PG&E Public Safety Power Shutoff is scheduled for Wednesday, October 9th at 4 AM for much of Northern California. For planning purposes, PG&E suggests customers prepare for outages that could last several days. Please take appropriate actions to ensure the safety of your systems if you are in a targeted shutdown area. See if your area is affected here...

Blog Articles from ATS Communciations

A Primer on Phishing Attacks

December 21st, 2016 by admin

Credit cards with a lock resting on top of them

Phishing attacks are a dangerous and devastating method hackers use to steal personal information and accounts—primarily by striking the user instead of the machine. According to the APWG Phishing Activity Trends Report, the first quarter of 2016 saw...

Read Full Story »

Posted in: Managed IT Services, Security

The End of the Samsung Galaxy Note 7: Device Explosions Trigger Full Recalls

December 13th, 2016 by admin

The word 'Samsung' with flames rising from it

In a rare move, Samsung fully recalled and discontinued production on its previously well-reviewed Galaxy Note 7 model following several verified cases of the devices catching fire. This unexpected turn of events has left a vacuum in the large smartphone...

Read Full Story »

Posted in: Knowledge

Managing Your Carrier Services

December 9th, 2016 by admin

We understand that feeling of being overwhelmed by the newest technologies on the market, the competition between service provider, and the conflicting reviews of software, prices, and quality. You have a business to run, and yet too much of your time...

Read Full Story »

Posted in: Services

Antivirus Software: When One Is Better Than Two

December 7th, 2016 by admin

Yellow 'Anti Virus' in yellow on a black background

If your company’s antivirus software is letting you down, you should think twice before installing a second one on a computer: It may actually make things worse. Multiple antivirus programs working in conjunction on the same device is not a case of...

Read Full Story »

Posted in: Security

Hack of 500 Million Yahoo Accounts Reminds Industry to Increase Security Measures

November 23rd, 2016 by admin

User name and password dialog box

In September 2016, half a billion Yahoo account users received the bad news that their names, email addresses, phone numbers, and security questions were potentially stolen in a 2014 hack. According to CNET, the Yahoo hack is the largest data breach...

Read Full Story »

Posted in: Security

The Benefits of Backups

November 16th, 2016 by admin

Three keys with circuit board graphics applied to them

Even seasoned IT pros have made the mistake of not backing up a device—and panicked after losing countless important files because the device failed. We may know better, yes, but that doesn’t mean we’re perfect. On the flip side, we’ve all...

Read Full Story »

Posted in: Backup, Managed IT Services

A Primer on Common, Helpful Device Adapters

November 11th, 2016 by admin

An iPhone 7 resting on a table top

In September 2016, Apple announced that the iPhone 7 will not feature a 3.5mm jack—meaning anyone who wants to use standard headphones (or the credit-card scanning Square Reader) will need an adapter. Only time will tell if removing the century-old...

Read Full Story »

Posted in: Solutions, Knowledge

Customer Feedback

November 7th, 2016 by admin

When you're working with a new service provider, you're often unsure of how processes will work, whether they'll deliver quality service, and if you can trust them. That's why we like to share our customer testimonials. By reading a few, you get to know...

Read Full Story »

Posted in: Company News

Massive IoT DDoS Attack Causes Widespread Internet Outages. Are Your Devices Secured?

November 1st, 2016 by admin

Finger touching a field of icons against a pale blue background

As you probably know already, the United States experienced its largest Internet blackout in history on October 21, 2016, when Dyn—a service that handles website domain name routing—got hit with a massive distributed denial of service (DDoS) attack...

Read Full Story »

Posted in: Backup, Security

Low Battery Life: Bringing Productivity to a Halt

October 26th, 2016 by admin

 Stylized graphic of a AA battery with a green cape flying through the air

Work-disrupting messages like “please connect charger” and “plug in or find another power source” can be a huge source of frustration—not to mention a major productivity killer—for employees on the go. Nobody wants to see their phone battery go belly-up...

