The TriState IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help Ohio, Kentucky and West Virginia businesses increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Spam Protection Solutions

Regain Control over your Inbox with our unique Spam Protection solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Patriot Tech Services Inc., we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • Do you have questions about Managed IT Services and what they can do for your company?
  • First Name *
  • Last Name *
  • Company Name
  • Phone *

      What Our Clients Say

      • Fantastic Support
        Portsmouth

        As the technology and computerization continued to grow in our practice, so did our I.T. support needs. The response time from the previous company that we were using was getting longer and longer, and this became very frustrating. Unfortunately, when a practice is completely dependent upon technology, a slow response time from an I.T. support company is crippling. After I talked with Chris from...

        Read More
      • Patriot-Techs brought us into the 21st century

        We are so thankful for Patriot-Tech, they upgraded our old computers and helped us become more productive. It's great because we can help more people if we can do more. Our old computers were so slow. Thanks guys!

        Read More
      • Great techs!
        Conover
        USA
        www.asd-usa.com

        Our large Dollar General project could not have been completed without your technicians. They were great at completing the sites they were responsible for quickly and correctly. Helped us finish up ahead of schedule which we appreciated! You are our go-to company for work in OH, WV & KY. Thank you!   Ashley Hill NDS - Automated Systems Design, Inc. (ASD)

        Read More
      • Extremely Professional
        Huntington
        CVS

        Tech was extremely professional and great to work with. Our end user was very happy with his performance and his politeness. Thank you for your hard work! Will definitely use again.  

        Read More
      • High Praise
        Ashland
        Rainbow Title Co

        Our 3rd party vendor couldn't say enough good things about Patriot's technicians. Their own IT person who supports their products everyday wasn't able to resolve the issue but your guys did!  Even though the vendor was embarrassed, he had high praise for the knowledge and quick work to resolve the issue and get me up and running.  Thank you!

        Read More

      Latest Blogs

      How to Effectively Measure and Use Data Backup and Disaster Recovery Metrics

      Today, we will explore the three most important metrics for data backup and disaster recovery: recovery time objective (RTO), recovery point objective (RPO), and backup success rate.

      RPO (Recovery Point Objective)

      No one anticipates a disaster, but if you experience one, you want to be prepared with the minimum amount of data you need to maintain operations. Simply put, you likely will not be able to keep all your data in the event of a data loss incident, so you have to prioritize the important stuff first. You’ll have to assign a value to your data to determine which types are more important, then take measures during the backup process to ensure that you’re treating it appropriately. For example, there are regulations and compliance requirements for certain types of data that must be considered. More often than not, the most important data, like customer information and financial records, will have low RPO, while less important data might have higher RPO.

      RTO (Recovery Time Objective)

      Establishing realistic expectations for how long it takes to get back to work after a disaster is also crucial. RTO is the acceptable level of downtime associated with recovering data and restoring business operations following a disaster. One way to gauge this is to ask yourself how long your business will take to get back to an acceptable level of operations, as well as what systems must be in place to make it happen. The important thing here is to get back to work with minimal loss and to continue functionality without running a loss. If you can do this, then a disaster won’t impact you as harshly as you might expect.

      Backup Testing and Success Rate

      With RPO and RTO in mind, you can create a backup system that allows you to maintain operations and minimize data loss, provided it works the way it should. You should test your backup solution to ensure that it works appropriately toward your goals. You’ll want to measure the amount of failed backups versus the amount of successful backups and keep the successes as high as possible—at least 95 percent, if not higher.

      In general, it’s a good idea to regularly test your backup system to ensure that it works for when you will need it most.

      Implement Data Backup and Disaster Recovery Today

      If your business doesn’t have data backup and disaster recovery, you’re playing a dangerous game. You could be risking everything you have built needlessly. We recommend you work with Patriot Tech Services Inc. to identify opportunities to be proactive with your data backup. Call us today at 877-874-4629 to learn more.

      Learn More

      Apple Users Hit with Rare Cyberattack: What Can We Learn?

      What are Mercenary Attacks?

