The TriState IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help Ohio, Kentucky and West Virginia businesses increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Spam Protection Solutions

Regain Control over your Inbox with our unique Spam Protection solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Patriot Tech Services Inc., we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • Do you have questions about Managed IT Services and what they can do for your company?
  • First Name *
  • Last Name *
  • Company Name
  • Phone *

      What Our Clients Say


      Deprecated: Non-static method ModTestimonailHelper::getTestimonial() should not be called statically in /home/patriottechs/public_html/modules/mod_testimonial/mod_testimonial.php on line 31
      • Fantastic Support
        Portsmouth

        As the technology and computerization continued to grow in our practice, so did our I.T. support needs. The response time from the previous company that we were using was getting longer and longer, and this became very frustrating. Unfortunately, when a practice is completely dependent upon technology, a slow response time from an I.T. support company is crippling. After I talked with Chris from...

        Read More
      • Patriot-Techs brought us into the 21st century

        We are so thankful for Patriot-Tech, they upgraded our old computers and helped us become more productive. It's great because we can help more people if we can do more. Our old computers were so slow. Thanks guys!

        Read More
      • Great techs!
        Conover
        USA
        www.asd-usa.com

        Our large Dollar General project could not have been completed without your technicians. They were great at completing the sites they were responsible for quickly and correctly. Helped us finish up ahead of schedule which we appreciated! You are our go-to company for work in OH, WV & KY. Thank you!   Ashley Hill NDS - Automated Systems Design, Inc. (ASD)

        Read More
      • Extremely Professional
        Huntington
        CVS

        Tech was extremely professional and great to work with. Our end user was very happy with his performance and his politeness. Thank you for your hard work! Will definitely use again.  

        Read More
      • High Praise
        Ashland
        Rainbow Title Co

        Our 3rd party vendor couldn't say enough good things about Patriot's technicians. Their own IT person who supports their products everyday wasn't able to resolve the issue but your guys did!  Even though the vendor was embarrassed, he had high praise for the knowledge and quick work to resolve the issue and get me up and running.  Thank you!

        Read More

      Latest Blogs

      Reviewing Zoom’s Efforts to Improve Its Security

      Zoom’s 90-Day Security Plan

      On April 1, 2020, Zoom announced that it had a 90-day plan to address the numerous security concerns and criticisms that had plagued many users. The crux of the issue was that Zoom links were commonly being shared on social media… effectively opening these meetings to anyone who could find that link. As a result, the concept of “Zoombombing”—unauthorized users hijacking meetings and sharing offensive content—was born.

      After numerous attacks were waged against organizations of all kinds, Zoom saw that it needed to make some changes. Therefore, on April 1st, the company announced that it would be pausing any new features to focus specifically on those related to the platform’s security. These include:

      • Passwords are now required to access all meetings
      • Waiting Rooms (a space where a meeting’s guests had to wait to be approved by the host) are enabled by default
      • The default settings only enable the host to share their screen

      Furthermore, Zoom’s acquisition of Keybase has enabled them to incorporate end-to-end encryption. Other internal changes are also now in place including a bug bounty program, deeper penetration testing, and other security improvements.

      Some Brief Controversy

      However, Zoom has not escaped all criticism as it has made these changes. In June, CEO Eric Yuan shared that the end-to-end encryption feature would be exclusive to paying users. Once users and security advocates alike spoke out about this policy, Zoom quickly walked this policy back. While it is still rolling out this capacity, and it may interfere with some other features, Zoom is also actively planning for the future with its next improvements already planned out.

      So, is Zoom Safe to Use?

      Compared to where it was? Absolutely. However, you may still want to take what you plan on communicating into account when deciding whether to use Zoom for certain conversations, just to be safe. Erring on the side of caution is always the better option when your business communications are involved.

      Whatever your business’ technology needs may be, Patriot Tech Services Inc. can help you find and implement the solutions to fulfill them. To learn more about what we have to offer, give us a call at 877-874-4629 today.

      Learn More

      How Important Is It to Keep Devices Charged Up?

      The fact is that everyone has those devices that they use once in a great while, whether they’re for personal use or for professional purposes. Consider a video camera: for many individuals, it only comes out at birthdays or events, and oftentimes, the same can be said of those that businesses keep on hand.

      However, the batteries that power video cameras—and a great many other devices, for that matter—simply weren’t designed to sit idly by and go unused for long periods of time. The battery could see its life diminished, or even explode.

      With that in mind, consider how many rechargeable devices you have that you haven’t touched for some time, and the potential risk that’s just sitting there.

      How to Safely Store Rechargeable Devices

      Whenever these devices are to be stored for extended periods of time, the recommendation is to do so with them hovering at about 50 percent battery life. They should be taken out and refreshed once every three to six months and should always be kept someplace cool and dry.