Read Full Story »

Posted in: Data, Managed IT Services, Solutions, Knowledge

Think Manually Running Hard Drive Defragmentation Is a Big Deal? Think Again

October 19th, 2016 by admin

Open hard drive sitting on a table with its internals exposed

Good news: Your IT staff can stop running regular hard drive defragmentation on your office computers. Improvements in technology have rendered this decade-old practice largely irrelevant. One less thing to worry about, as far as we’re concerned. Hard...

Read Full Story »

Posted in: Managed IT Services, Knowledge

Troubleshooting Step 1: Reboot

October 12th, 2016 by admin

Stylized graphic of two power buttons side-by-side, the one on the right one lit up in blue

While modern computers are much more stable than their ancestors, trying to get work done on a slow, malfunctioning computer is still a business world rite of passage. Troubleshooting bad behavior on your work computer can, of course, be a tedious...

Read Full Story »

Posted in: Managed IT Services, Knowledge

Business Continuity Strategies

October 7th, 2016 by admin

Why tempt fate by putting off a disaster recovery plan? Being unprepared might mean loss of sales, missing connections with clients, and lost data. Most businesses can't afford that kind of downtime. ATS can provide proactive measures to protect your...

Read Full Story »

Posted in: Backup, Services

Overloaded, Weak Signals: Alleviating Common Wi-Fi Bottlenecks

September 28th, 2016 by admin

Cartoon graphic of a hand holding a tablet with a Wi-Fi symbol on the screen

If your staff is complaining about slow Internet access at your office, it’s time to consider how well the Wi-Fi network is configured. Slow Wi-Fi is best known, after all, for transforming an otherwise ideal work environment into a slow-boiling pot...

Read Full Story »

Posted in: Solutions, Knowledge

IoT Devices to Make Your Office More Efficient

September 21st, 2016 by admin

Stylized graphic of a thermometer

IoT devices have incredible potential to make your office more efficient. Previously we’ve discussed the caveats IoT devices bring to the workplace a few times, but today we’re going to focus on how these devices can increase productivity. It’s easy...

Read Full Story »

Posted in: Managed IT Services, Solutions

Surveillance

September 13th, 2016 by admin

Make sure your staff and business is protected from crime with our video surveillance systems. Our surveillance systems are beneficial to any size business. With detail that surpasses analog cameras, you are able to capture events in your office or at...

Read Full Story »

Posted in: Security

Water-Resistant Smartphones Are Here: What You Need to Know

September 13th, 2016 by admin

Graphic of an iPhone with an image of water droplets on the screen

Water-resistance probably isn’t on the feature checklist for your employee smartphones—but judging by how many of these devices meet an untimely end via liquid damage, it should be. It probably doesn't come as a surprise that dropping the device...

Read Full Story »

Posted in: Solutions, Knowledge

Are Chromebooks Right for YOUR Business?

September 7th, 2016 by admin

White Acer laptop sitting on a white table, with a yellow flower in a glass to the side

Google’s Chromebook platform has the potential to replace traditional laptops and increase productivity for businesses, much like it has in the consumer market at large. For the uninitiated, Chromebooks are Cloud-oriented laptops that run most operations...

Read Full Story »

Posted in: Knowledge

Are Comatose Servers Draining Your Wallet and Leaving You Vulnerable?

August 30th, 2016 by admin

Black skull and crossbones graphic

Those old servers your business no longer uses—and keeps running anyway—are more than just a security risk: They’re hurting your firm’s bottom line. The term comatose server describes a functional server, connected to a network, that sits idle virtually...

Read Full Story »

Posted in: Solutions, Knowledge

How To Select a Second Monitor

August 24th, 2016 by admin

White office desktop with 2 Dell monitors and an Apple keyboard around a coffee cup

Secondary monitors have incredible potential to increase productivity in the workplace. It might not seem like much, but minimizing, maximizing, and arranging application windows on a single computer monitor can take up a significant amount of time....

Read Full Story »

Posted in: Managed IT Services, Solutions, Knowledge

40th Anniversary

August 16th, 2016 by admin

Can you believe just last year we turned 40?! Within this amount of time, our company has developed into a professional team of voice and data specialists that is committed to your satisfaction. We offer top quality products at competitive prices and...

