PG&E Public Safety Power Shutoff is scheduled for Wednesday, October 9th at 4 AM for much of Northern California. For planning purposes, PG&E suggests customers prepare for outages that could last several days. Please take appropriate actions to ensure the safety of your systems if you are in a targeted shutdown area. See if your area is affected here...

Blog Articles from ATS Communciations

ATS Accelerates the Adoption of Microsoft Azure Among Local Businesses

November 15th, 2023 by admin

Microsoft Azure

Leading MTSP Helps Organizations Benefit by Moving Their Network Into the Cloud CONCORD, CA ‐ ATS , a leading managed technology services provider (MTSP), announced today that the company has accelerated the adoption of Microsoft Azure cloud services...

Read Full Story »

Posted in: Press Releases

ATS Communications Helps Healthcare Organizations Protect Patient Data with the Latest in Cybersecure Technology

May 4th, 2021 by admin

Doctor using modern computer interface as medical data concept.

Startling Statistics Reveal Challenges of Healthcare Industry's Ability to Safeguard Patient Records CONCORD, CA – ATS Communications, a leading managed technology services provider, announced that the company is helping healthcare organizations...

Read Full Story »

Posted in: Press Releases

Helping Businesses Shift from Survival Mode to Strategic Growth Mode in 2021

February 23rd, 2021 by admin

A man in a dress shirt and tie with the sleeves rolled up point his finger down towards a tablet he is holding as numbers along with white and blue block fill the foreground around him

Leading Managed Technology Services Provider Educates Businesses on Dramatic Increase in Cybercrime Directed at Small-Business Owners and How to Prevent It CONCORD, CA - ATS Communications, a leading managed technology services provider (MTSP),...

Read Full Story »

Posted in: Managed IT Services, Press Releases

Why Is the Cloud the Future of Technology?

January 29th, 2020 by admin

Multiple devices, a smart phone, laptop and tablet, using the cloud

With every passing year, a new application inevitably gets presented as the future of technology. However, one such innovative technology has been universally considered the assured future since it was brought up in 2006. The Cloud has been progressively...

Read Full Story »

Posted in: Cloud, Solutions

The Cybersecurity Workforce Gap and How It's Affecting Businesses

November 21st, 2019 by admin

eyes on a blue background with technology concepts

As cyber-attacks continue to intensify, businesses are having a hard time finding skilled cybersecurity workers to protect their operations. The cybersecurity industry has taken a significant hit with the labor shortage causing many companies to fall...

Read Full Story »

Posted in: Managed IT Services, Support, Services, Security, Solutions

Stay on Top of Your Operations with the Technology Optimization Program (TOP)

November 8th, 2019 by admin

IT professional checking systems using a tablet

Are you experiencing an influx of operating costs due to maintenance and upgrades for your IT and phones? Or are you a small business looking to avoid paying for unnecessary IT costs? It may be time to rethink your IT investment strategy and join our...

Read Full Story »

Posted in: Support, Services, Solutions

Secure WiFi-as-a-Service Protects Customers from Cyber Attacks

October 2nd, 2019 by admin

Yellow lock on a blue background with technology concepts

Concord, CA – Announcing the launch of a Secure WiFi-as-a-Service program to protect our customers from cyber attacks through wireless access points. Over the past few years, the prevalence of cyber attacks has continued to grow, expanding...

Read Full Story »

Posted in: Press Releases

Preparing Your Business for Windows 7 End-Of-Life

August 21st, 2019 by admin

Windows desktop background

Windows 7 is coming to an end, so what does that mean for businesses still running on the platform? It may mean complex migrating, tons of time and resources that will be spent on training, configuring, and an added expense to install the new system....

Read Full Story »

Posted in: Company News, Support

The Importance of Understanding Your Cyber Security Risk Tolerance and Exposure

July 14th, 2019 by admin

Hooded figure in black with technical code

It is common for companies to underestimate their security risks and think that specific attacks could never happen to their business until it happens. While it is always essential to stay prepared no matter the likelihood of an attack,...

Read Full Story »

Posted in: Security, Solutions

ATS Communications Ranked Among World’s Most Elite 501 Managed Service Providers

July 12th, 2019 by admin

MSP 501 Winner Badge

12th Annual MSP 501 Identifies Top Forward-Thinking Global MSPs & Leading Trends in Managed Services ATS Communications has been named as one of the world’s premier managed service providers on the prestigious 12th-annual Channel Futures MSP 501 rankings....

