View Excalibur Technology's Facebook page View Excalibur Technology's Twitter page View Excalibur Technology's YouTube page View Excalibur Technology's Google Plus page View Excalibur Technology's blog View Excalibur Technology's LinkedIn page

Hardware Management Is Difficult – Here’s How To Do IT Right

Hardware Management How To Do It RightYour business relies on intensive and expensive technology solutions, which are designed to keep your staff productive and provide them with the tools they need to perform their daily duties. Yet, small organizations often run into trouble when managing their mission-critical hardware systems. How does your business maintain its technology? Chances are that there’s a better way to do it, and it all starts with managed services.

Consider this scenario: Your server is experiencing technical difficulties, but you don’t suspect that it’s a major issue. The problem persists, but eventually, the symptoms escalate, and you’re left with a slow, dogged piece of hardware that’s holding your business back. Just when you get the idea that you need to upgrade to a new server, the old one crashes, and all of your data is lost. Now what?

Depending on how much data was stored on the server, you’ll be in varied degrees of trouble. If your entire infrastructure was stored on it, it’s safe to say that the data is likely gone, and it will be difficult, if not impossible, to restore it. This means that your business will lose client data, contact information, employee records, and other important documents and information. In most cases, businesses that cannot recover their data will go out of business within one year of the data loss incident.

Plus, even if you can get back on your feet, you’ll have to collect all of your data, explain the circumstances to your clients, and hope that they still see you as a reliable business worthy of their patronage. After you carelessly lost their data, what do you think the odds of that are? We’re willing to bet that you’ll see at least some budget problems due to replacing hardware solutions and losing customers. Combined with the frustrations of downtime and productivity loss, it’s enough to dig even the most reputable enterprise’s grave.

The solution is to take care of your hardware and resolve issues before they can become major problems, but the small or medium-sized business may not be able to identify these subtle changes in operation. Managing hardware takes time, which is a rarity amongst business owners and organizations that don’t have internal IT departments. Furthermore, it requires an expertise that not many people, besides trained technicians, can muster.

The solution, therefore, should be to find an outsourced provider for your hardware maintenance and management; one that’s competent and conscious of your business’s specific needs and goals. You want them to be able to remotely monitor and maintain your systems, and to limit on-site visits whenever possible. You want to keep issues from becoming major problems, and you want to do it without breaking your budget.

Ordinarily, you’d be asking the impossible; but we’re not just any old service provider.

You don’t want to go with any typical break-fix IT service provider. All they will do is bleed your business dry and welcome any problems that are associated with your organization’s technology. You need assistance from a provider that’s ready and willing to help you save time and money – one that considers your success, its own success. You want an organization like Excalibur Technology by your side.

For more information about how we can help your business protect its data, call us today at (877) NET – KING.


5 Easy Ways To Overcome the Doldrums Of The Workday

Zen at WorkWhile working all day in an office setting may be good for your wallet, it can take quite a toll on the body. However, remaining productive while taking care of one’s well-being sounds tricky, doesn’t it? Fear not, maintaining your health while simultaneously maintaining your quality of work is easier than it sounds, especially with these five handy tips to guide you.

Get Up
While sitting all day has been clearly documented as unhealthy, the office environment doesn’t exactly encourage frequent motion, as moving about tends to cut into productivity and can be distracting for your fellow workers. Therefore, it is best to stand up at least every half hour and to do your best to move about every hour and a half as much as is possible.

It’s Okay to “Stair”
Just like the first tip, electing to climb the stairs overriding the elevator has metabolic benefits to it. Who doesn’t want to burn a few extra calories? To encourage stair use, try propping the door open with a fire release magnet, along with signs describing the health benefits of stair-climbing over elevators.

Go Outside
Have you been having trouble sleeping? It may be because spending long work hours inside has put your body into a state of light deficiency, and has therefore thrown off your circadian rhythm. The best fix? Take a walk outdoors whenever possible to reset yourself and get some better sleep.

Stay Home, Sicky! 🙂
If the goal is to keep a workspace healthy, it doesn’t make much sense to introduce more germs than are already introduced through a normal office setting, does it? A single worker can easily cause an outbreak within the office that could kill productivity. A much better decision would be to stay home. If you are incredibly concerned about lost work time, a work-from-home policy may be wise to implement.

