The TriState IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help Ohio, Kentucky and West Virginia businesses increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Spam Protection Solutions

Regain Control over your Inbox with our unique Spam Protection solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Patriot Tech Services Inc., we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • Do you have questions about Managed IT Services and what they can do for your company?
  • First Name *
  • Last Name *
  • Company Name
  • Phone *

      What Our Clients Say


      Deprecated: Non-static method ModTestimonailHelper::getTestimonial() should not be called statically in /home/patriottechs/public_html/modules/mod_testimonial/mod_testimonial.php on line 31
      • Fantastic Support
        Portsmouth

        As the technology and computerization continued to grow in our practice, so did our I.T. support needs. The response time from the previous company that we were using was getting longer and longer, and this became very frustrating. Unfortunately, when a practice is completely dependent upon technology, a slow response time from an I.T. support company is crippling. After I talked with Chris from...

        Read More
      • Patriot-Techs brought us into the 21st century

        We are so thankful for Patriot-Tech, they upgraded our old computers and helped us become more productive. It's great because we can help more people if we can do more. Our old computers were so slow. Thanks guys!

        Read More
      • Great techs!
        Conover
        USA
        www.asd-usa.com

        Our large Dollar General project could not have been completed without your technicians. They were great at completing the sites they were responsible for quickly and correctly. Helped us finish up ahead of schedule which we appreciated! You are our go-to company for work in OH, WV & KY. Thank you!   Ashley Hill NDS - Automated Systems Design, Inc. (ASD)

        Read More
      • Extremely Professional
        Huntington
        CVS

        Tech was extremely professional and great to work with. Our end user was very happy with his performance and his politeness. Thank you for your hard work! Will definitely use again.  

        Read More
      • High Praise
        Ashland
        Rainbow Title Co

        Our 3rd party vendor couldn't say enough good things about Patriot's technicians. Their own IT person who supports their products everyday wasn't able to resolve the issue but your guys did!  Even though the vendor was embarrassed, he had high praise for the knowledge and quick work to resolve the issue and get me up and running.  Thank you!

        Read More

      Latest Blogs

      What is G Suite, Really?

      Understanding G Suite

      G Suite is effectively Google’s collection of applications that businesses can leverage to assist their operations. Originally released as “Google Apps for Your Domain” about 12 years before the time of this writing, this solution was slowly added to over the years - eventually being rebranded to “G Suite” in September 2016. Today, the solution is kept free of any advertisements, and even better, none of the data stored within is used to inform advertisements, either.

      What’s Included in G Suite?

      G Suite includes a wide variety of solutions under its blanket, so this will not be a comprehensive list. Instead, we will focus on the commonly known highlights, as these are the ones that can clearly deliver value for you and your users.

      Gmail

      Gmail is Google’s email software, first released in 2004. As a part of a G Suite plan, it offers each user 30GB of storage and assorted email options. For instance, not only can you have unlimited Google Group email addresses (so instead of listing everyone in your customer service department as an email’s recipient, you can send one email to your entire customer service department), you can also customize your email addresses to match your business’ domain. This looks much more professional than having “@gmail” at the end of a business email.

      Docs, Sheets, and Slides

      Added to the platform in 2006, these solutions make up Google’s answer to the word processing, spreadsheet generating, and presentation building programs that have a useful place in just about any business. Featuring full collaborative capabilities, these solutions encourage your team to work together to accomplish their objectives by giving them the tools to do so simply. With all progress automatically saved - including a complete, restorable revision history - working on tasks as part of a larger, collaborative group becomes that much easier to pull off successfully.

      Drive

      Launched in 2012, Google Drive is the cloud storage platform included with G Suite. With this platform, your business users can have access to all of the content and files that they need to fulfill their responsibilities. It is also compatible with assorted file formats, eliminating the need to install plugins or additional pieces of software to view its contents. Thanks to Drive, collaboration is much more simple to accomplish, and different plans offer different storage options based on your business’ specific needs.

