GET SUPPORT

24/7 EMERGENCY:
CALL 1-877-890-7335

If you're experiencing problems, just "Submit a Ticket", fill out the required information, and give us a detailed description of the issue you are experiencing. Your ticket will be handled electronically and quickly addressed. We also offer a remote support service 24 hours a day, 7 days a week.

If you have any other issues feel free to email us at support@redfiveit.com.

REMOTE SUPPORT
SUBMIT A TICKET
CLIENT PORTAL
APPRIVER PORTAL
DOCUMENTATION PORTAL
MONITORING PORTAL

  • We're IT when it comes to I.T.®

    YOUR NEXT FULL-SERVICE MANAGED I.T. COMPANY...

    CALL 1-877-890-7335

  • Certified & Professional Partners

    QUALIFIED PEOPLE IMPLEMENTING QUALITY HARDWARE...

    LEARN MORE

  • Is Your Network Secure?

    OUR NETWORK MONITORING PROGRAM HELPS YOU REST EASY...

    GET STARTED

  • We're Here When You Need Us

    OUR 24/7 HELP DESK SUPPORT IS READY...

    GET STARTED

1
/
3
/

We help our clients with 

Managed I.T. Services

We provide both blocktime service and monthly service contracts, so that you pay for what you need, and nothing more.

Computer Repair Service

Computer down? One of our knowledgeable specialists can help you to identify and resolve the problem in a timely fashion.

Network & Email Security

We’ve partnered with the best names in security to ensure that your network, email and business data have the highest level of protection.

Cloud Consulting

Cloud computing offers a lot of benefits for businesses big and small. With Office 365, enhanced security, and the option to work collaboratively from anywhere in the world, the cloud can seriously improve your business’ productivity levels.

Backup & Disaster Recovery

In case of emergency, you want your business to be prepared and secure. Red Five provides multiple disaster recovery and backup services to make sure that your business maintains productivity even in the event of an emergency.

Help Desk Services

As a client of Red Five, you will have access to our help desk support 24 hours a day, 7 days a week, via phone, email or our online ticketing system. We provide you with the best help support, for exactly when you need it.

We’re certified and friendly professionals:

COMPREHENSIVE I.T. SYSTEMS AUDIT – JUST $249

Determine the strengths, weaknesses of your I.T. System. Discover opportunities to save money. Assess your risk and shore up looming security threats. Get started today…

REQUEST MY I.T. SYSTEMS AUDIT >>>

LATEST RED FIVE I.T. NEWS

Three best practices to protect your data

June 27, 2022
Three best practices to protect your data. While malware and phishing attacks have evolved over time and are constantly becoming more and more sophisticated, there are ways to protect your data from them. Here are two best practices to observe no matter the size of IT infrastructure needed in your company or organization to follow that can help safeguard your business. Install a strong firewallA firewall can help prevent unauthorized access to your network by monitoring access attempts and allowing or rejecting them. Firewalls are flexible in the sense that you can choose how stringent or lenient you want it to be in terms of limiting access. There are different kinds of firewalls, each serving a particular purpose and offering different protection levels. An MSP with deep experience with these technologies, as well as your specific industry, can be an excellent resource. Firewalls basically work to block unauthorized traffic to your network based on various factors including IP address, location and any other custom parameters that you may choose. Without a firewall, your network is essentially open, exposed to any one on the web, which puts you at serious risk. Invest in antivirus software Antivirus software programs identify viruses and other malicious attachments that cybercriminals may use to gain entry into your system or network. Make sure you invest in a good antivirus software and update it regularly so it can protect you against newer versions of malware that crop up with time. Be wary of consumer grade programs. Train your staff Train your staff to identify and steer clear of phishing emails, links and messages. All the protection in the world is no defense if your staff opens a phishing email and clicks ona malicious link. It is game over right then. Employees tend to assume you are the one responsible for maintaining data security. They often don’t realize they also play a role. Educate them on password hygiene, safe web surfing, and basic IT best practices even when using their own devices. You can provide training in-person and conduct mock drills and IT workshops. Also, consider sending regular emails on these topics so your staff remains alert. Security training isn’t a one-off project. Also update your staff on any new vulnerabilities discovered and if there are any security updates or patches released for them in the market, then be sure to apply them immediately.