Avoid Junk Food Like It’s Junk Mail
Too many office break rooms heavily feature snack options that are less-than-healthy. Do your best to avoid the caloric, sugary options that are available in favor of the healthier choices offered, or bring your own healthy snacks from home. If possible, try to encourage an environment where healthier options are displayed more prominently than the junky stuff.

Implementing these tips can help your workspace become a healthier place. Let us know what other initiatives your office has implemented to promote a healthier lifestyle in the comments below!


Delta Air Lines “Grounded” For Not Adhering To Best Practices

Delta Airlines Technology IssuesNobody likes being delayed at the airport, forced to sit in uncomfortable chairs as the minutes slowly pass, each signifying that an important event or deadline is that much closer to being missed. Events that cause such delays cause headaches for passengers and airlines alike, just ask Delta, who recently suffered from such an event when a power outage struck Atlanta, GA, and with it, Delta’s computer system.

As a result, over 1,500 flights were cancelled outright, with far more experiencing delays. What’s more, in addition to the costs Delta will incur through providing their stranded travellers with travel waivers, their reputation as an airline has been tarnished and will likely continue to be, as the put-out passengers are not likely to stay quiet on the issue to their families, peers, and coworkers.

Delta has been regularly updating those affected with plans and protocol they’ll follow to make amends and to ensure such an outage never happens again. We feel, however, that some important lessons may be learned from this event that may help others never encounter such circumstances in the first place.

As stated by the airline, Delta has been attempting to “rest operations,” but is also experiencing difficulties in returning to full operations, as a senior vice president posted:

“We were able to bring our systems back online and resume flights within a few hours yesterday but we are still operating in recovery mode.”

However, if Delta had properly-implemented, functional backups in place, which they did not, the airline could have potentially avoided any downtime at all, saving themselves the ripple effect that the power outage caused the airline. Furthermore, Delta failed to act after similar circumstances befell Southwest Airlines a just a few short weeks before, neglecting to defend themselves against the potential repercussions of an outage.

Of course, there are measures that business travelers may put into place to help mitigate a few of the consequences that they would incur thanks to a grounded or delayed flight.

If a traveler’s flight is changed or cancelled for any of a variety of circumstances, a virtual private network put to use with a mobile computing solution and a VoIP solution would allow for a stranded traveler to communicate with clients and coworkers alike, preventing the loss of productivity one would usually associate with being trapped in a terminal.

If losing productivity to forces beyond your control concerns you, the professionals at Excalibur Technology can help you establish a solution to mitigate or even circumvent the consequences. To find out what solutions would best fit your needs, give us a call at (877) NET – KING.


It Pays To Outsource Your IT

It Pays To Outsource Your ITTechnology can be fickle at times. When it’s not working properly, it can hold your business back from reaching its maximum potential. Therefore, in order to maximize your bottom line, it becomes common sense to ensure that your technology is in proper working order at all times. The problem lies in the fact that you may not necessarily specialize in technology management, and don’t have the time or budget to perform maintenance yourself. What’s the SMB to do?

In the past, break-fix IT services allowed users to get the technical support they needed, but at a steep cost. IT companies would tell the user what was wrong with the technology, and offer a price for what it would take to fix it. By nature, this type of IT maintenance is designed to thrive off of the user’s technology failing to work properly. Therefore, from a break-fix IT company’s point of view, there’s no real reason to put preventative measures in place that would save the user money in the long run.

In stark contrast, managed IT services do the exact opposite of their break-fix counterpart, and that’s to save businesses money by preventing issues from developing into costly and downtime-causing problems. This helps organizations keep their IT budgets intact, even if they don’t have a dedicated in-house IT department. Preventative maintenance detects small issues and resolves them in a timely manner, preventing them from becoming major problems.

Here are some examples of effective managed service offerings that can save SMBs money in the long run:

Server Hosting
Your server units are the hardware responsible for the safe storage and distribution of your organization’s digital assets. Therefore, it makes sense that you would want to guarantee that they’re being cared for properly. The problem here is that server maintenance and hosting requires a specific skillset that only a professional technician can provide, and that the SMB typically has a limited IT budget that doesn’t necessarily accommodate hiring new staff members for this purpose. This is often why organizations outsource this responsibility to a managed service provider that can guarantee consistent uptime and the prolonged health of server units.

