PG&E Public Safety Power Shutoff is scheduled for Wednesday, October 9th at 4 AM for much of Northern California. For planning purposes, PG&E suggests customers prepare for outages that could last several days. Please take appropriate actions to ensure the safety of your systems if you are in a targeted shutdown area. See if your area is affected here...

Blog Articles from ATS Communciations

Reasons to Use Multi-Factor Authentication

February 22nd, 2023 by admin

Photo of a multi-factor authentication request on screen

Multi-factor authentication (MFA) is an extra layer of security used to ensure that only authorized individuals can access a system or application. This type of security requires users to provide more than one form of authentication,...

Read Full Story »

Posted in: Managed IT Services

The Importance of Cyber Security Awareness Training

February 10th, 2023 by admin

A person using an e-learning platform to learn new skills and gain knowledge

Cyber security awareness training is a program designed to educate employees about the risks of cyber-attacks and other digital threats, the importance of establishing secure online practices, and how to respond if they become victims of an attack....

Read Full Story »

Posted in: Services

Leveraging Powerful Artificial Intelligence Anti-Phishing Technology to Keep Email Inboxes Safe

January 24th, 2023 by admin

A login form on a business card with a fishing hook in it. Phishing concept.

Leading MTSP Shares Why Email Is an Easy Way to Destroy A Company's Network CONCORD, CA - ATS Communications, a leading managed technology services provider (MTSP), recently announced that they are protecting small to mid-sized businesses (SMBs) with...

Read Full Story »

Posted in: Press Releases

Why Dark Web Scanning Is Important

January 24th, 2023 by admin

A hacker wearing a gray sweatshirt using a laptop

Dark web scanning is the process of actively seeking out publicly available data related to an organization, its employees, customers, vendors, or partners on the dark web. This process looks for indicators that could be used by malicious actors to...

Read Full Story »

Posted in: Managed IT Services

The Benefits of Antivirus and Email Filtering

December 16th, 2022 by admin

A fish hook in a credit card. Phishing concept.

Antivirus and email filtering are important tools in keeping your computer safe from malicious activity. By regularly performing security scans and monitoring incoming emails, these programs can help protect you from online threats such as viruses,...

Read Full Story »

Posted in: Security

Educating Customers on the Importance of Cybersecurity Insurance

September 21st, 2022 by admin

A blue lock with a human hand pointing at the lock

Leading MTSP Shares How to Protect Businesses from Cybercrime CONCORD, CA - ATS Communications, a leading managed technology services provider (MTSP), is educating small to mid-sized business (SMB) owners on how they can protect their organizations...

Read Full Story »

Posted in: Press Releases

How Can Desktop Management Benefit Your Business?

March 31st, 2022 by admin

Close up of business man's hand using tablet with digital code design overlay.

Businesses across industries invest a lot of time and put in hard work to ensure their network's health and performance. After all, if something goes wrong with the system, the productivity of your business is likely to suffer. But with...

Read Full Story »

Posted in: Services

ATS, High-End Innovative IT Services for Bay Area Businesses

April 1st, 2021 by admin

A man in suit reaching out and touching a connected network of icons while holding a tablet in the other hand

For more than 40 years, ATS has provided innovative technology to California businesses. We pride ourselves on our reputation of designing, implementing, and proactively supporting solutions for clients. Our technology solutions provide companies...

Read Full Story »

Posted in: Cloud, Services, Solutions

Helping Businesses Shift from Survival Mode to Strategic Growth Mode in 2021

February 23rd, 2021 by admin

A man in a dress shirt and tie with the sleeves rolled up point his finger down towards a tablet he is holding as numbers along with white and blue block fill the foreground around him

Leading Managed Technology Services Provider Educates Businesses on Dramatic Increase in Cybercrime Directed at Small-Business Owners and How to Prevent It CONCORD, CA - ATS Communications, a leading managed technology services provider (MTSP),...

Read Full Story »

Posted in: Managed IT Services, Press Releases

How Moving to a Private Data Center Cloud Solution Benefits Your Business

January 20th, 2021 by admin

A graphic showing three blue computers connected to a blue cloud, with three sets of three reds computers connected to each other off to the side

Many businesses have found themselves making the switch to the cloud, and when you look at everything it offers it's not hard to see why. They give a wealth of benefits that most would be hard-pressed to ignore, such as improved security...

