The Thurston, Pierce, Lewis, and Mason Counties IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

 

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

This article contains both the letter and the social media needed. To get the link to include in the letter and social media posts, you will need to go to Components > Easyblog > Posts > and make sure the blog: Knowing, and Planning For, Your Organization’s Compliance Burden is published. It will appear in the Miscellaneous Category on the front end of your website. 

===Letter===

[ADDRESS BLOCK]

DAY, MONTH, YEAR

Dear [CONTACTNAME],

Understanding the numerous regulations your business must comply with can be an arduous and expensive task for small-business owners. The average small-business owner is estimated to spend at least $12,000 every year on average dealing with regulations, not to mention the dozens of hours spent ensuring that your company meets the standards of those regulations. Educating yourself on what your company needs to do in order to comply is necessary in today’s society to ensure compliance - or noncompliance - costs don’t sink your business.

We at PC Technologies want to help ease some of the burden that these regulations put on your company. To help, I would like to point you to a blog article on our website that discusses the issue of compliance in detail. We care about your company, and want to make sure that you don’t have to shoulder this burden alone.

You can read that article here: LINK

I’m available to answer any questions you may have about controlling your compliance situation. I can be reached at 360-491-2227 - EXT, so please don’t hesitate to give me a call so we can chat about your company’s compliance burden and what PC Technologies can do to help.


Sincerely,

CONTACT NAME

POSITION

COMPANY



===Social Media===

Facebook: In today’s data-driven world, it’s more important than ever to ensure that your information systems are secured. However, regulations that involve protecting sensitive information are expensive for SMBs: LINK

 

Facebook: The average small-business owner is spending at least $12,000 every year dealing with regulations. Are you prepared to handle the cost of compliance? LINK

 

Twitter: The cost of compliance will hurt your business if you’re not prepared for it. Can your business afford to comply? LINK

 

Twitter: Regulations are costly for small-businesses. Make sure your organization is prepared to handle the cost: LINK

 

LinkedIn: The average small business pays more for their regulatory compliance programs than larger businesses in the same market do. That’s why it’s important to plan ahead: LINK

 

LinkedIn: Ensuring that your small business is compliant with all applicable regulations is a complicated and expensive (but necessary) process: LINK

 

 




Who Are We?

It's Nice To Know Who You're Working With, We Get That

PC Technologies understands that making a decision means putting your trust in us. We encourage you to find out more about our company and read testimonials from our many satisfied customers!

About PC Technologies

We are not your typical business, We are your business partners

We live by the idea that your business needs come first, so much so that our CEO W. Jeff Seeman has written a letter for you to read showing just how dedicated our team is to not only solving problems but your success!

Read More
Our Difference
 
It's a Secret

Shhh, don't tell anyone we told you!

WARNING: We are about to let you in on a secret about how most computer companies really make their money! We will cover the three main types of IT companies and what you can expect out of them.

Discover What It Is!
 

Refer A Friend To PC Technologies!

Do you know someone who you think my benefit from our services? Let us know and we will get in touch with them!

Read More
Refer a Friend
 

What Our Clients Say

  • I highly recommend PC Technologies for any of your IT and/or computer needs
    Practice Manager at Robert GR Lang, MD Inc

    Jeff has provided computer components and IT services to our medical practice since 2007. He has seen us through a system conversion, office move, and EMR implementation, providing the peripherals and support needed to make a smooth transition each time. He and his staff are prompt, professional, and price conscious. I highly recommend PC Technologies for any of your IT and/or computer needs

  • Gets it fixed fast
    CPA

    Jeff and his staff installed a major computer upgrade for my office. There was no down time for my staff, the system works great and whenever there's glitch, Jeff, or one of his staff, gets it fixed fast.

  • No more having to take the computer into the store
    Director at Washington Gemological Laboratory

    I have relied on Jeff and his crew for not only minor 'bugs' that occur but also for swapping out the entire data from an older laptop into the one I currently use. They have always been able to do the job and quickly. Most of the time they are able to resolve the issue over the phone, while controlling my computer from their office. Love it!! Makes my life so much easier. No more having to take the computer into the store.

  • Jeff is the IT consultant for our company.
    Citizen Action Network at Freedom Foundation

    He goes the extra mile to ensure that all of our computer infrastructure is running smoothly. When we do encounter problems Jeff is quick to respond. He has become integral to our team--so much so, we should call him a staff member rather than a consultant.

  • PC Tech is a great place to get all of your IT needs.
    Branch Manager / Loan Officer at Weststar Pacific Mortgage

    Jeff is always available and works with you on the best possible solutions to ones needs. I would recommend PC Tech to anyone that is running a business and does not want to deal with IT.

  • Jeff is able to bridge the gap between IT professional and customer relationships very well.
    Board Member at Seattle Search Network

    I've recommended him to clients that are in need of IT services many times. Jeff is highly skilled in IT and understands the changing trends and its impact to the small business owner. I'd highly recommend Jeff to others seeking for an IT professional.

Latest Blogs

Best Practices for Your Access Management

Control Access, Based on Role

Let me ask you a question: how many people outside of your accounting department need to see the business’ financials? Outside of the people involved in managing payroll, who needs to see how much each of your employees are making? There is a lot of potentially sensitive information floating around your business, and without the right solutions in place to protect it, anyone in your business could potentially access it.

Role-based access management solutions can do a lot to help fix this problem. These solutions simplify the process by assigning permissions to roles, rather than individuals, so all a manager needs to do to remove a user’s permissions is to remove them from a certain role. As a result, it is easier to grant and rescind permissions as necessary without worrying about missing one in the process.

