Drew is currently a junior at Mount Aloysius College pursing a degree in Information Technology. He is also an Intelligence Systems Maintainer and Integrator for the United States Army, where he has gained additional training and experience with System and Network Administration. He is currently preparing for the A+ and Network+ certifications. Drew resides in

Read more…

From serving to servers, you might recognize Garrison from delivering you a plate of deliciousness! Garrison attended YTI Career Institute in Altoona for their Computer System Technician program earning an Associates Degree in Specialized Technology. He is currently studying for the Network+ certification. Before returning to school, he held the position of Assistant Manager at

Read more…

Join us in welcoming Jon Sojak to our team! Jon was born and raised in Johnstown, where he earned a degree in Network Administration/Information Technology at Pennsylvania Highlands Community College (PHCC). Before joining Precision Business Solutions he worked as an IT Analyst for a housing software company centered, in Johnstown, where he has had years

Read more…

The team at Precision Business Solutions is made up of such diverse talent, it’s amazing how we all come together to give our clients the best of us, we can. While we excel in Information Technology Management, a few of our techs have chosen to pass their vast knowledge and experience on to students sharing

Read more…

Each and every one of us needs to do our part to make sure that our online lives are kept safe and secure. That’s what National Cybersecurity Awareness Month (NCSAM) – observed in October – is all about! https://staysafeonline.org/ncsam/ https://www.dhs.gov/national-cyber-security-awareness-month https://www.cisecurity.org/blog/october-national-cybersecurity-awareness-month/   Tip of the Day – Social Engineering Social engineering is the use of

Read more…

We’re going to begin using some of the examples we collect, to share with everyone in an effort to better expose you to ways you can (often times) easily identify phishing emails.  And of course, when we receive good phishing examples, we’ll share them as well. Phishy Things (red flags): From Name From Address Phishers

Read more…