Read Full Story »

Posted in: Company News

Password Managers and Recovery Strategies

August 16th, 2016 by admin

Computer sign in dialog box ***@*******.com

Secure passwords and recovery strategies are an essential part of doing business in the digital age—and password manager programs can help streamline the process. Password managers store and, often, automate login credentials for individuals across...

Read Full Story »

Posted in: Managed IT Services, Solutions, Knowledge

Don’t Forget About Printer Security

August 9th, 2016 by admin

Array of 6 white printer icons against backgrounds of various color

There was a time when printers—in your office or home—were considered relatively "simple" office equipment: plug it in, connect it to the local network, and keep the ink fresh, and there wasn't much else to worry about. But times have changed. Today's...

Read Full Story »

Posted in: Managed IT Services, Knowledge

Looking at Data Storage Longevity

August 2nd, 2016 by admin

Oblong view of a depiction of the internal workings of a mechanical hard drive

Not all storage devices were built to stand the test of time, so it’s important for every business to ensure its data is backed up on a reliable platform. If you’ve ever needed to reference financial records or court cases from a decade ago, you’ll...

Read Full Story »

Posted in: Data, Support, Solutions

Are “Bandwidth Hogs” Slowing Your Network?

July 26th, 2016 by admin

Dials on a modern car showing a speedometer, tachometer, and other information

Last time, we talked about several handy do-it-yourself online tools to measure your office broadband speed. If your online connections aren't quite as fast as you expected from your service provider, don't be afraid to show them the "hard numbers"...

Read Full Story »

Posted in: Managed IT Services, Support, Solutions, Knowledge

Is Your Broadband Fast Enough? Here’s How to Check

July 19th, 2016 by admin

Simple representation of a wireless signal: a circle with 3 waves emanating from it

How fast is your company's broadband Internet speed compared to ten years ago? Chances are that while your online connection at work back then was faster than your first home Internet service (think of that annoying dial-up modem noise), if you tried...

Read Full Story »

Posted in: Managed IT Services, Support, Knowledge

Defend Your Network Against Advanced Persistent Threats

July 12th, 2016 by admin

You Have Been Hacked - cartoon of a robber climbing out of a black laptop

If you've looked over our previous posts since we've started our blog, you know how serious we are about protecting your company from everyday cyber-threats—mainly phishing, ransomware, and various other malware. Today we'd like to discuss a different...

Read Full Story »

Posted in: Managed IT Services, Solutions, Knowledge

The “Wearable Revolution”: Is Your Company Prepared?

July 7th, 2016 by admin

A man's forearm wearing a smart watch displaying numerous colorful icons

It's a fair bet that one of your employees has already shown off a trendy new wearable gadget around the office. What began with Bluetooth earpieces would branch off into smartwatches, smart glasses, wrist-worn fitness trackers, and even smart clothing...

Read Full Story »

Posted in: Managed IT Services, Security, Knowledge

IT Management ATS Communications

July 4th, 2016 by admin

Tired of managing your network? With our managed IT services, your can forget about your network and focus on your business. Some of the benefits of our services include: reduced costs, stability, guaranteed service levels, accessible and responsive support...

Read Full Story »

Posted in: Managed IT Services

The “Seven Deadly Sins” of Ransomware

June 29th, 2016 by admin

Large, shiny red '7' in a blocky format

Readers of our blog over the past few years know we were among the first in the Bay Area to warn our customers about the growing threats of ransomware—from the emergence of CryptoLocker and CryptoWall to our federal government's startling admission...

Read Full Story »

Posted in: Support, Security, Knowledge

Is It Time to Switch to Flash Storage?

June 21st, 2016 by admin

Graphic of a open, gray filing cabinet outlined in blue

More and more businesses are switching their storage solutions from hard disk drives (HDDs) to solid state drives (SSDs) for one simple reason: the appeal of faster loading times and increased productivity. However, HDDs can still be the better choice...

