Get Started Today!  217-475-0226

Central Illinois' IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Premium IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Decatur Computers Inc., we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

IT Questions?

If you have questions about whether or not our IT services platform is right for your business, simply complete and submit this form and one of our trusted IT professionals will promptly respond to your query!

What Our Clients Say

  • Saved my WEDDING!
    Residential Client

    This past year I have been planning my wedding, and I have a ton of spreadsheets and documents on my computer pertaining to the “big day”.  I saved everything on an external hard drive just in case. One day I went to get one of the documents off of the hard drive and of course there were no documents in the file. My computer is very old so I have worried about it crashing. I have no clue where to take it to find out what went wrong. I was telling my cousin Steve Turner about it and he suggested Decatur Computers. I took it in, I was only there for about 10 minutes, they had great customer service, said that they would call me in a few days to let me know what they were able to do. I got a call that week, they not only retrieved everything on the hard drive but they also increased the speed of my computer so we were able to wait a bit longer to buy a new one. I would definitely recommend anyone to Decatur computers.

  • These guys do a great job!
    Residential Client

    "These guys do a great job! I took my computer in to be updated and they not only did that but they got rid of all the bugs and viruses and it runs much faster. Then when I got home with the upgrade my printer wouldn’t connect. I called them up and they connected to my computer from their location and within half hour they had me back in service!  It was also kind of funny watching them move the mouse and different things going on the screen while I was sitting here not moving a thing. :)"

  • Excellent service 
    Residential Client

    Decatur Computers has given us excellent service in our computer needs. The staff provides professional, immediate service. A telephone call to them gets immediate help with any of the needs we have had with our current system. We are most happy to have them available, and the prices have been right!

  • Prompt, efficient and affordable computer service
    General Fence

    “Decatur Computers has always provided prompt, efficient and affordable computer service at our home as well as at our place of business. We have also purchased several new computer systems from them and have been very pleased with the products they recommended for purchase. The technicians are always courteous. Any technical issues or problems we have had, they have addressed quickly to ensure that we had minimal down time if any at all. I would highly recommend Decatur Computers to anyone whether it be for residential or business services.”

  • The staff is very professional.
    Owner/Operator, Starship Billiards and Buffalo Agency Inc.

    “I run two small companies and have relied on Decatur Computers for over 7 years. The staff is very professional. One business runs a POS system the other data management . They are fantastic with both. There has never been a problem they cannot fix, even though both systems are very different. I would strongly recommend them to anyone for whatever they need.”

  • Great service and fair pricing!
    CEO,  EHC Admin Service

    “I have worked with Decatur Computers for over 10 years. I have always had great service and fair pricing. Now that I have my own home based business I am looking forward to the continued relationship. The staff is always courteous whether it is on the phone, in shop or off site. I know that I can count on them to fix my problem or answer my question.”

  • I would highly recommend Decatur Computers Inc.
    Plant Director/Operator, Jacobs Field Service

    With today’s technology advancing so fast it is nice to know there is a one stop shop for all technology problems.  I personally have gained a lot of knowledge and had the best assistance with all my computer and software issues I have encountered.  I would highly recommend Decatur Computers for anyone’s personal and business needs.  As I always say ‘Why try to fix your own computer when that is what Decatur Computers does'”

  • Go Above and Beyond

    Decatur computer and their staff go above and beyond to serve their customers. Mathew was very friendly and informative through the repair process. I received emails through the entire process updating me on the progress of my repair. I would highly recommend Decatur computer to anyone i know for repairs or upgrades. Thanks again to Mathew his great customer service and hard work.

Latest Blogs

Your Cybersecurity Policy Will Come to Define Your Business

Establish Definitions 

It is important to first identify what you define as a cyber incident. Do you limit that to simply some threat coming in from outside of your network? Does it include malfunctioning hardware or corrupted software that is on your network? You will need to define what your aims are. All cybersecurity is in place to protect your data and network against threats. By identifying those threats you will be able to more succinctly strategize what protections you will need to put in place.

You will also want to make an effort to document everything in a manner commensurate with your internal staff’s cybersecurity competency. For organizations with cybersecurity novices, using layman’s terms to describe these definitions will make it simpler for them to understand exactly what the plan is. 

Establish Processes

Once your threats are defined, you will want to start educating your staff. The best way to do this is to establish easily defined processes that work with the express purpose of keeping threats off of your network. That means making standards that apply to all types of situations. This includes a remote worker contingency, what qualifies for acceptable use of company bandwidth, and how to establish the authentication protocols that will dictate access to the systems you are aiming to protect. It should also be noted that your business may be mandated to provide a certain degree of proof-of-security or increased transparency because of federal, state, or industry regulations so you should alter your processes to fit those demands.

As you document your cybersecurity policies, you will want to ensure that you have the following information:

  • What protections are in place (and what they protect against)
  • What backup policies are in place
  • What the updating/patching process looks like regarding your protections

You will also want to make sure that any documentation has your continuity information in case your staff will need to recover data as a result of a cybersecurity problem. 

Establish Accountability

Once your processes are implemented and documented, you will need to make sure that your staff is given the training they need to properly understand what you are trying to accomplish. This step is extremely important. Your staff needs to understand how their actions could have negative (and positive) outcomes for the entire business.

You will want to go over most of the threats they will encounter, like phishing messages, and how to spot and eliminate the threats. You will want to describe the steps you have taken to keep the business safe. Most won’t understand the firewalls and the antivirus solutions that you use. They will shrug off monitoring and react impulsively against solutions that impede on how they use their personally-owned devices. 

Most employees will take a cue from a manager that takes these things seriously, and react in turn. Some won’t, and need to know that there will be consequences for actions taken out of negligence, or worse yet, animosity. If you know that you can trust your staff to carry out their duties without putting the whole business at risk, giving them every reason to trust that your cybersecurity initiatives are there to protect their jobs, your clients, and your business technology you can trust that they will react with diligent action.

