Our consultants work with you to understand your current business processes, identify gaps and create strategic initiatives that align technology with the goals of your organization. Our goal as an organization, is to help our clients leverage technology. Technology is the passion that drives our organization.
We were a Managed Services Provider when it had not become a buzzword. What managed services means to us is that we become part of our clients’ organization; we act has their I.T. Department. We manage vendors, handle daily help-desk requests, provide project planning and all strategic direction for the organization taking the stress of out of the management of the constant change in technology.
Managed Security Services
Is your organization secure? Do you know know if you have been breached? Cyber-attacks evolve at an incredibly fast pace, leading to one new threat after another. Without the proper security tools and resources, keeping up with evolving threats, addressing threats as they arise, and recovering from incidents can be detrimental to the business. We have the resources and experience to keep our clients secure from the dark side of the internet.
The inTech Mission
We don't see ourselves as a vendor, we become part of your organization
We are always researching and developing better products and experiences for our clients
We are focused on leveraging technology to solve your business needs
Recent Blog Posts
70TB of user data stolen from now-defunct social media site Parler.
Does it feel like you’re getting an email update from everyone you’ve ever done business with about how their company is handling COVID-19? A spike in corporate email messages meant to keep customers informed has provided a valuable opening for bad actors to exploit as they mount new phishing attacks. The United States Secret Service recently released an Read more about MALWARE-LADEN COVID-19 EMAILS EXPLOIT MS OFFICE VULNERABILITY[…]
As companies collect and store more and more personal information, they face data privacy risks on many fronts. Increasingly, they are being held accountable for protecting their customers’ digital privacy. New regulations, led by Europe’s General Data Protection Regulation (GDPR) in 2018, are quickly becoming normative in countries around the world. In total, 58% of all countries Read more about Six Similarities Between GDPR & US Regulatory Requirements[…]
It can happen to anyone – you’ve taken steps to limit your exposure to a cyber incident. You’ve purchased and implemented top-of-the-line IT solutions. You’ve carefully thought about security best practices and strived to adhere to them. But somehow, you’ve just become the latest victim of a data breach. It might have been discretely packaged Read more about You’ve Been Breached: Now What?[…]
Phishing is one of the most common, yet dangerous methods of cybercrime. It utilizes deceptive messages to trick victims into clicking untrustworthy links, downloading malicious attachments, or divulging sensitive information. Despite cybersecurity experts’ warnings over the years, it seems that internet users still consistently fall prey to these simple but effective attacks. According to Verizon’s 2019 Read more about How to Spot a Phishing Attempt[…]
Maintaining compliance in today’s ever-changing environment is no easy task, particularly within the healthcare space. In the past, hackers opportunistically targeted providers due to poor security networks and infrastructure. Over time, however, cybercriminals have realized the true value of personally identifiable information (PII) and protected health information (PHI), which can be leveraged for identity theft, financial Read more about HIPAA 101[…]
Data privacy regulations are quickly becoming par for the course in countries around the world, each one bringing new, nuanced responsibilities for companies to follow. While Europe’s expansive General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) have made most of the headlines, we are just months away from the latest privacy regulation, New Read more about The NY SHIELD Act is Almost Here: How to Stay Compliant[…]
A quick glance at recent reports or news headlines paints a dismal picture of the data breach landscape in 2019. Both by the measure of the number of companies compromised and the number of records accessed, breach incidents are occurring at a record-setting pace, with over four billion records exposed for misuse and abuse this year. Read more about How to Stop Credential Stuffing Attacks[…]
A data breach is disastrous for any company in any industry, but the healthcare sector is an especially high-stakes arena where data security is of utmost importance and under continual attack. Few types of data are as valuable as Personal Health Information (PHI) and other health-related data like prescription information, health insurance login information, or Read more about The Relationship Between Healthcare & The Dark Web[…]
It’s no secret that the costs associated with data breaches are trending upward at alarming rates. Just this year, IBM’s annual Cost of a Data Breach Study found that the average cost of a single data breach is approaching $4 million. Although IT repair, identity monitoring services, and regulatory fines quickly make their way to financial statements, Read more about The Unseen Consequences of Data Breaches[…]
Few cyber threats are as prevalent and costly as phishing attacks. In 2018, Microsoft documented a 250% increase in phishing campaigns, which masquerade as legitimate products or services but actually carry malicious payloads that steal credentials and compromise IT integrity. To no surprise, the rise of phishing attacks continues to trend upward and is wreaking havoc for Read more about 4 Phishing Attack Trends of 2019[…]
The remodel is finally complete! We have officially moved into our new building.
We will be moving into our very own building in July. The new building is also located in Kent so we will be calling Kent our home for the foreseeable future. We are excited to move!
Raj and Kamal co-chaired the 2019 South Sound Heart Ball on Friday April 26th. Under Raj and Kamal’s leadership, the campaign raised $400,000 – which is the most amount the campaign has raised. Thank you to all that supported the mission.
