GET SUPPORT

24/7 EMERGENCY:
CALL 1-877-890-7335

If you're experiencing problems, just "Submit a Ticket", fill out the required information, and give us a detailed description of the issue you are experiencing. Your ticket will be handled electronically and quickly addressed. We also offer a remote support service 24 hours a day, 7 days a week.

If you have any other issues feel free to email us at support@redfiveit.com.

REMOTE SUPPORT
SUBMIT A TICKET
CLIENT PORTAL
APPRIVER PORTAL

  • We're IT when it comes to I.T.®

    YOUR NEXT FULL-SERVICE MANAGED I.T. COMPANY...

    GET STARTED

  • Certified & Professional Partners

    QUALIFIED PEOPLE IMPLEMENTING QUALITY HARDWARE...

    GET STARTED

  • Is Your Network Secure?

    OUR NETWORK MONITORING PROGRAM HELPS YOU REST EASY...

    GET STARTED

  • We're Here When You Need Us

    OUR 27/7 HELP DESK SUPPORT IS READY...

    GET STARTED

1
/
3
/

We help our clients with 

Managed I.T. Services

We provide both blocktime service and monthly service contracts, so that you pay for what you need, and nothing more.

Computer Repair Service

Computer down? One of our knowledgeable specialists can help you to identify and resolve the problem in a timely fashion.

Network & Email Security

We’ve partnered with the best names in security to ensure that your network, email and business data have the highest level of protection.

Cloud Consulting

Cloud computing offers a lot of benefits for businesses big and small. With Office 365, enhanced security, and the option to work collaboratively from anywhere in the world, the cloud can seriously improve your business’ productivity levels.

Backup & Disaster Recovery

In case of emergency, you want your business to be prepared and secure. Red Five provides multiple disaster recovery and backup services to make sure that your business maintains productivity even in the event of an emergency.

Help Desk Services

As a client of Red Five, you will have access to our help desk support 24 hours a day, 7 days a week, via phone, email or our online ticketing system. We provide you with the best help support, for exactly when you need it.

We’re certified and friendly professionals:

COMPREHENSIVE I.T. SYSTEMS AUDIT – JUST $249

Determine the strengths, weaknesses of your I.T. System. Discover opportunities to save money. Assess your risk and shore up looming security threats. Get started today…

REQUEST MY I.T. SYSTEMS AUDIT >>>

help-desk

LATEST RED FIVE I.T. NEWS

Best Practices for Computer Security

December 8, 2015
With constantly evolving technology, it can be difficult to keep up with all of the updates your computer needs, the scans, and the virus protection software. But if you’re just relying on your antivirus scanner to keep your computer safe, you might want to think again. Since technology is constantly updating, it’s hard for even your antivirus software to keep up with all of the changes, including new viruses and bugs that are created and improved every day. So, with all this continuous change, what are some good practices to get into to make sure your computer stays as safe as possible? Use antivirus – If you’re not using it, you’re not safe. As mentioned above, they aren’t perfect but they’re currently the best defense your computer has against viruses and malicious bugs. You might think you’re being safe, only opening trusted sites, no suspicious downloads, etc., but the fact is that viruses can still get through all of your precautions, which is why antivirus is so essential. Uninstall Java – Most people unknowingly have an old, outdated version of Java running as they surf the web. Because Java has a lot of security issues, you can easily contract a virus without even knowing it. So, avoid the risk, and just quickly uninstall Java from your computer. Update your software – We know this can be a pain, and those constant pop-ups always occur at the worst time. You can save yourself the trouble and just choose to have your software – Internet Explorer, Google Chrome, Adobe Reader, etc. – update automatically. This way you don’t have to worry about updating the programs yourself, and your computer will be much more secure. Use caution in downloads – This might seem like a no-brainer, but insecure and untrustworthy downloads are a major risk for your computer. If you’re downloading software, for example, make sure you go directly to the software’s original website. There are a ton of sites on the internet that may advertise the software download as a disguise for a virus or malware.   Unique passwords – Do not reuse passwords. This just opens you up to more trouble. As soon as a hacker figures out one account, they’ll have access to all of your other accounts. Protect yourself and your computer ahead of time by making sure you’re choosing unique passwords.   Utilize your firewall – Most computers come with a built-in firewall. Leave it enabled. It protects you from malware and unsolicited incoming connections. Also, when your firewall prompts you with questions, make sure you provide it with the correct answers. If you tell your firewall you’re at home when you’re really at a coffee shop for example, it could make your shared files available to other people on that network. Instead choose the Public setting, if you really are in public.  

