Your IT Guy

Beware The Botnets!

on April 12, 2019 Comments Off on Beware The Botnets!

Have you ever heard of Botnets? It sounds a little like the name for some cute cartoon one might see on Cartoon Network, but it’s not.

What is Botnet? According to Wikipedia: ” A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection. “

Why do you need to know about Botnets? Because, your system could be a part of a Botnet. Those crafty Botnet builders slink around infecting multiple devices with their Botnet viruses, and then they use them.

I found out about Botnets from this post on the AVG Website. This is an excerpt from a post they wrote about online threats we should all be watching out for this year.

“2. Botnets

The one for megalomaniacs

Simply put, this is when a hacker creates nasty malware that enslaves thousands upon thousands of smart devices (your PC included) in order to get the processing power to do some greater evil. What you probably didn’t know: you might not even notice.

What does being part of a botnet do?

Make your PC run slower. Give you other types of malware. Make you feel ashamed: normally it comes with spyware or ransomware. But the wider picture: your PC could be unknowingly working to attack websites or networks, steal passwords, social security numbers, credit card details, addresses and phone numbers of innocent people around the world. Eeek.

Prepare yourself in 2019

In 2016, botnets made up 33% of all detected malware. In 2018, botnets made up 78%! Not surprising when you think about all the new IoT stuff we’re making every year. But here’s what you do: first, update your devices passwords and use anti-malware to regularly check for infections. Second, search for your IP address in a specific attack if you’re suspicious (here’s a page), and third, use a free network analysis tool such as Wireshark or Snort to monitor your Internet traffic for unusual activity.”

If you systems are running slower than usual, it may be time to have us come in and take a look. We can run some of the most effective software tools to check your servers and your network to make sure its free and clear of viruses.

Your Tech Guys

managed IT services vero beach, sebastian, ft pierce, port St Lucie West Pam beach, Palm bay, melbourne,Managed business IT services in Fort Pierce, Vero Beach, Sebastian
read more
Your IT GuyBeware The Botnets!

Let Unified Technology Solutions Help

on April 4, 2019 No comments

It’s your company. It has your name on the door and your reputation is on the line if things don’t go well. We understand that. But trying to do everything yourself just doesn’t always work. Let us help.

Here in America, we take pride in self reliance. It’s important that we be able to wear many hats and take care of things ourselves. But is that really the best way to do things? Is it the most effective way to run your business? Probably not.

You spend countless hours educating yourself and working with your staff on the things you need to know to be the best you can be in your area of business. How can you also devote the time and resources it would take to be an expert in Information Technology, software and hardware?

We at Unified Technology Solutions can take over that part of your business for you. It’ doesn’t mean that you should stop learning about new advances in technology, it just means that you can trust us to resolve your tech issues so that you can work on your business.

Servers, Cloud storage and back up, internet security, preventing malware attacks and recovering from hardware crashes, that’s what we do. We also have help desk services for when your people encounter a software or hardware problem. Some issues require us to be on site, but there are also issues we can solve by logging in remotely and diagnosing the problem right from our offices.

Give us a call at : 772.539.7667 to set up an appointment for us to come and learn more about your operation and you to learn more about our services.

Your Tech Guys

managed IT services vero beach, sebastian, ft pierce, port St Lucie West Pam beach, Palm bay, melbourne,Managed business IT services in Fort Pierce, Vero Beach, Sebastian
read more
Your IT GuyLet Unified Technology Solutions Help

VoIp Phone Systems and 5G

on March 28, 2019 No comments

Voice Over Internet Protocol is a fancy name for you don’t need a landline to have a sophisticated business phone system for your company. Back in the late 90’s and early 2000’s, VoIp was clunky and the echoing on phone calls was extremely annoying. Yes, it was cheaper than a landline, but for business use, not very good

All that has changed. VoIp phone systems are sophisticated, the ability to have conversations without the echo is encouraging, and the integration between wireless and office phone systems give employees all the flexibility to be out of the office on work related tasks, while still having the ability to respond to their phone calls.

In case you haven’t been paying attention, things are due to get even better. Wireless systems are being upgraded from 4G networks to 5G networks. Why do you care? Well, for one reason, that means communications and data handling ability are going to be more seamless. Everything will be faster when it comes to wireless, and because VoIp is internet base, that means VoIp communications will be even better.

This is what www.techadvisory.org has to say

Virtual and augmented reality

“With 5G network speeds, virtual and augmented reality will become more common for SMBs. 5G will blow past 4G’s Gbps (gigabits per second) limit, which is currently holding back the adoption of virtual reality (VR) and augmented reality (AR) applications.