2018 was an amazing year for my personal growth and improvements, but I couldn’t have done it without having such a willing and able team helping me along the way. My role with inTech has allowed me to acquire new skills that I did not have and has allowed me to sharpen my existing skills. Read more about Employee of the Year – 2018[…]
Meet Karson! When he isn’t working hard to resolve your I.T. issues, he is enjoying noodles at his favorite noodle place in Seattle Samurai Noodles. When asked what attracts him to this 5th ave restaurant he responds “Try the Noodles!”
Heart disease and stroke take the life of too many of our loved ones, yet most people don’t know that cardiovascular diseases are the number one threat to our health. We are pleased to chair the American Heart Association’s Heart Ball in Tacoma on April 26 to raise awareness of this fact so we can Read more about American Heart Association Heart Ball 2019[…]
We are celebrating our 5 year anniversary this year. It has been an amazing ride. In the 5 years, we have cultivated many relationships, clients on 3 continents and team members in 3 countries. We are excited to see what the next 5 years will look like.
We welcome Roy to our growing team of technology enthusiasts. Roy was born and grew up in the Pacific Northwest. His interests are music and technology. Roy teaches piano to young music enthusiasts in his spare time. Being legally blind does not deter Roy – he uses the built-in operating system accessibility tools along with Read more about New Team Member – Roy[…]
On Saturday May 26th, inTech participated in the Annual Sikh Parade at the Showare Center in Kent. Heart disease is the leading cause of death among people of Indian descent so we decided to partner with the American Heart Association to teach signs of heart attacks and stroke. We also provided CPR training and were Read more about Seattle Sikh Parade[…]
On Saturday May 19th, inTech had the privilege of volunteering for the Seattle Sluggers. The Sluggers are a Beep Baseball team from Seattle. Beep Baseball is played by blind individuals with a softball like ball that makes audible noise to alert the blind batter and fielders the whereabouts of the ball. On Saturday, it was Read more about Beep Baseball – Seattle Police Department – 4th Annual Game[…]
We welcome Jake to our growing team of technology enthusiasts. Jake is originally from the state of New York. His interests are music, hiking and cats.
Brayden was recognized as the Employee of the Year for 2017. We have a committee that recognizes and awards our team members monthly for Employee of the Month and the Employee of the Year is an accumulation of the points earned throughout the year and is awarded in December. Brayden’s specialty is all things Office Read more about Employee of the Year – 2017[…]
Bitcoin, a type of cryptocurrency, has been the craze for the last couple months for its exponential growth and immense potential for profitability. For reference of how lucrative Bitcoin has been, back in July of 2010, a single coin was worth $.08; in December of 2017, it reached $20,000 for a single coin. It Read more about Lunch and Learn on 3/9/18: Bitcoin, Blockchain, and Mining[…]
In the previous blog post, we talked about our first speaking gig of 2018, on Cybersecurity. We talked about the importance of being very aware of the dangers of Viruses, Malwares, and Security Breaches. Here is the link to this post. With that said, 95% of breaches are caused by human error and 55% of Read more about Top 5 Simple Tips: on Preventing Viruses, Malwares, and Security Breaches[…]
As we get closer to 2020, we start entering the deep waters of immersive technology that can be very exciting but also worrisome. It is nice to have online banking, buy clothes from an online website, store our private photos on the cloud (instead of a physical drive that could be destroyed in a fire), and Read more about First Speaking Gig of the Year – A Talk on Cybersecurity[…]
As an organization, we want to give back to our community and it is our goal to have our team members involved in our community. The American Heart Association is an organization that has great ties with inTech. Our team participated in the 2017 Puget Sound Heart Walk on September 30th. We had a wonderful Read more about American Heart Association Heart Walk 2017[…]
Everyone knows that there is a huge fan base for Apple’s iPhone. On September 12th, Apple is scheduled to make some interesting announcements and the main announcement will be the new iPhone 8. We have been monitoring the rumor mill and have come up with the following list of features that are rumored to be Read more about iPhone 8[…]
At one of our manufacturing customers, something strange was happening. Employee lunch was at 11:45am. That became 11:40am over several months. And it was only moving earlier. After tracing out the relay wiring for the alert system, we found the connector to the relay controlling the alert system inside one of the old timeclocks. When Read more about Raspberry Pi Timer[…]
It was Saturday Aug 26 and a beautiful Northwest summer day. We reached Rainier Beach High School and met with Kevin Daniel, coach for Seattle Sluggers. Seattle Sluggers are a Beep Baseball team that was recently at the World Series of Beep Baseball in July. Kevin and I agreed to have our teams play each Read more about Seattle Sluggers Beep Baseball[…]
We are remodeling our office to add more space for our new team. We have been growing pretty rapidly – adding 2-3 people per quarter over the last year. We are excited for the remainder of the year as we plan on adding at least 5 more new positions by the end of the year.
