Drew is currently a junior at Mount Aloysius College pursing a degree in Information Technology. He is also an Intelligence Systems Maintainer and Integrator for the United States Army, where he has gained additional training and experience with System and Network Administration. He is currently preparing for the A+ and Network+ certifications. Drew resides in
PrecisionBS adds Drew Slatko-Wilt to the team!
As part of our Patch Management Policy, November’s security patches and updates were approved for distribution.
From serving to servers, you might recognize Garrison from delivering you a plate of deliciousness! Garrison attended YTI Career Institute in Altoona for their Computer System Technician program earning an Associates Degree in Specialized Technology. He is currently studying for the Network+ certification. Before returning to school, he held the position of Assistant Manager at
As part of our Patch Management Policy, October’s security patches and updates were approved for distribution.
Join us in welcoming Jon Sojak to our team! Jon was born and raised in Johnstown, where he earned a degree in Network Administration/Information Technology at Pennsylvania Highlands Community College (PHCC). Before joining Precision Business Solutions he worked as an IT Analyst for a housing software company centered, in Johnstown, where he has had years
The team at Precision Business Solutions is made up of such diverse talent, it’s amazing how we all come together to give our clients the best of us, we can. While we excel in Information Technology Management, a few of our techs have chosen to pass their vast knowledge and experience on to students sharing
Each and every one of us needs to do our part to make sure that our online lives are kept safe and secure. That’s what National Cybersecurity Awareness Month (NCSAM) – observed in October – is all about! https://staysafeonline.org/ncsam/ https://www.dhs.gov/national-cyber-security-awareness-month https://www.cisecurity.org/blog/october-national-cybersecurity-awareness-month/ Tip of the Day – Social Engineering Social engineering is the use of
As part of our Patch Management Policy, September’s security patches and updates were approved for distribution.
We’re going to begin using some of the examples we collect, to share with everyone in an effort to better expose you to ways you can (often times) easily identify phishing emails. And of course, when we receive good phishing examples, we’ll share them as well. Phishy Things (red flags): From Name From Address Phishers
As part of our Patch Management Policy, August’s security patches and updates were approved for distribution. Additionally, 3rd Party Patches were approved for servers.