If you are looking to implement cybersecurity procedures and need help finding solutions, training staff, and documenting your plan, call the IT experts at Decatur Computers Inc. today at 217-475-0226. 

Learn More

Understanding Tech Acronyms

-aaS

Today, in IT as in other types of businesses, you are beginning to see things that once were the responsibility of an organization being outsourced to another company. These products are typically combined with others and delivered “as-a-service”. As costs continue to escalate, more “-aaS” businesses start. It allows businesses to get the core technology and consulting services they need at a price point that works for their budget.

BI

Business Intelligence is the strategy of tracking business metrics to find out more about the business. This allows for businesses to pivot to different plans, promoting revenue growth, smarter decision making, and more effective management of their business’ resources. 

BYOD

Bring Your Own Device is a mobile device strategy where a business allows its workers to access business resources on their personal devices and be an overall productivity hub for the worker. This strategy demands that the business has a strong mobile device management platform, and that it adheres to industry best practices to protect a business’ network and data. 

DoS

A Denial-of-Service attack (and sometimes, a DDoS, or Distributed-Denial-of-Service attack) is a popular cyberattack where hackers overwhelm a business’ network with traffic, forcing the network, or at least the network defenses, to fail. 

EOL

When you see “EOL”, you are seeing a piece of software that is being retired. It stands for “end of life” and it means that the software title will no longer be getting updates, patches, and upgrades, making it a security and privacy risk.

IoT

The Internet of Things (IoT) is one of this generation's largest contributions. By making products “smart”, more can be done, systems last longer, and are more reliable than before. The problem is that products are being rushed to market to fill demand and they are becoming more trouble than they are worth when it comes to keeping them secure. Don’t get us wrong, there is value in using IoT devices, but any business will want to take precautions to secure them.

LAN

A LAN, or a Local Area Network, is any network that is connected by cables. Hardware such as servers, workstations, network switches, printers, copiers, and more are connected to this type of network. 

MFA (also referred to as 2FA)

These days, you have to be diligent about the type of security you have to protect your important digital assets. MFA, or multi-factor authentication, makes accounts a little more secure by introducing a randomized passcode tied to an individual. 

SSL

A Secure Sockets Layer is a protocol for sending encrypted data. Used to keep data safe when sending it to outside servers and when it is sent back, the SSL is an essential tool used for online commerce.

UPS

Power surges can completely fry the components of a server, workstation, or any other computer that’s plugged in. An Uninterruptible Power Supply (UPS) is a power strip that comes equipped with its own battery system. If the power goes out or gets wonky, the UPS will take over to give you time to shut down your computers and avoid hardware failure. 

VM

The virtual machine is an important part of many business’ computing infrastructures. Virtual machines can reduce the computing resources needed to run software by virtualizing all of the hardware or software. It can significantly cut computing costs when used across an organization.

VoIP

Voice over Internet Protocol is a full-featured telephone system that is broadcasted through the Internet as opposed to traditional phone lines. VoIP providers offer a range of business tools such as telephone services, instant messaging, text messaging, and voice and video conferencing options. 

VPN

A Virtual Private Network (VPN) is a tool to transmit data securely over any Internet connection. Using encryption, the VPN user can rely that their data won’t be intercepted.

WAN

WAN, or wide-area networks, are used by organizations that have multiple locations over a wider area by connecting multiple small networks into one larger network. 

To learn more about these solutions, and many others that we can help you to implement, reach out to Decatur Computers Inc. at 217-475-0226.

Learn More

Is Your Data Redundant?

When so much that has to do with business today revolves around the idea of efficiency and streamlining everything, it does seem odd that we would endorse anything described as “redundant.” However, it is important to realize that redundancy with a purpose is somewhat different. Consider the 3-2-1 Rule.

The 3-2-1 Rule of Data Backup

One of the common best practices recommended by IT professionals, the 3-2-1 Rule demands that there should be three copies of all of your data, including two backup copies, one of which is stored offsite. Why the additional (arguably redundant) offsite backup?

Well, what happens if the disaster that took out your original copy also took out the backup you had on hand? If a fire broke out and burned your business (and everything inside) to ashes, or a storm reduced it to so much rubble, utterly destroying any and all electronics? Maybe a thief breaks in and takes everything, including both the hardware storing your original and the hardware storing the backup.

Hence, the offsite copy, backing up your backup.

Why Backup Matters Now

Unfortunately, current events have only made it even more clear why the backup is more important now than ever. As businesses have had to close or turn to remote operations in light of the ongoing COVID-19 coronavirus infection that has been wreaking havoc, there has been an unfortunate uptick in crime against businesses. What if the disaster that takes your data is literally someone taking your hard drives as described above, or even just vandalising them? You want your data stored safely elsewhere to prevent it from being lost in such an event.

Of course, if you have your backup copy (or really, copies) stored in the cloud, you stand to see double the benefit in this particular situation. Not only is your data safe, your team could access it to work from home if they were to be stuck there.

Of course, we don’t hope that any of this happens to anyone. However, we aren’t going to assume that it won’t, either. That’s why we subscribe to the 3-2-1 Rule, and so should you.

We can help you do that. Reach out to Decatur Computers Inc. today to learn more about business data backups, and the other benefits that working with us can bring. Give us a call at 217-475-0226.

Learn More

Know someone who would benefit from Decatur Computers Inc.? Let us know!

Latest Blog

At this point, it’s hard to believe that anyone needs to be told that cybersecurity is important, but some organizations are still doing the bare minimum to protect their network and data. That can’t go on forever. Today, we thought we would discuss how to put together a cyb...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.