CALL 1-877-890-7335

If you're experiencing problems, just "Submit a Ticket", fill out the required information, and give us a detailed description of the issue you are experiencing. Your ticket will be handled electronically and quickly addressed. We also offer a remote support service 24 hours a day, 7 days a week.

If you have any other issues feel free to email us at


  • We're IT when it comes to I.T.®


    CALL 1-877-890-7335

  • Certified & Professional Partners



  • Is Your Network Secure?



  • We're Here When You Need Us




We help our clients with 

Managed I.T. Services

We provide both blocktime service and monthly service contracts, so that you pay for what you need, and nothing more.

Computer Repair Service

Computer down? One of our knowledgeable specialists can help you to identify and resolve the problem in a timely fashion.

Network & Email Security

We’ve partnered with the best names in security to ensure that your network, email and business data have the highest level of protection.

Cloud Consulting

Cloud computing offers a lot of benefits for businesses big and small. With Office 365, enhanced security, and the option to work collaboratively from anywhere in the world, the cloud can seriously improve your business’ productivity levels.

Backup & Disaster Recovery

In case of emergency, you want your business to be prepared and secure. Red Five provides multiple disaster recovery and backup services to make sure that your business maintains productivity even in the event of an emergency.

Help Desk Services

As a client of Red Five, you will have access to our help desk support 24 hours a day, 7 days a week, via phone, email or our online ticketing system. We provide you with the best help support, for exactly when you need it.

We’re certified and friendly professionals:


Determine the strengths, weaknesses of your I.T. System. Discover opportunities to save money. Assess your risk and shore up looming security threats. Get started today…




Free Windows 10 Upgrade Ends Soon

June 15, 2016
If you have a Windows device and you haven’t upgraded to Windows 10 yet, you might want to. Back in May, Microsoft announced that the free upgrade offer, a first in Microsoft history, will end July 29. If you haven’t upgraded by then, you’ll have to either buy a new device with Windows 10 already installed, or you’ll have to shell out the $119 it costs to buy the software.   Personally, we can’t see why you wouldn’t want to update. Windows 10 offers all kinds of user-friendly improvements from previous Windows versions, and it works to make all Windows devices more compatible.  If you’re on the fence though, here’s a couple of reasons to upgrade: Advanced Tech – Obviously, most upgrades promise some sort of technical improvements. Windows 10 is no different. When you install Windows 10, you’ll get the digital assistant Cortana, who functions much like a Microsoft version of Siri. You’ll be able to keep all of your old apps through the upgrade, the new system is supposed to be considerably faster, and as a bonus, this the most secure version of Windows to date.  You’ll get all kinds of free spyware and malware designed to keep your computer, and your information safe. Familiar & User-Friendly – Windows 10 was specifically designed to be familiar to Windows users. Many Microsoft devices still Windows 7 versions of the system because the Windows 8 upgrade was so radically different that users were reluctant to switch over. Windows 10 aims to fix this problem, and allow people to upgrade for a better experience, without the learning curve. In addition to that, Windows 10 will increase device compatibility. The new system will ensure that all of your devices, phone, tablet, laptop, and desktop work together seamlessly. Um, it’s free – We mentioned this already, but just so we’re clear: the upgrade is free. And not only will you get all of the immediate benefits that come with Windows 10, but you’ll get free upgrades to the existing system in the future. That means when Microsoft launches new improvements, like their Anniversary Update later this summer, you’ll get all of that improved technology for free too.  If you don’t have Windows 10 by July 29, you’ll either have to buy it, and then pay for the new upgrades to it, or you’ll need to get a new device. We recommend you skip the hassle and just get everything for free now! The bottom line? The Microsoft Windows 10 free upgrade train leaves the station on July 29. We hope you’re on it! You can read the full article on the Windows blog.

Best Practices for Computer Security

December 8, 2015
With constantly evolving technology, it can be difficult to keep up with all of the updates your computer needs, the scans, and the virus protection software. But if you’re just relying on your antivirus scanner to keep your computer safe, you might want to think again. Since technology is constantly updating, it’s hard for even your antivirus software to keep up with all of the changes, including new viruses and bugs that are created and improved every day. So, with all this continuous change, what are some good practices to get into to make sure your computer stays as safe as possible? Use antivirus – If you’re not using it, you’re not safe. As mentioned above, they aren’t perfect but they’re currently the best defense your computer has against viruses and malicious bugs. You might think you’re being safe, only opening trusted sites, no suspicious downloads, etc., but the fact is that viruses can still get through all of your precautions, which is why antivirus is so essential. Uninstall Java – Most people unknowingly have an old, outdated version of Java running as they surf the web. Because Java has a lot of security issues, you can easily contract a virus without even knowing it. So, avoid the risk, and just quickly uninstall Java from your computer. Update your software – We know this can be a pain, and those constant pop-ups always occur at the worst time. You can save yourself the trouble and just choose to have your software – Internet Explorer, Google Chrome, Adobe Reader, etc. – update automatically. This way you don’t have to worry about updating the programs yourself, and your computer will be much more secure. Use caution in downloads – This might seem like a no-brainer, but insecure and untrustworthy downloads are a major risk for your computer. If you’re downloading software, for example, make sure you go directly to the software’s original website. There are a ton of sites on the internet that may advertise the software download as a disguise for a virus or malware.   Unique passwords – Do not reuse passwords. This just opens you up to more trouble. As soon as a hacker figures out one account, they’ll have access to all of your other accounts. Protect yourself and your computer ahead of time by making sure you’re choosing unique passwords.   Utilize your firewall – Most computers come with a built-in firewall. Leave it enabled. It protects you from malware and unsolicited incoming connections. Also, when your firewall prompts you with questions, make sure you provide it with the correct answers. If you tell your firewall you’re at home when you’re really at a coffee shop for example, it could make your shared files available to other people on that network. Instead choose the Public setting, if you really are in public.  