      When we think of more “typical” cyberattacks, they are commonly designed to target as many people as possible, often using rudimentary attack methods to identify the easiest targets to pursue. A mercenary attack is similar to this but on a much smaller scale, with millions of dollars spent to target a relatively small target pool.

      As the threat notification email informed potential targets, “This attack is likely targeting you specifically because of who you are or what you do.”

      The email also describes the kinds of things that this attack, as a mercenary spyware attack specifically, would likely do, stating, 

      "If your device is compromised by a targeted mercenary spyware attack, the attacker may be able to remotely access your sensitive data, communications, or even the camera and microphone."

      What Has Apple Done to Address the Threat?

      Apple has added a support page describing these attacks, and what an impacted Apple user should do if they suspect their device is infected. This includes a list of best practices that we can very much sign off on:

      • “Update devices to the latest software, as that includes the latest security fixes
      • Protect devices with a passcode
      • Use two-factor authentication and a strong password for Apple ID [we just want to add you should do this with all accounts]
      • Install apps from the App Store [all Android users should only utilize the Google Play store]
      • Use strong and unique passwords online
      • Don’t click on links or attachments from unknown senders”

      Apple also recommended that those who had not yet been targeted, but had reason to suspect they might be, to turn on “Lockdown Mode,” which restricts the device to very limited functions to reduce the attack surface that these kinds of targeted threats would use.

      Hopefully, you won't be targeted by these kinds of attacks, but we wanted to help spread the word as much as possible, and we’re not going to miss the opportunity to share some security best practices. For more security best practices and general technology assistance for your business needs, please consider the managed services that we offer here at Patriot Tech Services Inc.. Call us at 877-874-4629 to discuss your options with our team of experts.

      Learn More

      Downloading and Installing APK Files Could Put Your Business at Risk

      How APK Files Work with Your OS

      The Android OS uses APK files to install applications. Like the installation packages you might see for a desktop computer, these APK files contain all kinds of data. The APK will contain not only the code for the app but also the resources and assets it will use to run on your device. When you open the APK file, it will install the app on your Android device.

      APK was once the standard file format for Android apps before 2021, but nowadays, the AAB, or Android App Bundle, is the preferred option because it will create APKs specifically for your device. Additionally, AAB files allow developers to distribute apps that are not quite ready for the general public just yet, either because they aren’t finished or not on the Google Play Store. It can also be a great way to download previous versions of apps or those removed from the Play Store.

      Sideloading Apps is a Bad Idea

      If an app developer wants to distribute their content to the Google Play Store, they need to stick to fairly strict requirements and agreements. Part of this process is ensuring that there are adequate security and safety checks against the apps. 

      Suppose an application is “sideloaded” or installed from a location aside from the Google Play Store. In that case, you can’t take advantage of those security checks to ensure nothing malicious is at play with your download. Therefore, you should never download and install an APK from an unknown source.

      It’s also a bad idea to download an unauthorized, altered, or cracked application, too, as you could be involved in illegal behavior that violates copyright laws. You should engage in ethical business practices that do not support these methods.

      How You Can Install APK Files (with a Word of Caution)

      You should never install APK files on your Android device without first notifying your IT department of your intentions. They will undoubtedly want to test the app to ensure it’s safe before you try sideloading it. In any case, you shouldn’t install an app to your device without first asking IT anyway, let alone sideload them.

      If you’re curious about the process, installing an APK file is easy—perhaps alarmingly so. All you have to do is download the file and open it to get started.

      Your settings might warn you about the potential security risks associated with opening the file. You can get around this though by making some adjustments in your settings app, namely the toggle under Install Unknown Apps. You just change this to Allow Permission and tap Install.

      Don’t Neglect Your Security

      Installing unknown apps is a fairly common way for a network to become a victim of a cyberattack. Don’t let your business fall into the same trap. Contact the technology experts at Patriot Tech Services Inc. with any security concerns.

      Learn More

      Latest Blog Entry

      How often do you think about your data backup system? If you’re like most businesses, it’s something that you will likely set up, then quickly forget about, provided you haven’t had to use it. Still, having one is essential to any modern business, and building it with clear ...

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at www.patriot-techs.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login