GET SUPPORT

24/7 EMERGENCY:
CALL 1-877-890-7335

If you're experiencing problems, just "Submit a Ticket", fill out the required information, and give us a detailed description of the issue you are experiencing. Your ticket will be handled electronically and quickly addressed. We also offer a remote support service 24 hours a day, 7 days a week.

If you have any other issues feel free to email us at support@redfiveit.com.

REMOTE SUPPORT
SUBMIT A TICKET
CLIENT PORTAL
APPRIVER PORTAL
DOCUMENTATION PORTAL
MONITORING PORTAL

  • We're IT when it comes to I.T.®

    YOUR NEXT FULL-SERVICE MANAGED I.T. COMPANY...

    CALL 1-877-890-7335

  • Certified & Professional Partners

    QUALIFIED PEOPLE IMPLEMENTING QUALITY HARDWARE...

    LEARN MORE

  • Is Your Network Secure?

    OUR NETWORK MONITORING PROGRAM HELPS YOU REST EASY...

    GET STARTED

  • We're Here When You Need Us

    OUR 24/7 HELP DESK SUPPORT IS READY...

    GET STARTED

1
/
3
/

We help our clients with 

Managed I.T. Services

We provide both blocktime service and monthly service contracts, so that you pay for what you need, and nothing more.

Computer Repair Service

Computer down? One of our knowledgeable specialists can help you to identify and resolve the problem in a timely fashion.

Network & Email Security

We’ve partnered with the best names in security to ensure that your network, email and business data have the highest level of protection.

Cloud Consulting

Cloud computing offers a lot of benefits for businesses big and small. With Office 365, enhanced security, and the option to work collaboratively from anywhere in the world, the cloud can seriously improve your business’ productivity levels.

Backup & Disaster Recovery

In case of emergency, you want your business to be prepared and secure. Red Five provides multiple disaster recovery and backup services to make sure that your business maintains productivity even in the event of an emergency.

Help Desk Services

As a client of Red Five, you will have access to our help desk support 24 hours a day, 7 days a week, via phone, email or our online ticketing system. We provide you with the best help support, for exactly when you need it.

We’re certified and friendly professionals:

COMPREHENSIVE I.T. SYSTEMS AUDIT – JUST $249

Determine the strengths, weaknesses of your I.T. System. Discover opportunities to save money. Assess your risk and shore up looming security threats. Get started today…

REQUEST MY I.T. SYSTEMS AUDIT >>>

LATEST RED FIVE I.T. NEWS

How the Coronavirus crisis is the gateway to the other kind of virus

July 28, 2021
How the Coronavirus crisis is the gateway to the other kind of virus To say the COVID-19 pandemic gave the whole world a tough time would be an understatement. Economies collapsed, joblessness rose, people lost their loved ones and livelihoods to the disease. Adding to this situation was the need for social distancing and self-isolation which took a toll on mental health of millions across the world. 10 months into the pandemic or perhaps even before, people started growing tired of it and just when it seemed like humankind will give up collectively, there was a light at the end of the tunnel–Vaccines. While the news of the first vaccine being approved and then administered in December 2020, was a huge victory for humankind and rightly welcomed with claps and cheers, cybercriminals were cheering too. For cybercriminals, this was a great opportunity to exploit the eager, mentally fatigued and vulnerable populace. Emails were sent with phishing links disguised as genuine which urged the recipients to fill a form to access their vaccination schedule and vaccine information. Some emails were made to look like it came from the FDA, United States CDC or the NHS (UK). Some had attachments that required recipients to download them and run exe (executable) files that planted malware into their systems. “E-commerce” sites were created overnight on the dark web and enticed people into ‘placing orders for vaccines’ at $250 each, in the ‘Black market’. The point is, this is not the first organized cybercrime modus operandi and certainly won’t be the last. So, how do you protect yourself? Here are a couple of tips. Do not download or open attachments or click on links from unknown, unverified sources or a source that you don’t trust. Sometimes, the email or message may seem to be from someone you trust, but their account may have been compromised and used to send out the malicious link or attachment to you. Or, there may be a slight variation in the email ID (spelling), so while you get the impression it is a genuine email, the reality is different. If something doesn’t add up, or if it doesn’t feel like the message was in fact written by the person you know, either ignore or call and verify if they did indeed send it to you. Install firewalls that have the capability to identify and block dangerous sites, so you will be alerted of possible security threats and inadvertent clicks won’t take you to dubious clone sites Make sure your antivirus software is up-to-date From a business perspective, discuss a strong cybersecurity plan of action with an MSP. This includes investing in the right anti-malware tools, ensuring all your software programs are updated, and updating security patches released by your software vendors as soon as they are available. Educate your staff on common cybercrime tactics so they don’t accidentally expose your IT network to cybercriminals.