VR and AR need to process significantly more data because of the visuals they must process as users move, and this puts an enormous strain on mobile networks. 5G is also set to ensure a better user experience by facilitating smoother connections and preventing network delays from affecting your bottom line.

Mobile VoIP

VoIP calls rely heavily on sufficient download and upload speeds. For example, when mobile VoIP users on 4G networks are limited to 12Mbps upload and 2Mbps download speeds, they experience unstable and poor call connectivity and clarity. These limitations could also lead to something called packet loss, which happens when one or more “packets” of data traveling across a computer network fail to reach their destination, typically caused by network congestion.”

Still not sure what all of this means for your company? Give us a call and we can meet and talk about your current phone system, what the advantages and cost savings could be for your company and how to make it all work for you.

Your Tech Guys

managed IT services vero beach, sebastian, ft pierce, port St Lucie West Pam beach, Palm bay, melbourne,Managed business IT services in Fort Pierce, Vero Beach, Sebastian
read more
Your IT GuyVoIp Phone Systems and 5G

Strong Passwords Are Important

on March 21, 2019 No comments

Want to keep your business safe from cyber breaches? When your employees are online, threats come in multiple forms. These include phishing, cross-site scripting, scams, malware and various other forms of hacking. Keeping employees safe online is the responsibility of everyone in the organization. At the highest level, however, it is the responsibility of management and people with the ultimate authority.

When it comes to keeping employees safe at the personal level, having an especially strong password policy can limit external threats. Hackers typically exploit employees’ use of weak or common passwords, using brute force to guess and crack passwords.  Who doesn’t remember the movie “Hackers”?  Employees had not listened to the IT support and had weak common passwords (I believe it was god) and that was how the hackers gained access.

These days, constructing a strong password will consist of condensing an entire sentence, at least 12 characters long, into one cohesive word. These sentences can be shortened or abbreviated, but the point is, single words just don’t cut it anymore.

If you’re using numbers, never use ones that are related to addresses, birthdays, and other searchable information as those details are easily accessible by hackers. Also as convenient as it may be, do not let your browser remember your password. This information is open to hackers, especially if your device is misplaced or stolen.


More importantly have different passwords for different accounts.  It is common for individuals to utilize the same password for multiple accounts, but even at a minimum, employees should have at least two separate passwords for personal and business accounts. 

A strong password policy makes it harder for hackers to crack passwords and breach your network. Passwords should be changed on a regular basis. In addition, you should invest in your workers’ education concerning threats and cyber security practices. Everyone in the organization needs to adhere to strong cybersecurity practices that protect the individual and the entire company network.

managed IT services vero beach, sebastian, ft pierce, port St Lucie West Pam beach, Palm bay, melbourne,Managed business IT services in Fort Pierce, Vero Beach, Sebastian
Your Tech Guys



read more
Your IT GuyStrong Passwords Are Important

I.T. Support and Your Company

on March 8, 2019 No comments

All too often, I.T. is treated like secondary concern by small business owners who’ve recently made it through the lean, DIY startup years. They might see IT support as an option rather than a necessity. But what happens when something goes wrong? What can you gain from technical support that you may not notice? Maybe the bigger question is, what can you expect to receive from your technical support service?


Issue Resolution – This goes without saying; after all, it is the bread and butter of technical support. More than likely, this is the main reason you use support. If you’re in a pinch, they are there to bail you out.  The peace of mind you get knowing that tech experts who already know your systems are available to get your systems back up and running quickly. Having someone knowledgeable to resolve tech issues to your people doing what you’re paying them to do. Instead of fiddling with a malfunctioning printer or some software issue for an hour or more “hoping” that something will start working as they stab in the dark trying to fix it.

Expertise – At UTS the support technicians you work with can be considered an expert in the software they are supporting due to hours and training involved. Most technical support service companies require their support techs to have technical certifications or extensive experience with the product they are supporting. They are in the field, working with hardware, software and technical issues all day every day. This expertise provides you more insightful tidbits of knowledge and quicker resolution times.

Peace of mind – One of the best values provided by a technical support service is the peace of mind. Should all your systems fail, or even just one computer, it’s no matter, You don’t need to worry because UTS can find and fix your issues. Peace of mind is a service we don’t list on our Website, and probably should because it’s one of the most important services we provide at Unified Technology Solutions.

managed IT services vero beach, sebastian, ft pierce, port St Lucie West Pam beach, Palm bay, melbourne,Managed business IT services in Fort Pierce, Vero Beach, Sebastian
read more
Your IT GuyI.T. Support and Your Company

Phishing, Malware and More

on February 22, 2019 No comments

Our last two posts were about Phishing, and you are probably wondering where we are heading with all of this phishy stuff.