The Principle of Least Privilege

While we’re discussing role-based access control permissions, we should touch on the concepts behind the principle of least privilege. Consider a high-ranking member of one of your departments (we’ll call it department A). It stands to reason that the manager of department A should be able to access all of department A’s resources and data. However, the manager of department A probably has no need for the resources and data that department B or C have. Likewise, the managers of B and C each have complete access to the data they utilize but should not have this access to data controlled by other departments.

Access control simply creates a relatively simple system of enforcing this kind of specified access.

Multifactor for Multi-Layers of Protection

While, on paper, passwords should be the apex of security measures, they have proven countless times to be less than adequate for security. The reason for this is twofold: first, the technology available to crack passwords is advanced enough to do so much faster, and second, users aren’t creating them to the standard that “the apex of security measures” should be held to.

Chances are the second reason is the one that will give you more trouble. When you consider that the launch code for the entirety of the United States’ nuclear arsenal was simply “00000000” for almost two decades, how likely does it seem that one of your employees has become lax in their passwords?

This is why it makes sense to protect your resources by requiring multiple factors of authentication. Typically, to log into a system and access its data, you need to provide your identity via a username, and verify that identity through an agreed-upon form of authentication - traditionally, the password. However, if that password is easily guessed or cracked, that alone isn’t technically enough to fully verify that a user is who they say they are.

That’s why multifactor was developed. It takes one factor - the password - and requires another in addition to it to fully confirm an identity. Preferably, this additional factor wouldn’t be another password - it may be biometrics, or a physical security key, or a code that is generated on demand.

You have a lot of power when it comes to controlling your company’s data, so you need to find a balance between access and restriction that both protects this data and allows your business to leverage it to its full potential. PC Technologies can help - reach out to us and learn more by calling 360-491-2227.

Learn More

Tip of the Week: Keeping Track of Your Own IT Isn’t Easy

This is a big part of why we call ourselves a managed service provider, actually.

How We Are Able to Track So Much

One of the biggest parts of managed services is our practice of monitoring our clients’ IT solutions in order to catch inconsistencies and threats. In order to do so, we utilize a collection of advanced tools and specialized software that allows us to comprehensively track and analyze all of your technology.

These tools and software give us a look under the hood, so to speak, allowing us to record data and create our own historical record to reference.

As a result, we wind up producing a truly staggering amount of documentation on your business’ technology:

  • Each and every device you have, from your network infrastructure to every company-owned endpoint and peripheral that attaches to it.
  • The proper configuration for each of these devices.
  • The date that each of these devices was installed.
  • The licenses that your business needs to maintain, and the status of the ones you have.
  • A comprehensive history of all service that each of these devices have received.

This documentation allows us to better diagnose and resolve issues with your IT - usually preemptively - resulting in fewer interruptions and issues to keep you from accomplishing what your business is supposed to be accomplishing.

Interested in finding out more?

This entire process usually starts with a simple network audit, just to reveal where the business currently stands. Let us perform one for you. Reach out today to schedule yours by calling us at 360-491-2227!

Learn More

The Value That Managed IT Services Bring to the Table

Our Experience with Industries

Perspective is a valuable thing, especially when you have to figure out solutions to as many problems as an MSP has to. Not only are there occasionally real-time issues to resolve, we also deal with predicted problems and challenges, working to have a fix ready for when it is needed. We’ve gathered a lot of perspective during our experiences doing so, and it has made us better at our jobs.

However, perspective is only helpful if it can be applied practically - you need more than a complete view of things, you also need to know what you are looking at. The same goes for the IT support team you are relying on, too. What are your IT challenges, and how are your operations most impacted by them? The most successful support team is the team that understands how your business needs to operate and provides you with the IT services that facilitate that.

Response Times

From the perspective of a business owner, many of the issues that pop up in their technology do just that - they pop up. They’re sudden. Considering that, there’s little wonder that many business owners still prefer to have an employee (or a department, depending on the size of the business in question) on-hand to work on IT issues. That way, travel time isn’t a factor, and the issue can be resolved quicker, right?

Well, yes and no. 

Part of it has to do with the remote nature of managed services, so someone on-site is going to be able to get their hands on the problematic device that much quicker, sure. However, because the MSP is using their remote access to proactively monitor your solutions, you probably aren’t even aware of the problems that the MSP is catching and resolving for you behind-the-scenes - and technically speaking, even if the problem does require an on-site visit, the MSP could be using their remote monitoring solutions to help diagnose the problem as the tech is on their way. 

Again, the idea is to avoid incidents that make it critical to cut down response times in the first place.

Services Offered

What is it, really, that you need of your IT resource? Specialized experience with niche technologies? Greater control in your hands? Less responsibility? Improved communications? Adherence to stricter compliance standards? A good managed service provider can help you with all these things, and more.

Furthermore, a relationship with us gives you privileged access to the same professionals that we’ve cultivated relationships with - vendors and the like - as a pleasant addition to our team’s expertise and determination to successfully provide for your IT needs. Overall, this is truly one of the biggest, underestimated, benefits to working with a managed service provider.

Cost Savings

Consider the investment you would have to make to completely staff and equip an entire IT department with highly skilled professionals of the caliber and skill that we have at PC Technologies. Now consider how you could better invest that money, having saved it by signing on with PC Technologies as your outsourced IT provider.

There really is something to this managed service arrangement.

If you’re looking to get something more out of the way your business takes advantage of technology, give us a call at 360-491-2227.

Learn More

Know someone who would benefit from PC Technologies? Let us know!

Latest Blog Entry

As you oversee your business, there is a lot that you’re going to have to manage - including how much access your employees have to the data you have collected and generated throughout your operations. An access management policy can help you to accomplish this. Here, we’ll ...

Latest News

PC Technologies launches new website!

PC Technologies is proud to announce the launch of our new website at www.pctechnologies.net. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...

Account Login