Top 5 Network Security Tools

December 8, 2015
Network security is probably one of the most crucial aspects of protecting your important business data and information, but it’s also a little tricky to figure out by yourself. There’s all kinds of tools out there, free and otherwise, and the technical lingo can be pretty difficult to decipher. So, we’ve put together a list of the top 5 network security tools that could work well for you and your business, and that will help you ensure that your important information is safe and secure.     Nessus – One of the world’s most popular network security tools, Nessus is a vulnerability scanner that alerts its user to any weak points in your computer that could allow malicious hackers access to any computer, and thus the data, in your network. Nessus is free for personal use. Wireshark – Originally named Ethereal, Wireshark is a network packet analyzer. This means that Wireshark analyzes data that come in through your network and turns it into a human readable form, so that network technicians can determine where issues lie in the network itself. Wireshark is also a free software that can be a great resource in advancing your network security. Snort – Snort is a comprehensive Intrusion Detection System (IDS) that essentially functions to detect and alert users of suspicious traffic. Snort is a reactive IDS, which means that it can take actions to prevent the threat, generally by blocking any more information from the suspicious URL. Another freely available tool, Snort functions on many platforms, including Linux and Windows.   Netcat – Netcat performs many useful tasks for its users, but the most important in regards to network security are its debugging and investigation capabilities. Also freely available, Netcat can read and write data across data connections, making it a great option for any network security need. Metasploit Framework – Available in both free and premium versions, Metasploit Framework is a penetration testing software.  Metasploit is a great tool because as a framework, it allows the user much more versatility. Users can create tools that are specific to the security testing tasks they need completed, which means that you’re ensured exactly the kind of network security testing you or your business requires. Still confused about Network Security Tools? Give us a call at 1-877-890-7335, or submit a ticket online, and we’ll be in touch!

What exactly is VoIP?

November 19, 2015
What is VoIP? First of all, VoIP stands for Voice over Internet Protocol. Basically, what that means is if your internet connection is good enough, VoIP can allow you to receive telephone service through the internet, rather than from your telephone service provider. VoIP has the power to bring many locations of one organization together under the same communications network. It additionally offers many support services and features, making it more convenient, and more efficient for you to run your business.   Why should I use VoIP? There are two major benefits to VoIP, the first being the lowered costs, and the second being increased functionality. Most regular telephone services tend to have higher prices because they are entities of the government or monopolies, and so can afford to charge higher rates. Since now you are able to purchase both your internet and telephone services through the same provider, you can save a bundle.  With VoIP, your company and employers will be able to work when they want, and where they want. VoIP allows phones to receive calls from anywhere they can connect to the internet, which means you don’t have to rely on cell towers or telephone poles anymore. If you have call center agents with VoIP phones, for example, they will be able to work from anywhere that has a secure internet connection, making your company more versatile and functional.  