Network Security
If your business doesn’t know the difference between viruses, malware, trojans, phishing scams, and other common threats, it’s a good idea to have a trained security professional on-hand to manage your network and endpoints. Businesses can outsource the responsibility of maintaining and managing solutions like firewalls, antivirus, spam-blocking, and content-filtering components, that are capable of mitigating threats and limiting exposure to dangerous situations.

Remote Maintenance and Management
There are times when technological issues aren’t immediately known to the user, and they can become disastrous problems later on if ignored. Technology professionals can identify these issues by remotely monitoring statistics like CPU usage, RAM consumption, and other critical factors, in order to prevent them from escalating into major unavoidable disasters. These issues can then be resolved remotely, without the need for an on-site visit from a tech, helping you keep your budget under control.

Backup and Disaster Recovery
Small businesses might be agile enough to respond to threats and disasters promptly, but this is only the case if they’re taking measures to keep their data safe. It’s been shown that businesses that fail to recover their data following a data loss incident, will likely go out of business within one year of the incident. Therefore, you need a comprehensive solution that’s designed to limit data loss and practically eliminate downtime.

If your business has difficulty managing and maintaining its technology infrastructure, why not reach out to Excalibur Technology to ask about what we can do for your business? To learn more about backup and disaster recovery, network security, and more, reach out to us at (877) NET – KING.


4 Ways To Make Sure Workplace Instant Messaging Enhances Productivity

Work Chat ProductivityInstant messaging has changed the way that individuals communicate with one another, both in their personal lives and in the workplace. Just as email threw a wrench in traditional mail’s plans, instant messaging threatens to jump start a new method of instantaneous communication, one which can be seen as a great benefit, but also an immense annoyance.

As reported by ITProPortal, over half of the respondents to a survey by BetterCloud believe that instant messaging will overtake email in the office; an impressive feat, especially considering how commonplace email is in today’s professional environment. However, this also means that businesses need to improve their instant messaging practices if they want to reap the benefits it provides, and to use instant messaging in such a way that it’s not a major workplace distraction.

If you want to improve your business’s instant messaging practices, try these tips.

Accurately Represent Your Current Online Status
You need to give your team a proper representation of whether you are currently available or not. If you don’t, they could be wasting valuable time trying to reach out to you when, in reality, you’re nowhere near your computer. Make sure that you change your status to indicate that you’re away from your computer, or logged off for the night; that way, your team can know that they would be better off contacting someone else who is available.

If It’s Going to Be a Long Conversation, Try a Different Communication Medium
Long IM conversations can waste time, especially if they aren’t particularly relevant to the task at hand. In this case, it’s better to simply pick up the phone and call the person you need to communicate with or arrange for a face-to-face conversation. This way, the details get ironed out and you don’t waste valuable time getting to the point. Plus, emotions are somewhat difficult to express through instant messaging, while voice chat and in-person meetings are easier to get a feel for.

If You Have a Short, Specific Request, Try to Put It at the Beginning of the Conversation
There’s no point in drawing out a conversation when all you need to do is ask a question. Doing so isn’t just wasting your time; it’s wasting the recipient’s time too. Be courteous and respectful of your colleagues’ time and ask questions as soon as you can.

Take Full Advantage of Your IM System’s Features
Many instant messaging platforms also allow for several other functions. If you fully take advantage of these features, your team can be more productive with your IM solution. For example, if your system allows for voice chat, using it can be a great way to clear up confusion or explain a particularly difficult concept. If you need to rope in another person, try adding them to the conversation when they need to be there. The idea is to play around with what works and what the limits of your IM system are. This way, you can help your team better understand how to take advantage of the features.

By following these best practices, your organization will see a more fruitful use of instant messaging features. What are some of your favorite ways to use instant messaging, and do you have any specific practices that you follow at your organization? We’d love to hear about them. Let us know in the comments, and be sure to subscribe to our blog for more best practices and tech tips.


For NATO, Cyberspace Is Today’s Frontline

Cyber Security WarIt’s clear that security professionals have waged war with hackers since the Internet’s inception, but NATO has reaffirmed that cybersecurity is not just a localized problem; it’s a nation-state-wide issue, and one that needs to be addressed. Just like land, air, and sea, cyberspace is now an operational domain, a place that can be considered a battlefield.

