The TriState IT Experts

We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help Ohio, Kentucky and West Virginia businesses increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Spam Protection Solutions

Regain Control over your Inbox with our unique Spam Protection solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Patriot Tech Services Inc., we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • Do you have questions about Managed IT Services and what they can do for your company?
  • First Name *
  • Last Name *
  • Company Name
  • Phone *

      What Our Clients Say

      • Fantastic Support

        As the technology and computerization continued to grow in our practice, so did our I.T. support needs. The response time from the previous company that we were using was getting longer and longer, and this became very frustrating. Unfortunately, when a practice is completely dependent upon technology, a slow response time from an I.T. support company is crippling. After I talked with Chris from...

        Read More
      • Patriot-Techs brought us into the 21st century

        We are so thankful for Patriot-Tech, they upgraded our old computers and helped us become more productive. It's great because we can help more people if we can do more. Our old computers were so slow. Thanks guys!

        Read More
      • Great techs!

        Our large Dollar General project could not have been completed without your technicians. They were great at completing the sites they were responsible for quickly and correctly. Helped us finish up ahead of schedule which we appreciated! You are our go-to company for work in OH, WV & KY. Thank you!   Ashley Hill NDS - Automated Systems Design, Inc. (ASD)

        Read More
      • Extremely Professional

        Tech was extremely professional and great to work with. Our end user was very happy with his performance and his politeness. Thank you for your hard work! Will definitely use again.  

        Read More
      • High Praise
        Rainbow Title Co

        Our 3rd party vendor couldn't say enough good things about Patriot's technicians. Their own IT person who supports their products everyday wasn't able to resolve the issue but your guys did!  Even though the vendor was embarrassed, he had high praise for the knowledge and quick work to resolve the issue and get me up and running.  Thank you!

        Read More

      Latest Blogs

      Could Voice Authentication Join the Ranks of MFA?

      Let’s examine the many variables associated with voice authentication to see how much promise it actually shows.

      First and Foremost, How Does Voice Authentication Work?

      It may help to specify how authentication in general works, just so we can get a full appreciation of how voice authentication would function.

      In any variety of authentication measures, the user provides some kind of proof of identity. If that proof matches the reference that the security system is comparing it to, the user is given access. In terms of voice authentication, the user’s voiceprint of a specific phrase would be compared to the stored copy of what that user’s voiceprint should resemble.

      So, if your passphrase was “The rain in Spain falls mainly over the lazy dog,” the system would check for the correct phrase, but also check that the tones and inflections present in the user’s voice matched the patterns in that user’s voiceprint. As a result, voice authentication is typically classified under the “something you are” subset of multi-factor authentication along with retinal scans, facial recognition, or palm scans.

      How Secure is Voice Authentication?

      Like any other authentication measure, there are already countless stories of voice recognition being bamboozled, meaning that more work is needed to keep your solutions secured. Hackers have already been able to fool voice authentication using recorded snippets, and have hidden malicious commands in white noise to gain control over voice-activated devices.

      Having said that, it is important that we also address that any form of identity authentication is inherently less secure when used exclusively, rather than as part of a multi-factor authentication strategy. Furthermore, voice authentication is now being developed with two fraud-fighting technologies built-in. The first, liveness detection, works to differentiate between a live voice and a recorded one. The second, continuous authentication, does what its name suggests and verifies the user throughout the time they are active. That way, an attacker that just switches back to themselves after using a recorded voice to log in would be caught regardless.

      Best Practices Concerning Voice Authentication

      We’ve referenced a few already, but here are a few essential functions that any voice-based authentication system should involve:

      • Multi-Factor Authentication: We really can’t encourage the use of MFA enough. The more proof that a user has to provide to prove their identity, the less likely it is that an unauthorized individual will have what they need to access your resources. Pairing a PIN or password/passphrase with a secondary proof, like voice authentication, makes it much harder for this kind of access to be secured. This primary form of authentication should need to be reconfirmed regularly.

      • Secure Storage: On your end, you need to keep your saved records of all authentication data extremely secure… including the biometric data. Otherwise, MFA could potentially be fooled and the whole system would topple.

