marketing@abtechtechnologies.com

Case Study: HealthCare eClinicalworks Application Upgrade

Abtech partners with Major Medical Center and eCW to reduce downtime, reduce costs, and enhance patient care. I wanted to quickly jot a note to you before the evening was completely gone. We were wildly successful with this evening’s tasks. I remarked to Abtech it’s lovely to have successful migrations like the ones that we’ve …

Case Study: HealthCare eClinicalworks Application Upgrade Read More »

The best way to mitigate damage from a cyber-attack.

Dell EMC PowerProtect Cyber Recovery Cybercrime has been dubbed the largest transfer of wealth in history. According to Accenture, cybercrime will put $5.2 trillion worth of global wealth at risk over the next five years. Regardless of the industry or size of the organization, Cyber-attacks constantly put businesses at risk of loss of revenue, loss …

The best way to mitigate damage from a cyber-attack. Read More »

Everyday tips that help you identify a phishing attempt

Phishing is one of the most common types of cyberattacks aimed at stealing your money or identity by means of obtaining your personal information and using it to access your accounts. This type of cybercrime is present on all popular communication media, ranging from social networks all the way to emails, phone calls or even …

Everyday tips that help you identify a phishing attempt Read More »

Prevent, Protect and Mitigate Cyber Attacks

An anatomy of a real attack User targeted by spam email. User engaged with hacker and their local laptop was compromised.  The hacker then used the VPN connection on the laptop to access the corporate network.  With access to the network the hacker started a network discovery sweep. One spreadsheet with admin credentials was found.  …

Prevent, Protect and Mitigate Cyber Attacks Read More »

6 common items that help identify a phishing attempt

What is Phishing? Phishing is a cybercrime in which a target or targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.  Generally, emails sent as phishing attempts are masked …

6 common items that help identify a phishing attempt Read More »

Abtech’s team of talented support engineers continues to grow.

Zach Taggett has joined Abtech Technologies as part our team of talented support engineers in our managed IT services division. Abtech is expanding its managed services division in Maryland, Washington D.C., Delaware and Virginia. Zach brings with him many years of experience, supporting customer IT environments, and came to us highly recommended by one of our …

Abtech’s team of talented support engineers continues to grow. Read More »

Swimming to the top in a sea of server offerings

Evaluating server suppliers can be tough. In considering the Big Four, with similar options from the same chip manufacturers, NICs from the same networking vendors, and the same OEM’s disk and memory options, it can be difficult to look at servers as anything but a commodity. On the other hand, each server supplier has their …

Swimming to the top in a sea of server offerings Read More »

Top 10 Reasons to Refresh legacy DellEMC storage with PowerStore

As they say, all good things must come to an end.  Storage administrators with expiring DellEMC storage solutions know this better than anyone. Acquired by Dell in 2010, Compellent, later dubbed as SC, featured Auto-Tiering which proved as a nifty way to keep the most frequently accessed data on flash media, and tier less frequently …

Top 10 Reasons to Refresh legacy DellEMC storage with PowerStore Read More »

‘killware’ Raises the Stakes in the Game of Cyber Security.

As Business Leaders and IT Professionals continue efforts to get off their heels and in front of cyber criminals, the threats are changing and making it more important than ever to protect our most valuable commodity – data. While ransom events like Colonial Pipeline and Solar Winds certainly grabbed national attention, bad actors continue to quietly evolve their efforts.  …

‘killware’ Raises the Stakes in the Game of Cyber Security. Read More »

Abtech Technologies awarded multi-year managed services contract.

Abtech Technologies has been awarded a multi-year contract to provide and deliver IT Managed Services, IT Security Services and IT Consulting Projects for the City of Lake Forest, CA. This is in addition to the Cloud Backup and Disaster Recovery Service that Abtech Technologies already provides for the city. Abtech won the bid against strong …

Abtech Technologies awarded multi-year managed services contract. Read More »

Microsoft Teams Best Features

Microsoft Teams™ is a real-time, cloud-based platform that provides users with workplace chat, video and audio meetings, file collaboration capabilities, file storage, and so much more. In this newsletter, you will gain valuable insights into how you can use Microsoft Teams wide array of features to your advantage. Here are just some of the highlights: …

Microsoft Teams Best Features Read More »

Why move to the Dell|EMC VxRail for your next upgrade?

HYPERCONVERGED. One of the many buzzwords thrown around today amongst the litany in the IT industry. What is Hyperconverged and how can it help revolutionize your daily business operations? Many years ago, the need for more and more applications caused data centers to grow, so did the need for additional servers.  Servers were standalone, single …

Why move to the Dell|EMC VxRail for your next upgrade? Read More »

“How To Get The Best Performance From Your SQL Server 2019”

Contrary to common perception, today’s Microsoft SQL Server is no longer an off the shelf RDBMS system that you install and run with its default settings.    With version 2019 you get one of the most sophisticated and technologically advanced systems on the market comparable to the likes of Oracle.   To help the average user, we …

“How To Get The Best Performance From Your SQL Server 2019” Read More »

How Protected Are Your Backups Against Ransomware?

Ransomware today is big business for criminals, so profitable that we are seeing more organized crime and nation-state actors getting involved. The threat landscape today is larger than ever with supply chain attacks targeting major vendors and pushing compromised software updates as seen in the 2021 SolarWinds incident or shipping conglomerate Maersk in 2017. Each …

How Protected Are Your Backups Against Ransomware? Read More »