Read Full Story »

Posted in: Company News, Managed IT Services

How Rapid Growth Can Negatively Impact Business.

June 25th, 2019 by admin

Business building

During the beginning stages of operations, demand can be slow at first and then gradually start picking up, but what happens when small demand increases to significant demand in a short period? When a company is experiencing expansion, it is usually...

Read Full Story »

Posted in: Support

Get a Reliable 24/7 Support Team for your IT Service

June 24th, 2019 by admin

Technicians working on network servers

Having available ongoing support for your IT services is vital for your business to thrive, and we want to ensure that your business stays on top of its operations. Should questions arise or unexpected issues happen, you need responsive experts to resolve...

Read Full Story »

Posted in: Support

Offering Next Generation Cybersecurity Solutions

February 5th, 2019 by admin

Close up on an eye with technology images

CONCORD, CA – We are proud to announce a new solution to help small to midsized businesses (SMBs) equip themselves with the necessary cybersecurity protections that every modern company needs to survive. In the past, large organizations...

Read Full Story »

Posted in: Press Releases

Grow Your Business with Our Industry Expertise

December 7th, 2018 by admin

office buildings

ATS provides IT consulting services for many industries, from nonprofit and Legal sectors to healthcare and biotech, we offer industry expertise to help you expand your business to the next level. As companies start to grow and evolve, many concerns...

Read Full Story »

Posted in: Solutions

Lowering the Bottom Line: IT Management Support and Cost-Saving Benefits

June 27th, 2018 by admin

Close up of two businessman shaking hands

Shifting to IT management support services can make a huge difference in reducing your business' operational bottom-line. IT management goes a long way to streamline both infrastructure and support while providing access to a larger knowledge pool than...

Read Full Story »

Posted in: Managed IT Services, Support

Making the Switch to BYOD? Pros, Cons and Security Implications to Consider First

June 26th, 2018 by admin

Sleek, slim laptop on a gray business desk

Making the switch to a Bring Your Own Device (BYOD) business environment extends well beyond the decision to let employees choose their devices. Your business should look at the pros and cons of the concept before deciding how to approach it and to what...

Read Full Story »

Posted in: Support

Key Strategies to Boost IT Security in the Workplace

June 20th, 2018 by admin

Conference room

Businesses have more to worry about than ever when it comes to dealing with new forms of cyber-attacks. The shift to a BYOD workplace adds even more challenges to protecting your digital assets. While hardware and software solutions continue to improve...

Read Full Story »

Posted in: Support, Security

Unique IT Challenges Financial Services Providers Face Today

June 19th, 2018 by admin

Skyscraper office buildings tinged in blue

Financial services providers find their IT challenges list is always growing because of security issues, employee needs, customer protection, regulatory laws and business requirements. Keeping up with IT concerns is important not just because failing...

Read Full Story »

Posted in: Solutions

What Nonprofits Should Seek in an IT Provider

May 29th, 2018 by admin

Group of 5 business professionals looking at a laptop

While many of the technical needs at nonprofit and for-profit businesses overlap, there are still several key considerations for nonprofits looking for the right IT services provider. Nonprofits' motivations may be driven less by the concept of "spending...

Read Full Story »

Posted in: Managed IT Services

What Changes in Net Neutrality Could Mean for Your SMB

April 19th, 2018 by admin

Close up of Ethernet cables going into a switch

The FCC net neutrality 3–2 repeal vote of December 2017 could lead to major concerns for IT staff at small and medium businesses. As of February 2018, the FCC is continuing to move toward the net neutrality repeal, but actual business changes will take...

Read Full Story »

Posted in: Support, Services, Solutions

Addressing the Unique IT Management Needs at Law Firms

April 11th, 2018 by admin

Close of up businessman's holding a pen, wearing a black watch and a gold wedding band

Law firms face many unique IT management challenges that stem from the confidential nature of the information they work with. And that confidential data is why law firms must make the protection of information a key IT priority. Threats can come from...

Read Full Story »

Posted in: Managed IT Services, Services, Solutions

5 Commonly Overlooked Workplace IT Disasters

February 28th, 2018 by admin

Stylized graphic in blue of a figure holding a giant-sized magnifying glass

Because IT staff get so invested in making sure software, networking and security elements are working, they sometimes overlook the human, environmental and contingency planning factors that can invite workplace IT disasters. In many cases, preventative...

Read Full Story »

Posted in: Managed IT Services, Solutions

Spectre and Meltdown: Valuable Lessons for Your IT Security Team

February 12th, 2018 by admin

White lock icon on a backdrop of code snippets

At the end of 2017, the world learned about Spectre and Meltdown: two far-reaching security threats that exploit how CPUs work to expose protected information on nearly every recent PC, server and smartphone. Hackers can use these exploits to do things...

Read Full Story »

Posted in: Security

5 Specific IT Considerations for Remote Employees

February 5th, 2018 by admin

White-bloused businesswoman using a slim laptop on a birch colored desk

Businesses have a lot to gain by hiring remote employees, including the ability to recruit from a larger talent pool and the potential for less expensive workplace accommodations. However, remote employees introduce new challenges in IT security because...

Read Full Story »

Posted in: Solutions

Does Fintech Pose a Threat to Cybersecurity at Financial Services Companies?

January 29th, 2018 by admin

Sample portfolio summary being displayed on an iPad

Financial services companies should embrace a healthy dose of caution when implementing new fintech in their business. Fintech, or any technological innovation in the financial sector, is not inherently more or less secure than any other new technology,...

Read Full Story »

Posted in: Security

3 Subtle Ways IT Management Makes Day-to-Day Operations More Manageable

January 22nd, 2018 by admin

Outstretched hand holding stylized, brightly-colored gears and cogs

For many businesses, it is difficult to gauge how helpful IT management can be in the workplace on a day-to-day basis — mainly because when things are going well, there's little to notice. Some of the most important benefits of an IT managed services...

Read Full Story »

Posted in: Managed IT Services, Solutions

Four Security Threats Your Company Could Face in 2018

January 16th, 2018 by admin

Close up view of network Ethernet cables plugged into ports on a switch/router

Hot off the tail of the massive 2017 Equifax breach that exposed personal information of 143 million customers, businesses are on high alert concerning IT security in 2018. While the IT security industry has been successful in mitigating and cracking...

Read Full Story »

Posted in: Security

Putting Unused Computers Back to Work

December 28th, 2017 by admin

Black MSI laptop with red highlight coloring, opened and facing the viewer

There are many ways to reuse an old computer. Replacing an old computer that still works is a good feeling.   The device survived the replacement cycle. However, some desktops and laptops have the potential to lead second lives in the workplace. Re-assigning...

Read Full Story »

Posted in: Solutions

Latest Popular Smartphones Significantly Dip in Drop Test Performance

November 22nd, 2017 by admin

iOS device with cracked and broken screen in the bottom left side

After years of improving smartphone glass durability, a shift design is bringing back the perils of dropping the device only to discover the glass has cracked on impact. The newly released iPhone 8 and iPhone X aren’t doing well in drop tests, with screens...

Read Full Story »

Posted in: Support, Solutions

Don't Neglect Surge Protectors in Your Workplace

November 16th, 2017 by admin

Isolated black surge protector strip with 6 outlets

Businesses use surge protectors every day without thinking about them; however, they are an incredibly important piece of technology that can make the difference between a $20.00 and a $2,000.00 equipment replacement. While uncommon, a power surge can...

Read Full Story »

Posted in: Support, Solutions, Knowledge

Problems with Power Loss: Tips for Workplace Computer Battery Backups

November 8th, 2017 by admin

View of the backside of a wooden desk with 2 Apple computers and an Apple laptop, all in gray

It's inevitable: employees working hard on a time-consuming project and then out of nowhere, the lights start to flicker and the power goes out. Suddenly, those workers express their frustration by pulling out their hair because they've just lost hours'...

Read Full Story »

Posted in: Knowledge

Alternative Employee Device Security: Fingerprints, Facial Recognition, and Iris Scans, Oh My!

October 17th, 2017 by admin

Stylized magnifying glass resting on three oversized fingerprints

So far, 2017 has been an eventful year for increasing access to password-alternative smartphone and laptop unlocking techniques. Notably, Samsung added Face unlocking to the Galaxy S8 line and Apple introduced Face ID on the iPhone X. Of particular note,...

Read Full Story »

Posted in: Security

Wireless Charging in the Workplace: iPhone Joins Android

October 10th, 2017 by admin

Hand holding a white iPhone plugged in and charging from empty

Wireless charging in the workplace has the potential to make it easier for your employees keep their arsenal of devices running throughout the day with fewer of those pesky low battery warnings. Until recently, wireless charging hasn't been as good at...