NATO has declared that cyberspace qualifies as an area where conflict can occur, (it surprisingly took this long). While many cyber attacks tend to be limited to only data infrastructures, there are plenty of instances where attacks have moved from the cyber realm to the physical world. Some examples include a Ukrainian electrical grid hack from just last year, as well as a supposed Iranian hack of a United States dam control system. In other words, technology systems have the capabilities to cause quite a bit of damage, like blackouts or shutting down critical systems.

NATO Secretary General Jens Stoltenberg made a valid observation concerning the decision to add cyberspace to the list of operational domains: “Cyber defence is part of collective defence. Most crises and conflicts today have a cyber dimension. So treating cyber as an operational domain would enable us to better protect our missions and operations.”

Technology has become such a commodity in today’s world that even warfare is assisted by it, through providing access to important data and applications. Networks that are used to deploy this data could be hacked, causing important information to be either lost or stolen; thus, putting real-world lives at risk. Plus, if a hacking attack rendered citizens without heat, electricity, and other necessities, it could redefine what the world thinks of as a war of attrition.

NATO plans on securing networks and focusing on helping other countries secure their own. Additionally, NATO wants to help others identify where attacks come from, and what can be done about them. In 2014, NATO changed its policies to allow them to respond to any attacks against nations involved with the organization, so this shows that cyber warfare could potentially become a major factor in ongoing conflicts in the future.

Granted, measures that could be put into place are easier to talk about than to actually implement. Cyber security is generally handled on a state level, and while the US and UK have invested heavily in cyber security, other countries tend to think of it as a low priority, or don’t foresee it affecting them in the near future.

This decision by NATO should drive the importance of cybersecurity in the workplace, and reaffirm that your organization needs to take a cautious and proactive stance. Additionally, you’ll need to use best practices in order to minimize the risks of working online, as you’ll probably realize far too late that you’ve been infiltrated by hackers. It’s in your best interest to take a preventative stance on network security, regardless of how much risk you feel your business is at.

To learn more about IT security, reach out to us at (877) NET – KING.


Why True Autoscaling Is Out of Reach For The Average SMB

Autoscaling Cloud Services not CheapShopping for a cloud solution can be difficult. You’ll be sold on plenty of impressive-sounding features that you may not know anything about. One feature that you may have seen floating around is autoscaling, which sounds great on paper, but may not live up to its expectations. The only problem, though, is how you can identify those that deliver, and those that don’t, before investing in a project.

The idea of autoscaling for your cloud solution seems to be great. Workloads can automatically be adjusted depending on the scale and specific amount of resources they need to perform a task. The idea is that these processes are automated so that you can focus on doing your job. This always-on feature keeps your network monitored, preventing bottlenecks and traffic spikes from derailing operations. Supposedly, cloud autoscaling can handle all of this without any human intervention whatsoever.

Unfortunately, this simply isn’t the case.

The reality of the situation is that autoscaling to this degree requires an immense amount of human oversight and intervention, that the “auto” in autoscaling is hardly a qualifying term. ITProPortal explains, “To create a truly automated and self-healing architecture that scales with little or no human intervention requires custom scripts and templates that can take months for a skilled team to get right, and many organizations have neither the time nor those resources to make it work.”

Instead of investing so much time and effort into making a truly automated system, it’s often best to just have human oversight involved in your cloud solution. This is done best by allowing trusted IT administrators to keep tabs on network traffic and intelligent scaling. Besides, isn’t a human system better than an automated system in the first place?

This type of oversight for a cloud platform is important, especially since network computing can be unpredictable at times. For example, what would happen if your website was hosted in the cloud, and your business was featured in a TV spotlight on the local news? Your website might crash from the unexpected amount of traffic it receives. Any solution connected to the Internet is vulnerable to such a threat, particularly DDoS attacks, which are frequently used by both fledgling hackers and experienced criminals alike. If a network is being monitored with the proper oversight, the needed resources can be allocated and scaled to suit the situation, and (hopefully) prevent the attack.

However, nothing is as simple as it seems, even when people are involved. For a small business, it can be difficult for the IT budget to procure a salary for a dedicated IT technician who can constantly oversee their network. Furthermore, even if you can accommodate an in-house IT technician, you know how busy they can get. ITProPortal explains: “They don’t have time for this either. Couple it with the fact that they are chastised when systems are under-provisioned or fail, that re-starting a system may land it on an unfortunate server filled with noisy neighbors, and that all of this is happening at the scale of dozens or hundreds of servers at a time – and this feels like a great time to just over-provision everything and leave well enough alone.”

