Making IT decisions for 2026? Check out our YouTube channel for practical IT guidance, cybersecurity updates, and more.
ComTech is reliable, knowledgeable, and courteous. The staff always respond to issues in a timely manner and correct the issue. We use both their IT and Phone services. The cost savings were very good versus our...
ComTech installed phones for our 7 locations. I want to send a heartfelt “Thank You” for a job well done on this project. Considering the number of locations and complexities that entails, I am very pleased...
ComTech was very much involved and sat down and talked to us when we were switching our phone system to their cloud-based system. They explained everything about the new system and made suggestions on improving call...
ComTech provides good service and support of both IT and Phone equipment. Being able to retrieve our voicemails through email saves us time from calling in to retrieve them. We are very pleased with the system. I...
I have confidence that ComTech is giving me the best “reasonable” protection of my information system. Having confidence in their services, the benefits are greater than the costs. It is critically important to...
So much more cost effective! I can’t believe what we’ve been paying Earthlink and Windstream, who raised their “administrative fees” every 8 months. Immediate response for support, NO need to call an 800...
We have been with ComTech for four years and we are raving fans. Their service is great, the team really knows their stuff and we know when we call them, they will have the answer. We even recommend ComTech to other...
You have probably heard about the LastPass breach that occurred in August of 2022. It seemed to be nothing to be concerned about on the surface. However, LastPass just released […]
If you are thinking about making the switch to a VoIP phone system in your business, it’s important to understand both the pros and cons of this change. You’ve likely […]
A question our team gets asked frequently is “Office 365 from Microsoft HIPAA compliant? The short answer is yes, it is compliant – BUT a mis-configured system can change that. […]
What is a Firewall and How Does It Work? Keeping digital assets secure is important for every business. One tactic that can be used to protect the network your business […]
Authentication is an essential piece of the digital security puzzle. By properly authenticating users, you can work to prevent the wrong people from gaining access to critical areas of your […]