Phishing is how hackers figure out where you are vulnerable. They can ask you for information you should never give them. They can also attach files which will not ask you for any information. They will, however, take information from you, and leave you a “gift”.

Not a gift you would ever want, however. This gift will be a set of instructions which can clean off your data, it can hold your computer hostage. Sometimes it can piggy back on to the data you send out to others and install it on their systems as well.

We talked about a few things you can do to protect your systems from Phishing, now let’s go further and discuss what can be done to prevent Malware from getting installed on your system. Or, if the installation has already occurred, how to remove it from your system.

From Security In A Box”

“You can sometimes clear up a malware infection just by running your anti-malware software and letting it take care of the problem. On the other hand, some malware is designed to survive a full re-installation of the operating system. Most infections falls somewhere in the middle. In order from least to most effort (and, unfortunately, from least to most effective), the following are a few options:

  1. Do a full scan with your existing anti-malware tool.
  2. If the suspect device is a computer, restart it from an anti-malware rescue disk (such as Windows Defender Offline or the AVG RescueCD) and then discard the USB memory stick you used to create the rescue disk.
  3. If you have a way to restore your device to its “factory settings,” backup your important files and do so. Do not backup any software. Be careful with the storage device you used for backup. Make sure it is clean before plugging it into your restored device.
  4. If the suspect device is a computer, you can reinstall the operating system after backing up your important data. Once again, make sure your backup disk is clean before plugging it into the device on which you reinstalled the operating system. If you use a USB stick to reinstall the operating system, consider discarding it.”

Better still, if you are part of a network, the moment you suspect something is wrong, unplug your computer or laptop from that network. Take it OFF LINE immediately and do not access any websites which would require you to type in a user name or password. Then call us.

read more
Your IT GuyPhishing, Malware and More

How To Prevent Phishing

on February 15, 2019 No comments

At Unified Technology Solutions, we get calls from customers who have unwittingly become the victims of Phishing Scams. Inadvertently, someone in their organization had received an email that looks like it has come from a trusted company they do business with only to discover it was not legitimate. 

Whether that’s an email that looks like it’s coming from your bank, a tech support scam, or a fishy social media campaign, cybercriminals have become sophisticated enough to trick even tech-savvy individuals. By being aware of the following top tactics, you can fend off uninvited malware guests:

Before you open any email, carefully check the sender’s address. Is it from the actual company he or she claims?  Often the phisher will misspell the company name by a letter or two.

Hover over links provided in the body of the email. Is the URL legit? You can often tell by once again checking the spelling. The URL will look official, but it will have an extra letter or a different extension.

Read the language of the email carefully. Are there weird line breaks?  Awkwardly-constructed sentences that sound foreign?

And finally, know the typical methods of communication for important organizations. For example, the IRS will never contact you via email. If something doesn’t look right, send an email from your account to the person at the original account and just ask them if they did indeed send you an email.

If it is a personal email, once again, carefully check the sender information. When in doubt, call your healthcare, bank, or other potentially-spoofed organization directly.  PayPal has a dedicated email address to forward spoofs and scammy emails to try to stay on top of these scammers. 


Phishing is spreading to other forms of communication.  It has spread to our cellphones and text messaging now too.  Bonus mobile phone tip: Cybercriminals love spoofing banks via SMS/text message or fake bank apps. Do not confirm personal data via text, especially social security numbers. Again, when in doubt, contact your bank directly.

It’s also very important to have good Anti-Virus/ Anti Malware software on your systems. It’s important to keep it up to date and make certain your anti-malware software updates itself regularly.

 New malware is written and distributed every day, and your computer will quickly become vulnerable if you do not keep up with new malware definitions. If possible, you should configure your software to install updates automatically.

Most professionals agree a multi-layer approach—using not only multiple layers of security technology but also user awareness—helps keep you protected from the bad guys and your own mistakes.  So, take time to check out what you are reading and keep your info safe. 

You can always call on us to come in and get your systems protected.

Your Tech Guys

read more
Your IT GuyHow To Prevent Phishing

What Is Phishing?

on February 8, 2019 No comments

Fishing vs. Phishing

What is Phishing ?

Fishing is, for some, a pleasurable activity consisting of a rod, a reel, some bait, a body of water and fish. Sometimes people use a boat when they go fishing, sometimes they fish off a pier or on the beach.

Phishing is something nefarious. It’s when cyber criminals figuratively throw a line into the water we call the internet, and phish for data.

According to the FTC Website:

“Phishing is when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information – such as account numbers, Social Security numbers, or your login IDs and passwords. Scammers use your information to steal your money or your identity or both.

Scammers also use phishing emails to get access to your computer or network then they install programs like ransomware that can lock you out of important files on your computer.

