Key Methods Welcomes New Client, Douglas County

December 1st, 2010

[frame_right]"" alt="" width="110" height="115" [/frame_right]We're proud to welcome Douglas County to our family of clients. We've partnered with their IT Department to provide pro-active maintenance and monitoring on their systems.

Key Methods Welcomes New Client, Fibonacci Smile

November 21st, 2010

[frame_right][/frame_right]We're proud to welcome Fibonacci Smile to our family of clients. Located right down the hall from our Wenatchee office in the Riverfront Center, Fibonacci is one of the premier dental offices in the Valley.

Beware: QuickBooks Phishing Scam

October 14th, 2010

Phishing scams are rampant these days. We wanted to make you aware of recent scam we noticed involving QuickBooks.

Our accountant recently received an email from [email protected] that instructed her to download “Intuit Secure Software” or else lose access to her account (read the email  below).

These types of emails can seem very official but if you have any question whether it is legitimate or not please contact us or your software vendor to confirm the validity.

How to Develop A Technology Investment Strategy

August 28th, 2010

While most small businesses require technology to grow, they are also likely to have tight budgets and be unable to invest in "pie in the sky" IT projects with no guaranteed returns. That's why it's important to lay down a technology investment strategy that aligns with the specific goals of your organization.

Disaster Preparedness: 5 Mistakes to Avoid

July 6th, 2010

You know you need to ensure your business is prepared for a disaster. You know technology can fail. You know that a fire, hurricane, flood or something else can happen to interrupt your business operations. But are you actually ready for disaster, whether it's man made or natural?

Companies avoid planning for disaster.

Why Your Web Traffic Needs to Have an Anti-Virus Filter

June 23rd, 2010

Viruses have been around almost from the beginning of corporate networks. That's why most companies have antivirus programs installed to protect their networks and workstations. Because email is a common vehicle for viruses, companies also deploy email filters to protect that avenue of attack.