Premium IT Services
Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.
Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.
Premium IT Services
Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.
Network Security
Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.
Backup & Disaster Recovery
Ensure peace-of-mind in any situation with the most complete data backup solution available.
Cloud Hosting Solutions
Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.
When you just want IT to work!
There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.
At Decatur Computers Inc., we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.
We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.
This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.
Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.
What Our Clients Say
Latest Blogs
Let’s consider why—explicitly—these evaluations are so important.
There are three elements that any modern backup strategy needs to incorporate to contribute to its success:
While you should always evaluate your technology to check for issues, your data backups make this even more important to do. Your business relies on the data it can access, and with so many ways that this data could be lost you need some way to effectively mitigate any scenario. A backup and data recovery service can provide you with the means to do so.
Of course, even if you have a BDR in place, testing is no less important to ensure that it works effectively if (or, more realistically, when) you need to use it. Plus, if it doesn’t work in your test, you have a chance to fix the problem before larger problems ensue.
Here at Decatur Computers Inc., we’re committed to helping our clients keep their operational data safe. If you would like our assistance with implementing and maintaining your backup—as well as your other technology solutions, give us a call at 217-475-0226 to learn more.
There are two different ways that an attacker will generally try to undermine your password:
Because of this, it is important that you ensure that all the passwords that your users have in place are strong enough to resist both methodologies.
Considering this, it makes sense to keep the following ideas in mind as you put together your passwords and password policies:
For an optimally secured password, you must consider both of these ideas.
There are a few standbys when it comes to password best practices that are likely familiar to you:
In addition to these precautions, we must consider how attackers break into passwords through brute force attacks. To help avoid that outcome, your passwords need to be sufficiently complex as well.
Approximately 40 percent of passwords in use only contain lowercase letters, which enterprising cybercriminals are well aware of and use to their advantage throughout their brute force attacks. They do so by first only checking combinations of exclusively lowercase letters, making their efforts much faster. Each additional variable adds to the difficulty the hacker will have decoding it, potentially convincing them to abandon their efforts before success.
Of course, you still need to remember these passwords, so if you can’t commit it to memory it isn’t going to help you, either.
As a result, an idea has come around that a truly ideal password is made up of a few randomized words with random alphanumeric substitution and capitalization sprinkled throughout them, padded out with symbols. After all, each variable we incorporate makes the hacker’s job that much more of a challenge and could foreseeably stymie any automated efforts to bypass the password long enough to render the search impracticable.
So, in light of this, a good password might look something similar to this:
[email protected]@gE;;;br|ghtEn;;;sc0v|llE++++
Taking this password into closer consideration, we can see why it would be nigh impossible to guess, without being impossible for a user to remember. However, its varied construction also means that a brute force method would have to go through an extensive list of permutations before eventually landing on this precise combination.
So, if you’re up to the challenge, it makes sense to consider making your passwords look something like this from here on out.
Of course, using a separate example of a password like this for each account you have is a considerable feat—daunting for most people. A password manager can make it much simpler to keep to these best practices.
A password manager is a specialized software that securely stores your active passwords for you to use, locking them behind a single master password. That way, you can keep to password best practices without having to remember dozens of different passwords.
Whether you need assistance with your IT’s security or your company’s productivity, Decatur Computers Inc. is here to assist you. Find out what we can do by calling 217-475-0226.
Everytime something terrible happens, hackers are there to try and take advantage of the desperation people have. It is one of the saddest, most sickening truths that takes place in our digital society. As the pandemic stretches on, more and more scams have been reported that cover all types of parts of people’s lives. They include:
Well, that’s not a simple answer, but there are plenty of things you should be doing to keep your private information out of other people’s hands. Firstly, you will always want to verify the identity of anyone that asks you for anything online. This means anyone. It can be your boss, your partner, your parents, anyone. These days scammers will do anything to get a hold of a little piece of you to take a lot from you. Verify, verify, verify.
Everyone that has an online life should understand the potential pitfalls that are out there. This perspective, along with adhering to best practices can go a long way toward keeping your personal information out of the hands of scammers.
If you would like some help coming up with a comprehensive cybersecurity strategy for your company that includes thorough training and testing, call the IT professionals at Decatur Computers Inc. today at 217-475-0226.
Latest Blog
Latest News