top of page
All Posts


Onboarding an IT Provider: What’s Realistic?
When you hire a managed service provider, you want instant results: you want all your technology to run faster and more smoothly, and...


Could the Business You Work for be More IT Savvy?
Working for a small business, you can be asked to wear many hats. Even if one of your many roles is not IT, you may need to speak up...


How to Prevent Password Spraying Attacks
Bad cyber actors are what the kids these days would call “try hards.” They do everything they can think of to get into your accounts. One...


Computer Down? You Need it Now. Now What?
Ever met someone who responds to computer downtime with applause or relief? Neither have we. When a computer goes down, the individual...


6 Top Tech Small Business New Year Resolutions
As the new year approaches (already?), it is a good time to take stock and plan some small business resolutions. Join the millions around...


7 Common Business IT Myths Debunked
MythBuster programs on television never focus on business misconceptions about IT. Too bad, because believing these myths can be both...


Outsourcing to an MSP: Custom-size Your Partnership
When it comes to business technology, there is no one-size-fits-all answer. Managed service providers (MSPs) know this firsthand. That’s...


A Good Internal IT Person Is Hard to Find
Technology is everywhere, yet we don’t always understand it. When things go wrong or get challenging, we turn to IT Services for help,...


Are Your HIPAA Compliance Efforts Healthy?
Let’s address the (ahem…) hippo in the room. HIPAA compliance continues to be a real challenge for small and midsized businesses. HIPAA...


Lessons Learned from an Oil Pipeline Ransomware Attack
Your business may not be supplying oil to the United States, and you may not even be in the critical infrastructure business, but don’t...


Microsoft 365 Replaces Your Many Apps
There are many online business tools you can replace with Microsoft 365. Communication First, there’s Business Voice to replace your...


Why You Should Never Use A Free Email Address For Your Business
This blog is about setting up your businesses technology properly. You need to look the part when it’s small, and protect it properly...


5 Red Flags of Phishing Emails: Think Before You Click
A single click can be the difference between maintaining data security and suffering massive financial losses. From the moment just one...


Keeping Control of Your Business with Microsoft 365
Microsoft 365 represents a complete shift in the way we interact with modern business computing. If you haven't been introduced to it...


Got A Bad Case Of Password Exhaustion?
You’re not alone! Most people use the same password everywhere – home, work, Gmail, Facebook… even for banking. Considering how many...


The Computer Guy Wins 2020 Best Of MichBusiness Award
The Computer Guy LLC is honored to be recognized as a 2020 Best of MichBusiness Award Winner. This year’s awards program honors the...


The Top 5 IT Security Problems for Businesses
Companies that suffer security breaches nearly always have one of these IT security problems. Is your company guilty of any of them? No...


Why 2-Factor Authentication is Important
You hear about hacks all the time. The news covers major websites who have had data leaks containing your email and password. Computers...


3 Cyberattackers Putting Business at Risk
Cyberattacks and data breaches happen worldwide, and no one is immune.


Returning to Work: Prioritizing Safety with IT Too
These suggestions can help you return to work while prioritizing safety.

Ready for technology you can rely on?
If you’re looking for stable systems, stronger security, and a partner that takes ownership of your environment, we’d welcome a conversation.
bottom of page