Your employee’ social media account was hacked How does it affect you?

July 21, 2021
Your employee’ social media account was hacked. How does it affect you? Did you know that social media accounts are one of the favorite targets for cybercriminals? You may think cybercriminals would prefer to hack online banking accounts or shopping accounts, but that doesn’t seem to be the case. Here’s why. Social media accounts hold A LOT of personal information including name, email ID, date of birth, place of birth, place of work (your business!) high school attended, names of family, friends and pets, anniversaries, and more…which means, they are basically gold mines of Personally Identifiable Data (PII). Plus, if you play games and have your credit card details saved, there’s more information and better the chances for the cybercriminal to commit fraud. All of this data can then be used to hack into other accounts of the user, including financials. So, hacking into someone’s social media account can help cybercriminals gain entry into other, more ‘useful’ and secure accounts. But, how does it matter to you, as a business? If your employee’s personal social media account is hacked, it shouldn’t affect you, as a company, right? Wrong…here’s how it can affect you. If the employee whose social media account is hacked is the administrator of your company’s official social media handles, you are in big trouble as hackers will gain access to your company account and consequently to customer information, because you may be having clients who follow your business account on social media. The whole situation can result in a lot of damage to your business and brand reputation and also result in penalties and possible lawsuits. Even if your employee doesn’t handle your company’s social handles, the hackers may have enough of their PII to try and pry open a small entryway into your IT network. You can avoid such mishaps by Training your staff on social media and cybersecurity best practices including advanced privacy and permission settings for social media accounts Ensuring your employees are able to identify and steer clear of phishing and social media frauds Helping your employees understand the importance of practicing good password hygiene across all their online accounts–social, work or personal. Ensuring they realize that their Facebook or LinkedIn account is not ‘just another online socializing platform’, but an actual gold mine of information and only those who they really trust should be able to access them. Sharing regular Day Zero Alerts and relevant news articles with your staff that keeps them updated on the latest modus operandi and happenings related to cybercrime Your managed IT services provider will be able to help you in organizing and conducting these kinds of training and awareness sessions at regular intervals for your staff.

Do your homework: 3 things to do when looking for an MSP

March 15, 2021
Do your homework: 3 things to do when looking for an MSP Thinking of hiring a Managed Service Provider, but not sure how to go about it? Here are a few things to do before you zero in on one. Figure out what you have alreadyThe first step in a good plan is to figure out where you stand currently. Before you talk to an MSP, conduct an audit of your IT infrastructure to decide what you have currently. List all your hardware and software. When performing this IT audit, don’t forget other technologies that you are using, such as biometric access systems, CCTV systems and even telephone systems. You may think they are irrelevant as they are not directly related to your IT infrastructure, but, in the near future you may want them all to be connected to one another, and so, including them in the audit and inventory right now is a good idea. Figure out what you needThis is the next step. After you determine what you already have, the next step is to figure out what you need. What do you want to add on or remove from your existing IT infrastructure? Are your servers too slow? Do you want to switch to the Cloud instead of traditional services? Do you want a Unified Communications set up instead of your current PBX phone line? Do you want to shift to a work-from-home model and need the infrastructure to support that? Do your researchNow that you are clear about what you have and what you need, start doing your research. If you have an in-house IT team, you can ask them to evaluate the various options that can help you reach your goal. If not, then there are plenty of resources available online for SMBs that help with tech questions. https://www.sba.gov/learning-center is one great resource and a Google search will get you more. As a part of this research, you should also make a list of credible MSPs in your area and learn more about them. A Google search can help you with that, but it would be even better if you reach out to a couple of your peers requesting them to refer you to their MSPs, if they have one. Hiring an MSP means trusting them with your IT infrastructure, so it is very important that you have a clear understanding of what you really want and need, so you can share your expectations with your new MSP. This transparency and clarity goes a long way in determining the success or failure of your relationship with the MSP.