We are pleased to announce the expansion of inTech team to Vancouver, Canada. With our new office located at 8333 130th St, Surrey, BC. We are excited for the new positioning this gives inTech as we move into our next year of planning. At inTech Consulting, we believe that to successfully address the customers issues Read more about inTech Canada Location Opening[…]
My days are hectic. My life is run by my calendar and therefore my iPhone. I am constantly checking emails, making calls and researching topics and products from my phone all day. If you know me then you know how much I love my iPhone 7. The problem has always been the battery life! I Read more about Apple iPhone 7 Smart Battery Case Is The Best![…]
When your phone dies at 36 percent battery remaining, you replace the battery. When the second battery does the same thing, and re-calibrating the battery doesn’t work, you get a new phone. Or at least that’s what I did. I loved my Samsung Galaxy Note 4 from the time I got it until the time Read more about iSwitched back to the iPhone[…]
Come see us at our booth at the Kent Business Expo today at the ShoWare Center. Looking forward to meeting some great people.
Our team at inTech participated in the 2016 South Sound Heart and Stroke walk over the weekend. It was held at Cheney Stadium on Saturday, October 8th. It was very special event for us personally because so many of our family members have been affected by heart disease. It was truly touching to see how Read more about inTech Cares – American Heart Association Heart Walk[…]
I get really excited at the beginning of September – every year. I am a huge Apple fan, iPhone fan, more specifically. Apple will announce the new iPhone model and we will be watching the live event tomorrow and will post what we learn afterwards. Here is what the rumors say: The design of the Read more about What is Apple announcing tomorrow?[…]
We are at the VMworld conference this year learning about all of the new technologies that are being introduced by the biggest names in the industry. We will post what we learned on Friday.
We constantly come across a fair number of security related articles talking about security flaws, worms, viruses, Trojans and all manner of nasty sounding programs. With a large selection of malicious software out there, it can be tough to tell the difference between a virus and worm. Here’s an overview of the most commonly used terms Read more about Know your terminology[…]
MIT Rivals Tor What is Tor? Tor is free software for enabling anonymous communication over the internet. It stands for “The Onion Router,” based on the original software project name, which is further based off the type of routing it uses; onion routing. We will get in to that later. It is a web Read more about MIT Rivals Tor[…]
The Current Landscape Right now, everything you do over any type of network is based on three types of cryptography, made popular in the 70s. You have RSA, Diffie-Hellman key exchange, and Elliptic Curve technology. These are all based on mathematical problems that are easy to solve, but hard to reverse. For example, a Read more about Quantum Computers And Why Your Cat Meme Album Is At Risk[…]
With the current direction the industry is heading, more and more IT environments are moving to cloud solutions. This means you need to use additional tools to keep your cloud and on-premise environments in sync to create a true Single Sign-On solution. In this article, we will be reviewing sync features of one specific tool Read more about Azure AD Connect – Connecting your infrastructure to the cloud[…]
The Basics of Security In any environment, the security system is only as strong as its weakest link. Why would you have a state of the art firewall if you just left the root admin password as default? Why would you lock down your network shares, only to share out account passwords? Why would Read more about Password Security[…]
So you pay your employees to collect, input, process, correlate, audit and otherwise wrangle the data that drives your business. You’ve paid a small fortune for a line-of-business application to structure and hold all this data and guide your business processes. You’ve invested a great deal of time and energy in implementing all of this Read more about The Myth of Turn-Key Business Intelligence[…]
Business process automation (BPA) is a way to manage information, processes, and data with technology in order to reduce costs for a business. Because of its success in many enterprises, BPA is a growing market. There are many ways to make money or reduce spending using BPA, including through the following five business process automation Read more about Use Business Process Automation to increase profits![…]
Secure your hardware Securing your hardware is an often overlooked and simple step you can take to secure your network. The best firewalls and anti-virus systems are rendered useless if burglars steal your equipment, servers, laptops, and mobile phones. Lock your servers and related equipment behind a locked door and secure them with server racks. Read more about 5 Simple Steps You Can Take To Secure Your Small Business Network[…]
We are always on the lookout for new talent, and as manager of our services team I interview a lot of candidates. Some are just starting their career, some are working on a second or third career, and some, like me, have spent years in corporate IT and are looking for a change or a Read more about So You Want To Get Into IT…[…]
Remember that Sunday morning we set our clocks FORWARD by one hour! Daylight savings has to do with energy savings. Remember, this Sunday on March the 13th, “Spring Forward” into the new year and set your clocks forward an hour. Technically, it’s 2am on Sunday, so if you have an early morning– be sure to account Read more about Spring Forward![…]
Office365 is a fantastic mail platform with many options. However, due to the large amount of options, certain features are often unexplored. Specifically, there seems to be a lot of confusion regarding O365 mailboxes. I frequently see offices paying for mailbox licenses when a different free mailbox could’ve been used. In this article I will review Read more about Using O365 Mailboxes and Permissions[…]
CryptoWall Viruses CryptoWall viruses such as CryptoLocker, AlphaCrypt and TeslaCrypt to name a few are ransomware trojans that encrypt any file that it has access to your on machine, delete the original, and then demand money to restore your data. What this means is that not only will it delete your files from your computer Read more about Crypto![…]