The SMB seems to be stuck at an impasse here; with true autoscaling being difficult, if not impossible to achieve, and onboarding new IT technicians being out of scope, the most effective way to achieve a semblance of autoscaling for your cloud solution is to use a managed cloud service. Excalibur Technology’s managed services provides affordable and accessible IT solutions for small businesses, which can include the oversight you need for your cloud solution.

In the end, you won’t be doing any of the work, so it’ll be just as good as any automated cloud solution could be. To learn more, reach out to us at (877) NET – KING.


Couple Jailed For Scamming More Than A Million Dollars From The IRS

Hackers Steal Millions from the IRSIt all goes to show: don’t mess with the IRS. The prison system has two new residents, after Anthony Alika, 42, and his wife Sonia, 27, were sentenced for filing fraudulent tax returns through the often-exploited “Get Transcript” site maintained by the Internal Revenue Service. In addition to their incarceration, the Alikas will each be responsible to pay restitution to the IRS.

Ultimately, Anthony is to serve 80 months in prison followed by three years of supervision upon release, in addition to paying $1,963,251.75 in restitution for conspiracy to commit money laundering. Sonia was handed down a sentence of 21 months of jail time, also followed by three years of supervision, and an IRS restitution totalling $245,790.08 for structuring cash withdrawals to avoid the required bank reporting. Each pled guilty to their charges.

These sentences were passed after the Alikas were found guilty of laundering $1 million in money stolen from the US Treasury by filing fraudulent forms, specifically income tax returns populated with data stolen from the Get Transcript vulnerability. The Get Transcript function, meant to allow taxpayers to review their past returns with clearly spelled-out information, also allowed the Alikas to obtain the data they needed to make off with their ill-gotten funds.

The Alikas, along with co-conspirators, would purchase prepaid debit cards and registered them to the identities they had stolen, before filing false returns for those identities and receiving the refunds on the prepaid cards. They would then use these cards to purchase money orders, deposit that money into bank accounts, and withdraw their loot in multiple small increments to avoid the bank reporting of the transactions.

This isn’t the first time hackers have used the Get Transcript portal, either. In May of 2015, 100,000 tax accounts were stolen and used to take almost $50 million from the IRS. This is all because the authentication requirements to access the necessary information are flimsy.

Reacting to this case, the United State Department of Justice put out a press release outlining some best practices to keep personal information and accounts as safe and secure as possible.

File Early
A tax refund criminal can’t file a false return if the return has already been filed by the actual individual who should be doing the filing. The longer a return goes without filing, the more opportunity a criminal has to file one fraudulently.

Use Strong Usernames and Passwords
This one goes for any and all online accounts, but especially for those containing information as sensitive as a tax return does. If a close family member could get pretty close to the credentials with a guess, those credentials are nowhere near strong enough.

BONUS TIP: Randomized strings of upper and lower-case letters, numbers, and (if permitted) symbols are the most secure option when selecting a password.

For more tech security information to help keep your data–and yourself–safe, keep coming back to the Excalibur Technology blog.


Study: 95% Of All Cyber Attacks Are Financially Motivated

Cyber Attacks are Financially MotivatedBusinesses need to take security into account and make it a priority. In fact, security is so important that Verizon has compiled a report of the various types of attacks and data breaches that occurred in the past year. This is Verizon’s Data Breach Investigations Report, or DBIR, and it offers insights into how you can protect your business and secure your assets.

The DBIR has a method of outlining data breach types into nine separate categories. In particular, your business should focus on four of them. We’ll provide you with a basic outline of what the threat entails, as well as how your organization can protect itself from them.

Crimeware
The DBIR reports that crimeware is one of the most common trends in the business environment, citing that 39 percent of all attacks in 2015 involved ransomware. The DBIR’s definition of “crimeware” is quite large, and is used to refer to “any use of malware that doesn’t fall into a more specific pattern.” This lack of predictability makes crimeware rather dangerous, and only serves to show business owners just how many different types of threats exist that fall into this category.

The DBIR recommends that all workstations and servers be patched and maintained at all times, and that organizations have backup and disaster recovery solutions put into place to prepare for the worst. Additionally, it’s recommended that you monitor your systems for any changes to system configurations.

