PG&E Public Safety Power Shutoff is scheduled for Wednesday, October 9th at 4 AM for much of Northern California. For planning purposes, PG&E suggests customers prepare for outages that could last several days. Please take appropriate actions to ensure the safety of your systems if you are in a targeted shutdown area. See if your area is affected here...

Blog Articles from ATS Communciations

ATS Communications Protects SMBs From Windows 7 End of Life

December 21st, 2018 by admin

Close Up of Circuit Board with Illustration of Padlock in the Middle

CONCORD, CA – ATS Communications a leading managed technology services provider (MTSP), is helping small to mid-sized businesses (SMBs) secure their organizations from cyber-attacks, by addressing the Windows 7 “End of Life” policy that will begin...

Read Full Story »

Posted in: Press Releases

Grow Your Business with Our Industry Expertise

December 7th, 2018 by admin

office buildings

ATS provides IT consulting services for many industries, from nonprofit and Legal sectors to healthcare and biotech, we offer industry expertise to help you expand your business to the next level. As companies start to grow and evolve, many concerns...

Read Full Story »

Posted in: Solutions

Supporting Your IT Team with the Help They Deserve

November 21st, 2018 by admin

Male and Female Techs Working in a Server Room

Anyone in IT can tell you that it's a hectic job to manage. You have to make sure everything tech related is running smoothly and efficiently. That's if it's a good day. On a bad day, they are working hard to fix whatever has gone wrong on top of their...

Read Full Story »

Posted in: Services

ATS Communications Protects SMBs From DNS Attacks

November 20th, 2018 by admin

Padlock on Network Cables Data Protection Concept

CONCORD, CA – ATS Communications a leading managed technology services provider (MTSP), is helping small to mid-sized businesses (SMBs) protect themselves and their customers from DNS (Domain Name Server) attacks through innovative technology...

Read Full Story »

Posted in: Press Releases

Identifying the Top 4 Network Security Risks

November 15th, 2018 by admin

Shadowy Figure Overlaid with Digital Code on Dark Background

Security for your business is crucial. Everyone knows that, but settling for any old security system won't give you the protection you need against modern-day cybercriminals stealing sensitive data and monitoring operations. ATS offers great network...

Read Full Story »

Posted in: Security

The Future is in the Cloud

October 22nd, 2018 by admin

Business man with hands in front of cloud with technology icons

The Cloud is quickly becoming a dominant choice for businesses. From hosting their data to even being what they use to host their phone systems. Its accessibility and wide array of options has helped make Cloud Solutions the way of the...

Read Full Story »

Posted in: Cloud

ATS Communications Leverages Inspeed Networks to Provide Quality Services

October 15th, 2018 by admin

Businessman Holding Cloud

CONCORD, CA – InSpeed Networks™ the leading provider of self-driving SDWAN solutions and ATS Communications, a leading technology firm headquartered in (CONCORD, CA), today announced that ATS Communications has selected InSpeed Networks...

Read Full Story »

Posted in: Press Releases

Keeping You Connected

September 27th, 2018 by admin

Mess of Tangled Network Cables

Are your wires getting crossed? No matter how many gadgets you add, the quality of your communications starts with properly structured cabling. You need a solid foundation that supports your company’s technology goals. Your cable infrastructure...

Read Full Story »

Posted in: Solutions

ATS Communications Shares 3 Best Practices for Thwarting Phishing Attacks

September 19th, 2018 by admin

Secure Payment Message on Laptop Screen

CONCORD, CA – ATS Communications, a leading managed technology services provider (MTSP), is helping small to mid-sized businesses (SMBs) thwart cyberattacks and protect their organizations from unnecessary downtime by addressing the most common...

Read Full Story »

Posted in: Press Releases

Keeping Your Data Safe

August 10th, 2018 by admin

Keeping Your Data Safe

As technology gets more advanced, so do the bad guys. That’s why at ATS we make your network security our priority and help you avoid disruptions to your operations! From ransomware to the dark web and all the email scams in-between, criminals...

Read Full Story »

Posted in: Security

New Cybersecurity Regulations on Horizon for Corporate America

August 7th, 2018 by admin

Eye Viewing Digital Information

CONCORD, CA – ATS Communications, a leading managed technology services provider, is helping small to mid-sized businesses (SMBs) navigate the recent changes in cybersecurity standards that are highly likely to affect American businesses. Many...

