possible to make website for free

Get Started Today!  217-475-0226

Central Illinois' IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Premium IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Decatur Computers Inc., we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

IT Questions?

If you have questions about whether or not our IT services platform is right for your business, simply complete and submit this form and one of our trusted IT professionals will promptly respond to your query!

What Our Clients Say

  • Saved my WEDDING!
    Residential Client

    This past year I have been planning my wedding, and I have a ton of spreadsheets and documents on my computer pertaining to the “big day”.  I saved everything on an external hard drive just in case. One day I went to get one of the documents off of the hard drive and of course there were no documents in the file. My computer is very old so I have worried about it crashing. I have no clue where to take it to find out what went wrong. I was telling my cousin Steve Turner about it and he suggested Decatur Computers. I took it in, I was only there for about 10 minutes, they had great customer service, said that they would call me in a few days to let me know what they were able to do. I got a call that week, they not only retrieved everything on the hard drive but they also increased the speed of my computer so we were able to wait a bit longer to buy a new one. I would definitely recommend anyone to Decatur computers.

  • These guys do a great job!
    Residential Client

    "These guys do a great job! I took my computer in to be updated and they not only did that but they got rid of all the bugs and viruses and it runs much faster. Then when I got home with the upgrade my printer wouldn’t connect. I called them up and they connected to my computer from their location and within half hour they had me back in service!  It was also kind of funny watching them move the mouse and different things going on the screen while I was sitting here not moving a thing. :)"

  • Excellent service 
    Residential Client

    Decatur Computers has given us excellent service in our computer needs. The staff provides professional, immediate service. A telephone call to them gets immediate help with any of the needs we have had with our current system. We are most happy to have them available, and the prices have been right!

  • Prompt, efficient and affordable computer service
    General Fence

    “Decatur Computers has always provided prompt, efficient and affordable computer service at our home as well as at our place of business. We have also purchased several new computer systems from them and have been very pleased with the products they recommended for purchase. The technicians are always courteous. Any technical issues or problems we have had, they have addressed quickly to ensure that we had minimal down time if any at all. I would highly recommend Decatur Computers to anyone whether it be for residential or business services.”

  • The staff is very professional.
    Owner/Operator, Starship Billiards and Buffalo Agency Inc.

    “I run two small companies and have relied on Decatur Computers for over 7 years. The staff is very professional. One business runs a POS system the other data management . They are fantastic with both. There has never been a problem they cannot fix, even though both systems are very different. I would strongly recommend them to anyone for whatever they need.”

  • Great service and fair pricing!
    CEO,  EHC Admin Service

    “I have worked with Decatur Computers for over 10 years. I have always had great service and fair pricing. Now that I have my own home based business I am looking forward to the continued relationship. The staff is always courteous whether it is on the phone, in shop or off site. I know that I can count on them to fix my problem or answer my question.”

  • I would highly recommend Decatur Computers Inc.
    Plant Director/Operator, Jacobs Field Service

    With today’s technology advancing so fast it is nice to know there is a one stop shop for all technology problems.  I personally have gained a lot of knowledge and had the best assistance with all my computer and software issues I have encountered.  I would highly recommend Decatur Computers for anyone’s personal and business needs.  As I always say ‘Why try to fix your own computer when that is what Decatur Computers does'”

  • Go Above and Beyond

    Decatur computer and their staff go above and beyond to serve their customers. Mathew was very friendly and informative through the repair process. I received emails through the entire process updating me on the progress of my repair. I would highly recommend Decatur computer to anyone i know for repairs or upgrades. Thanks again to Mathew his great customer service and hard work.

Latest Blogs

Tip of the Week: Ward Off Holiday Scammers

Keep in mind that these are only preventative measures; we can’t guarantee that whoever you’re shopping through is protecting your data adequately, so if the retailer is known for suffering from big data breaches (think Target), perhaps your patronage will be best served elsewhere.

Do Your Research
Going off of the previous point, you’ll want to investigate a little bit to see how well the retailer handles their security. By this, we mean simply going online and seeing if they have been the victim of a massive data breach in previous years. If they have, see what they did about it and whether or not they learned from their mistakes. After all, it would be unfair to judge them on something that happened years ago if they have had a clean record ever since. If you’re unsure or unsettled by any data breaches, there are always other options to shop at, so don’t be too worried.

Check the Physical Vicinity of ATMs
Sometimes you might need some cash in your pocket for a purchase, and while you might think thieving is your biggest problem, ATM scamming is a serious contender. This happens when an ATM has been tampered with to send your banking credentials to a third party--in this case, a hacker. You should always check to see if the ATM has been fitted with devices on the card reader slot, as well as any kind of device attached to the back of it. For example, if the ATM has panels on the back missing, it’s a good sign that perhaps you shouldn’t use that particular machine. Furthermore, make sure that you only use ATMs in well-traveled areas with security cameras, as the chances of the ATM being tampered with are significantly lower.

