Get Started Today!  217-475-0226

Central Illinois' IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Premium IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Decatur Computers Inc., we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

IT Questions?

If you have questions about whether or not our IT services platform is right for your business, simply complete and submit this form and one of our trusted IT professionals will promptly respond to your query!

What Our Clients Say

  • Saved my WEDDING!
    Residential Client

    This past year I have been planning my wedding, and I have a ton of spreadsheets and documents on my computer pertaining to the “big day”.  I saved everything on an external hard drive just in case. One day I went to get one of the documents off of the hard drive and of course there were no documents in the file. My computer is very old so I have worried about it crashing. I have no clue where to take it to find out what went wrong. I was telling my cousin Steve Turner about it and he suggested Decatur Computers. I took it in, I was only there for about 10 minutes, they had great customer service, said that they would call me in a few days to let me know what they were able to do. I got a call that week, they not only retrieved everything on the hard drive but they also increased the speed of my computer so we were able to wait a bit longer to buy a new one. I would definitely recommend anyone to Decatur computers.

  • These guys do a great job!
    Residential Client

    "These guys do a great job! I took my computer in to be updated and they not only did that but they got rid of all the bugs and viruses and it runs much faster. Then when I got home with the upgrade my printer wouldn’t connect. I called them up and they connected to my computer from their location and within half hour they had me back in service!  It was also kind of funny watching them move the mouse and different things going on the screen while I was sitting here not moving a thing. :)"

  • Excellent service 
    Residential Client

    Decatur Computers has given us excellent service in our computer needs. The staff provides professional, immediate service. A telephone call to them gets immediate help with any of the needs we have had with our current system. We are most happy to have them available, and the prices have been right!

  • Prompt, efficient and affordable computer service
    General Fence

    “Decatur Computers has always provided prompt, efficient and affordable computer service at our home as well as at our place of business. We have also purchased several new computer systems from them and have been very pleased with the products they recommended for purchase. The technicians are always courteous. Any technical issues or problems we have had, they have addressed quickly to ensure that we had minimal down time if any at all. I would highly recommend Decatur Computers to anyone whether it be for residential or business services.”

  • The staff is very professional.
    Owner/Operator, Starship Billiards and Buffalo Agency Inc.

    “I run two small companies and have relied on Decatur Computers for over 7 years. The staff is very professional. One business runs a POS system the other data management . They are fantastic with both. There has never been a problem they cannot fix, even though both systems are very different. I would strongly recommend them to anyone for whatever they need.”

  • Great service and fair pricing!
    CEO,  EHC Admin Service

    “I have worked with Decatur Computers for over 10 years. I have always had great service and fair pricing. Now that I have my own home based business I am looking forward to the continued relationship. The staff is always courteous whether it is on the phone, in shop or off site. I know that I can count on them to fix my problem or answer my question.”

  • I would highly recommend Decatur Computers Inc.
    Plant Director/Operator, Jacobs Field Service

    With today’s technology advancing so fast it is nice to know there is a one stop shop for all technology problems.  I personally have gained a lot of knowledge and had the best assistance with all my computer and software issues I have encountered.  I would highly recommend Decatur Computers for anyone’s personal and business needs.  As I always say ‘Why try to fix your own computer when that is what Decatur Computers does'”

  • Go Above and Beyond

    Decatur computer and their staff go above and beyond to serve their customers. Mathew was very friendly and informative through the repair process. I received emails through the entire process updating me on the progress of my repair. I would highly recommend Decatur computer to anyone i know for repairs or upgrades. Thanks again to Mathew his great customer service and hard work.

Latest Blogs

If Your Backup Doesn’t Involve These Three Aspects, You’re Doing It Wrong

Let’s consider why—explicitly—these evaluations are so important.

The Fundamentals of Data Backup

There are three elements that any modern backup strategy needs to incorporate to contribute to its success:

  1. Incremental Backups: To retain as much data as possible in the event of a disaster, backups should be taken throughout the day—as frequently as every 15 minutes.
  2. Fast Recovery: A backup solution needs to be able to restore data promptly and when called for so it can minimize the amount of downtime your business must contend with.
  3. Regular Testing: A backup solution that doesn’t do its job could lead to a highly detrimental situation, so your backups should be tested regularly to identify and resolve any shortcomings.

Is Testing Your Backups Really That Important?

While you should always evaluate your technology to check for issues, your data backups make this even more important to do. Your business relies on the data it can access, and with so many ways that this data could be lost you need some way to effectively mitigate any scenario. A backup and data recovery service can provide you with the means to do so.

Of course, even if you have a BDR in place, testing is no less important to ensure that it works effectively if (or, more realistically, when) you need to use it. Plus, if it doesn’t work in your test, you have a chance to fix the problem before larger problems ensue.

Here at Decatur Computers Inc., we’re committed to helping our clients keep their operational data safe. If you would like our assistance with implementing and maintaining your backup—as well as your other technology solutions, give us a call at 217-475-0226 to learn more.

Learn More

Tip of the Week: How to Generate Strong Passwords That You Can Actually Remember

Threats Against Your Passwords

There are two different ways that an attacker will generally try to undermine your password:

  1. Using trickery to fool your team members into sharing their password.
  2. Using tools and malicious software to deduce and/or steal the correct credential.

Because of this, it is important that you ensure that all the passwords that your users have in place are strong enough to resist both methodologies.