4 things to do to ensure your business continuity planning is a success

March 12, 2021
4 things to do to ensure your business continuity planning is a success Working on creating a contingency plan for your business? That’s great! Here are 4 things you need to consider when preparing your new business continuity plan. Audit of your business continuity planHaving a business continuity plan alone is not enough. You need to audit it at regular intervals to ensure it is up-to-date and relevant. Often, business continuity plans aren’t used for years, and may be obsolete or irrelevant by the time an actual emergency occurs. Creating a team for business continuityConstitute a team for your business continuity project. Decide who will take ownership of implementing the business continuity in the event of an emergency. Break down the business continuity plan into smaller elements and decide who is responsible for each of them. Also, remember to designate a back up for each person in the team. Mock Drills and Dry RunsAfter your business continuity plan is ready you need to check if it really works. A dry run will tell you if it is really effective and also point out to loose ends, if any, that you can fix before the actual emergency. Don’t forget a debriefIn case you do end up using your business continuity plan, make sure you do a debrief. It will help you determine the effectiveness of your business continuity plan. The brief should focus on identifying the losses you incurred from the disaster, the time taken for implementation of the business continuity plan, the key positives of implementation of your business continuity plan and also offer suggestions, if any for improvement. Irrespective of the size of your business, business continuity planning is indispensable. Bigger companies often have their own staff (IT as well as non-IT) for business continuity planning, but for SMBs to have their own business continuity planning team can be a bit of a strain on their resources. Consider teaming up with a MSP who is experienced in disaster recovery planning, so you don’t cut corners now to regret later.

What are the essentials of a business continuity plan?

March 10, 2021
What are the essentials of a business continuity plan? An unexpected emergency can wipe out your business! A business continuity plan can help it survive. But, what should a good business continuity plan cover? Read this blog to find out. A list of your key contactsOne of the most important elements in your business continuity plan is a list of all your important contacts who should be informed of the disaster. This can include all your C-level execs, HR managers, IT Manager, client facing managers, etc., A comprehensive list of your IT inventoryYour business continuity plan should contain a list of all the softwares, apps and hardware that you use in the daily operations of your business. This list should identify each of those as critical or non-critical and mention details pertaining to each of them such as The name of the app/software Version/model number (for software/hardware) Vendor name and contact information for each of them Warranty/support availability details Contact information for customer support for these hardware/apps Frequency of usage Backup informationData backups are critical to your disaster recovery and so your business continuity plan should include information about data backups. It should mention how often data is backed up, in what formats and where. It should also mention what data backups are available–ideally, you should be backing up ALL data already! What’s your Plan B?Make sure your business continuity plan lists a backup operations plan that will come into play in the event of a disaster. Examples include alternative workflows such as options to work remotely or to allow employees to bring their own devices to work (BYOD) until the time regular business premises or systems are ready. Floor plans and locationYour business continuity plan should also include floor plans of your offices with the exit and entry points clearly marked up, so they can be used in the event of any emergency. It should also mention the location of data centers, phones, key IT systems and related hardware. Process definitionMake sure your business continuity plan defines the SOPs to be followed in the event of an emergency. Think business continuity planning is too complicated? Don’t give up! A lot of SMBs, don’t create a business continuity plan thinking it is too much of a hassle. But this can prove fatal to your business later. A qualified MSP can help you understand business continuity planning and even help you create a business continuity plan that’s best suited for you..

We’ll bring great service and support to you:

Grand Haven

Spring Lake

Norton Shores

Muskegon

Holland

Zeeland

Grand Rapids

Coopersville

Whitehall

GET A COMPREHENSIVE I.T. SYSTEMS AUDIT >>>
+ GET SUPPORT