Read Full Story »

Posted in: Solutions

Where's Your Company's WISP? Why You Need One NOW

June 14th, 2016 by admin

Businessman reviewing 3 papers while poised to write on one with a fancy pen

A WISP is one of the most important documents for any company doing business over the Internet—which, in this day and age, is pretty much everybody. Who's responsible for drafting and maintaining your company's WISP? Or are you even sure what a WISP...

Read Full Story »

Posted in: Security, Knowledge

Keeping your business safe

June 12th, 2016 by admin

Don't miss out on the opportunity to give your business the best continuity plan. At ATS, we take measures to eliminate the obstacles that could disrupt your business and help implement reliable networks. Let ATS help you go above and beyond basic backup...

Read Full Story »

Posted in: Backup, Cloud, Managed IT Services

Data Sanitization: Are You Erasing Your Old PCs COMPLETELY?

June 7th, 2016 by admin

Sepia-tinted close up of an eraser on the back of a pencil

One of our pet peeves with some of our new customers is that once we come in to upgrade their IT network, they're careless about disposing their old hardware—specifically, their PC hard drives. They think that by simply deleting their existing files—email,...

Read Full Story »

Posted in: Data, Managed IT Services, Knowledge

Data Breaches: Dark Times in the Golden State?

June 1st, 2016 by admin

Four brightly colored locks intertwined together in a square shape

Being the cyber-security geeks we are, we took great interest in combing through this year's California Data Breach Report, released by the Attorney General's office this past February. The report tabulates data collected from breach incidents which...

Read Full Story »

Posted in: Data, Security

Windows 10 Free Upgrade Window Comes to an End

May 24th, 2016 by admin

Stylized depiction of the modern Windows start menu with a blue '10' overlaid

Those “Upgrade to Windows 10” notifications seem to be showing up everywhere, even in the middle of a weather forecast on Iowa television. What would’ve otherwise been an embarrassing interruption turned into a watercooler moment that anyone who used...

Read Full Story »

Posted in: Support, Knowledge

How To Choose a Desktop Monitor

May 17th, 2016 by admin

Graphical render of a standard desktop PC, with monitor, keyboard, mouse, and tower

Let’s talk about desktop monitors. In many companies, large or small, an onboarding employee gets whatever display hardware might already reside in their assigned cube—no matter how old it is. But like most computer products, the technology is always...

Read Full Story »

Posted in: Managed IT Services, Knowledge

Datto Drive

May 15th, 2016 by admin

Datto Drive is a new product we are offering that was just released this month! It is similar to Dropbox; it provides an easy way to share files and work cohesively with everyone in your organization! There is an introductory offer of 1 year of 1TB of...

Read Full Story »

Posted in: Solutions

New Threat Targets Older Android Devices

May 11th, 2016 by admin

Three smartphones with happy, neutral, and sad faces on them

Smartphone users can be broken down into two camps: those who can't live without lining up to buy the latest and greatest model the day it hits the stores, and those who hold on to their tried-and-true phone until it suddenly dies one morning. There's...

Read Full Story »

Posted in: Security, Knowledge

URGENT: Uninstall QuickTime for Windows NOW

May 3rd, 2016 by admin

Red and yellow depiction of a ringing alarm clock with hands at 12:15

Today we'd like to pass along a critical security advisory to all our customers: If any of your company's Windows systems still retain Apple's QuickTime for Windows software, uninstall it immediately—as soon as you finish reading this post (if not...

Read Full Story »

Posted in: Support, Security, Knowledge

Are Your Smartphones Properly “Containerized”?

April 26th, 2016 by admin

Cartoon of a brown picket fence with green grass in front and shrubs on the other side

Earlier today the cashier at the local drive-thru miskeyed the amount of cash I gave him into his register. Somewhat sheepishly, he asked if I had a smartphone so I could verify the correct amount of change. Fortunately, I never leave home without it....

Read Full Story »

Posted in: Managed IT Services, Support, Knowledge

Cybercrime Begins Over the Phone, Too - Don't Let Your Employees Forget

April 19th, 2016 by admin

Clip art of a red rotary telephone

If you've been a regular reader of our blog, you know we've spent plenty of time discussing phishing, malware, and other cybercrime. It's all part of our modern online world, and we know it will never really go away. We've talked about the tricks scammers...

