GET SUPPORT

24/7 EMERGENCY:
CALL 1-877-890-7335

If you're experiencing problems, just "Submit a Ticket", fill out the required information, and give us a detailed description of the issue you are experiencing. Your ticket will be handled electronically and quickly addressed. We also offer a remote support service 24 hours a day, 7 days a week.

If you have any other issues feel free to email us at support@redfiveit.com.

REMOTE SUPPORT
SUBMIT A TICKET
CLIENT PORTAL
APPRIVER PORTAL
DOCUMENTATION PORTAL
MONITORING PORTAL

  • We're IT when it comes to I.T.®

    YOUR NEXT FULL-SERVICE MANAGED I.T. COMPANY...

    CALL 1-877-890-7335

  • Certified & Professional Partners

    QUALIFIED PEOPLE IMPLEMENTING QUALITY HARDWARE...

    LEARN MORE

  • Is Your Network Secure?

    OUR NETWORK MONITORING PROGRAM HELPS YOU REST EASY...

    GET STARTED

  • We're Here When You Need Us

    OUR 24/7 HELP DESK SUPPORT IS READY...

    GET STARTED

1
/
3
/

We help our clients with 

Managed I.T. Services

We provide both blocktime service and monthly service contracts, so that you pay for what you need, and nothing more.

Computer Repair Service

Computer down? One of our knowledgeable specialists can help you to identify and resolve the problem in a timely fashion.

Network & Email Security

We’ve partnered with the best names in security to ensure that your network, email and business data have the highest level of protection.

Cloud Consulting

Cloud computing offers a lot of benefits for businesses big and small. With Office 365, enhanced security, and the option to work collaboratively from anywhere in the world, the cloud can seriously improve your business’ productivity levels.

Backup & Disaster Recovery

In case of emergency, you want your business to be prepared and secure. Red Five provides multiple disaster recovery and backup services to make sure that your business maintains productivity even in the event of an emergency.

Help Desk Services

As a client of Red Five, you will have access to our help desk support 24 hours a day, 7 days a week, via phone, email or our online ticketing system. We provide you with the best help support, for exactly when you need it.

We’re certified and friendly professionals:

COMPREHENSIVE I.T. SYSTEMS AUDIT – JUST $249

Determine the strengths, weaknesses of your I.T. System. Discover opportunities to save money. Assess your risk and shore up looming security threats. Get started today…

REQUEST MY I.T. SYSTEMS AUDIT >>>

LATEST RED FIVE I.T. NEWS

Business Security

Online shopping? Watch out for these red flags

May 15, 2020
Online shopping? Watch out for these red flags Who doesn’t like online shopping? Online shopping has opened up a whole new world to us. Get whatever you want, whenever you want, without wandering from store to store. It doesn’t matter if it is too hot to venture outside or if there’s a blizzard out there, you do your shopping from the comfort of your couch and the stuff at your doorstep. You get great deals, some are better than in-store specials. But, did you know cybercriminals love the concept of online shopping as much as you do. Cybercriminals are exploiting the growing popularity of online shopping to cheat unsuspecting buyers through techniques such as phishing, malware injection, etc. Here are a few tips that may work to keep you safe from being a target of cybercriminals as you shop online. How to determine if the ad or shopping site is genuine?As you browse the web, you will come across various ads targeted at your interests. Businesses engage in ‘Retargeting’ which means they use cookies to target you with very specific ads until you buy something. For example, look at a wallet and, you will see ads for wallets on various other sites you browse even if they are not shopping sites. Are those ads genuine? Before clicking on any ad you see online and making a purchase, be sure to verify if the ad is genuine. The same goes for shopping sites. Before you shop, you need to ensure the site is genuine, especially since you will be sharing your credit card details or Personally Identifiable Information (PII) such as your address. Here are a few things to check before you make that online purchase. English: Keep an eye out for grammatical errors or spelling mistakes in the ad. Fake ads and sites may look a lot like the actual ones, but spelling mistakes or grammar errors may tell the true story. Scammers don’t have content writers to write great sales content! Check the URL: When at a shopping site, always check the URL in the address bar to ensure it is genuine. For example, if you see www.1amazon.com or www.amazon-usa.com, you should know it is not the same as www.amazon.com. Checking the URL also lets you detect website cloning and phishing. Website cloning is one of the most popular methods used by scammers to fleece consumers. As the term suggests, the cybercriminal first creates a ‘clone’ site that looks exactly like the original one, barring a very minor change in the URL. Don’t Get Phished!Phishing is when you receive a message, usually through an email or a text message asking you to take an action, such as clicking on a link, filling out a form, logging into an account, etc., Such messages look as though they are genuine. But, the form fill, account login, or link will take you to a spurious site where your information will be captured for bad use. Checking the URL will help you detect
Business Security

Free Internet Access? Don’t fall for this one

May 8, 2020
Free Internet Access? Don’t fall for this one One of the popular internet scams that has been doing the rounds since 2017 is the one about “Free Internet”. This scam seems to resurface and somehow manages to claim quite a few unsuspecting victims. Here’s how they catch you. Ads are created on Google, Facebook, popular search engines and social media platforms advertising free internet hours. The ads look professional and show up on general searches and on social media when surfing. This offers a sense of validity. Once you click on the ad, you will be taken to their website, where you will be asked to perform an action, such as Filling out a form with your Personally Identifiable Information (PII) Sharing your credit card information, and though you will be promised that your card won’t be charged, you may end up signing up for something or subscribing to a service for which your card will be charged later. Sharing a few email IDs or phone numbers–basically contacts with whom you will be asked to share the message in return for free internet service. How to stay safe?As always, remember no one offers something for free. Whether it is free internet access or tickets to a concert, if it is something of value, then you will be expected to provide some value in return. Steer clear of offers that seem too good to be true. If you receive a message from someone you know and trust, please let them know that their link may be a problem. No matter what, don’t open a link from anyone if you aren’t entirely sure the links are valid.
Business Security

Why do you need a top-down approach to IT security?

