IT Support

Welcome to our IT support blog posts. Bookmark this page to stay in the loop with our expert advice about IT and workplace security. Learn more about dealing with common challenges with Microsoft, Webex, cyber security and more.

Microsoft Office Auditing Case Study

How One Client Saved 28K with Microsoft Office 365 Auditing

By Intrust Man | June 16, 2022

We saved one client over $28,000 per year on Microsoft Office 365 licenses through our Office 365 auditing process.  Here at Intrust, almost all of our clients use Microsoft Office…

Read More
Managed Microsoft 365 featured image

Managed Microsoft 365: 9 Benefits of Managed IT Services

By Tim Rettig | June 16, 2022

If you are using or considering Microsoft 365 for your business? Consider this: Managed Microsoft 365 is even better. Managed 365 means that a managed service provider (MSP) correctly configures,…

Read More
New Models For Outsourced IT Support

In House, Co-Managed or Hybrid: New Models For Outsourcing IT Support

By Eric Martinez | May 19, 2022

You know you need better IT but you don’t know the best way to get it: Hire in-house or outsourcing IT support with a managed service provider (MSP)? Why not…

Read More
Avoid These Cloud Migration Nightmares

Cloud Migration Nightmares and Tips

By Josh Rees | May 12, 2022

By now you know that migrating to the cloud is an absolute necessity for both large and small companies for better mobility and collaboration and business resilience. But you need…

Read More
Saving Changes HP Thin Clients

Saving Changes When Using HP Thin Clients and Windows Embedded

By Intrust Man | May 8, 2022

HP thin clients that use Windows embedded as the operating system (OS) have a feature that causes them to revert back to the previous state upon reboot. With HP thin…

Read More
Disaster Recovery Time RTO & RPO

Know Your RTO & RPO For Disaster Recovery Time

By Intrust Man | April 27, 2022

If you are like many small business executives, you don’t know what your RTO or RPO are for your business — at least according to a recent article in Small…

Read More
Cloud Migration Strategy in 10 Steps

Your Cloud Migration Strategy in 10 Steps

By Josh Rees | March 17, 2022

Cloud migration, simply put, is moving your digital business operations such as relevant data, applications and IT-related processes from your onsite premises to an offsite cloud. A cloud migration strategy…

Read More
Endpoint Detection and Response (EDR)

Why You Need Endpoint Detection and Response (EDR): Next Gen AV

By Dave Hatter | March 10, 2022

You know by now that your cyber security comes down to far more than your antivirus (AV) software. But that doesn’t mean you shouldn’t stay up to date on the…

Read More
Avoiding Ransomware attack at Your Company

Your Money or Your (Company’s) Life? Avoiding a Ransomware Attack

By Dave Hatter | March 10, 2022

Ransomware is a growing billion-dollar business and hackers have launched high-profile ransomware attacks against nearly every industry from healthcare to higher education to financial services, often with large ransoms and…

Read More
Intrust IT explores crypto mining on company servers

Crypto Mining on Company Servers

By Dave Hatter | February 24, 2022

Here at Intrust IT, we’ve seen an increase in crypto mining on company servers with new  and existing clients. Our vulnerability assessment can catch if employees are engaging in crypto…

Read More