Be Careful of Wireless Connections
Wireless communications are a significant weak point this holiday season, as public Wi-Fi is notorious for being much more dangerous than any protected network. This is largely in part due to the fact that these networks don’t require a sign-in, and any device can just access it unimpeded. You should keep your devices from accessing these networks automatically, as the data flowing to and from them could be under watch by scammers.

Keep an Eye On Your Devices
As always, the threat of device theft is omnipresent in locations where a lot of people gather. Pickpockets and thieves know full well how much valuable data can be found on these devices, and they might even try to use them for their own purposes. Alternatively, they could sell the devices to make a quick buck or sell the data on the black market to fund further thieving initiatives.

This holiday season be prepared for anything. For more great tips and tricks about how to stay secure with your purchases and online interactions, subscribe to Decatur Computers Inc.’s blog.

Learn More

Why Protecting Your Google Account Should Be a Priority

Why Your Account is So Valuable
While the Internet has been about sharing information, many users out there trust it to keep their personal data safe and accessible only to them. Understanding the origins of the Internet and where it’s heading are both critical to keeping your Google account’s best interests in mind.

The Foundations of the Internet
At its most rudimentary level, the Internet was designed to provide access to information to everyone. J.C.R. Licklider of MIT coined the term “Galactic Network” in 1962, and this network was designed to share data and programs across computers. They are then connected to the entire world. Of course, the concept for the World Wide Web itself was credited to Sir Tim Berners-Lee, who knew that the Internet had to be built around the concepts of openness and accessibility. He stated, “Had the technology been proprietary, and in my total control, it would probably not have taken off. You can’t propose that something be a universal space and at the same time keep control of it.”

The modern Internet has largely been implemented in this way. It is a space where there is no centralized point of control, which promotes an accessible environment that isn’t prone to censorship (easily, at least). Considering how the Internet is built to share information, it’s laughable that anyone can keep anything on it private.

Changes Over Time
As the Internet changed and evolved, security and privacy became more of a necessity. Much of the data sent along an Internet connection could be seen as confidential, so a method to keep it secure while in transit is required. These developments eventually created a situation where an “internal openness” was created--sort of like a microcosm of the Internet itself, only internally for a business or user. Data could be shared on a need-to-know basis, but it wasn’t a pain to do so. It’s even possible to use the Internet for personal connectivity and growth. These reasons, and many more, are why Google has become such a force to be reckoned with in the technology space.

Google
While Google was originally most known for its search engine, it has since evolved into countless other productivity solutions, including its G-Suite of applications for business: Google Drive, Google Docs, Business Directory, Google Maps, and more. Even those using Google for their own private purposes can take advantage of these services. For example, Gmail is used by both business professionals and individual users to an immense degree. How heavily does your organization rely on Google? How much do you use it in your everyday life? How much trust do you place in this singular account?

Another Perspective
To take a look at how Google affects a user’s computing infrastructure, let’s dig a little deeper into what it offers.

Taking Features Into Accounts
A key part of why Google accounts are so effective for users and professionals is that one account is used to access countless Google services. All you need to do is log into your Google account and you’ll have access to not just Gmail, but other services associated with it. Some online services even offer the ability to help you make a new account using your Gmail account, making it easy as can be to get going. For the sake of simplicity, many people just use their Gmail account for all of their accounts, which make sense to a degree. After all, Google has adequate security standards, and the convenience of Chrome saving passwords cannot be overlooked.

Unfortunately, all of this combines to create a situation where any accounts created using your Google account will be forever linked to that account, meaning that anyone who has access to your Google account will then be able to access any accounts created by it.

An Eye-Opener
For an idea of how many accounts are accessing your Google account, you go here and navigate through Sign-in & Security > Apps with Account Access. You will then see all the applications that have access to your account, including any websites that might have credentials saved by Google Smart Lock. What’s your list look like? If it includes your bank, you could potentially fall victim to financial fraud and abuse. For example, if someone has access to your email, they could change your password, gaining access to any accounts linked to it. In other words, your email could become a gateway for hackers and other cyber criminals to access your important accounts and services.

Granted, the convenience of using your Google account for these services makes it irritating at best to avoid using it, so the only alternative you have is to seriously consider security measures to place a safety net around your account. While there isn’t an automatic Google system to automatically protect it from threats, you do have us to help you out. We’ll discuss how you can go about reducing the odds of your Google account falling prey to hackers and security threats.