Phishing scammers lure their targets into a false sense of security by spoofing the familiar, trusted logos of established, legitimate companies. Or they pretend to be a friend or family member.

Phishing scammers make it seem like they need your information or someone else’s, quickly – or something bad will happen. They might say your account will be frozen, you’ll fail to get a tax refund, your boss will get mad, even that a family member will be hurt or you could be arrested. They tell lies to get to you to give them information.”

Unlike the type of fishing some of us enjoy out on the water, Phishing is dangerous. If the Phisher is successful and convinces you to give them information, it could cause all manner of problems.

Check back for our next blog posts where we talk more about the subject of Phishing and Ransomware.

Your Tech Guys

managed IT services vero beach, sebastian, ft pierce, port St Lucie West Pam beach, Palm bay, melbourne,Managed business IT services in Fort Pierce, Vero Beach, Sebastian
read more
Your IT GuyWhat Is Phishing?

Tech Support For Companies

on January 25, 2019 No comments

You’re a business owner and you’ve been doing just fine without a huge staff or a dedicated IT guy. So far, so good. Like everything else these days, your business depends on technology: email, databases, documents and spreadsheets—maybe even software unique to your industry. What happens when things stop running smoothly?

Perhaps you and your staff are becoming frustrated with computers that aren’t working properly, and network that’s too slow and you’ve been troubleshooting computer/printer/router problems—your business needs IT support. In fact, we think it need us, UTS.

As you pile more and more work on an older system, it will slow down. At some point, it will heave a sigh and stop working all together. It’s important to perform preventative maintenance on the components of your network. It’s also important to ensure you are using the type of computer, servers and network equipment that is made to handle higher volumes of data.

Rather then waiting until something catastrophic happens, let us go through your current configuration and make recommendations. Adding new devices to your network may seem easy, and in some cases it might be, but it’s not always the case. It is a delicate process that needs to be done by professionals to ensure that it is set up right for the sake of your business.

As the new year begins, it is the very best time to re-evaluate your tech operations, and if your business doesn’t already have an IT strategy, you might need to consider finding  an IT partner as soon as possible. We hope that will be Unified Technology Solutions.

it support for company near vero beach, sebastian, ft pierce

managed IT services vero beach, sebastian, ft pierce, port St Lucie West Pam beach, Palm bay, melbourne,Managed business IT services in Fort Pierce, Vero Beach, Sebastian

Your Tech Guys,

read more
Your IT GuyTech Support For Companies

Getting More Control of Your Web Presence

on January 17, 2019 No comments

The World Wide Web is less than 30 years old. Today, there are those of you who will read this post and have no idea there was indeed a world without web. In fact, until around 1990, trying to access the Internet was not for the average pc user.

Beginning in the late 1980’s and early 1990s the tech geniuses of the day began to build search engines and browsers, but they each had their own way of coding and indexing data.

Then in 1991 a man named Tim Berner-Lee and a woman named
” Nicola Pellow, a math student intern working at CERN, to write the Line Mode Browser a cross-platform web browser that displayed web-pages on old terminals and was released in May 1991.[14] ” This according to Wikipedia.

For all intents and purposes Berner-Lee and Nicola Pellow were the founders of what we now call the World Wide Web. It looked nothing like it does today, with all the ads and fancy, colorful photos. But still, it became a great way to find things without having to run around looking in different reference books.

There were several iterations of search engines that came and went before Google took hold of all of us. And once they did get us hooked, they began to collect all sorts of data about us which they could then monotize by selling it to others.

Today, everyone knows everything about everybody, and this same man, Tim Berner-Lee is starting a new company to try and given us all some measure of control over that data and perhaps some income from what we choose to sell from that data pool.

It is an interesting article. Mr. Berner-Lee ” ….has a proposal called Solid, and a startup called Inrupt to promote it, which aims to allow people to have control of their own data, as opposed to the big corporations.

He described this as “web technology repurposed,” and said he is driven by the belief that you should control your data and receive a share of the revenue derived from it. “You shouldn’t worry about someone monetizing your data and influencing elections,” he said, and described Solid as a private repository—or “Pod”—which has a common API for all websites. This would separate applications on the web from your data, and you could then write the data to a generic website and share it via an API with anyone you wish, such as your family or your doctor.” taken from www.pcmag November issue.

Check out the link from our Facebook Page

Let us know what you think.

Your Tech Guys

managed IT services vero beach, sebastian, ft pierce, port St Lucie West Pam beach, Palm bay, melbourne,Managed business IT services in Fort Pierce, Vero Beach, Sebastian
read more
Your IT GuyGetting More Control of Your Web Presence