Read Full Story »

Posted in: Solutions

Equifax Breach: What does it teach us about IT security?

October 3rd, 2017 by admin

Highly zoomed icon of a hand-shaped cursor clicking on a link labeled 'Security'

The 2017 Equifax hack is teaching a painful lesson about the necessity of businesses keeping up with software patches for IT security and to avoid catastrophic damage. The hack, which resulted in potentially exposing the financial information necessary...

Read Full Story »

Posted in: Security

Flash Drives: A Productivity and Security Guide

September 26th, 2017 by admin

Wireless dongle, USB drive, micro SD chip, and 2 SD chips on a field of black

With proper planning, your business can take advantage of USB flash drive technology to increase productivity, while eliminating most of the medium's inherent risk. The USB flash drives likely lying around your business offer excellent opportunities to...

Read Full Story »

Posted in: Security, Solutions

Screen Mirroring Mini-Guide

September 19th, 2017 by admin

Conference room with dark wood table, black and silver chairs, a speaker phone, and a tv display on the far wall

Setting up your conference room for wireless screen mirroring is the answer to employees sharing in a collective groan when it's time to connect a computer or mobile device to show a presentation. While setting up the conference room television or projector...

Read Full Story »

Posted in: Knowledge

The System Is Down: How To Stay Online When Your Service Provider Is Offline

September 12th, 2017 by admin

Stylized icons that indicate free WiFi is available

It's easy to take a functional Internet connection for granted until it's no longer working. When that Internet connection inevitably goes down, your business could be left scrambling to figure out how to keep working until service is restored. The best...

Read Full Story »

Posted in: Managed IT Services, Solutions

3 Lessons SMBs Can Learn From Retailers On Thanksgiving Weekend

September 6th, 2017 by admin

Two monitors with arms reaching out of them, exchanging a gold credit card for purchased items

Online retailers are already working on business strategies for the Thanksgiving, Black Friday, and Cyber Monday online shopping weekend months in advance. These three days are the busiest online shopping days for retailers, bringing in nearly $6 billion...

Read Full Story »

Posted in: Knowledge

When Windows 10 Support Stops

August 22nd, 2017 by admin

Dark wood desk with a Mac desktop, a gray MacBook Pro, and a white table resting on it

In July of 2017, some Windows 10 users received an error message when trying to install the Creators Update, stating, "Windows 10 is no longer supported on this PC." This first-of-its-kind problem stems from an incompatibility with a handful of Intel's...

Read Full Story »

Posted in: Managed IT Services, Solutions

The Internal SMB IT Security Threat: Overconfidence In Cyber Security Preparedness

August 15th, 2017 by admin

Email application displaying '1 New Message' on a smartphone screen

According to a 2017 published study by Advisen and Experian, one of the biggest threats facing small businesses comes from within, such as overconfidence in the organization's ability to protect itself and recover from cyber security attacks. While businesses...

Read Full Story »

Posted in: Managed IT Services, Security

Looking at USB/NFC Keys for Extra Account Security

August 1st, 2017 by admin

White security icon spotlighted on a dark field of colorized programming code

Hijacked accounts are an IT security nightmare, so it makes sense for your company to look at new technology for better ways to keep your digital assets safe. While security professionals are working out new ways to look at what account credentials are,...

Read Full Story »

Posted in: Managed IT Services, Security

Avoiding Hardware Overkill: IT Consulting to the Rescue

July 18th, 2017 by admin

Close up of a circuit board

Spending far too much money on excessively overpowered computer hardware can quickly deplete your company's IT budget, taking funding away from other important expenses. Two exciting products released in June 2017, Apple's new iMac Pro ($4,999) and Intel's...

Read Full Story »

Posted in: Managed IT Services

Flaws in 2-Factor Authentication Methods Could Leave You Vulnerable

July 11th, 2017 by admin

Close up of a businessman holding a Microsoft smartphone in his hands

If your business is using 2-factor authentication or 2FA, methods to secure your important accounts, you may need to investigate better ways to implement the practice. Security experts widely recommend using 2FA, a system which utilizes a second security...

Read Full Story »

Posted in: Security, Knowledge

Android and IOS: Is the Device Just Old, or Is It Obsolete?

