Our Services


Network Protection Services

If your business is dependent on the data that it generates from day to day, you should consider speaking with us about securing and bolstering your current network and cyber security with one of our cyber security and network protection service accounts.

Workstation and Server Deployment

When it comes to the roll out of large quantities of PC’s and Servers, Atlanta I.T. Service is the proven choice offering exponentially more efficient service than anyone else.

Priority Customer Service

From time to time, certain situations require special attention. Atlanta I.T. Service offers priority service to customers who have special needs.

Wide Area Networks

If you have or need remote offices, Atlanta I.T. Service can design, implement, and support the optimal Wide Area Network for your business.

Data Vault Service

We offer highly reliable, automated backups and recovery services that assure fast and accurate restoration following data loss or destruction.

Wiring Services

We are a Georgia State Low Voltage Licensed Contractor. Low voltage cabling is the backbone of most networks and telecommunication infrastructures.

Web Design

Your organization deserves to put its best foot forward on the internet. Let us assess your needs and provide dynamic, memorable and tasteful web designs.

And More…

We pride ourselves on making sure you get the most comprehensive experience possible.


Recent News

  • Microsoft discontinues MD5 crypto for digital certificates to improve RDP Authentication

    This week Microsoft has released several advisories to help their users update from weak crypto. Microsoft is beginning the process of discontinuing support for digital certificates that use the MD5 hashing algorithm and to improve the network-l…

  • Hackers turn Verizon signal booster into a mobile hacking machine

    A group of  hackers from security firm iSEC found a way to tap right into verizon wireless cell phones using a signal-boosting devices made by Samsung for Verizon and cost about $250. They hack Verizon’s signal-boosting devices, known as fem…

  • Microsoft to patch Six critical Remote Code Execution vulnerabilities this Tuesday

    Microsoft has announced Patch Tuesday for this July Month, with seven bulletins. Out of that, one is important kernel privilege escalation flaw and six critical Remote Code Execution vulnerabilities. Patch will address vulnerabilities in Micros…

  • Blackberry, no more BIS

    It appears Research In Motion’s new Blackberry OS 10 is leaving behind a feature that has been instrumental to the company’s success. The BlackBerry Internet Service (BIS) is designed to provide BlackBerry smartphone users with access to email messaging, instant messaging, Internet browsing, and more. BlackBerry Internet Service subscribers can receive automatic delivery of email […]

  • Attackers Continue to Target Java

    Java’s security vulnerabilities can lead to viruses and malware on your Computer. Disabling Java in your browser may help keep your PC secure. It’s no secret that Java has moved to the top of the target list for many attackers. It has all the ingredients they love: ubiquity, cross-platform support and, best of all, lots […]

  • Is your data in the Cloud secure?

    When you upload data to your Cloud service, where exactly does it go? It is Secure? There are a few things to consider while looking for the best cloud solution for your company. If you’re already using one, you be interested to know that there are options available that can let you keep your data […]

  • Spamhaus vs. “The Largest DDos Attack in History”

    Anti-spam organization Spamhaus has recovered from what may possibly be the largest DDoS (Distributed Denial of Service) attack in history. A massive 300Gbps (Gigabits-per-second) attack was thrown against Spamhaus’ website in an attempt to bring their systems to their knees, but the anti-spam organization was able to recover from the attack and get its core […]

  • How Facebook Got Hacked

    Zero-Day Exploit Bypassed Java Protections to Install Malware By Eric Chabrow, February 16, 2013. Follow Eric @GovInfoSecurity Even the most savvy information technologists aren’t immune from cyber-attacks. Just ask Facebook. The social-media tita…

  • Microsoft Office 2013 – Free Release Preview Download and some changes to expect.

    Microsoft recently announced the completion of development work of Office 2013 and compilation of RTM build of Office 2013. As of mid-October, this new version of their productivity suite has now been released to manufacturers. General public’s availability is set for the first quarter of 2013, but customers who buy a retail copy of Office […]

  • Replace your Windows PC with Zorin OS

    Over the recent years, switching to a Linux Based OS has become more and more of a viable option for most PC users. Thanks to supremely user-friendly systems like Ubuntu Linux and Linux Mint, Linux has made an art form out of becoming the leader of the “user-friendly experience”. Out of all the varieties, there’s […]

  • GoDaddy Goes Down.

    Popular domain name registrar and Web and email hosting provider GoDaddy is experiencing a severe outage, one that appears to have taken out not only its hosted services, but even those websites that have registered their domain names through GoDaddy. In a YouTube video, secretive hacking group Anonymous has taken credit for the outage, claiming […]

  • Why is the FBI collecting Apple Device IDs?

    posted by Christina DesMarais on September 08, 2012in Blog, News, Computers and Software, Phones and Mobile, Cell Phones :: 0 comments This week the hacker group known as AntiSec released a list of one million UDIDs—Unique Device Identifier numb…



Friendly & knowledgeable technology support for your business!
Contact Us today to learn how we can transform your business.