Web Application Attacks
E-commerce platforms are some of the most common targets, and it’s simple to understand why. In the DBIR, 95 percent of all web application attacks had some sort of financial motivation. These attacks are caused by successful phishing attempts to steal credentials and infiltrate networks. Additionally, content management system data breaches have become quite common, with some aiming to infiltrate and repurpose sites as phishing centers.

The DBIR suggests using two-factor authentication, and to promptly update and patch software as needed.

Cyber Espionage
Some criminals will primarily target intellectual property. These cyber-espionage tactics will stick to your typical methods of network breaches and utilize sophisticated means to meet their goals if simple tactics don’t work. Therefore, many of these attempts to steal sensitive data can be undermined by basic protection, like firewalls and antivirus, but these solutions shouldn’t be counted on to keep out more advanced threats.

Additionally, you need to take advantage of advanced security solutions, like remote monitoring and management, to ensure that your infrastructure’s configurations aren’t being tampered with, and implement a mobile device management solution to protect your organization’s mobile data infrastructure.

Miscellaneous Errors
This category consists mostly of mistakes of all kinds that leads to compromised security. Verizon reports that around 40 percent of miscellaneous errors are caused by server issues, and about 26 percent are caused by simple employee mistakes, like sending a message filled with sensitive data to the wrong person.

The DBIR suggests that business owners or technology professionals strengthen control over how sensitive data is distributed. Verizon suggests the thorough and proper disposal of any unneeded or irrelevant hardware, and we’d like to mention how employee education as a preventative measure. By ensuring that your team is informed of industry best practices and data management techniques, you’ll drastically cut down user errors.

The takeaway: Basically, the majority of security discrepancies were due to, with varying degrees, human error. This is natural, as hackers actively look to exploit the weaknesses of the human mind. Therefore, if the people that make your business tick are the weakest link in the chain of operations.

What can you do to safeguard your data? For starters, stay up-to-date on the various trends in security breaches, and always keep your systems prepared by installing patches and security updates. To learn more about cyber security and preventative technology solutions, reach out to Excalibur Technology at (877) NET – KING.


Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Microsoft Vulnerabilities Addressed By PatchesMicrosoft recently issued security patches to fix 27 vulnerabilities, many of which are critical in nature. The vulnerabilities are significant and popular titles are affected like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. Microsoft users that ignore these security patches are putting their system at unnecessary risk.

If you’ve already applied the security patches, then rest assured, your computers are safe and what follows is an informative read of what you’re protected from. On the other hand, if you haven’t yet applied the security patches, then we’ll go over why you’ve got good reason to worry.

In relation to the critical vulnerabilities affecting Microsoft Office, Internet Explorer, and Edge, hackers have found a way to remotely execute malicious code through Office documents or web pages. Microsoft goes into detail about this in the following security bulletins:

Microsoft has also found and fixed vulnerabilities with the Windows Graphics Component, which affects Windows, Microsoft Office, Skype, and Lync. Hackers can exploit this vulnerability to remotely execute code through malicious documents and web pages.

Perhaps affecting the most users is a vulnerability discovered in Windows PDF Library, which comes bundled with Windows 8.1, Windows RT 8.1, Windows 10, Windows Server 2012, and Windows Server 2012 R2. This vulnerability involves a critical remote code execution flaw. The Edge browser is uniquely affected by this vulnerability, giving hackers an opening to exploit a malicious PDF document hosted on a website, which they’ll use to trick users into downloading.

Not all vulnerabilities fixed by Microsoft are categorized as “critical.” The security patches also take care of vulnerabilities deemed “important.” Still, the lessened severity of the threat doesn’t mean users can afford to ignore the patches.

Have you already applied Microsoft’s security patches? It’s important that you do and Excalibur Technology is standing by to assist if you require our services. To make this happen, simply call us at (877) NET – KING.

We should also mention that Excalibur Technology clients who are taking advantage of our managed IT service have no need to worry about applying the security patches; our engineers have already remotely performed this task for you. This is the case with all security patches and major software updates, meaning that you can rest easy knowing that your system is protected.  Call one of our friendly Technology Consultants today for additional information and a quote!



Excalibur Technology
Excalibur Technology
Excalibur Technology
Excalibur Technology
Excalibur Technology
Excalibur Technology