Read Full Story »

Posted in: Managed IT Services

Protecting SMBs from Exponential Growth in Cybercrime

January 13th, 2021 by admin

A shield blocking red skulls representing cybersecurity

Leading Managed Technology Services Provider Educates Businesses on Dramatic Increase in Cybercrime Directed at Small-Business Owners and How to Prevent It CONCORD, CA - ATS Communications, a leading managed technology services provider (MTSP),...

Read Full Story »

Posted in: Press Releases, Solutions

How to Improve Your Remote Workforce's Security and Efficiency

December 31st, 2020 by admin

A man working from home at his desk talking on his smartphone

Many companies have made the switch to remote working this year due to the pandemic, doing their best to adapt to changing work culture. However, the struggle doesn't end with just establishing your remote operations. Now that you've reacted, it's...

Read Full Story »

Posted in: Cloud, Services, Security, Solutions

How to Ensure Your Remote Workforce Is Successful in the New Environment

July 23rd, 2020 by admin

A bearded man working from home using his laptop

Companies made the switch to remote work to keep employees safe from COVID-19, and with the pandemic still affecting businesses, long-term remote work appears to be the solution. Ensuring your employees have the tools and infrastructure to be successful...

Read Full Story »

Posted in: Services, Solutions

ATS Communications Provides Cybersecurity for a Remote Workforce

June 9th, 2020 by admin

A businessman working remotely in his home office

With businesses moving to a remote workforce, they face different challenges that they didn't deal with before. One of those challenges is how to keep your network secure while operating under a remote model. Here are some recommendations to ensure...

Read Full Story »

Posted in: Services, Security, Solutions

Why Are Businesses Migrating to the Cloud?

February 27th, 2020 by admin

Man in a suit extending out his hand, with a glowing blue cloud representation floating above his palm

With each passing year progressively, more businesses are switching over to the Cloud. Yet there are still companies that haven't made the leap or taken advantage of this innovative technology. Many business owners are still hesitant to shift...

Read Full Story »

Posted in: Cloud, Solutions

ATS Protects Your Network From Security Threats

January 16th, 2020 by admin

Blue shield with keyhole providing protection from cybersecurity

Protecting your data networks is one of the most important things your company can do. At ATS, our experience and expertise enable us to bring the most innovative cybersecurity solutions to the table. There are numerous types of cyberattacks,...

Read Full Story »

Posted in: Services, Security

IP Surveillance to Protect Your Business and Employees

January 9th, 2020 by admin

Silver Security Camera with a red light

Network security is a hot topic nowadays, and rightfully so. Protecting your data networks from hackers is one of the most important things your business needs to do. But, has your company taken the necessary steps to protect its physical location,...

Read Full Story »

Posted in: Security, Solutions

The Cybersecurity Workforce Gap and How It's Affecting Businesses

November 21st, 2019 by admin

eyes on a blue background with technology concepts

As cyber-attacks continue to intensify, businesses are having a hard time finding skilled cybersecurity workers to protect their operations. The cybersecurity industry has taken a significant hit with the labor shortage causing many companies to fall...

Read Full Story »

Posted in: Managed IT Services, Support, Services, Security, Solutions

Secure WiFi-as-a-Service Protects Customers from Cyber Attacks

October 2nd, 2019 by admin

Yellow lock on a blue background with technology concepts

Concord, CA – Announcing the launch of a Secure WiFi-as-a-Service program to protect our customers from cyber attacks through wireless access points. Over the past few years, the prevalence of cyber attacks has continued to grow, expanding...

Read Full Story »

Posted in: Press Releases

Alerting Businesses About Robocall Scams

August 3rd, 2019 by admin

Finger touching business phone

CONCORD, CA – We are proud to announce that we are alerting small to midsized businesses (SMBs) about the prevalence of robocall scams and how any organization can best handle these calls to ensure that all sensitive company information...

Read Full Story »

Posted in: Press Releases

The Importance of Understanding Your Cyber Security Risk Tolerance and Exposure

July 14th, 2019 by admin

Hooded figure in black with technical code

It is common for companies to underestimate their security risks and think that specific attacks could never happen to their business until it happens. While it is always essential to stay prepared no matter the likelihood of an attack,...

Read Full Story »

Posted in: Security, Solutions

Types of Phishing Attacks: Whaling, Deceptive, Pharming

May 25th, 2019 by admin

Discrete hacker looking for vulnerable code

Phishing attacks occur when communication that appears to be reputable is fraudulent. These sorts of scams are made to extract personal and sensitive information from victims such as social security numbers, addresses, bank information, and more. People...

Read Full Story »

Posted in: Security

The Importance of Cyber Security

May 9th, 2019 by admin

Password and data security lock

Throughout 2018 data breaches were a typical story from corporations of every size. The stories either tell of a breach that happened during the year or they're about ones that occurred years ago. Those common press releases about how their client's...

Read Full Story »

Posted in: Services, Security

Educating SMBs on Surveillance & Security Breakthrough

April 15th, 2019 by admin

A cylindrical modern security camera.

CONCORD, CA – We are helping small to mid-sized businesses (SMBs) to take advantage of dramatically increased capabilities in surveillance cameras. As security, both online and offline, has become a growing concern for many small business owners,...

Read Full Story »

Posted in: Press Releases

Offering Next Generation Cybersecurity Solutions

February 5th, 2019 by admin

Close up on an eye with technology images

CONCORD, CA – We are proud to announce a new solution to help small to midsized businesses (SMBs) equip themselves with the necessary cybersecurity protections that every modern company needs to survive. In the past, large organizations...

Read Full Story »

Posted in: Press Releases

ATS Knows Security

January 29th, 2019 by admin

Lock

Your business needs a dependable and robust cybersecurity solution, plain and simple. As technology continues to advance and new threats are coming to the forefront, it is essential to have the proper security and management behind you to ensure...

Read Full Story »

Posted in: Security

Identifying the Top 4 Network Security Risks

November 15th, 2018 by admin

Shadowy Figure Overlaid with Digital Code on Dark Background

Security for your business is crucial. Everyone knows that, but settling for any old security system won't give you the protection you need against modern-day cybercriminals stealing sensitive data and monitoring operations. ATS offers great network...

Read Full Story »

Posted in: Security

Take the Guesswork Out of Email Filtering!

July 5th, 2018 by admin

Chains on a keyboard

Did you know email can be a huge security risk for your businesses? Careless or unaware employees can click on malicious emails, opening up your network to security issues and downtime while it is being repaired. ATS offers easy and affordable anti-virus...

Read Full Story »

Posted in: Services

3 Steps to Getting Your Business BYOD Ready

July 3rd, 2018 by admin

If your business is considering a Bring Your Own Device environment, there's a great deal of security preparation work to do beforehand. A successful BYOD strategy and BYOD policy is all about finding the sweet spot of control, where your business is...

Read Full Story »

Posted in: Solutions

Making the Switch to BYOD? Pros, Cons and Security Implications to Consider First

June 26th, 2018 by admin

Sleek, slim laptop on a gray business desk

Making the switch to a Bring Your Own Device (BYOD) business environment extends well beyond the decision to let employees choose their devices. Your business should look at the pros and cons of the concept before deciding how to approach it and to what...

Read Full Story »

Posted in: Support

Key Strategies to Boost IT Security in the Workplace

June 20th, 2018 by admin

Businesses have more to worry about than ever when it comes to dealing with new forms of cyber-attacks. The shift to a BYOD workplace adds even more challenges to protecting your digital assets. While hardware and software solutions continue to improve...

Read Full Story »

Posted in: Support, Security

Datto Drive, Business-Class File Sync and Share (FSS) Solution

June 10th, 2018 by admin

Cloud Security

As a business with a highly mobile workforce, you need File Sync and Share (FSS) solutions that are not going to leave your important business data exposed. With people being more and more on the move and often switching between devices, from desktop...

Read Full Story »

Posted in: Solutions

7 Ways to Keep Work Secure on Employee Personal Devices

May 14th, 2018 by admin

Blond-haired business man looking at mobile phone while leaning against a window

Technology improvements have made it easy for employees to get work done on their personal devices from anywhere. However, that freedom comes with additional security risks and requires extra diligence to keep data secure. Safeguarding information is...

Read Full Story »

Posted in: Security

5 Email Disasters: How a Service Like ATS Can Prevent Catastrophe

May 3rd, 2018 by admin

Dense, color-coded code in depth-of-field blur

Often, businesses don't prepare for email disasters until after one has hit. But while email may comprise just a small part of a company's day-to-day operation, an email disaster can have a staggering impact on your business. The 2016 Democratic National...

Read Full Story »

Posted in: Security, Solutions

Cybersecurity and C-Level Execs: Protecting Data While On the Go

March 26th, 2018 by admin

Silhouette of a businessman standing in front of window blinds in an office

While all employees need to be mindful of security, the nature of C-level executives makes them more attractive targets for hackers. That means it's necessary for them to take greater precautions. According to TechRepublic, C-level executives are more...

Read Full Story »

Posted in: Security

IP-Based Surveillance with Avigilon Control Center

March 19th, 2018 by admin

Toshiba and Mitel

As a business owner, ATS knows that your number one priority is the safety and security of your employees and assets. Whether you want to ensure that you’re covered in case of theft, vandalism or other crime or you just want the freedom to check...

Read Full Story »

Posted in: Solutions

The Mirai Botnet Returns — and Why You Should be Concerned

March 13th, 2018 by admin

Stylized stream of meta data against a dark background

The Mirai botnet refers to a massive-scale network of Linux-running Internet of Things devices turned into remote-controlled bots through a malware infection. Hackers can use the network to run a distributed denial of service, or DDoS, by having the infected...

Read Full Story »

Posted in: Security

Spectre and Meltdown: Valuable Lessons for Your IT Security Team

February 12th, 2018 by admin

White lock icon on a backdrop of code snippets

At the end of 2017, the world learned about Spectre and Meltdown: two far-reaching security threats that exploit how CPUs work to expose protected information on nearly every recent PC, server and smartphone. Hackers can use these exploits to do things...

Read Full Story »

Posted in: Security

5 Specific IT Considerations for Remote Employees

February 5th, 2018 by admin

White-bloused businesswoman using a slim laptop on a birch colored desk

Businesses have a lot to gain by hiring remote employees, including the ability to recruit from a larger talent pool and the potential for less expensive workplace accommodations. However, remote employees introduce new challenges in IT security because...

Read Full Story »

Posted in: Solutions

Does Fintech Pose a Threat to Cybersecurity at Financial Services Companies?

January 29th, 2018 by admin

Sample portfolio summary being displayed on an iPad

Financial services companies should embrace a healthy dose of caution when implementing new fintech in their business. Fintech, or any technological innovation in the financial sector, is not inherently more or less secure than any other new technology,...

Read Full Story »

Posted in: Security

Four Security Threats Your Company Could Face in 2018

January 16th, 2018 by admin

Close up view of network Ethernet cables plugged into ports on a switch/router

Hot off the tail of the massive 2017 Equifax breach that exposed personal information of 143 million customers, businesses are on high alert concerning IT security in 2018. While the IT security industry has been successful in mitigating and cracking...

Read Full Story »

Posted in: Security

HTTPS: Securely Sending Personal And Private Information

December 28th, 2017 by admin

Stylized graphic with a white lock, blue 1s and 0s in a sphere, and 2 computer monitors

Avoid costly data security breaches by training your staff to check for secure connections when handling private information on the Internet. Secure Hyper Text Transfer Protocol, or HTTPS, is a technology legal, healthcare, and financial businesses use...

Read Full Story »

Posted in: Security, Solutions

New Phishing Technique Hijacks Legitimate Conversations

October 24th, 2017 by admin

Hand holding up a clip-art style yellow lock, against a blue field of 1s and 0s

A new spear phishing technique, being used in a hacking campaign called FreeMilk, takes advantage of a Microsoft Office vulnerability in order to hijack existing email conversations to spread malware to high-profile targets. This new technique phishing...

Read Full Story »

Posted in: Security

Equifax Breach: What does it teach us about IT security?

October 3rd, 2017 by admin

Highly zoomed icon of a hand-shaped cursor clicking on a link labeled 'Security'

The 2017 Equifax hack is teaching a painful lesson about the necessity of businesses keeping up with software patches for IT security and to avoid catastrophic damage. The hack, which resulted in potentially exposing the financial information necessary...

Read Full Story »

Posted in: Security

Is Your Office Router Secure?