May 23rd, 2017 by admin

Relief drawing of a pocket watch with roman numerals I through XII

When trying to determine if a piece of technology is simply old or completely obsolete, keep in mind that there are different criteria for Android and iOS devices than for desktop and laptop computers. An employee stuck using an obsolete device is likely,...

Read Full Story »

Posted in: Support, Solutions

The Dock Returns: Anticipating Trends for Productivity Potential

April 19th, 2017 by admin

Stylized graphic of a desktop monitor, tablet, and smartphone, in black and white

Samsung's March 2017 announcement that its flagship smartphone would support first-party peripheral that makes the device work like a desktop computer could mean big changes for how people look at their productivity devices. While this is not the first...

Read Full Story »

Posted in: Managed IT Services

This Is the End: Microsoft Takes a Hard Stance on Phasing Out Older Windows Versions

April 11th, 2017 by admin

Stylized depiction of Windows 10's start menu on a desktop monitor

If your business hasn't already made the switch from Windows 10's predecessors to a new operating system, it's time to make the initiative a priority. While your IT staff doesn't need to upgrade every computer in your office, it's necessary to make sure...

Read Full Story »

Posted in: Managed IT Services

Mesh Networking for SMB Offices

March 28th, 2017 by admin

Stylized representation of a wireless radio antenna with radio signals emanating from it

If the sounds of disgruntled employees complaining about poor Wi-Fi connectivity are all too familiar in your SMB, it's time to consider switching to a mesh network. Unlike traditional Wi-Fi networks that use a single point of origin and optional...

Read Full Story »

Posted in: Knowledge

The Benefits of Laptop Docks and At-Desk Peripherals

March 21st, 2017 by admin

Overhead view of a computer user typing on a white, detachable Mac keyboard connected to a MacBook laptop

With a little bit of effort, your staff can reap all the benefits of a laptop, and many of the perks of a desktop, with a little bit of planning and some additional hardware. It's a common perception that laptops lead in portability, while desktops specialize...

Read Full Story »

Posted in: Managed IT Services, Knowledge

Mac- and Linux-Based Malware Targets Biomedical Industry

March 14th, 2017 by admin

Skull and crossbones symbol drawn with 1s and 0s

The malware infection, discovered in late January, that's been hiding out on Mac and Linux devices for more than two years doesn't mean the security floodgates are open, but it is a reminder that these devices aren't invincible. Apple is calling this...

Read Full Story »

Posted in: Security

Network-Attached Storage: Data Backup and Transfer Options for Small Businesses

March 9th, 2017 by admin

File upload icon in 5 colors: gray, green, red, blue, yellow

Network-Attached Storage (NAS) servers are a great asset for small businesses managing data. For the uninitiated, NAS is essentially a streamlined server designed specifically for sharing files between devices. Because of their simplified...

Read Full Story »

Posted in: Managed IT Services, Knowledge

Using Snap and Split-Screen Modes for Increased Productivity

February 1st, 2017 by admin

Stylized sliding drawers stacked one atop the other, in blue and gray

Multi-tasking wizards have a secret: Modern operating systems offer a handy technique for managing multiple windows while maximizing available screen space, significantly increasing productivity. Depending on the OS, this feature may be referred to as...

Read Full Story »

Posted in: Solutions, Knowledge

Virtual Reality: What does It Mean for Your Business?

January 18th, 2017 by admin

Blue and purple depiction of the concept of consciousness

Depending on your industry, modern virtual reality (VR) devices could offer impressive options to improve productivity. The video game industry, for one, has been a major player in pushing VR technology. Despite a handful of flops like Nintendo’s 1995...

Read Full Story »

Posted in: Knowledge

Boost Productivity and Security with Google's Cloud Applications

January 11th, 2017 by admin

For anyone unfamiliar with the Google Applications platform, Google Docs et al. are a Cloud-based spin on mainstay office suite programs that can help your staff work better together. With a zero-dollar price tag (compared with Microsoft Office's...

Read Full Story »

Posted in: Cloud, Support

Looking Forward: Cloud Services Costs and Opportunities

January 5th, 2017 by admin

Blue, green, and orange stylized cloud upload/download icons

If your small-to-medium business (SMB) isn't looking at ways to increase productivity through Cloud services, you could be missing out on exciting opportunities. But while the Cloud offers countless opportunities for business expansion, it can also taking...

