About Us
Learn About ComTech
ComTech Referral Program
Our Fun Events
Services
Managed IT Services
Co-Managed IT Services
Zero-Trust Cybersecurity
VoIP Phone System
HaaS - FlexTech
Helpdesk Services
Server Management
Backup & Disaster Recovery Services
Office 365 License Management
Compliance Services
Industries
Accounting & Financial
Architecture & Engineering
Assisted Living
Healthcare
Legal
Manufacturing
Nonprofit
Small Business
Service Areas
Raleigh
Charlotte
Greensboro
High Point
Winston-Salem
North Carolina
Resources
Blog
CyberHero Academy
Phone System Tutorials
Video Library
Events
Client Tools
Client Portal
Remote Support
Phone Portal
Billing Portal
Contact Us
Managed IT vs. In-House IT: What Actually Works for Multi-Location Businesses? →
Phishing is a term that describes emails that look legitimate but are actually designed to fool users into revealing personal information such as passwords, bank account numbers, etc. Phishing (the […] Continue Reading
“Password1”, “Password2”, “Password3”, or the ever-popular and bullet-proof “Password123”. Sometimes you even get fancy and add an exclamation point to the end (when forced to). Are any of these ringing […] Continue Reading
[youtube https://www.youtube.com/watch?v=yUf60OwiE8U] Cybersecurity training is here! Talk to us about our employee training program that trains your employees to identify cybersecurity threats to your business, your... Continue Reading
[img src=”/wp-content/uploads/2018/05/old-lynksys-router_1.jpg”] We get a lot of questions about the latest router malware attacks, so we created a video to address your concerns. If you have a home class... Continue Reading
We had a packed house today at the Alamance County Chamber of Commerce for the Cybersecurity Lunch and Learn. Mike Farlow with ComTech provided great information on current Cybersecurity issues […] Continue Reading
A new scam has emerged that can put your hard earned money at risk. Fake check scams are becoming more common as they leverage payment as a bait to lure […] Continue Reading
I get this question quite often and rightfully so. There are many ways to purchase Office and they can be confusing. Depending upon your situation one method may be better […] Continue Reading
Power jacks in public places can be dangerous. Learn how to protect yourself against “juice jacking”. Continue Reading
In the interest of brevity, I won’t bother to go into deep detail about the two latest PC threats that have been discovered. Feel free to google “spectre” or “meltdown” […] Continue Reading
How many of you have started this new year off but have brought over A LOT of baggage from 2017 that is weighing you down? How many of you know […] Continue Reading
Above is a screenshot from the news on June 28th, 2017. It is a common headline lately. Although ransomware is devious and disruptive to business, there are some things you […] Continue Reading