Peters & Associates Recognized for Excellence in Managed IT Services

Peters & Associates, a Chicagoland-based leader in delivering technology and managed support services, announced that CRN®, a brand of The Channel Company, has named them to its 2018 Managed Service Provider (MSP) 500 list in the Pioneer 250 category.

By | 2018-02-22T14:56:35+00:00 February 22nd, 2018|Press Releases|Comments Off on Peters & Associates Recognized for Excellence in Managed IT Services

Managed Mobility Management + Cloud + Security

As the complexity of enterprise applications and computing environments increases, protection of company data also needs to evolve. Microsoft’s Enterprise Mobility + Security Suite (EMS) helps to ensure that corporate data is secure. With solutions, such as Intune, Azure Active Directory, and Cloud App Security, you are heading in the right direction to upgrade your [...]

By | 2018-12-18T12:13:43+00:00 June 12th, 2017|Security Solutions|Comments Off on Managed Mobility Management + Cloud + Security

Hyper-V Snapshots – Who, What, When & Why

Hyper-V Snapshots. What are they?  When should you use it?  Why should they be used and how?  Read on to discover the answers and more. What is a Hyper-V snapshot? While it seems like a simple question, defining what a Hyper-V snapshot is can be problematic. One of the most important things is not to [...]

By | 2018-12-18T11:58:20+00:00 February 24th, 2017|Infrastructure Services|Comments Off on Hyper-V Snapshots – Who, What, When & Why

Spoiled Milk – Avoiding Expired Certificates

Expired certificates happens frequently enough to our clients: life is good, all systems working.   Then mysteriously, you start getting communication failures with an application like Skype for Business.  Turns out, a certificate expired at 11:14 am today and now communication between machines isn’t trusted.  Remedying the issue isn’t too bad in most cases, but [...]

By | 2018-12-18T11:58:30+00:00 February 10th, 2017|Infrastructure Services|Comments Off on Spoiled Milk – Avoiding Expired Certificates

I’m infected with Ransomware. What do I do? – Ransomware Series Part 3

You’ve been infected with ransomware, you need to act quickly to save your data.  Disconnect from WiFi or unplug from the network immediately. You have to be off of the network so the infection does not spread to other machines or directories. Use System Restore or a backup solution to get back to a known-clean [...]

By | 2018-12-18T12:18:31+00:00 January 18th, 2017|Security Solutions|Comments Off on I’m infected with Ransomware. What do I do? – Ransomware Series Part 3

Cloud Economics: A Managed Services Provider is the missing link

With cloud computing becoming more popular for all sized businesses, it is important to know how to maximize your investment while also reducing your organization's risk. Our Managed Services can help you accomplish tracking your ROI and understand how you can continue to limit security risks. Cloud savings--are they real? Cloud computing is not going anywhere [...]

By | 2018-12-18T12:26:28+00:00 January 13th, 2017|Managed Services|Comments Off on Cloud Economics: A Managed Services Provider is the missing link

Strategies for IT staffing

One of today’s business challenges centers around IT staffing. Is your business struggling to hire and keep qualified IT staff?  If so, you are not alone. Some of the most common staffing challenges facing IT departments today include: […]

By | 2018-12-18T12:26:57+00:00 June 3rd, 2016|Managed Services|Comments Off on Strategies for IT staffing

Protecting Revenue with Backup Strategies

When was the last time you tested a restore of your data? Are you checking every backup to make sure that it is usable? Can you recover from a failed system in minutes, or does it take you hours, or even days? What would you do if your key financial system died when you are [...]

By | 2016-04-20T13:23:08+00:00 June 1st, 2016|0 Comments

Strategies for IT Staffing

Businesses today are faced with a number of challenges around IT staffing - keeping up with a rapidly changing technology environment, keeping skills sets current while also maintaining legacy systems, adapting to ever increasing security needs, and continuing to make sure everything runs as smoothly as possible. Join us to discuss a variety of strategic [...]

By | 2016-04-20T13:05:37+00:00 May 11th, 2016|0 Comments