How to Keep Your Account Safe
It’s important to remember that in order to optimize your Google account’s security, you have to put in the work. This means consistently applying what you learn today to take an active role in your account’s security. Here’s a list of what you can do to keep your Google account locked down from threats.

Passwords and Basic Account Security
Passwords are the cornerstone of improving your account’s security, and you should always exercise best practices when choosing a password. However, you also want to consider where you’re accessing an account from. For example, you don’t want to access your Google account from any public points of access. These kinds of endpoints are notorious for having malware and other dangers lurking just beneath the surface. To truly minimize the risk of your Google account falling prey to these threats, you’ll have to minimize your use of your Google account in public places or on a public Wi-Fi signal.

Two-Factor Authentication
Two-factor authentication can go a long way toward keeping your account secure. There are multiple kinds of 2FA methods available, but one of the most interesting ones is Google Authenticator. You can use one-time authentication codes that you can use if you don’t have access to your mobile device in the moment. These can also be reset at any time, keeping your security managed and up-to-date, even if the list is lost. For more information about how these security features work, as well as how to set them up, log in to your Google account.

Security has never been as important as it is today, so take steps now to keep your Google account secure. To learn more, reach out to us at 217-475-0226.

Learn More

Other Options for Visual Excel Data

In-Cell Charts and Sparklines
One of the biggest downsides to line after line and row after row of numbers and labels is that it becomes difficult to visualize any patterns. Both of these functions resolve that by providing clear visual cues.

Excel’s Sparkline option displays a miniaturized line graph, bar graph, or win/loss chart within a cell. This adds an added layer to the visualization. So, let’s say you want to track how many sales were made of a certain product or service offering. With a line graph Sparkline, you can create this quick reference:

You also can go even more in-depth with your styling, applying custom rules to your cells to display more granular information. Let’s assume that your goal for these specific sales was to complete at least 16 per month. Utilizing conditional formatting can make it even more obvious when this goal was (and wasn’t) reached.

With your data selected, select Conditional Formatting from the menu ribbon. Click Manage Rules and access your newly-created rule for the data set. You can then play with some of your options. In this example, we decided to use arrows as our icon style and identify 16 as both of our top values and 15 for the bottom. After you hit Apply, your data should appear like this:

As a result, you can see much more quickly which months saw enough sales to reach the set goal, and which did not. This makes it easier to identify other events that may have influenced these numbers and act accordingly.

Turning Pies into Sunburst Charts
A sunburst chart is effectively the combination of multiple pie charts into a single, unified representation. This helps you to spot important patterns that may have been missed if the graphs were left separated.

For example, let’s say you serve a variety of industries, and have specific services for each, with each service divided into tiers. By labelling each industry as 1,2, and 3, with services A, B, and C, and the tiers X, Y, and Z, you can create a sunburst chart that allows you to compare how these sales play as a part of your incoming revenue.

One this data has been divided as pictured, you can apply the sunburst chart to see the following hypothetical:

So, while you can see from the data that service 3CY outperforms any other on this chart (most by a considerable margin) by reviewing the data, the sunburst chart provides considerably more insight into this fact - primarily, the significance of such a difference. From there, you can again examine some of the factors surrounding these outcomes and adjust accordingly.

Raising the Bar with a Thermometer Chart
Thermometer chart are great for providing some motivation to your team toward a goal, although it does tend to be used primarily for financial benchmarks. However, this one can be a challenge, so be careful as you follow along.

Sticking to the sales usage, let’s say our penultimate goal is $150,000, and there has been $37,163.48.

  • In Excel, insert cells that look like this:
  • Selecting them, click Insert, and under the Column Chart options, add a Clustered Column Chart item. With this item selected, click Switch Row/Column in the menu bar at the top of your screen.
  • Right-click the Total Sales bar and select Format Data Series, then in the Series Options page, select Secondary Axis. You should now only see one bar, with labels on both sides.
  • Right-click the label on the left and select Format Axis. The Axis Options Pane should appear. In the box for Maximum, type in your goal of $150,000. Repeat this process for the label on the right.
  • Right-click the Goal Bar and select the Format Data Point option. Under Fill & Line in the menu that appears, select No fill and make the border a Solid line. Repeat this process with the Total Sales Bar, skipping the “No fill” part and selecting the color you want instead.
  • Finally, you can delete the labels on the bottom and sides (if you wish), as well as the horizontal lines, leaving you with the finished product:

What kind of data would you express better, now that you have these tools to leverage? Share your thoughts in the comments!

Learn More

Know someone who would benefit from Decatur Computers Inc.? Let us know!

Latest Blog

It’s the most wonderful time of the year… for scammers, that is. These kinds of criminals love to take advantage of the gift-giving season. With the right tools for the job, hackers can have a field day stealing sensitive information, like credit card numbers, due to the she...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.