Read Full Story »

Posted in: Security

Network Security

April 12th, 2016 by admin

Protecting vital business information is a priority of any business. ATS can help ensure that your network, users, and data are protected from continually evolving threats.  A firewall is often installed in a specially designated computer separate from...

Read Full Story »

Posted in: Security

The Best Way to Check Your PCs for Malware - Fast and FREE

April 12th, 2016 by admin

Clip art of two badges, one red with an 'X' and the other green with a check mark

A couple months back, we touched on the story of our normally tech-savvy friend who got tricked into allowing his desktop PC to be infected with obvious malware. At first, he had the sickening feeling that comes with a virus-infected computer—but thanks...

Read Full Story »

Posted in: Security

Prepare Now or Pay Later: More Ransomware Attacks in the News

April 7th, 2016 by admin

Silhouette of a running man carrying a giant 1 Euro coin, against a blue digital cityscape

We're only a few months into 2016, but we've already seen two high-profile ransomware attacks—where cyber-crooks heavily encrypt a victim's computer files before demanding payment for a decryption key only they can provide. Two notable incidents grabbed...

Read Full Story »

Posted in: Backup, Security, Knowledge

The Latest Big Cyber-Threat: Are Your Servers “DROWN-proof”?

March 30th, 2016 by admin

Life preserver in alternating red and white colors, hanging on a wooden wall

If you think there's a new cyber-threat to worry about every week, you're probably right. The latest vulnerability to send shockwaves through the enterprise security community has been given a rather ominous acronym: DROWN, short for Decrypting RSA...

Read Full Story »

Posted in: Security, Knowledge

Cloud Solutions

March 28th, 2016 by admin

If you’re thinking about investing in the cloud, we can help. The cloud is an emerging, growing solution. The cloud alleviates many of the problems associated with premise-based communications, physical space constraints, hardware obsolescence, incompatibility,...

Read Full Story »

Posted in: Cloud, Solutions

Are Macs “Ransomware-Proof”? Not Anymore

March 23rd, 2016 by admin

Clip art of a hacker in a purple shirt using a blue computer

Since Apple famously introduced the Macintosh over three decades ago, Mac users have been confident that their computers are virtually immune to ransomware and other malware threats which plague their Windows counterparts. But those days are over. ...

Read Full Story »

Posted in: Security, Knowledge

IoT Devices: Security Holes?

March 15th, 2016 by admin

Cloud of icons connecting to other icons on a blue background

Hackers can take advantage of a newer technology prevalent throughout your business to break into your network and compromise security: Internet of Things devices. Your business may have never considered that the handy new Smart Thermostats throughout...

Read Full Story »

Posted in: Security

iPhone “Backdoor”? It Already Exists! Why Your Company Needs It

March 8th, 2016 by admin

Close up of a woman with pink fingernails using an iPhone while carrying a black bag

February's big story in the tech world was the conflict between Apple and the FBI over the creation of a "backdoor" to retrieve encrypted data on iPhones. The government is looking for any clue as to what—or, more specifically, who—motivated Syed Farook,...

Read Full Story »

Posted in: Security

Cloud Solutions

February 6th, 2016 by admin

As technology continues to develop, more and more businesses are moving their data to the cloud. The cloud offers a variety of features and has become extremely cost effective. However, we understand that it’s not always practical for a business to move...

Read Full Story »

Posted in: Cloud

Network Security

January 29th, 2016 by admin

At ATS, protecting your business’s valuable information is a top priority. With the help of our industry-leading partners, we deliver high performance network security solutions that help you protect your network, users and data from continually evolving...

Read Full Story »

Posted in: Services, Security

Fake Phishing: The Ultimate Security Training?

January 5th, 2016 by admin

'Do Not Enter' traffic sign of a red circle with a white horizontal line

What is the current state of your company's IT security training program—if you have one? Many companies settle for an annual group training session to broadly review the major types of cyber-threats—viruses, malware, and phishing. The problem with...

Read Full Story »

Posted in: Security