Read Full Story »

Posted in: Press Releases

Managing Automatic Updates: Balancing Security With Convenience

July 10th, 2018 by admin

Business mobile phones and other items on a table

Running automatic updates for applications and operating systems helps protect your company's digital devices, but those updates can harm productivity if not well managed. Unpatched software is the single biggest security risk in the workplace, so it's...

Read Full Story »

Posted in: Security, Solutions

Take the Guesswork Out of Email Filtering!

July 5th, 2018 by admin

Chains on a keyboard

Did you know email can be a huge security risk for your businesses? Careless or unaware employees can click on malicious emails, opening up your network to security issues and downtime while it is being repaired. ATS offers easy and affordable anti-virus...

Read Full Story »

Posted in: Services

ATS Communications' Technology Thwarts Cryptojacking

July 4th, 2018 by admin

Abstract technology security on global network background vector illustration.

ATS Communications a leading managed technology services provider, is helping small to mid-sized businesses (SMBs) to prevent cryptojacking attacks from damaging their organizations. Cryptojacking attacks, are derived from the widely popular cryptocurrencies,...

Read Full Story »

Posted in: Press Releases

3 Steps to Getting Your Business BYOD Ready

July 3rd, 2018 by admin

If your business is considering a Bring Your Own Device environment, there's a great deal of security preparation work to do beforehand. A successful BYOD strategy and BYOD policy is all about finding the sweet spot of control, where your business is...

Read Full Story »

Posted in: Solutions

Lowering the Bottom Line: IT Management Support and Cost-Saving Benefits

June 27th, 2018 by admin

Close up of two businessman shaking hands

Shifting to IT management support services can make a huge difference in reducing your business' operational bottom-line. IT management goes a long way to streamline both infrastructure and support while providing access to a larger knowledge pool than...

Read Full Story »

Posted in: Managed IT Services, Support

Making the Switch to BYOD? Pros, Cons and Security Implications to Consider First

June 26th, 2018 by admin

Sleek, slim laptop on a gray business desk

Making the switch to a Bring Your Own Device (BYOD) business environment extends well beyond the decision to let employees choose their devices. Your business should look at the pros and cons of the concept before deciding how to approach it and to what...

Read Full Story »

Posted in: Support

How to Protect Your Business From the Dark Web

June 21st, 2018 by admin

Hacker at work with graphic user interface around him.

The dark web is a hive of scum and villainy that waits for the opportunity to steal your valuable information - and potentially even steal your identity. Taking these valuables and using them to harm you and others is a scary thing to think about isn’t...

Read Full Story »

Posted in: Services, Solutions

Key Strategies to Boost IT Security in the Workplace

June 20th, 2018 by admin

Conference room

Businesses have more to worry about than ever when it comes to dealing with new forms of cyber-attacks. The shift to a BYOD workplace adds even more challenges to protecting your digital assets. While hardware and software solutions continue to improve...

Read Full Story »

Posted in: Support, Security

Unique IT Challenges Financial Services Providers Face Today

June 19th, 2018 by admin

Skyscraper office buildings tinged in blue

Financial services providers find their IT challenges list is always growing because of security issues, employee needs, customer protection, regulatory laws and business requirements. Keeping up with IT concerns is important not just because failing...

Read Full Story »

Posted in: Solutions

Datto Drive, Business-Class File Sync and Share (FSS) Solution

June 10th, 2018 by admin

Cloud Security

As a business with a highly mobile workforce, you need File Sync and Share (FSS) solutions that are not going to leave your important business data exposed. With people being more and more on the move and often switching between devices, from desktop...

Read Full Story »

Posted in: Solutions

ATS Communications Becomes Virtual CIO for Small to Mid-Sized Businesses

May 31st, 2018 by admin

Virtual Technology Concept

CONCORD, CA – ATS Communications a leading managed technology services provider, announced today that the company will now be serving as a Virtual CIO (Chief Information Officer) for small to mid-sized business (SMBs) who are looking to focus...

Read Full Story »

Posted in: Press Releases

What Nonprofits Should Seek in an IT Provider

May 29th, 2018 by admin

Group of 5 business professionals looking at a laptop

While many of the technical needs at nonprofit and for-profit businesses overlap, there are still several key considerations for nonprofits looking for the right IT services provider. Nonprofits' motivations may be driven less by the concept of "spending...

Read Full Story »

Posted in: Managed IT Services

Which Industries Are Most Likely to be Targeted with Cyber Security Threats?

May 21st, 2018 by admin

Doctor in white scrubs wearing a stethoscope and with a pocket full of pens

To understand why some industries are targeted in cyber attacks more often than others, it's important to understand what drives hackers and what makes a target appealing. Of the two, hackers are easier to understand: According to a Verizon data security...