Ransomware vs other malware attacks

June 20, 2022
Ransomware vs. other malware attacks There is no end to the volume and type of malware out there in cyberspace. For a very long time, organizations were aware that viruses could attack their data, render it corrupted and unusable. They were also aware that malware was used to steal data and use it for–primarily–monetary gain. Sell off banks of credit card numbers, steal identities, re-sell Social Security numbers, etc. Phishing, as we talked about in an earlier blog, is a set of tricks to get access to personal information and probably even to your IT network by stealing access credentials, but that’s not the only way. Cybercriminals also deploy various malware such as viruses, worms and trojan horses to attack IT networks. These malware usually gain entry into the system disguised as genuine email attachments, links to file downloads, etc. and then corrupt the data. If it is a case of a virus whose sole intent is criminal mischief, your surest protection are consistent and frequent backups. In the case of malware whose goal is theft, you need to have the technical expertise to maintain the security firewalls, anti-virus software, and knowledge of the field of cyber crime to protect your organization. Ransomware is a newer threat that requires additional knowledge in order to ensure that backups are clean in case of an attack. Ransomware, as the name suggests, is a kind of malware attack that goes beyond data corruption where the cybercriminals hold the data hostage and demand a ransom from the business for restoring data access. Backups can also be infected with a ransomware virus, leaving you completely vulnerable to ransom charges if you want your data back. The point here is that cybersecurity is a specialized field. It is a lot more than buying a consumer grade anti-virus application. In general, in small- and medium-sized organizations, in-house tech staff may not have the depth of experience and/or the time to keep up with the latest issues and threats in cybercrime, necessary to design and maintain a well-defended IT infrastructure. In the area of cyber security, It makes sense in such a scenario to bring an experienced Managed Services Provider (MSP) on board who can help you with data security, training and general up-keep and maintenance of your IT infrastructure.

Everyone wants to go phishing

June 13, 2022
Everyone wants to go phishing. You are very much aware that your company or organization is at risk, every minute of the day, from cyberattacks, malware, ransomware, and even benign errors that can put your data at risk. Even a failed backup procedure could mean a loss of critical company and customer data. In today’s blog we’re just going to review one of the most common methods that bad actors use to try to gain access to your data. Phishing. Phishing isn’t a particular type of malware or virus that attacks your data. Instead, it refers to the tools cyber criminals use to get access to your data. Phishing refers generally to the bag of tricks they use to break into your house. In phishing attacks, cybercriminals generally send a web link that is disguised to look genuine, and prompt the receiver to share information that will then be misused. For example, an email may be sent to you that looks as though it came from your bank or the IRS announcing a tax refund that your business is eligible to receive. You may be asked to log into your bank account or a fake IRS site and enter your bank details to receive the refund or download a receipt. The cybercriminals will have access to any details you share and later use it to clear out your bank account. Phishing links may also lead to clone websites. Clone websites, as the name suggests, are websites that look strikingly similar to original websites, but are obviously not the same and are controlled by cybercriminals and used to steal data from unsuspecting victims. Here are a few tips to help you identify clone websites and steer clear of them. If you receive an email with a link to a familiar website asking you to log into the site or enter your personal information, cross check the URL. Check the spelling and domain, for example, www.amazon.com is the right URL, whereas a clone website may have an URL that looks similar but is not the same. An example would be www.amaazon.com or www.amazon-offer.com Another thing you can do is, always type the URL you intend to visit. For example, if you are being asked to log into your bank account, type your bank’s website address instead of clicking on the link they provided to you in the email. Sometimes, phishing attacks can be manual as well, meaning, instead of asking you to enter your personal information in a website or a form, the cybercriminal may pose as someone you know and send you an email from an email address that looks authentic and try to get money or personal information from you. Such attacks usually happen if your network or that of your recipient’s has been compromised in a hacking attack, whereby the cybercriminal has some information that they can use to make their messaging sound genuine.