May 1, 2020
Why do you need a top-down approach to IT security? For any organization, its employees are its biggest assets. But, what happens when your biggest assets turn out to be your greatest threats or liabilities? That is how cybercrime can change the game. In a recent study, it came to light that employee actions account for about 70% of the data breaches that happen. This blog focuses on the first step you need to take as an organization to better prepare your employees to identify and mitigate cyber threats–adopting a top-down approach to IT security. Being a victim of cyber-attack can prove disastrous for your business as it has the following repercussions. Affects your brand image negatively: Business disruption due to downtime or having your important business data including customer and vendor details stolen reflects poorly on your brand. It can cause you to lose customers: Your customers may take their business elsewhere as they may not feel safe sharing their PII with you. Can cost you quite a bit financially: Data breach makes you liable to follow certain disclosure requirements mandated by the law. These most likely require you to make announcements on popular media, which can prove expensive. Plus, you will also have to invest in positive PR to boost your brand value. It makes you vulnerable to lawsuits: You could be sued by customers whose Personally Identifiable Information (PII) has been compromised or stolen. The organizational mindset needs to change and acknowledge the fact that IT security is not ONLY your IT department, CTO or Managed Service Provider’s (MSP) responsibility. You need to truly believe that IT security is everyone’s business, and that includes everybody working in your company, from the C-level execs to the newly hired intern. Everybody needs to understand the gravity of a cyberattack and its impact. Only then will they take cybersecurity seriously.
Network Security

BYOD goes far beyond IT questions.

April 22, 2020
BYOD goes far beyond IT questions. Most often we view BYOD policies as something initiated and overseen by IT. But that misses the broad-ranging impact of BYOD across several other functions in an organization, particularly the human resource function. A quickly or poorly developed BYOD policy can create legal liabilities under federal and state laws, but it also involves human resources issues that affect employee satisfaction, trust, recruitment and retention. Today, let’s look at the privacy issue. Extreme dissatisfaction with privacy policies could damage employee satisfaction and the trust necessary to maintain a positive employer-employee relationship. Extreme dissatisfaction could lead to retention issues, which is a major human resource management concern. With BYOD, employers have sincere concerns about the privacy of their data contained on devices over which they do not have complete control. To what extent can they monitor and have complete access to the device in order to update software and secure their own data? From the employee perspective, the biggest concern about BYOD is the privacy of their personal data. Employees fear company access to video, health records, photos, private emails and text, and other data. What about GPS tracking? Can the employer track employee whereabouts? These aren’t just IT logistics questions. They get at the root of the employer-employee relationship. These are issues too complex to answer here, but it is important to raise them so that you can adopt BYOD with “eyes wide open.” Design HR policies that ensure you are not in violation of either FLSA and state reimbursement policies. And while the law may be less clear regarding privacy policies and company monitoring of BYOD devices, it should be recognized that ill-defined policies or ones that are perceived to be excessively invasive of employee privacy could create serious human resource issues, particularly in the areas of employee satisfaction, recruitment and retention.
Network Security

BYOD: The fine print matters

April 15, 2020
BYOD: The fine print matters BYOD is the acronym for Bring Your Own Device to Work where “device” can refer to a laptop, tablet, or smartphone. Most frequently, however, the BYOD issue arises over the use of mobile phones. As it became more common for everyone around the start of the 2000s to buy their own mobile phone, an issue of convenience began to arise. Employees who had previously only had company-issued phones now had to carry two devices 24/7: their own and their employer’s. This clearly wasn’t the height of convenience. If the devices were not identical it would mean mastering two different operating systems. As a result, a movement arose to allow individuals to use their own phones for work-related demands and drop the employer issued one. Although not as prevalent, the issue can come up with the use of personal laptops and tablets for work use. Why would employees want this when their employer is footing the entire bill for a company issued phone or laptop? It is mostly convenience and the freedom of personal choice. Because we use electronic mobile devices 24/7, we blur the lines between work and personal use. At any point, we may be answering a work email and texting to a family member. It just becomes impractical to have the two physically segregated. That said, there are also reasons individual employees may have strong objections to a required BYOD, not the least being personal privacy. So what’s an employer to do? The answer isn’t easy and will differ for each organization. A wide calculus of issues enter into the final decision to allow BYOD and there is no right or wrong answer. However, it is important that the decision be made by a management team that is fully informed of all the issues surrounding BYOD. The worst thing is to just adopt the approach with no policy to constrain BYOD device usage. Without proper guidelines, policies, and tech support, the company exposes itself to privacy, human resource, and data security issues.

We’ll bring great service and support to you:

Grand Haven

Spring Lake

Norton Shores

Muskegon

Holland

Zeeland

Grand Rapids

Coopersville

Whitehall

GET A COMPREHENSIVE I.T. SYSTEMS AUDIT >>>
+ GET SUPPORT