Managed IT Services
Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.
Our mission is to help Ohio, Kentucky and West Virginia businesses increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.
Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.
Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.
Ensure peace-of-mind in any situation with the most complete data backup solution available.
Regain Control over your Inbox with our unique Spam Protection solutions.
There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.
At Patriot Tech Services Inc., we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.
We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.
This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.
Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.
Today, we will explore the three most important metrics for data backup and disaster recovery: recovery time objective (RTO), recovery point objective (RPO), and backup success rate.
No one anticipates a disaster, but if you experience one, you want to be prepared with the minimum amount of data you need to maintain operations. Simply put, you likely will not be able to keep all your data in the event of a data loss incident, so you have to prioritize the important stuff first. You’ll have to assign a value to your data to determine which types are more important, then take measures during the backup process to ensure that you’re treating it appropriately. For example, there are regulations and compliance requirements for certain types of data that must be considered. More often than not, the most important data, like customer information and financial records, will have low RPO, while less important data might have higher RPO.
Establishing realistic expectations for how long it takes to get back to work after a disaster is also crucial. RTO is the acceptable level of downtime associated with recovering data and restoring business operations following a disaster. One way to gauge this is to ask yourself how long your business will take to get back to an acceptable level of operations, as well as what systems must be in place to make it happen. The important thing here is to get back to work with minimal loss and to continue functionality without running a loss. If you can do this, then a disaster won’t impact you as harshly as you might expect.
With RPO and RTO in mind, you can create a backup system that allows you to maintain operations and minimize data loss, provided it works the way it should. You should test your backup solution to ensure that it works appropriately toward your goals. You’ll want to measure the amount of failed backups versus the amount of successful backups and keep the successes as high as possible—at least 95 percent, if not higher.
In general, it’s a good idea to regularly test your backup system to ensure that it works for when you will need it most.
If your business doesn’t have data backup and disaster recovery, you’re playing a dangerous game. You could be risking everything you have built needlessly. We recommend you work with Patriot Tech Services Inc. to identify opportunities to be proactive with your data backup. Call us today at 877-874-4629 to learn more.
When we think of more “typical” cyberattacks, they are commonly designed to target as many people as possible, often using rudimentary attack methods to identify the easiest targets to pursue. A mercenary attack is similar to this but on a much smaller scale, with millions of dollars spent to target a relatively small target pool.
As the threat notification email informed potential targets, “This attack is likely targeting you specifically because of who you are or what you do.”
The email also describes the kinds of things that this attack, as a mercenary spyware attack specifically, would likely do, stating,
"If your device is compromised by a targeted mercenary spyware attack, the attacker may be able to remotely access your sensitive data, communications, or even the camera and microphone."
Apple has added a support page describing these attacks, and what an impacted Apple user should do if they suspect their device is infected. This includes a list of best practices that we can very much sign off on:
Apple also recommended that those who had not yet been targeted, but had reason to suspect they might be, to turn on “Lockdown Mode,” which restricts the device to very limited functions to reduce the attack surface that these kinds of targeted threats would use.
Hopefully, you won't be targeted by these kinds of attacks, but we wanted to help spread the word as much as possible, and we’re not going to miss the opportunity to share some security best practices. For more security best practices and general technology assistance for your business needs, please consider the managed services that we offer here at Patriot Tech Services Inc.. Call us at 877-874-4629 to discuss your options with our team of experts.
The Android OS uses APK files to install applications. Like the installation packages you might see for a desktop computer, these APK files contain all kinds of data. The APK will contain not only the code for the app but also the resources and assets it will use to run on your device. When you open the APK file, it will install the app on your Android device.
APK was once the standard file format for Android apps before 2021, but nowadays, the AAB, or Android App Bundle, is the preferred option because it will create APKs specifically for your device. Additionally, AAB files allow developers to distribute apps that are not quite ready for the general public just yet, either because they aren’t finished or not on the Google Play Store. It can also be a great way to download previous versions of apps or those removed from the Play Store.
If an app developer wants to distribute their content to the Google Play Store, they need to stick to fairly strict requirements and agreements. Part of this process is ensuring that there are adequate security and safety checks against the apps.
Suppose an application is “sideloaded” or installed from a location aside from the Google Play Store. In that case, you can’t take advantage of those security checks to ensure nothing malicious is at play with your download. Therefore, you should never download and install an APK from an unknown source.
It’s also a bad idea to download an unauthorized, altered, or cracked application, too, as you could be involved in illegal behavior that violates copyright laws. You should engage in ethical business practices that do not support these methods.
You should never install APK files on your Android device without first notifying your IT department of your intentions. They will undoubtedly want to test the app to ensure it’s safe before you try sideloading it. In any case, you shouldn’t install an app to your device without first asking IT anyway, let alone sideload them.
If you’re curious about the process, installing an APK file is easy—perhaps alarmingly so. All you have to do is download the file and open it to get started.
Your settings might warn you about the potential security risks associated with opening the file. You can get around this though by making some adjustments in your settings app, namely the toggle under Install Unknown Apps. You just change this to Allow Permission and tap Install.
Installing unknown apps is a fairly common way for a network to become a victim of a cyberattack. Don’t let your business fall into the same trap. Contact the technology experts at Patriot Tech Services Inc. with any security concerns.
Patriot Tech Services Inc. is proud to announce the launch of our new website at www.patriot-techs.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.
Read more ...