      Calendar

      Integrating with Gmail, Google Calendar is an easy way for your team to keep their schedules and responsibilities straight. Let’s say a user has to arrange a meeting with a few coworkers. Google Calendar permits them to see their coworkers’ availability, preventing the productivity-killing, “No, that time doesn’t work for me… how about...” discussions.

      Other Capabilities

      With a Business account, you are able to access your own G Suite Admin Panel. Essentially your control room, the Admin Panel allows you to manage each and every setting. Here’s a brief overview of just a few of the options available on the Admin Panel:

      Users

      This is where you add new users to your account. From here, you can also manage what attributes your users have (or essentially, the details about them that you have recorded - like start date, location, job titles, et cetera) and when they last signed in.

      Groups

      You can organize your users in this section into mailing lists and, well, groups. These groups make it easier to schedule meetings and manage events, as they allow you to bundle users together as a means of communicating with them en masse. 

      Company Profile

      This section allows an admin to brand their company’s G Suite solution with the company logo and update other information pertaining to the business. It also allows you to set up custom, branded URLs for your company’s Drive, Calendar, and Gmail accounts.

      Admin Roles

      As the lead admin, you can add additional roles and grant permissions, as well as set permissions for particular groups, devices, and services. This section also allows you to review what admins you have, and the permissions that these admins have as well.

      Billing

      Any charges that your G Suite account and its licenses have incurred can be reviewed and managed here. This section should also display the G Suite plan you have subscribed to.

      Reports

      Here, you can track how your G Suite services and apps are being used, and what your users have been doing on G Suite. Within this section, you can review a general overview of your applications under Highlights, while Reports allows you to run reports and audits on specific services, devices, and users.

      Other functions include the capability to manage device permissions, enable security features, manage other locations your business may operate out of, and many more.

      Want to learn more about how you can leverage G Suite as a business tool? Reach out to Patriot Tech Services Inc.! Our professionals can help implement and integrate its functions into your processes. Call today at 877-874-4629 to learn more, or to get started!

      Learn More

      Tip of the Week: What You Need to Know to Avoid Phishing Attacks

      What Exactly Is Phishing?

      Remember those weekend fishing trips you spent as a kid, staring endlessly unsure which bait to use? The goal was for your bait to look as real as possible, ensuring you wouldn’t leave without a bite. Phishing has been appropriately named due to the similarities. Unfortunately for most businesses, your employees are the fish’s replacement and that wall-mounted trophy fish becomes an unaffordable amount of data loss. 

      Posing as a fraudulent website or persona with the intentions to steal data or access credentials yields a high reward for cybercriminals. Trial and error has revolutionized phishing into a much more effective means of theft. There are numerous different kinds of attacks, which can be split into two categories. The first category is general phishing. This makes use of an email that is written to apply to as many people as possible. The sheer volume of emails sent, typically rewards a cybercriminal with at least a few hits. The second is commonly known as spear phishing. This method of phishing is a much more personalized cyberattack. Cybercriminals typically do an uncomfortable amount of research to increase their odds of fooling a specific target. This method has proven to be extremely effective, especially since these messages typically appear to have been sent from an authoritative figure. 

      What reward does this yield? Phishing attacks can be used to steal credentials, infect a workstation or network with malware, or just fool a business user into making false orders with business funds. 

      Phishing 101 - Types of Bait

      There are many different baits cybercriminals are using. Most of them fall within the same outline, so learning what to look for applies to most cyberattack attempts. 

