My Place Hotel Phone System – Twin Falls, ID

During the construction of the new My Place Hotel in Twin Falls, Idaho - management came to Tech Strategies for a proposal for a phone system for their guest rooms and hotel staff (like the front desk, management, etc.). TSI took on the challenge and provided a proposal that came in well below competing products using the 3CX phone system and Fanvil IP Phones. TSI is very familiar with the 3CX phone system and has worked with it in a variety of installations for larger offices where our hosted...

Preventing Ransomware

Ransomeware is one of the most concerning types of malware/virus attacks we see.  As a business owner, manager or employee it's important that you be aware of how to prevent a Ransomware attack and have a plan in the event you do get hit with one. The No More Ransom organization recommends the following to prevent a ransomware attack.  After reviewing the recommendations below get in touch with us for help with recommendations #1 and #2. How to prevent a ransomware attack? Back-up! Back-up!...

Secure Your Windows Machine By Using Standard User Accounts

A new report has confirmed what security experts have suspected for a long time: Users who have not removed administrative rights from their Windows users accounts are at risk of getting critical malware attacks. Ninety-two percent of all security vulnerabilities reported as severe by Microsoft could have been avoided if user accounts didn't have Admin Rights. That's according to Avecto, an enterprise-security company based in Manchester, England. Avecto further said that users who failed...

Cloud vs On-site: The Pros and Cons

Are you tired of hearing the word cloud and everything related to it? If so, you should know that this word isn’t going away. In fact, it is a relevant strategy for numerous IT departments. Recently, the idea of hosting computing resources off-site, such as in a provider’s data center, has gained plenty of traction. In spite of this, there are IT departments that still struggle with whether they should continue with the traditional on-site servers or adopt cloud computing technologies. ​ There...

Announcing the Merger of Millennium IT With Tech Strategies

We’re excited to announce the merger of Millennium IT Services with Tech Strategies, Inc., effective immediately. What does this mean for you and your business…? Overall, you should not see a change - most everything will stay the same. Millennium IT and Tech Strategies have had a long business relationship and have worked together over for the last four years. You may have worked with the CEO of Tech Strategies in the past, Joel Eskelsen. If you have not, you should know that his knowledge and...

How to Make ‘IT’ a Profit Center and Not Just a Cost Center

In the old days of doing business, a company’s profitability was based almost exclusively on their sales. Improving profitability meant reducing costs on everything, while still supporting sales. Of course, when companies realized IT and tech strategies were absolutely crucial to functioning, business owners accepted the fact they would have to live with the costs, but that didn’t mean they wouldn’t make every effort to keep them as low as possible. Wait, is this really just a memory? If you...
Reset your password!

When did you last reset your password?

Almost every site you use online requires the use of a password. While you might be able to read articles online without one, when you want to make a comment, it is becoming more and more likely that you will need to login to the site with a username and password. Anonymous-type comments are increasingly becoming a thing of the past. Liability issues and hate speech legislation are often behind the decisions made by webmasters who now require this when setting up comment sections for their websites. Because...

The Yahoo Data Breach is About More Than Just Your Yahoo Account.

In 2014, 500 million yahoo accounts were hacked into and information stolen. Unfortunately the breach wasn't reported until the fall of 2016, the company reported that a state sponsored reporter was one that was behind the attack. The information was vital and included, dates of birth, mobile numbers, names, and even email addresses.  Unfortunately more and more information is coming out still nearly 5 months after the announcement and over 2 years after the breach. At the start of August 2016,...

Don’t Let An Outdated Phone System Limit Your Business Growth

Businesses are always trying to move forward with new innovations, breakthrough products and strategic business plans to outpace and outmatch the competition. As such, it is vital that organizations upgrade their business communication platforms as soon as they can before it becomes a bottleneck. That age-old analog phone system you're still using may be holding back your business potential for massive growth with its limiting scale and exorbitant telecom costs. When coming up with a solid business...

A Look at Why Telecommuting is Crucial and How The Cloud Contributes to it

Just a few decades ago, telecommuting was virtually unheard of in business offices. After all, employees who worked from home not only couldn’t answer the business phone service, which was crucial before the internet, but they also had limited access to files, documents, etc. Now, fast forward to 2016, when more and more U.S. offices, particularly those that are considered highly successful, are opting to downsize and thin out how many people actually come to the office each day. The reason...

Get In Touch!

201 Canyon Crest Dr, Ste 100
Twin Falls, ID 83301

Phone: (208) 944-0031