Our Services


Network Protection Services

If your business is dependent on the data that it generates from day to day, you should consider speaking with us about securing and bolstering your current network and cyber security with one of our cyber security and network protection service accounts.

Workstation and Server Deployment

When it comes to the roll out of large quantities of PC’s and Servers, Atlanta I.T. Service is the proven choice offering exponentially more efficient service than anyone else.

Priority Customer Service

From time to time, certain situations require special attention. Atlanta I.T. Service offers priority service to customers who have special needs.

Wide Area Networks

If you have or need remote offices, Atlanta I.T. Service can design, implement, and support the optimal Wide Area Network for your business.

Data Vault Service

We offer highly reliable, automated backups and recovery services that assure fast and accurate restoration following data loss or destruction.

Wiring Services

We are a Georgia State Low Voltage Licensed Contractor. Low voltage cabling is the backbone of most networks and telecommunication infrastructures.

Web Design

Your organization deserves to put its best foot forward on the internet. Let us assess your needs and provide dynamic, memorable and tasteful web designs.

And More…

We pride ourselves on making sure you get the most comprehensive experience possible.


Recent News

  • Windows Local Privilege Exploit On Sale For $90,000

    How much would a cybercriminal, nation state or organized crime group pay for blueprints on how to exploit a serious, currently undocumented, unpatched vulnerability in all versions of Microsoft Windows? That price probably depends on the power of the exploit and what the market will bear at the time, but here’s a look at one […]

  • FBI Warns to Beware of Fake USB Chargers that Wirelessly Record Everything You Type

    Last year, a white hat hacker developed a cheap Arduino-based device that looked and functioned just like a generic USB mobile charger, but covertly logged, decrypted and reported back all keystrokes from Microsoft wireless keyboards. Dubbed KeySweeper, the device included a web-based tool for live keystroke monitoring and was capable of sending SMS alerts for […]

  • Uninstall QuickTime For Windows

    Here are the instructions to uninstall QuickTime for Windows via the Windows Programs And Features interface. Click the Start Menu, then click the Control Panel, and click on Uninstall a program under Programs. In the list of programs, highlight QuickTime For Windows, and then choose Uninstall. At this point QuickTime 7 and the Browser plugins […]

  • Firefox Exploitable Through Popular Plugins Such As NoScript

    NoScript, Firebug, and other popular Firefox add-on extensions are opening millions of end users to a new type of attack that can surreptitiously execute malicious code and steal sensitive data. There is no isolation among various Firefox add-ons installed by an end user. The underlying weakness has been described as an extension reuse vulnerability because […]

  • Microsoft No Longer Supporting Internet Explorer 8, 9, and 10

    Microsoft has ended support for Internet Explorer 8, 9, and 10 as of January 2016. If you want to continue receiving updates, Microsoft recommends everyone to upgrade to version 11 or use the Edge browser that is built in to Windows 10. To quote Microsoft’s End of IE support page, It means you should take action. After […]

  • First Mac OS X Ransomware Targets Apple Users

    Another Mac OS Virus/Malware successful attack, we often hear Apple devices are on a closed OS and are not susceptible to the unwanted Virus/Malware type attacks but Virus outbreaks of the Flashback virus to Mac systems and Wire Lurker attacks on iPads and phones are proof Apple’s Mac OS and other products are in fact […]

  • Chinese ISPs Caught Injecting Ads and Malware into Web Pages

    China has gained a considerable global attention when it comes to their Internet policies in the past years; whether it’s introducing its own search engine dubbed “Baidu,” Great Firewall of China, its homebrew China Operating System (COP) and many more. Now, Chinese Internet Service Providers (ISPs) have been caught red-handed for injecting Advertisements as well […]

  • Review Of Malwarebytes New Anti-Ransomware Tool (With Silent Installation Instructions)

    Malwarebytes Anti-RansomWare (MBARW) was formerly known as CryptoMonitor from EasySync software until they were acquired by Malwarebytes. We tested this tool in our office with a physical (eg. not virtualized) Windows 7 64-bit computer, and threw a couple of ransomware infections at it. Please note that Malwarebytes AntiRansomWare is an alpha-quality tool, which means that […]

  • Apple’s Mac OS X Still Open to Malware, Thanks Gatekeeper

    A new Exploit for Apple computers discovered by researchers shows the Mac OS is still open to Malware. Last year, The Hacker News reported a deadly simple exploit that completely bypassed one of the core security features in Mac OS X known as Gatekeeper. Apple released a patch in November, but now the same security […]

  • Botched Update For Microsoft Outlook 2010

    Many of our customers are reporting that installing KB3114409 will force Outlook to start in safe mode. The patch has been removed from windows updates, but anyone who has it installed should remove it immediately and then Outlook will start working normally again. It took Microsoft around 12 hours to pull the faulty patch. Just last month, […]

  • New Dell Computers Have SuperFish Style Fake Certificate

    Dell users may have a serious security problem on their hands, thanks to an unauthorized SSL certificate that comes pre-installed on a number of the company’s laptops. Affected computers are set to trust any Secure Website’s certificate that is signed by the extracted private key.



Friendly & knowledgeable technology support for your business!
Contact Us today to learn how we can transform your business.