How the Coronavirus crisis is the gateway to the other kind of virus

May 25, 2022
How the Coronavirus crisis is the gateway to the other kind of virus To say the COVID-19 pandemic gave the whole world a tough time would be an understatement. Economies collapsed, joblessness rose, people lost their loved ones and livelihoods to the disease. Adding to this situation was the need for social distancing and self-isolation which took a toll on mental health of millions across the world. 10 months into the pandemic or perhaps even before, people started growing tired of it and just when it seemed like humankind will give up collectively, there was a light at the end of the tunnel–Vaccines. While the news of the first vaccine being approved and then administered in December 2020, was a huge victory for humankind and rightly welcomed with claps and cheers, cybercriminals were cheering too. For cybercriminals, this was a great opportunity to exploit the eager, mentally fatigued and vulnerable populace. Emails were sent with phishing links disguised as genuine which urged the recipients to fill a form to access their vaccination schedule and vaccine information. Some emails were made to look like it came from the FDA, United States CDC or the NHS (UK). Some had attachments that required recipients to download them and run exe (executable) files that planted malware into their systems. “E-commerce” sites were created overnight on the dark web and enticed people into ‘placing orders for vaccines’ at $250 each, in the ‘Black market’. The point is, this is not the first organized cybercrime modus operandi and certainly won’t be the last. So, how do you protect yourself? Here are a couple of tips. Do not download or open attachments or click on links from unknown, unverified sources or a source that you don’t trust. Sometimes, the email or message may seem to be from someone you trust, but their account may have been compromised and used to send out the malicious link or attachment to you. Or, there may be a slight variation in the email ID (spelling), so while you get the impression it is a genuine email, the reality is different. If something doesn’t add up, or if it doesn’t feel like the message was in fact written by the person you know, either ignore or call and verify if they did indeed send it to you. Install firewalls that have the capability to identify and block dangerous sites, so you will be alerted of possible security threats and inadvertent clicks won’t take you to dubious clone sites Make sure your antivirus software is up-to-date From a business perspective, discuss a strong cybersecurity plan of action with an MSP. This includes investing in the right anti-malware tools, ensuring all your software programs are updated, and updating security patches released by your software vendors as soon as they are available. Educate your staff on common cybercrime tactics so they don’t accidentally expose your IT network to cybercriminals.

Your employee’ social media account was hacked How does it affect you?

May 18, 2022
Your employee’ social media account was hacked. How does it affect you? Did you know that social media accounts are one of the favorite targets for cybercriminals? You may think cybercriminals would prefer to hack online banking accounts or shopping accounts, but that doesn’t seem to be the case. Here’s why. Social media accounts hold A LOT of personal information including name, email ID, date of birth, place of birth, place of work (your business!) high school attended, names of family, friends and pets, anniversaries, and more…which means, they are basically gold mines of Personally Identifiable Data (PII). Plus, if you play games and have your credit card details saved, there’s more information and better the chances for the cybercriminal to commit fraud. All of this data can then be used to hack into other accounts of the user, including financials. So, hacking into someone’s social media account can help cybercriminals gain entry into other, more ‘useful’ and secure accounts. But, how does it matter to you, as a business? If your employee’s personal social media account is hacked, it shouldn’t affect you, as a company, right? Wrong…here’s how it can affect you. If the employee whose social media account is hacked is the administrator of your company’s official social media handles, you are in big trouble as hackers will gain access to your company account and consequently to customer information, because you may be having clients who follow your business account on social media. The whole situation can result in a lot of damage to your business and brand reputation and also result in penalties and possible lawsuits. Even if your employee doesn’t handle your company’s social handles, the hackers may have enough of their PII to try and pry open a small entryway into your IT network. You can avoid such mishaps by Training your staff on social media and cybersecurity best practices including advanced privacy and permission settings for social media accounts Ensuring your employees are able to identify and steer clear of phishing and social media frauds Helping your employees understand the importance of practicing good password hygiene across all their online accounts–social, work or personal. Ensuring they realize that their Facebook or LinkedIn account is not ‘just another online socializing platform’, but an actual gold mine of information and only those who they really trust should be able to access them. Sharing regular Day Zero Alerts and relevant news articles with your staff that keeps them updated on the latest modus operandi and happenings related to cybercrime Your managed IT services provider will be able to help you in organizing and conducting these kinds of training and awareness sessions at regular intervals for your staff.

We’ll bring great service and support to you:

Grand Haven

Spring Lake

Norton Shores

Muskegon

Holland

Zeeland

Grand Rapids

Coopersville

Whitehall

GET A COMPREHENSIVE I.T. SYSTEMS AUDIT >>>
+ GET SUPPORT