Read Full Story »

Posted in: Security

Voice Solutions to Improve Your Business

May 14th, 2018 by admin

Business Phone

We've talked a lot recently on our blog about everything from new partners, to virtualization, cloud solutions and carriers but now we want to get back to the basics and talk with you about your phone solutions. Having a reliable and effective phone...

Read Full Story »

Posted in: Solutions

7 Ways to Keep Work Secure on Employee Personal Devices

May 14th, 2018 by admin

Blond-haired business man looking at mobile phone while leaning against a window

Technology improvements have made it easy for employees to get work done on their personal devices from anywhere. However, that freedom comes with additional security risks and requires extra diligence to keep data secure. Safeguarding information is...

Read Full Story »

Posted in: Security

5 Email Disasters: How a Service Like ATS Can Prevent Catastrophe

May 3rd, 2018 by admin

Dense, color-coded code in depth-of-field blur

Often, businesses don't prepare for email disasters until after one has hit. But while email may comprise just a small part of a company's day-to-day operation, an email disaster can have a staggering impact on your business. The 2016 Democratic National...

Read Full Story »

Posted in: Security, Solutions

6 Can't-Miss Tools for Innovative Presentations

April 26th, 2018 by admin

Business professional in blue suit with purple tie and horn-rimmed glasses

It's easy to grow jaded about presentation software. After all, each new version of PowerPoint and Keynote may feel like the equivalent of the same old room getting a new coat of paint. However, new tools and apps offer all sorts of fresh and clever ways...

Read Full Story »

Posted in: Solutions

What Changes in Net Neutrality Could Mean for Your SMB

April 19th, 2018 by admin

Close up of Ethernet cables going into a switch

The FCC net neutrality 3–2 repeal vote of December 2017 could lead to major concerns for IT staff at small and medium businesses. As of February 2018, the FCC is continuing to move toward the net neutrality repeal, but actual business changes will take...

Read Full Story »

Posted in: Support, Services, Solutions

Addressing the Unique IT Management Needs at Law Firms

April 11th, 2018 by admin

Close of up businessman's holding a pen, wearing a black watch and a gold wedding band

Law firms face many unique IT management challenges that stem from the confidential nature of the information they work with. And that confidential data is why law firms must make the protection of information a key IT priority. Threats can come from...

Read Full Story »

Posted in: Managed IT Services, Services, Solutions

Training Employees in Data Security Practices: Tips and Topics

April 3rd, 2018 by admin

Two women working together in an office, in front of an Apple monitor

While there's plenty of technology available to keep your business's data protected, the human element is still the most important piece to consider in safeguarding your company's data. Properly training employees to understand and implement data security...

Read Full Story »

Posted in: Security

10 Cyberattacks Your Business Should Defend Against

March 29th, 2018 by admin

Two CCTV security cameras on a pole with a blue sky behind them

Cyberattacks are a major security concern for any business that uses the Internet. Even if your company doesn't have a website, hackers can go after your email address and business service accounts. Though they represent one of the more severe risks of...

Read Full Story »

Posted in: Security

Cybersecurity and C-Level Execs: Protecting Data While On the Go

March 26th, 2018 by admin

Silhouette of a businessman standing in front of window blinds in an office

While all employees need to be mindful of security, the nature of C-level executives makes them more attractive targets for hackers. That means it's necessary for them to take greater precautions. According to TechRepublic, C-level executives are more...

Read Full Story »

Posted in: Security

ATS Communications Selected to Attend 18th Annual TAG Convention

March 22nd, 2018 by admin

Honor

We announced today that we have been selected to attend Technology Assurance Group’s 18th Annual Convention in San Diego, California on April 28th through May 2nd. TAG is an organization of managed technology services providers (MTSPs) in North...

Read Full Story »

Posted in: Press Releases

IP-Based Surveillance with Avigilon Control Center

March 19th, 2018 by admin

Toshiba and Mitel

As a business owner, ATS knows that your number one priority is the safety and security of your employees and assets. Whether you want to ensure that you’re covered in case of theft, vandalism or other crime or you just want the freedom to check...

Read Full Story »

Posted in: Solutions

Giving a Presentation: A Technology Preparedness Checklist

March 19th, 2018 by admin

Stylized graphic of a businesswoman standing in front of a training blackboard

Giving a presentation can be stressful, so dealing with technology issues at the last minute is the last thing you want when attempting a professional delivery. The following technology preparedness checklist can help you make a good impression rather...