Read Full Story »

Posted in: Cloud

A Primer on Phishing Attacks

December 21st, 2016 by admin

Credit cards with a lock resting on top of them

Phishing attacks are a dangerous and devastating method hackers use to steal personal information and accounts—primarily by striking the user instead of the machine. According to the APWG Phishing Activity Trends Report, the first quarter of 2016 saw...

Read Full Story »

Posted in: Managed IT Services, Security

The End of the Samsung Galaxy Note 7: Device Explosions Trigger Full Recalls

December 13th, 2016 by admin

The word 'Samsung' with flames rising from it

In a rare move, Samsung fully recalled and discontinued production on its previously well-reviewed Galaxy Note 7 model following several verified cases of the devices catching fire. This unexpected turn of events has left a vacuum in the large smartphone...

Read Full Story »

Posted in: Knowledge

Antivirus Software: When One Is Better Than Two

December 7th, 2016 by admin

Yellow 'Anti Virus' in yellow on a black background

If your company’s antivirus software is letting you down, you should think twice before installing a second one on a computer: It may actually make things worse. Multiple antivirus programs working in conjunction on the same device is not a case of...

Read Full Story »

Posted in: Security

Hack of 500 Million Yahoo Accounts Reminds Industry to Increase Security Measures

November 23rd, 2016 by admin

User name and password dialog box

In September 2016, half a billion Yahoo account users received the bad news that their names, email addresses, phone numbers, and security questions were potentially stolen in a 2014 hack. According to CNET, the Yahoo hack is the largest data breach...

Read Full Story »

Posted in: Security

The Benefits of Backups

November 16th, 2016 by admin

Three keys with circuit board graphics applied to them

Even seasoned IT pros have made the mistake of not backing up a device—and panicked after losing countless important files because the device failed. We may know better, yes, but that doesn’t mean we’re perfect. On the flip side, we’ve all...

Read Full Story »

Posted in: Backup, Managed IT Services

Massive IoT DDoS Attack Causes Widespread Internet Outages. Are Your Devices Secured?

November 1st, 2016 by admin

Finger touching a field of icons against a pale blue background

As you probably know already, the United States experienced its largest Internet blackout in history on October 21, 2016, when Dyn—a service that handles website domain name routing—got hit with a massive distributed denial of service (DDoS) attack...

Read Full Story »

Posted in: Backup, Security

Low Battery Life: Bringing Productivity to a Halt

October 26th, 2016 by admin

 Stylized graphic of a AA battery with a green cape flying through the air

Work-disrupting messages like “please connect charger” and “plug in or find another power source” can be a huge source of frustration—not to mention a major productivity killer—for employees on the go. Nobody wants to see their phone battery go belly-up...

Read Full Story »

Posted in: Data, Managed IT Services, Solutions, Knowledge

Think Manually Running Hard Drive Defragmentation Is a Big Deal? Think Again

October 19th, 2016 by admin

Open hard drive sitting on a table with its internals exposed

Good news: Your IT staff can stop running regular hard drive defragmentation on your office computers. Improvements in technology have rendered this decade-old practice largely irrelevant. One less thing to worry about, as far as we’re concerned. Hard...

Read Full Story »

Posted in: Managed IT Services, Knowledge

Troubleshooting Step 1: Reboot

October 12th, 2016 by admin

Stylized graphic of two power buttons side-by-side, the one on the right one lit up in blue

While modern computers are much more stable than their ancestors, trying to get work done on a slow, malfunctioning computer is still a business world rite of passage. Troubleshooting bad behavior on your work computer can, of course, be a tedious...

Read Full Story »

Posted in: Managed IT Services, Knowledge

IoT Devices to Make Your Office More Efficient

September 21st, 2016 by admin

Stylized graphic of a thermometer

IoT devices have incredible potential to make your office more efficient. Previously we’ve discussed the caveats IoT devices bring to the workplace a few times, but today we’re going to focus on how these devices can increase productivity. It’s easy...

Read Full Story »

Posted in: Managed IT Services, Solutions

How To Select a Second Monitor

August 24th, 2016 by admin

White office desktop with 2 Dell monitors and an Apple keyboard around a coffee cup

Secondary monitors have incredible potential to increase productivity in the workplace. It might not seem like much, but minimizing, maximizing, and arranging application windows on a single computer monitor can take up a significant amount of time....

