonstrations & challenges.

 

You’ll also have the opportunity to:

  • Ask questions directly to your instructor
  • Dialogue with other students
  • Attend live webinars
  • Receive training from some of the top experts in the field of cybersecurity
  • Gauge your cyber-readiness through quizzes, tests and resource materials
  • Get equipped with practical knowledge you can use at work and at home

At the end of the course, you will receive a certificate of completion and ongoing access to even more valuable resources.

Other cybersecurity courses can cost several hundred dollars or more and none of them are as tailored for the business community.

We are offering our course for $197, but if you enroll between now and  November 7, 2017, you’ll pay just $97. We want to make this course as affordable as possible to get the word out on best practices for staying safe online.

Enrollment is limited to 50 participants. Class begins January 18, 2017.

Use the button below to enroll through out secure checkout facility: