Dave Ramsey 1 Day EntreLeadership Streaming Event

Dave Ramsey 1 Day EntreLeadership Streaming Event

This event, hosted by Radcliff CPA, a Dave Ramsey Endorsed Local Provider, covers Ramsey’s playbook for creating work that matters; building a group of passionate, empowered team members; and winning the race with steady momentum that will roll over any obstacle.

20 bucks with lunch (it’s $49 at the Ramsey site with just a virtual sandwich).

Learn more and register here. Seriously, just do it.

Registration Closes October 20th. Can’t promise Dave will have a red beans and rice recipe, but here’s one.

Kirkham.IT is a proud sponsor.

Managed Malware Protection: Partnering with Strongarm

Managed Malware Protection: Partnering with Strongarm

Managed malware protection is part of our relentless commitment to protect our clients with state-of-the art services as your Managed Service Provider.

Wrapping proactive IT security around your business with Strongarm.

With the right technology, anything is possible. Without getting too deep into technology, here are some of the things that will be happening to protect you, your business and your employees and users.

  • managed malware protectionThe attackers are being watched. Whatever the attackers, they are being watched as they set themselves upon the internet. Be it phishing sites, hacking websites and adding exploits, or malware command and control, Strongarm is constantly watching. By aggregating data from technology partners and open sources and curating a set of their own data, Strongarm gets ahead of the attackers.
  • managed malware protectionBy monitoring outbound DNS requests and correlating this against aggregated intelligence, Strongarm stops your company’s systems from talking to malicious infrastructure. When a connection to a bad domain is identified trying to leave your network, the DNS resolver returns Strongarm’s blackhole address instead of the attacker’s. The victim system communicates with Strongarm instead of the attacker, effectively disarming the attack.
  • managed malware protectionStrongarm speaks to your users…and malware.  If your user clicks on a phishing link, they receive a shot of user education right where they would have been phished! This is a real win, as there’s nothing for you to do to respond. In the case of malware or ransomware, this doesn’t just block an infection and drop the connection. Strongarm “speaks malware,” meaning they can interrogate the infected host to gather valuable information, such as who the victims (machines) were and whether there is a “poison pill” to destroy it. This is what makes this managed malware protection different from all other DNS providers and security solutions: Turning the attack against itself to protect your business.
  • managed malware protectionStrongarm’s got your back.  When an attack is stopped, the work has just begun. As soon as an attack has been stopped, Strongarm begins triaging what’s happened. Using the their discussion feature, Strongarm will tell you what kind of an attack has happened, what the attacker’s goal was, and recommend how you can respond.Sometimes it’s simply having a conversation with a user. Sometimes it’s cleaning malware off of a workstation. Sometimes it’s verifying your systems are patched against the attack we stopped. Working together, we’ll keep your users safe.
  • managed malware protectionWhy DNS-Based Security Works. By watching DNS requests and not focusing on the network traffic, Strongarm is not blind to encrypted traffic, peer-peer traffic, and other tactics that hackers use to get past firewalls and antivirus. One of the benefits of Managed Service Provider care through Kirkham.IT is that we’re going to help find those nasty little bugs and other creatures and keep them picked out.

Managed malware protection and your Managed  Service Provider.

Kirkham.IT is a Managed Service Provider (MSP) providing services that remotely manage and provides IT infrastructure for their clients, tailored to reach each client’s objectives.

Meet Avatara, Our New Premier Cloud Provider

Kirkham.IT is proud to introduce our premier cloud service provider, Avatara Cloud.

This is a “pure-play” cloud solution that moves your entire network to the cloud for better security, reliability. and mobility. On the technical side, the solution is practically limitless, including the ability to use CAD in the cloud. Here is an overview video:

Your entire workforce becomes mobile, with the ability to work anywhere, anytime, on any device. Home, job site, office, ballpark – anywhere there is an internet connection and some sort of device to connect with, your business is at your fingertips. Here is a demo of the mobility:

Disaster recovery and backups are easy with Complete Cloud

Put an end to continuous desktop, server and other capital expenses.


Upcoming Webinar: CAD in the Cloud

Join us for our upcoming webinar with Avatara, our premier cloud provider, as we discuss how CAD works in the cloud as the perfect solution for engineers, architects and others who need the ultimate in mobility without sacrificing performance.

December 5, 2017
10:00 am Central Daylight Time

Here’s where you can sign up to join us for our upcoming webinar!

IT Business Continuity: Are you prepared for reality?

IT Business Continuity: Are you prepared for reality?

Business continuity the morning after the storm was a secondary concern to the owner being interviewed by the TV news crew.  ”This is a building…I don’t care so much. Nobody got hurt…” The havoc wreacked by this perfect storm, the worst case scenario, was devastating. The building was nearly destroyed. Employees and their families were shaken, but safe. Are you prepared for the reality associated with a disruptive event?

IT Business continuity begins before the perfect storm.

Now what? The sun is up and you don’t have many options. It’s got to be business as usual. Clients, customers, consumers and employees look to you for stability and security. Whether your business relates to finances, health, legal issues or other confidential and critical matters, business continuity planning allows your business to maintain or quickly resume  mission-critical functions following a disaster.

How have you protected your business?

Business continuity is no small matter. In fiscal 2015, the U.S. Small Business Administration provided 46,000 businesses and individuals with $2.8 billion in disaster loans.

business continuity, disaster recoveryNearly every business, whether to satisfy insurance requirements or regulations under which they function, has conducted a business impact analysis to predict the consequences of disruption of business. Protecting your business against disaster disruption, loss of IT data and the loss of business continuity, is a solid, proven business investment. The consequences of choosing not to make this investment could become a staggering cost to your own business; as well as to your clients’ and to their own customers’ businesses and lives. 

Backup Management is the basis of business continuity.

Business continuity  operates through your overall Backup Management Plan before, during and after an event wherein a proactive plan goes into action to avoid and mitigate risks associated with a disruptive event. What have you done to help your business get back into action after a disruptive event?

  • Data backup: Have you integrated your operating system, data and applications into virtual servers that allow your business to become completely site and device independent? Are you sure your computers keep running safely in redundant data centers?
  • Unlimited support: Have you provided your employees with 24/7 support anywhere, any time on any device so they can resume work and stay productive immediately after a disruptive event?
  • Security management: Do you have a strategic security plan that allows you and your employees the ability to authenticate their identity, manage passwords and access all software applications, systems and data anywhere, any time on any device?
  • IT infrastructure: Have you prepared for the total physical loss of every computer, server and other piece of IT equipment residing within the physical structures of your business? How will your data, your work and your computers be accessible?
  • Total mobility: Is everybody able to work off-site with an internet-enabled device, such as a laptop, smartphone or tablet. Can they connect with one another and clients from home or temporary offices?

Disaster Recovery on a personal level.

Business is about more than IT. It’s about people. After a natural disaster, you and your employees, along with your clients and customers, are facing personal recovery, too. Here are some ways you can help your employees manage their work and personal challenges:

  • Keep in contact: Once the weather or the threat has passed, the first thing you should do is attempt to contact your employees. If you can’t reach people right away, don’t jump to conclusions. They may not have phone service or may be attending to more urgent matters. Wait a reasonable amount of time before taking further action or contacting the authorities.
  • Allow your employees to work remotely: From downed power lines to icy roads, it may be too dangerous for your employees to return to the office. Be careful not to forget about these employees. Check in with them regularly to stay-up-to-date on their situation and see if there is anything you can do to help them get back to work.
  • Be flexible: In the weeks or even months following a natural disaster, your employees will likely be doing a lot of clean up and damage control at their homes. Be flexible about work hours and dress code. Allowing employees flexible work hours to take care of personal issues can help reduce their stress, so they can be more focused and productive.
  • Pay your employees: Requirements for paying employees depend on whether they’re exempt or non-exempt. Refer to Fair Labor Standards Act (FLSA) and be sure your policy is documented in the employee handbook.
  • Set up an employee assistance program (EAP): Sometimes the most difficult part of recovering from a disaster is finding help. An EAP is a third-party organization that contracts with your company and provides a variety of support programs for employees. Normally, EAPs are in place to help employees with work-related difficulties, but it can also help employees with personal struggles.

How does your business compare?

  • A Business Continuity Plan (BVP): A definition of potential risks, determining how those risks will affect operations, implementing safeguards and procedures designed to mitigate those risks, testing those procedures to ensure they work, and periodically reviewing the process to make sure that it is up to date. Investopedia
  • Disaster Recovery Plan: A documented process of procedures to recover and protect a business IT infrastructure in the event of a disaster and is increasingly associated with the recovery of information technology data, assets and facilities. Wikipedia

Your Managed Service Provider.

Kirkham.IT is a Managed Service Provider (MSP) providing specifically defined services that remotely manage and assumes responsibility for providing IT infrastructure and/or end user systems for their clients. Kirkham.IT proactively determines the services needed to meet client-specific goals, and provides these services and infrastructure under a subscription business model.

What is Total Cloud Solutions?

Want to receive our Newsletter? Let us know and we’ll add you to our mailing list.

Meet Duo, Our Latest Security Partner

Meet Duo, Our Latest Security Partner

Kirkham.IT has partnered with Duo Security to provide Multi Factor Authentication (MFA) to desktops and remote access users. Security as well as ease-of-use are very important in our evaluations, and after considering offerings from multiple vendors, we selected Duo.

Easy and Fast

Duo’s Push MFA is easy to use and fast:

The video is not exaggerating – it really is that fast.

Duo is fast, easy to use, and affordable. It is simply the best way to secure your devices.

Duo’s corporate values also clearly align with Kirkham.IT. And that is important to us.

Duo Use Cases and Compliance Information

How to Change IT Providers Without Causing a Scene

How to Change IT Providers Without Causing a Scene

Often, companies only switch providers when the situation has already gotten hairy. Concerns aren’t being addressed and expenses are high. There’s no need to wait for an IT disaster before making the transition to a new provider, especially if your current one is less than ideal.

But these tech-savvy geniuses have all of the company credentials and you’re not sure how to break it to them that you’re moving on. You can skip the flowers and candy. The process is easier than you might think.

Below is the nitty-gritty on migrating IT providers so that you can avoid the awkwardness and get back to optimal company efficiency.

Ask to see a comprehensive onboarding process.

You’re already experiencing recurring issues that disrupt your day-to-day business operations with your existing provider, whether it’s failed backups, frequent server crashes or something else entirely, so you don’t need any more headaches. An onboarding plan that lays out exactly how the new provider will bring in your account quickly and easily is required for a smooth transition. These onboarding plans should be old hat to the company you choose.

Have the new provider do the heavy lifting.

Experienced managed service providers know how to make the onboarding process seamless for everyone involved. Once credentials and documentation are provided, services should be up and running with minimal downtime and without exposing critical company data.

Make sure the cost of the new provider matches the benefits you will receive.

Increased response time is an essential element to selecting a new IT company. If an error occurs, you need to know your company will be protected and able to get back to business as soon as possible. Ask the provider to send relevant testimonials or a similar client’s contact info to make sure the claims made are accurate.

Receive an IT infrastructure that facilitates company innovations and growth.

Your IT partner needs to prioritize the issues that are crucial to your particular business operations. The provider should have a solid understanding of your environment, policies, procedures, employee and vendor networks, support agreements, documentation and more. Customized solutions are the best solutions.

With the right partner, you’ll find that change isn’t nearly as bad or scary as your current IT pains. Increased efficiency, decreased risk and a relationship that makes you feel comfortable is all worth the adjustment. IT support and custom security from an experienced managed service provider will protect your business, your clients and your employees with an ideal response time and your business goals in mind.

Kirkham Systems handles transitions quickly, easily and respectfully. Finally, discover reliable and responsive IT support with an onboarding process that is painless. Kirkham has you covered with business continuity, preventative maintenance, security, backups, and a great help desk. Browse our Managed IT Services to see if we’d be a good fit or contact us so we can help you make the switch.

To learn more about selecting an IT service provider, check this out: