Category Archives: Managed Services

How to pick the right Co-Managed IT Provider

In the past, businesses either had an internal IT person/team or they worked with an outsourced IT company that provided Break/Fix or Managed IT Services. As the model has developed, businesses are finding it advantageous to have a combination of in-house and outsourced IT. For instance, they may not have the budget or need for […]

A Complete Guide to Co-Managed IT Support

Co-managed IT support has been gaining popularity with business owners and executives because it offers flexible, simple solutions to complex IT problems. It also allows them to maximize the efficiency of their IT team and save on labor costs. In this guide, we’ll take a deeper dive into what co-managed IT support is, potential use […]

Why are business leaders choosing Co-Managed IT?

There is a shift happening in the marketplace where businesses are increasingly choosing to outsource specific roles to Managed Service Providers. There is a realization that it is not effective for larger entities to outsource all IT roles. After 100+ endpoints, it’s important to have an internal IT manager or team. However, the IT budget […]

Security Alert: Growing Threats

Growing Threats

i.t.NOW works hard to protect our clients’ networks from security threats and ensure their safety and operability.  In those efforts we frequently see what growing threats there are in the wild.  Two that we particularly wanted to make our clients aware of are Business Email Compromise (BEC) attacks, and Ransomware. Neither one of these attacks […]

The HOW and WHY of Cybersecurity Endpoint Attacks:  Why do they happen?

They how and why of cybersecurity are numerous and varied.  Here we’ll discuss endpoint attacks specifically, and some of the more common attack vectors.  We’ll also touch on a few primary ways to prevent these breaches, and why business owners should care. How are they getting in?  Here are several common attack types User Initiated […]

How to Tell If You’ve Outgrown Your IT Provider

Man hunched over inside of a box

I met with a company this week that is thriving.  They have been growing by leaps and bounds over the last couple of years, and its run by smart, talented people.  The one area where they are struggling is with managing their technology.  That’s why they called me.  They were essentially asking how to tell […]

Endpoint Detection and Response

Endpoint Detection and Response

Antivirus solutions have been continually evolving over the years along with threats and attack patterns.  Endpoint detection and response (EDR) is the latest evolution and offers some significant advantages over its predecessors.  It’s been a long journey.  Here is a brief timeline of AV evolution and some practical advice about the very real advantages of […]

Business Case – A Salt Lake City Manufacturing Company

woman working on computer

Clark sat at his desk staring at his monitor, the frustration mounting. He felt tired. He loved his work, and he was damn good at it. This was simply too much. He had started work at a new company a few months prior. As an IT administrator he was excited to get his hands dirty […]

IT Security for Small Businesses – A Complete Guide

IT Security for Small Business – A Complete Guide

The news is full of the latest companies that have suffered security breaches. These headlines focus on large corporations because the big numbers involved make the attack more impressive. This gives many small business owners a false sense of security -an illusion that there is security through obscurity. There is an idea that a “small […]

Why you should enable Office 365 Two Factor Authentication

The world is a dangerous place.  Keeping your business safe online can be a chore.  There are a lot of good reasons why you should enable office 365 two factor authentication.  The fact that it makes keeping your data safe easier is one.  Here are a few more. Ease of Use Security needs to be […]