PG&E Public Safety Power Shutoff is scheduled for Wednesday, October 9th at 4 AM for much of Northern California. For planning purposes, PG&E suggests customers prepare for outages that could last several days. Please take appropriate actions to ensure the safety of your systems if you are in a targeted shutdown area. See if your area is affected here...

Blog Articles from ATS Communciations

Reduce Downtime with Business Continuity and Data Backup

April 1st, 2024 by admin

A person working on a computer connected to servers to implement data backup solutions

Reducing downtime is critical to achieve business continuity. Implementing robust business continuity plans and reliable data backup solutions ensures quick recovery from disruptions. Companies can, therefore, achieve remarkable results by identifying...

Read Full Story »

Posted in: Data, Solutions

Improve Security with Remote Monitoring and Management

February 15th, 2024 by admin

A person in a suit holding a digital lock

Businesses face an increasing number of cyber threats in today's fast-paced digital landscape. With the growing complexity of IT infrastructures, ensuring robust security measures has become a paramount concern for organizations of all sizes. ...

Read Full Story »

Posted in: Managed IT Services, Security

Improve Security with Access Control Systems

October 16th, 2023 by admin

Someone attempting to unlock a door that has access control security

Securing both physical and digital domains is a critical concern for businesses today. Access control systems offer robust solutions for guarding valuable assets and sensitive information. More than just restricting unauthorized entry, these systems...

Read Full Story »

Posted in: Solutions

New Artificial Intelligence Protects Companies From the Latest AI Phishing Attacks

October 12th, 2023 by admin

New Artificial Intelligence Protects Companies

Leading Managed Technology Services Provider Helps To Secure Organizations CONCORD, CA ‐ ATS a leading Managed Technology Services Provider (MTSP), announced today that the company is protecting small to medium-sized businesses (SMBs) from the...

Read Full Story »

Posted in: Press Releases

Keep Your Data Protected with Password Management Solutions

July 1st, 2023 by admin

Password management on a tablet

In the digital age, where personal and sensitive information is increasingly stored and accessed online, ensuring the security of our data has become paramount. With the proliferation of online accounts and the growing complexity of passwords,...

Read Full Story »

Posted in: Solutions

How Email Filtering Protects Your Business from Phishing Attacks

May 23rd, 2023 by admin

A businessman typing on a keyboard and there is a digital overlay over the keyboard with a sheild. Protection concept.

Email filtering is a process used to detect, block or divert emails that contain malicious content, fraudulent material, or spam. It is designed to help protect organizations from email-borne threats and ensure the security of their networks and systems....

Read Full Story »

Posted in: Security

The Benefits of Business Continuity and Data Back-Up

March 2nd, 2023 by admin

An engineer working in a server room with her laptop

Is your business equipped for a power outage? Can it handle several hours of downtime? Are your servers backed up in the event of a virus attack? Businesses often underestimate the importance of a business continuity plan and data backup. In a perfect...

Read Full Story »

Posted in: Data

Reasons to Use Multi-Factor Authentication

February 22nd, 2023 by admin

Photo of a multi-factor authentication request on screen

Multi-factor authentication (MFA) is an extra layer of security used to ensure that only authorized individuals can access a system or application. This type of security requires users to provide more than one form of authentication,...

Read Full Story »

Posted in: Managed IT Services

The Importance of Cyber Security Awareness Training

February 10th, 2023 by admin

A person using an e-learning platform to learn new skills and gain knowledge

Cyber security awareness training is a program designed to educate employees about the risks of cyber-attacks and other digital threats, the importance of establishing secure online practices, and how to respond if they become victims of an attack....

Read Full Story »

Posted in: Services

Leveraging Powerful Artificial Intelligence Anti-Phishing Technology to Keep Email Inboxes Safe

January 24th, 2023 by admin

A login form on a business card with a fishing hook in it. Phishing concept.

Leading MTSP Shares Why Email Is an Easy Way to Destroy A Company's Network CONCORD, CA - ATS Communications, a leading managed technology services provider (MTSP), recently announced that they are protecting small to mid-sized businesses (SMBs) with...

Read Full Story »

Posted in: Press Releases

Why Dark Web Scanning Is Important

January 24th, 2023 by admin

A hacker wearing a gray sweatshirt using a laptop

Dark web scanning is the process of actively seeking out publicly available data related to an organization, its employees, customers, vendors, or partners on the dark web. This process looks for indicators that could be used by malicious actors to...