      • The message’s content provides clues. Oh dear! The program I use was under an attack, so changing my password is recommended! How convenient though, the password-change link has been provided!
        If something is too convenient, especially password changes, chances are it’s phony. Phishing attacks are only successful if a user cooperates with the cybercriminal. If you are under the impression that an application has been a victim of a data breach, and you feel as though changing your password holds a value, then do so. However, navigate to the application’s website in order to do so. Convenient links are often spoofed links. 
      • Observe the language within an email. If an email is sent to “Customer” rather than you, chances are this is our first method of phishing we discussed -- general phishing. Lack of personalization indicates lack of legitimacy. 
      • Does the email make you feel threatened? If a supposed sender communicates a sense of urgency, potentially including a threat of serious consequence, ask yourself the following question. “Does this seem like the best way for a legitimate business to communicate with a client?” If the answer is no, avoid exploring the email further. 
      • Look before you click! As humans, we make mistakes. However, a typo in an email address is unacceptable. If a provided link says something like amzon.com or payal.com/secure, it is wise to avoid it. If there are any additional periods following a domain, but before the first forward slash, this also indicates phishy activity. Something like www.amazon.com.ru/passwords is an easily identified phony email address. If you aren’t able to see the full link provided in an email attachment, users can easily view the full URL by hovering over the provided link, or right clicking and selecting “copy link address” and pasting it into a notepad application. 

      Phishing is extremely consequential. Patriot Tech Services Inc. has experts who can assist your business with learning to identify phishing attempts. Call 877-874-4629 to speak to one today! 

      Learn More

      Taking a Look at the Future of Cybersecurity

      Modern times have gifted us with methods to defending ourselves from cyberattacks. There are solutions available to keep your business safe, and projections show that certain technologies will emerge that will much more effectively protect your business.

      Artificial Intelligence - Business’ Best Friend

      One of the most effective ways in combating cyberthreats is introducing artificial intelligence where applicable. One of the weakest links in any business chain, are the employees. Now we aren’t recommending dismissing all of your employees and hiring robots as replacements, but by default humans are prone to making mistakes. 

      Whether an employee turns spiteful after not receiving a promotion, or a careless one clicks the wrong link, humans make mistakes that AI simply would not. Today’s security solutions need constant monitoring to ensure that they are operating as they should.

      In the near future, your business can integrate AI into your security processes. This can resolve some of the common issues. Say Carl skips work, and does not reassign someone to monitor business security systems. While some employees like Carl will play hooky from time to time, AI is able to monitor systems 24/7, once they are taught what to keep an eye out for and recognize. They also are able to monitor these systems much more effectively than any human could, including Carl. 

      AI can even go beyond defense, and delve deeper into prevention.

      As the world of artificial intelligence continues to be explored, new technology begins being implemented in business practices. AI may replace traditional access management processes, replacing passwords entirely. The idea is rather than trusting your employees are using strong password practices for every account, AI will be able to monitor the user’s behaviors, workplace roles, and common actions. If the system recognized any deviations, an additional form of authentication such as biometrics would grant or deny access. 

      Like the flat screen TV’s early days, this level of technology has one major obstacle - cost. However, as this technology is adopted and explored, the cost may become more feasible for small to medium sized businesses. 

      Why 5G Connectivity Needs to Remain on Your Mind

      Artificial intelligence promises to advance a wide variety of processes. The use of 5G and data-intensive tasks are amongst them. 

      With every new device that is connected to the internet, an additional opportunity arises for a cybercriminal to take advantage of poor security standards. The capabilities that 5G connections have need to be heavily considered. Think about this: you’re riding down the highway when suddenly your self-driving car loses all connection due to a cyberattack. Considering that on a daily basis, your self-driving vehicle will equal roughly 3,000 times your daily data output, data overload is a serious security concern. 

      While there’s still time before these concerns materialize, there are plenty of present-day cybersecurity concerns that your business needs to anticipate. Patriot Tech Services Inc. has the experts you need to protect your data. Give us a call at 877-874-4629 today!

      Learn More

      Latest Blog Entry

      There is no question that Google is an absolute giant in computing, having moved from web search functionality to a much wider variety of applications. These applications now make up the G Suite, and are used by many, many businesses to accomplish their goals. Here, we’ll go...

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at www.patriot-techs.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login