Balancing Strength and Memorability

Considering this, it makes sense to keep the following ideas in mind as you put together your passwords and password policies:

  • If a password cannot be guessed, stolen, or deduced, the hacker will likely try any and all possible combinations until they get a match in what is called a brute force attack.
  • A password’s security and that same password’s resilience against being brute forced are two different things.

For an optimally secured password, you must consider both of these ideas.

Using This Information to Optimize Your Passwords

There are a few standbys when it comes to password best practices that are likely familiar to you:

  • A password needs to be longer, ideally over 16 characters in length when allowed
  • These characters need to include a combination of non-consecutive letters, numbers, and symbols
  • These characters don’t represent any common words or numbers, private information, or any publicly accessible details

In addition to these precautions, we must consider how attackers break into passwords through brute force attacks. To help avoid that outcome, your passwords need to be sufficiently complex as well.

Approximately 40 percent of passwords in use only contain lowercase letters, which enterprising cybercriminals are well aware of and use to their advantage throughout their brute force attacks. They do so by first only checking combinations of exclusively lowercase letters, making their efforts much faster. Each additional variable adds to the difficulty the hacker will have decoding it, potentially convincing them to abandon their efforts before success.

Of course, you still need to remember these passwords, so if you can’t commit it to memory it isn’t going to help you, either.

As a result, an idea has come around that a truly ideal password is made up of a few randomized words with random alphanumeric substitution and capitalization sprinkled throughout them, padded out with symbols. After all, each variable we incorporate makes the hacker’s job that much more of a challenge and could foreseeably stymie any automated efforts to bypass the password long enough to render the search impracticable.

So, in light of this, a good password might look something similar to this:

[email protected]@gE;;;br|ghtEn;;;sc0v|llE++++

Taking this password into closer consideration, we can see why it would be nigh impossible to guess, without being impossible for a user to remember. However, its varied construction also means that a brute force method would have to go through an extensive list of permutations before eventually landing on this precise combination.

So, if you’re up to the challenge, it makes sense to consider making your passwords look something like this from here on out.

The Matter of Remembering These Passwords

Of course, using a separate example of a password like this for each account you have is a considerable feat—daunting for most people. A password manager can make it much simpler to keep to these best practices.

A password manager is a specialized software that securely stores your active passwords for you to use, locking them behind a single master password. That way, you can keep to password best practices without having to remember dozens of different passwords.

Whether you need assistance with your IT’s security or your company’s productivity, Decatur Computers Inc. is here to assist you. Find out what we can do by calling 217-475-0226.

Learn More

What’s Happening with COVID-19 Scams

Opportunists and COVID-19

Everytime something terrible happens, hackers are there to try and take advantage of the desperation people have. It is one of the saddest, most sickening truths that takes place in our digital society. As the pandemic stretches on, more and more scams have been reported that cover all types of parts of people’s lives. They include:

  • Phishing - Phishing scams were here long before COVID-19 and will be here long after it isn’t a threat any longer. Essentially, scammers use emails that are disguised as being from a reputable and legitimate source (like the IRS or the CDC) to get people to take actions they wouldn’t normally take. Typically these messages come from what appears to be a financial institution, but they can literally come from anywhere. 
  • Vishing - Vishing is phishing, but over the telephone. It’s the same strategy, but because the call seems like it is coming from a legitimate source, people will impulsively act. This can have dire consequences. 
  • Smishing - Again, same concept, but this time the message is written via text message. Since people don’t think about the fact that people could be trying to fool them into giving over sensitive financial and personal information through text, they immediately act, leaving them scammed. 
  • Pretexting - This is a less well-known scam, but it has been used a lot over the past year. Basically, someone will contact you directly claiming to be someone they aren’t. They typically claim to be from a government office, a financial institution, or a healthcare organization and ask for personal information to verify your identity.
  • Spoofing - Spoofing can come from any medium, but in the COVID-19 era, we’ve seen a lot of spoofed social media profiles. The scammer will set up a profile with the name of a person you know, they will contact you out of the blue, but since you presumably know this person already, you will help them hack yourself. Spoofing can also be from email addresses, instant messaging accounts, and phone numbers. 
  • Quid Pro Quo - This type of scam has been played up with so many people looking for any way to make ends meet. The scammer will promise the victim something in exchange for information. It may start out as a seemingly legitimate relationship, but after trust has been maintained, the victim is taken for data, money, or worse. 

What Can You Do?

Well, that’s not a simple answer, but there are plenty of things you should be doing to keep your private information out of other people’s hands. Firstly, you will always want to verify the identity of anyone that asks you for anything online. This means anyone. It can be your boss, your partner, your parents, anyone. These days scammers will do anything to get a hold of a little piece of you to take a lot from you. Verify, verify, verify.

Everyone that has an online life should understand the potential pitfalls that are out there. This perspective, along with adhering to best practices can go a long way toward keeping your personal information out of the hands of scammers.

If you would like some help coming up with a comprehensive cybersecurity strategy for your company that includes thorough training and testing, call the IT professionals at Decatur Computers Inc. today at 217-475-0226.

Learn More

Know someone who would benefit from Decatur Computers Inc.? Let us know!

Latest Blog

For any business continuity strategy to be complete, a data backup strategy needs to be involved. This is often easier said than done: there are a lot of elements that need to be considered, and some data can go overlooked if the solution isn’t maintained. However, consideri...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.