Read Full Story »

Posted in: Managed IT Services

The Benefits of Antivirus and Email Filtering

December 16th, 2022 by admin

A fish hook in a credit card. Phishing concept.

Antivirus and email filtering are important tools in keeping your computer safe from malicious activity. By regularly performing security scans and monitoring incoming emails, these programs can help protect you from online threats such as viruses,...

Read Full Story »

Posted in: Security

Cloud Computing Provides Benefits to a Remote Workforce

June 3rd, 2020 by admin

A silver cloud with a keyhole depicting a secure environment

As businesses are transitioning to a remote workforce during the COVID-19 pandemic, they require tools to allow their employees to be productive and efficient while at home. Additionally, as budgets tighten, businesses need a cost-effective way to help...

Read Full Story »

Posted in: Cloud, Solutions

Be on the Lookout for Rising Number of COVID-19 Phishing Attacks

April 21st, 2020 by admin

A blue digital lock with various connected devices and a person hand pointing at the lock

Hackers will often look to exploit any weakness they can find, whether it is through technological means or through human curiosity and concern. With the rapid rise of COVID-19 across the globe, hackers are ramping up their phishing attack efforts....

Read Full Story »

Posted in: Security

Moving to the Private Cloud

April 20th, 2019 by admin

floating cloud above a hand

The possibilities are endless when it comes to being in the cloud. The majority of businesses are already in the cloud in some capacity, and your business may be one of them but are you entirely utilizing the benefits of the cloud? Private data centers...

Read Full Story »

Posted in: Cloud, Solutions

Unique IT Challenges Financial Services Providers Face Today

June 19th, 2018 by admin

Skyscraper office buildings tinged in blue

Financial services providers find their IT challenges list is always growing because of security issues, employee needs, customer protection, regulatory laws and business requirements. Keeping up with IT concerns is important not just because failing...

Read Full Story »

Posted in: Solutions

Which Industries Are Most Likely to be Targeted with Cyber Security Threats?

May 21st, 2018 by admin

Doctor in white scrubs wearing a stethoscope and with a pocket full of pens

To understand why some industries are targeted in cyber attacks more often than others, it's important to understand what drives hackers and what makes a target appealing. Of the two, hackers are easier to understand: According to a Verizon data security...

Read Full Story »

Posted in: Security

5 Email Disasters: How a Service Like ATS Can Prevent Catastrophe

May 3rd, 2018 by admin

Dense, color-coded code in depth-of-field blur

Often, businesses don't prepare for email disasters until after one has hit. But while email may comprise just a small part of a company's day-to-day operation, an email disaster can have a staggering impact on your business. The 2016 Democratic National...

Read Full Story »

Posted in: Security, Solutions

Addressing the Unique IT Management Needs at Law Firms

April 11th, 2018 by admin

Close of up businessman's holding a pen, wearing a black watch and a gold wedding band

Law firms face many unique IT management challenges that stem from the confidential nature of the information they work with. And that confidential data is why law firms must make the protection of information a key IT priority. Threats can come from...

Read Full Story »

Posted in: Managed IT Services, Services, Solutions

Training Employees in Data Security Practices: Tips and Topics

April 3rd, 2018 by admin

Two women working together in an office, in front of an Apple monitor

While there's plenty of technology available to keep your business's data protected, the human element is still the most important piece to consider in safeguarding your company's data. Properly training employees to understand and implement data security...

Read Full Story »

Posted in: Security

10 Cyberattacks Your Business Should Defend Against

March 29th, 2018 by admin

Two CCTV security cameras on a pole with a blue sky behind them

Cyberattacks are a major security concern for any business that uses the Internet. Even if your company doesn't have a website, hackers can go after your email address and business service accounts. Though they represent one of the more severe risks of...

Read Full Story »

Posted in: Security

Cybersecurity and C-Level Execs: Protecting Data While On the Go

March 26th, 2018 by admin

Silhouette of a businessman standing in front of window blinds in an office

While all employees need to be mindful of security, the nature of C-level executives makes them more attractive targets for hackers. That means it's necessary for them to take greater precautions. According to TechRepublic, C-level executives are more...

Read Full Story »

Posted in: Security

Managing Messaging Tools in Your Office

March 5th, 2018 by admin

Businessman's hand touching a virtual screen with a white email envelope icon on it

When used well, instant messaging tools can increase productivity while offering secure information exchange in your office. Messaging works in business environments because it's less involved than email, easy to queue and fast to respond. Several free...