Business Continuity Checklist

November 19, 2015
First, what exactly is Business Continuity Plan? It’s a plan designed to help your business move forward quickly and effectively in the event of a crisis or disaster. Unfortunately, disasters do happen, and the best way to be prepared for them is to plan for them to happen. While this might be a frightening thought, the only way to truly be ready is to have considered the possibility that something could go wrong. To help make sure your business is secure regardless of the situation, we’ve put together a checklist of the basic things you need to have a functioning plan to promote business continuity in the event of a disaster.   Introduction – As with every policy, a business continuity plan has to have an introduction that explains why you need the policy at all, and what exactly it’s importance is to the functioning of your business. The Scope – Your policy should identify exactly how far the plan will reach. If it will be effective company-wide in the event of a disaster, say that. If it is directed towards just a few departments, this is where you should identify those specific departments. The Policy – This is where you state the policy itself. What actions should be taken in the event of a disaster? How can you keep your employees safe and secure, and manage to get business up and running in the least amount of time possible? The policy should be extremely clear, so that there is no confusion later on.   Policy Executive – Who will lead and enforce your new business continuity plan? This person should be mentioned here in your plan, in addition to a description of their precise duties.   Verification of Compliance – This part should explicate what is necessary to ensure that business continuity activities are in compliance with the policy. This section can also highlight what assessments or exercises should be conducted on a regular basis, so that each participating employee understands their role in the event of an emergency.   Non-Compliance penalties – Here you should outline what the consequences are for those who do not comply with the business continuity policy e.g., note in personnel file, or verbal reprimand.   Appendices (As Needed) – If additional information is necessary, a list of contacts, reference materials, etc., add them to appendices as the information comes up. Red Five provides many business continuity and backup services for those situations you just can’t predict. If you’re unsure of how to design your business continuity plan, or have questions regarding your IT services, feel free to contact us online, or give us a call at 1-877-890-RED5.

5 Email Security Tips

November 19, 2015
Internet security is an issue that, with the explosive rise of internet popularity, has been thrown to the back of our minds. Most internet users feel pretty secure nowadays, especially with programs like Adblock that make it easier to avoid viruses and unwanted pop-ups. Unfortunately, internet security is still a big concern, and with our gained confidence, we only put ourselves more at risk. It’s important to remember that we should always be careful, and try to protect ourselves as best we can from viruses and bugs. One of the most vulnerable places that these unwanted pests can gain access is your email, so we’ve put together a short list of easy tips to keep your email, and thus your computer, as secure as possible. Create a strong, unique password – It’s tempting to have the same simple password for all of your accounts, but the fact is, in doing this you put your security at risk. It is of the utmost importance that you try and devise a password that is different from your other accounts, so that if one account gets hacked, the rest are still safe. Use separate accounts – If all of your work emails, personal emails, facebook notifications, junk emails, and spam go to the same account, you are definitely putting yourself at risk. This means, if someone breaks into that one account, you’re likely to lose everything. Consider instead creating separate email accounts. In addition to better protecting yourself, it can be a major productivity boost, because only your work emails are in your work email account, only your personal emails are in your personal account, etc. Don’t click links in emails – A lot of the time, email links can set you up for a bad surprise. If a site is trying to sell you something, you don’t know exactly where that link will take you. While it very well could be safe, there’s always the possibility that the link could lead you right to a virus. Choose instead to copy and paste the URL into your browser. Be aware of phishing scams – Any email that asks you for personal information, passwords or the like, is untrustworthy.  Phishing scams especially try to impersonate big name websites like Amazon or Ebay, tell you there’s something wrong with your account, and then ask for your account information to fix it. Never respond with your personal information, but if you are concerned about your account you can choose to access the website directly. This is a much safer way to ensure that everything is okay with your account, and that you aren’t being phished. Do not open unfamiliar attachments – As a general rule of thumb, if you’re not expecting it, or you don’t know the sender, don’t open it. Attachments can easily be disguised as something they’re not, quickly exposing your computer to unwanted viruses and bugs. So, unless it’s an attachment you’ve been waiting on, or it’s from your mom, delete that email instead.
outside-building

We’ll bring great service and support to you:

Grand Haven

Spring Lake

Norton Shores

Muskegon

Holland

Zeeland

Grand Rapids

Coopersville

Whitehall

GET A COMPREHENSIVE I.T. SYSTEMS AUDIT >>>
+ GET SUPPORT