July 25th, 2017 by admin

Netgear ProSafe GS108T router with 4 Ethernet cables plugged into it

In June 2017, WikiLeaks released secret documents that exposed the tools the CIA uses to infiltrate public and private networks through routers. These documents have shined a light on how easy it is for someone to hack a router. This begs the question,...

Read Full Story »

Posted in: Managed IT Services, Security

Flaws in 2-Factor Authentication Methods Could Leave You Vulnerable

July 11th, 2017 by admin

Close up of a businessman holding a Microsoft smartphone in his hands

If your business is using 2-factor authentication or 2FA, methods to secure your important accounts, you may need to investigate better ways to implement the practice. Security experts widely recommend using 2FA, a system which utilizes a second security...

Read Full Story »

Posted in: Security, Knowledge

79% of Businesses Were Hacked in 2016. Was Yours One of Them?

June 27th, 2017 by admin

Stylized graphic of a computer monitor with a pane of glass shattering in front of the screen

Getting caught off-guard in a cyber security attack is a disaster for any business, large or small—and the frequency of attacks is only getting worse. According to the CyberEdge 2017 Cyberthreat Defense Report, hackers successfully compromised...

Read Full Story »

Posted in: Support, Security

Intranets and Small-To-Medium Business Productivity

June 13th, 2017 by admin

Finger touching an array of icons laid out on a pale blue background

Many small-to-medium businesses (SMBs) have taken to hosting their own intranet to increase productivity in the workplace. For those unfamiliar with the term, "intranet" is not a typo, but rather an internal network that behaves like a private Internet....

Read Full Story »

Posted in: Solutions

Android and IOS: Is the Device Just Old, or Is It Obsolete?

May 23rd, 2017 by admin

Relief drawing of a pocket watch with roman numerals I through XII

When trying to determine if a piece of technology is simply old or completely obsolete, keep in mind that there are different criteria for Android and iOS devices than for desktop and laptop computers. An employee stuck using an obsolete device is likely,...

Read Full Story »

Posted in: Support, Solutions

Scheduling Security: Take Control of Your OS Updates

May 10th, 2017 by admin

The word 'update' written in chalk on a blackboard, with a red analog clock between the 'p' and 'd' letters

It happens to everyone: You turn your computer back on after you intended to leave the office, or come in early to get a head start on a new project, only to be greeted by a 20-minute operating system (OS) update session. This common workplace frustration...

Read Full Story »

Posted in: Solutions

Top 5 Security Tips for Email and Social Media Accounts

April 26th, 2017 by admin

White email envelope icon with several red, pink, and gray circles behind it

Email and social media accounts provide a wealth of cyber security challenges for businesses. Hackers often look for exploits in account operations to steal information and seize control—both of which can be extremely damaging and difficult to combat....

Read Full Story »

Posted in: Security

The Battle for Cyber Security

March 27th, 2017 by admin

Cyber Security

We’ve been noticing an alarming trend regarding cyber security. Actually, more so a lack of security. One of the best practices on the frontline of security is your password. Unfortunately, this is an area that a lot of people will gloss over, often relying...

Read Full Story »

Posted in: Services, Security

Network-Attached Storage: Data Backup and Transfer Options for Small Businesses

March 9th, 2017 by admin

File upload icon in 5 colors: gray, green, red, blue, yellow

Network-Attached Storage (NAS) servers are a great asset for small businesses managing data. For the uninitiated, NAS is essentially a streamlined server designed specifically for sharing files between devices. Because of their simplified...

Read Full Story »

Posted in: Managed IT Services, Knowledge

Video Surveillance

July 15th, 2015 by admin

While video surveillance does help to protect your business from crime, that is not all it does. It also... Protects your staff in case of customer disputes Enforces safe work conditions allows you to see whether procedures and protocols are being...

Read Full Story »

Posted in: Security

How a Managed Service Provider Can Increase ROI and Influence Long-Term Business Success

September 30th, 2013 by admin

Two puzzle pieces being drawn in the air, one saying 'partner' and the other 'ship'

Partnering with a Managed Service Provider (MSP) is one of the most important decisions you can make to ensure the longevity and productivity of your SMB. Why? An experienced MSP is a true business partner, reduces and streamlines IT costs, and takes...

Read Full Story »

Posted in: Managed IT Services