Read Full Story »

Posted in: Solutions

Spectre and Meltdown: Valuable Lessons for Your IT Security Team

February 12th, 2018 by admin

White lock icon on a backdrop of code snippets

At the end of 2017, the world learned about Spectre and Meltdown: two far-reaching security threats that exploit how CPUs work to expose protected information on nearly every recent PC, server and smartphone. Hackers can use these exploits to do things...

Read Full Story »

Posted in: Security

HTTPS: Securely Sending Personal And Private Information

December 28th, 2017 by admin

Stylized graphic with a white lock, blue 1s and 0s in a sphere, and 2 computer monitors

Avoid costly data security breaches by training your staff to check for secure connections when handling private information on the Internet. Secure Hyper Text Transfer Protocol, or HTTPS, is a technology legal, healthcare, and financial businesses use...

Read Full Story »

Posted in: Security, Solutions

79% of Businesses Were Hacked in 2016. Was Yours One of Them?

June 27th, 2017 by admin

Stylized graphic of a computer monitor with a pane of glass shattering in front of the screen

Getting caught off-guard in a cyber security attack is a disaster for any business, large or small—and the frequency of attacks is only getting worse. According to the CyberEdge 2017 Cyberthreat Defense Report, hackers successfully compromised...

Read Full Story »

Posted in: Support, Security

Network-Attached Storage: Data Backup and Transfer Options for Small Businesses

March 9th, 2017 by admin

File upload icon in 5 colors: gray, green, red, blue, yellow

Network-Attached Storage (NAS) servers are a great asset for small businesses managing data. For the uninitiated, NAS is essentially a streamlined server designed specifically for sharing files between devices. Because of their simplified...

Read Full Story »

Posted in: Managed IT Services, Knowledge

The Benefits of Backups

November 16th, 2016 by admin

Three keys with circuit board graphics applied to them

Even seasoned IT pros have made the mistake of not backing up a device—and panicked after losing countless important files because the device failed. We may know better, yes, but that doesn’t mean we’re perfect. On the flip side, we’ve all...

Read Full Story »

Posted in: Backup, Managed IT Services

A Primer on Common, Helpful Device Adapters

November 11th, 2016 by admin

An iPhone 7 resting on a table top

In September 2016, Apple announced that the iPhone 7 will not feature a 3.5mm jack—meaning anyone who wants to use standard headphones (or the credit-card scanning Square Reader) will need an adapter. Only time will tell if removing the century-old...

Read Full Story »

Posted in: Solutions, Knowledge

Looking at Data Storage Longevity

August 2nd, 2016 by admin

Oblong view of a depiction of the internal workings of a mechanical hard drive

Not all storage devices were built to stand the test of time, so it’s important for every business to ensure its data is backed up on a reliable platform. If you’ve ever needed to reference financial records or court cases from a decade ago, you’ll...

Read Full Story »

Posted in: Data, Support, Solutions

The “Seven Deadly Sins” of Ransomware

June 29th, 2016 by admin

Large, shiny red '7' in a blocky format

Readers of our blog over the past few years know we were among the first in the Bay Area to warn our customers about the growing threats of ransomware—from the emergence of CryptoLocker and CryptoWall to our federal government's startling admission...

Read Full Story »

Posted in: Support, Security, Knowledge

Where's Your Company's WISP? Why You Need One NOW

June 14th, 2016 by admin

Businessman reviewing 3 papers while poised to write on one with a fancy pen

A WISP is one of the most important documents for any company doing business over the Internet—which, in this day and age, is pretty much everybody. Who's responsible for drafting and maintaining your company's WISP? Or are you even sure what a WISP...

Read Full Story »

Posted in: Security, Knowledge

Data Sanitization: Are You Erasing Your Old PCs COMPLETELY?

June 7th, 2016 by admin

Sepia-tinted close up of an eraser on the back of a pencil

One of our pet peeves with some of our new customers is that once we come in to upgrade their IT network, they're careless about disposing their old hardware—specifically, their PC hard drives. They think that by simply deleting their existing files—email,...

Read Full Story »

Posted in: Data, Managed IT Services, Knowledge

Data Breaches: Dark Times in the Golden State?

June 1st, 2016 by admin

Four brightly colored locks intertwined together in a square shape

Being the cyber-security geeks we are, we took great interest in combing through this year's California Data Breach Report, released by the Attorney General's office this past February. The report tabulates data collected from breach incidents which...

Read Full Story »

Posted in: Data, Security