      If the battery hasn’t been used in some time, make sure to double-check that it isn’t damaged before you try to use it. If it turns out to be time to dispose of it, you need to ensure that you are doing so properly.

      On the topic, devices like smartphones, laptops, and tablets follow a few different rules. These devices will only lose potential battery life after being completely expended and recharged around 500 times. Furthermore, they can be left plugged in without damaging the battery or contributing to the 500-recharge limit.

      Why Should a Business Care?

      We’ve already gone over the potential risk that all your personal devices could potentially pose. Now, take a moment to consider how many devices are stored in the office, and how much these devices could cost to replace.

      To avoid this expensive circumstance, you need to be sure that your technology is properly maintained so that you have it when you need it. It also doesn’t hurt to have somewhere to turn when it does need repairs or replacement. Turn to Patriot Tech Services Inc. and our team of experienced professionals. Find out what we can do to benefit your business’ technology by calling 877-874-4629.

      Learn More

      How You Can Make IT’s Life Easier

      Why Doesn’t IT Like Me?

      If you’ve read this far, chances are that you are what an IT professional would call an “end user,” which is just someone who uses technology to accomplish their goals. Let me ask you something: how many end users would you assume have the same level of technology experience as an IT technician?

      Naturally, very few end users have this level of familiarity… otherwise, there wouldn’t be any need for the IT department. As a result, the end user is more susceptible to security issues and threats—the very things that IT is trying to minimize. Looking at it this way, it is understandable that IT might occasionally be frustrated.

      While we certainly know better than to try and make you an IT expert over the course of one blog, we can give you some advice to help you avoid such issues and thereby give your IT resource a bit of a break. This is a win-win, because the less time an IT professional spends cleaning up messes, the more time they can spend improving your business processes.

      Seeing as it is currently Cybersecurity Month, let’s review a few troublesome tendencies that the average end user slips into that could create issues so that these habits can be broken.

      Clicking on Everything

      Links are a funny thing. If I were to include a link in this blog, there’s a fair chance that you might automatically click through it out of habit. Even if I expressly told you not to click through it, many end users would click through it anyways.

      Let’s test this theory.

      The danger here is simple: cybercriminals know how tempting it can be to click on a link, how automatically so many of us tend to do so. This is why the use of misleading links is such a major part of a phishing strategy—basically, the “made you look” of cybercrime. Rather than bringing you to the page you anticipated, a phishing attack might install malware, or create a fraudulent lookalike page to steal whatever data you input.

      One of your users falling for a phishing attack is all it could take for a cybercriminal to bypass your network security, so it is important that your team knows why clicking links is more dangerous than they would expect. Make sure that, before clicking, your team members hover their cursors over any links to confirm where they will go, and when in doubt, to not click.

      Installing Unapproved Software

      Similarly, the “Install” button can be very tempting for an end user. The problem? That helpful-looking online application or browser add-on could easily subject your network to compatibility issues and security threats.

      Considering this, you should insist that—unless a program is sourced from an operating system’s official marketplace, or your IT department has already vetted it—a user should never install anything. Ideally, they wouldn’t install it anyways, relying on IT to properly supply and configure the solutions needed for the job.

      Poor Password Hygiene

      Few other best practices are as frustrating for an IT technician to repeat as the guidelines for proper password creation and management. As the current standard in identity authentication, it is beyond important for you and your users to comply with assorted password rules and requirements, such as:

      • Using a different one for each account
      • Avoiding common password combinations and conventions
      • Keeping them private, instead of sharing their passwords
      • Memorizing them, instead of writing them down

      If these practices are not followed, your business is essentially inviting in security issues, which IT then must deal with.

      You may consider making IT’s job somewhat simpler by implementing a password management solution. This piece of software saves all a user’s passwords in an encrypted vault that is only accessible by using a single master password. This ensures that the user always has access to their necessary passwords when they need them, while also reducing the number they need to remember to one.

      That way, there’s no longer any excuse for slacking in their password hygiene, and your business’ security benefits as a result.

      A cyberattack is leveraged against a business just about once every 39 seconds, so you can’t afford to have your users short-change the defenses you have in place. IT has enough to worry about without this contribution. Patriot Tech Services Inc. can help you out with our managed IT services, taking over some of their responsibilities and helping them to accomplish their goals.

      To find out more about the managed services we offer and their operational benefits, reach out to us at 877-874-4629.

      Learn More

      Latest Blog Entry

      As a communication tool, the video conferencing app Zoom saw a considerable bump in its popularity with both personal and business users as the coronavirus pandemic made other means of meeting no longer viable. However, this sudden increase in its user base also revealed som...

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at www.patriot-techs.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login