Read Full Story »

Posted in: Managed IT Services, Solutions, Knowledge

Password Managers and Recovery Strategies

August 16th, 2016 by admin

Computer sign in dialog box ***@*******.com

Secure passwords and recovery strategies are an essential part of doing business in the digital age—and password manager programs can help streamline the process. Password managers store and, often, automate login credentials for individuals across...

Read Full Story »

Posted in: Managed IT Services, Solutions, Knowledge

Are “Bandwidth Hogs” Slowing Your Network?

July 26th, 2016 by admin

Dials on a modern car showing a speedometer, tachometer, and other information

Last time, we talked about several handy do-it-yourself online tools to measure your office broadband speed. If your online connections aren't quite as fast as you expected from your service provider, don't be afraid to show them the "hard numbers"...

Read Full Story »

Posted in: Managed IT Services, Support, Solutions, Knowledge

Is Your Broadband Fast Enough? Here’s How to Check

July 19th, 2016 by admin

Simple representation of a wireless signal: a circle with 3 waves emanating from it

How fast is your company's broadband Internet speed compared to ten years ago? Chances are that while your online connection at work back then was faster than your first home Internet service (think of that annoying dial-up modem noise), if you tried...

Read Full Story »

Posted in: Managed IT Services, Support, Knowledge

Data Sanitization: Are You Erasing Your Old PCs COMPLETELY?

June 7th, 2016 by admin

Sepia-tinted close up of an eraser on the back of a pencil

One of our pet peeves with some of our new customers is that once we come in to upgrade their IT network, they're careless about disposing their old hardware—specifically, their PC hard drives. They think that by simply deleting their existing files—email,...

Read Full Story »

Posted in: Data, Managed IT Services, Knowledge

Are Your Smartphones Properly “Containerized”?

April 26th, 2016 by admin

Cartoon of a brown picket fence with green grass in front and shrubs on the other side

Earlier today the cashier at the local drive-thru miskeyed the amount of cash I gave him into his register. Somewhat sheepishly, he asked if I had a smartphone so I could verify the correct amount of change. Fortunately, I never leave home without it....

Read Full Story »

Posted in: Managed IT Services, Support, Knowledge

IoT Devices: Security Holes?

March 15th, 2016 by admin

Cloud of icons connecting to other icons on a blue background

Hackers can take advantage of a newer technology prevalent throughout your business to break into your network and compromise security: Internet of Things devices. Your business may have never considered that the handy new Smart Thermostats throughout...

Read Full Story »

Posted in: Security

Managed IT Services

September 16th, 2015 by admin

ATS Communications wants to help you make meaningful improvements in business processes, and share best practices. Let us take care of our network, so you can focus on your business! Managed IT services provide so many benefits. A few are: Accessible...

Read Full Story »

Posted in: Managed IT Services

5 Things you should do TODAY (and everyday) to preserve your IT systems

November 6th, 2013 by admin

Close up of a keyboard with a stethoscope resting on the left side

The 5 basic tips below are essential to maintaining the health and efficiency of your network, servers, and computer systems. Please consult an expert IT Consultant or Managed Service Provider for more information about protecting your IT systems. ...

Read Full Story »

Posted in: Managed IT Services

How a Managed Service Provider Can Increase ROI and Influence Long-Term Business Success

September 30th, 2013 by admin

Two puzzle pieces being drawn in the air, one saying 'partner' and the other 'ship'

Partnering with a Managed Service Provider (MSP) is one of the most important decisions you can make to ensure the longevity and productivity of your SMB. Why? An experienced MSP is a true business partner, reduces and streamlines IT costs, and takes...

Read Full Story »

Posted in: Managed IT Services

4 Crucial Benefits of a Managed Service Provider

August 27th, 2013 by admin

Drawing of 'computer network' with six spokes of other words pointing in towards it

Managed Service Providers - or MSPs - are tasked with the critically important job of managing IT to help businesses run smoothly. Information Technology is the foundation upon which businesses operate, communicate, and grow, and must therefore...

Read Full Story »

Posted in: Managed IT Services, Solutions

The Real Cost of IT Downtime

August 18th, 2013 by admin

Frustrated user pulling their hair while staring angrily at a computer screen

Downtime - it isn't always what you think! When you think downtime, I'm sure you're picturing the results of a total IT disaster - perhaps a flood destroying the server room or a malicious virus that hacks the network, forcing everyone to close up...

Read Full Story »

Posted in: Managed IT Services