Top 5 Network Security Tools

December 8, 2015
Network security is probably one of the most crucial aspects of protecting your important business data and information, but it’s also a little tricky to figure out by yourself. There’s all kinds of tools out there, free and otherwise, and the technical lingo can be pretty difficult to decipher. So, we’ve put together a list of the top 5 network security tools that could work well for you and your business, and that will help you ensure that your important information is safe and secure.     Nessus – One of the world’s most popular network security tools, Nessus is a vulnerability scanner that alerts its user to any weak points in your computer that could allow malicious hackers access to any computer, and thus the data, in your network. Nessus is free for personal use. Wireshark – Originally named Ethereal, Wireshark is a network packet analyzer. This means that Wireshark analyzes data that come in through your network and turns it into a human readable form, so that network technicians can determine where issues lie in the network itself. Wireshark is also a free software that can be a great resource in advancing your network security. Snort – Snort is a comprehensive Intrusion Detection System (IDS) that essentially functions to detect and alert users of suspicious traffic. Snort is a reactive IDS, which means that it can take actions to prevent the threat, generally by blocking any more information from the suspicious URL. Another freely available tool, Snort functions on many platforms, including Linux and Windows.   Netcat – Netcat performs many useful tasks for its users, but the most important in regards to network security are its debugging and investigation capabilities. Also freely available, Netcat can read and write data across data connections, making it a great option for any network security need. Metasploit Framework – Available in both free and premium versions, Metasploit Framework is a penetration testing software.  Metasploit is a great tool because as a framework, it allows the user much more versatility. Users can create tools that are specific to the security testing tasks they need completed, which means that you’re ensured exactly the kind of network security testing you or your business requires. Still confused about Network Security Tools? Give us a call at 1-877-890-7335, or submit a ticket online, and we’ll be in touch!

What exactly is VoIP?

November 19, 2015
What is VoIP? First of all, VoIP stands for Voice over Internet Protocol. Basically, what that means is if your internet connection is good enough, VoIP can allow you to receive telephone service through the internet, rather than from your telephone service provider. VoIP has the power to bring many locations of one organization together under the same communications network. It additionally offers many support services and features, making it more convenient, and more efficient for you to run your business.   Why should I use VoIP? There are two major benefits to VoIP, the first being the lowered costs, and the second being increased functionality. Most regular telephone services tend to have higher prices because they are entities of the government or monopolies, and so can afford to charge higher rates. Since now you are able to purchase both your internet and telephone services through the same provider, you can save a bundle.  With VoIP, your company and employers will be able to work when they want, and where they want. VoIP allows phones to receive calls from anywhere they can connect to the internet, which means you don’t have to rely on cell towers or telephone poles anymore. If you have call center agents with VoIP phones, for example, they will be able to work from anywhere that has a secure internet connection, making your company more versatile and functional.  

Business Continuity Checklist

November 19, 2015
First, what exactly is Business Continuity Plan? It’s a plan designed to help your business move forward quickly and effectively in the event of a crisis or disaster. Unfortunately, disasters do happen, and the best way to be prepared for them is to plan for them to happen. While this might be a frightening thought, the only way to truly be ready is to have considered the possibility that something could go wrong. To help make sure your business is secure regardless of the situation, we’ve put together a checklist of the basic things you need to have a functioning plan to promote business continuity in the event of a disaster.   Introduction – As with every policy, a business continuity plan has to have an introduction that explains why you need the policy at all, and what exactly it’s importance is to the functioning of your business. The Scope – Your policy should identify exactly how far the plan will reach. If it will be effective company-wide in the event of a disaster, say that. If it is directed towards just a few departments, this is where you should identify those specific departments. The Policy – This is where you state the policy itself. What actions should be taken in the event of a disaster? How can you keep your employees safe and secure, and manage to get business up and running in the least amount of time possible? The policy should be extremely clear, so that there is no confusion later on.   Policy Executive – Who will lead and enforce your new business continuity plan? This person should be mentioned here in your plan, in addition to a description of their precise duties.   Verification of Compliance – This part should explicate what is necessary to ensure that business continuity activities are in compliance with the policy. This section can also highlight what assessments or exercises should be conducted on a regular basis, so that each participating employee understands their role in the event of an emergency.   Non-Compliance penalties – Here you should outline what the consequences are for those who do not comply with the business continuity policy e.g., note in personnel file, or verbal reprimand.   Appendices (As Needed) – If additional information is necessary, a list of contacts, reference materials, etc., add them to appendices as the information comes up. Red Five provides many business continuity and backup services for those situations you just can’t predict. If you’re unsure of how to design your business continuity plan, or have questions regarding your IT services, feel free to contact us online, or give us a call at 1-877-890-RED5.

We’ll bring great service and support to you:

Grand Haven

Spring Lake

Norton Shores




Grand Rapids