      • Obtain Consent: You also need proof that your users have agreed to use biometric data as an authentication measure, for privacy and legal reasons alike.

      So, would you consider implementing voice authentication as an option in your company’s protections—specifically as part of a multi-factor authentication requirement? Are you concerned about the protections you currently have in place? Give us a call, we’ll help ensure that your business is properly secured. Call 877-874-4629 today.

      Learn More

      Is the VPN My Office Uses a Public VPN?

      To begin, let’s examine each of these two options to determine how they differ from one another.

      “VPN” is Used to Describe More Than One Thing

      A large amount of the confusion surrounding VPNs is that the term refers to related concepts that are used very differently in common practice. These concepts are summed up as so many things in IT are, with the delineation appearing between “public” and “private” VPNs.

      What Does a Public VPN Do?

      A public VPN allows a user to access an “anonymous” (more on this in a moment) network that they can use to browse. This kind of VPN is commonly used to sidestep geofiltering/geoblocking, or the process of blocking or allowing certain content based on the  user’s location, particularly where streaming services are involved. For example, if you are traveling abroad, you might not be able to access the same movies on Netflix. A VPN lets you access Netflix as if you were in some other country.

      Having said all this, this form of VPN is prone to numerous problems, primarily because many have been identified as a VPN and are therefore blocked… pretty much defeating the purpose. Furthermore, despite claiming to not maintain logs of the users’ activities, a public VPN provider could hypothetically see all of your unencrypted online activity and do with it as they please… including private messages. “Free” VPN services will often make their money by selling user activity to advertising networks.

      What Does a Private VPN Do?

      Comparatively, private VPNs are used to enable an organization’s users to securely access their materials and resources while working remotely. This is assuming that the VPN has been set up properly, of course. If it is, however, the VPN’s security is formidable, allowing a workforce to safely access the resources and files they have saved elsewhere (namely, your business’ storage space) with relative ease.

      A private VPN can basically be described as a protected thoroughfare for your data to travel to between two locations, shielded by heavy-duty encryption.

      So, Which Of These Options Would You Rather Utilize for Your Business’ Productivity?

      Obviously, the latter, private VPN connection is more suited for professional purposes—particularly with remote work remaining a common option for many businesses. We can help you set one up for your own use. Reach out to us for assistance with this, and any of your other IT needs.

      Learn More

      Looking at FoggyWeb to Better Understand Malware Attacks

      Back in April, security researchers laid the blame for the SolarWinds attack on the Russian Foreign Intelligence Service. Microsoft has discovered that there are various modules used by the attack group, a collective referred to as Nobelium. Nobelium includes other malware such as GoldMax, GoldFinder, and Sibot. Other types of malware that were previously known to researchers include Sunburst/Solorigate, Teardrop, and Sunspot. In the case of FoggyWeb, it is a malware which installs a backdoor on an already compromised server.

      Backdoors themselves allow hackers to pull off all sorts of nasty tricks. Hackers can use the backdoor to access a network at any given time in the future, and they can use the backdoor to install malware, access sensitive data, spy on users, and so much more. It’s safe to say that backdoors are dangerous for businesses to contend with.

      As for FoggyWeb, the backdoor itself is used to steal credentials and configurations from compromised servers. With these credentials in hand, hackers can remain on the infrastructure even after they have been purged from it. Hackers can also use these credentials to control access to important assets or other tasks that demand authentication. As with other backdoor threats, FoggyWeb can also receive commands remotely to pull off even more dangerous stunts.

      To ensure that your business does not fall victim to these types of threats, you should take a multi-faceted approach to your network security. This includes monitoring your network for suspicious activity, ensuring that user access controls are in effect, and deploying comprehensive security solutions that can keep your infrastructure safe.

      Thankfully, these solutions are more accessible than ever with the help of managed service providers like Patriot Tech Services Inc.. We can help arm you with the tools to protect your business from any type of threat. To keep your business secure from all sorts of threats, reach out to Patriot Tech Services Inc. at 877-874-4629.

      Learn More

      Latest Blog Entry

      Authentication has been a major talking point for the past few years, particularly as the value of data has only increased and security has correspondingly increased in importance. As a result, more secure and reliable means of identity verification have also become more cri...

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login