Read Full Story »

Posted in: Solutions

The Mirai Botnet Returns — and Why You Should be Concerned

March 13th, 2018 by admin

Stylized stream of meta data against a dark background

The Mirai botnet refers to a massive-scale network of Linux-running Internet of Things devices turned into remote-controlled bots through a malware infection. Hackers can use the network to run a distributed denial of service, or DDoS, by having the infected...

Read Full Story »

Posted in: Security

Managing Messaging Tools in Your Office

March 5th, 2018 by admin

Businessman's hand touching a virtual screen with a white email envelope icon on it

When used well, instant messaging tools can increase productivity while offering secure information exchange in your office. Messaging works in business environments because it's less involved than email, easy to queue and fast to respond. Several free...

Read Full Story »

Posted in: Solutions

5 Commonly Overlooked Workplace IT Disasters

February 28th, 2018 by admin

Stylized graphic in blue of a figure holding a giant-sized magnifying glass

Because IT staff get so invested in making sure software, networking and security elements are working, they sometimes overlook the human, environmental and contingency planning factors that can invite workplace IT disasters. In many cases, preventative...

Read Full Story »

Posted in: Managed IT Services, Solutions

New Partnership with ID Agent to Heighten Cybersecurity

February 27th, 2018 by admin

Heighten Cybersecurity

ATS Communications a leader in managed technology services, announced today that the company has partnered with ID Agent, to enhance the security of SMBs (small to mid-sized businesses) across the nation. ID Agent and this partnership will enable business...

Read Full Story »

Posted in: Press Releases

Spectre and Meltdown: Valuable Lessons for Your IT Security Team

February 12th, 2018 by admin

White lock icon on a backdrop of code snippets

At the end of 2017, the world learned about Spectre and Meltdown: two far-reaching security threats that exploit how CPUs work to expose protected information on nearly every recent PC, server and smartphone. Hackers can use these exploits to do things...

Read Full Story »

Posted in: Security

Do You Have a Crisis Management Plan for a Cyberattack?

February 8th, 2018 by admin

Illuminated hand touching a stylized chalk flowchart

A cyberattack crisis management plan is your business's best defense for minimizing cyberattack damage after technology-based preventative measures have failed. Unfortunately for most businesses, cyberattacks are not a matter of if, but a matter of when....

Read Full Story »

Posted in: Security

5 Specific IT Considerations for Remote Employees

February 5th, 2018 by admin

White-bloused businesswoman using a slim laptop on a birch colored desk

Businesses have a lot to gain by hiring remote employees, including the ability to recruit from a larger talent pool and the potential for less expensive workplace accommodations. However, remote employees introduce new challenges in IT security because...

Read Full Story »

Posted in: Solutions

Business Continuity through Virtualization

February 1st, 2018 by admin

Virtualization

It seems like not too long ago, we were still storing most of our data on desktops, maybe securing a backup on the most vital data on disks and a remote drive. As our data storage increased these past couple decades, our hard drives and servers got larger...

Read Full Story »

Posted in: Solutions

Does Fintech Pose a Threat to Cybersecurity at Financial Services Companies?

January 29th, 2018 by admin

Sample portfolio summary being displayed on an iPad

Financial services companies should embrace a healthy dose of caution when implementing new fintech in their business. Fintech, or any technological innovation in the financial sector, is not inherently more or less secure than any other new technology,...

Read Full Story »

Posted in: Security

3 Subtle Ways IT Management Makes Day-to-Day Operations More Manageable

January 22nd, 2018 by admin

Outstretched hand holding stylized, brightly-colored gears and cogs

For many businesses, it is difficult to gauge how helpful IT management can be in the workplace on a day-to-day basis — mainly because when things are going well, there's little to notice. Some of the most important benefits of an IT managed services...

Read Full Story »

Posted in: Managed IT Services, Solutions

Offering Professional IT Help Desk Support

January 18th, 2018 by admin

ATS knows all too well the troubles that many IT teams have, balancing daily troubleshooting support with the management of service providers, technology projects, and network management. Why not free up their time to focus on the work they’re best at?...

Read Full Story »

Posted in: Support

Four Security Threats Your Company Could Face in 2018

January 16th, 2018 by admin

Close up view of network Ethernet cables plugged into ports on a switch/router

Hot off the tail of the massive 2017 Equifax breach that exposed personal information of 143 million customers, businesses are on high alert concerning IT security in 2018. While the IT security industry has been successful in mitigating and cracking...

Read Full Story »

Posted in: Security