Always at your service to provide the highest level of quality support to our customers.
Anthony Firth Client Engineer
“I’m passionate about building and fostering relationships, and finding solutions for success.”
Michael Koenig Client Account Manager
“Enabling IT to become an effective and valuable partner by delivering premier customer service and quality IT solutions achieving business goals.”
Jake Parrott Business Development Manager
“Serving the client through IT solutions is my passion. A happy client is a happy me.”
Jason RichardsonClient Engineer
“Striving to provide friendly and quality service to our customers”
Ted Rorabaugh Client Engineer
“I help clients stabilize and grow their IT infrastructure so they can focus on growing their core business.”
Josh Wilshire Systems Engineer Team Lead
“Providing courteous, quality IT service for our customers.”
Rich Yoest Rapid Response Team Supervisor
“Striving to be your trusted adviser and IT teammate in accomplishing all your business goals”
Brandan Bishop Client Account Manager
“I strive to provide the highest level of quality service to our customers.”
Tommy Williams Sr. Hardware Engineer
“I’m driven by the steadfast belief that technology must serve as a business enabler. This mantra has driven 21
Years of successful partnerships.”
Stephen Riddick VP Sales & Marketing
“CSP doesn’t succeed unless your company succeeds.”
Stephen Allen Inventory Manager
“Through my intuition and genuine concern to help others I have built long-lasting relationships with our customers, co-workers and business partners.”
Scott Forbes VP Support Services
“Every day, I work with clients to help plan the future of their businesses.”
Michael Bowman vCIO
“Your IT problems become our IT solutions.”
Mark McLemore Project Engineer
“Managing internal and external operations to ensure that CSP provides quality and reliable customer service .”
Margie Figueroa Business Manager
“Helping customers get the most out of their IT Infrastructure.”
Marc Gillet Project Engineer
“Providing quality internal and externals financial support to our customers and accounting support to CSP.”
Katie Steiglitz Accounting Administrator
“Your satisfaction is our #1 priority.”
Heather Moore Project Manager
“Some call me the CEO. I call myself the Cheerleader for an awesome team!”
William B. Riddick Founder & CEO
“CSP is here to assist you with your IT needs.”
Beth Wylie Inside Sales Manager
Thinking ofHiring A New IT Company?
On What Questions You Need To Ask Before Signing Any Agreement.
For starters, you will want to very regularly back-up your mobile phone’s data, which will mitigate your worry about data exploitation or loss in case of something like a malware or virus attack. Also, keep your mobile device’s software and applications updated and upgraded wherever possible. You can also streamline your phone’s performance (allowing your cybersecurity tools to work more efficiently) by deleting those apps you no longer use. Also, certain apps can reveal your location via GPS coordinates and collect data about you, so make sure your data-sharing allowances are on the temporary setting. All these things and more will keep your mobile phone safe from hackers and theft.
You will also want to enable your mobile device’s password-protect function, which can also be a biometric authentication tool like a fingerprint scan. If your phone has more than one type of authentication, use any and all of them, in case your phone is stolen.
Public Wi-Fi Security
You should never make financial transactions using a public Wi-Fi connection, such as those at airports, libraries, and coffeehouses, but if you absolutely must, it would be wise to use a Virtual Private Network (VPN) or Cellular Data Network. Hackers have specially-built malware and spyware that is capable of monitoring and intercepting all user activity across public Wi-Fi hotspots, and are even able to record every keystroke. Because of this, it’s easy for them to retrieve usernames and passwords for emails and online bank accounts. Hackers can even access records and files stored on your smartphone memory.
Further Security Suggestions
Your physical location can be tracked via Wi-Fi and Bluetooth functions being on when not in use, and seeking wireless networks to connect to. It’s advisable, then, to turn off all app functions that can reveal your location or transmit personally-identifiable info about you. Be sure, likewise, that all of your social media account settings that show your physical location are turned off. Also, utilizing the remote wipe feature on your mobile device allows you to delete its contents or files without the phone being in your hand, which comes in handy in the event of a theft. You will also want to immediately enable the Find My Phone or Find My Mobile feature, in case your device slips inside hard-to-access spaces such as between your car seat and console and you lose track of it.
Reasons for Rampant Smartphone (and Data) Theft
Mobile phones are most often accessing the Web via public networks, making them especially vulnerable to black hat hackers and data thieves. Also, mobile phone users are seen as choice targets of cybercriminals because 1) Almost everyone has one, and 2) Many smartphone users are seen as affluent, making many financial transactions and personally-identifiable communications using them which can be lucrative for hackers. It’s all too easy for hackers to jump onto unsecured public Wi-Fi connections and parse the sensitive data being sent back and forth by many millions of unwitting mobile device owners.
Get Better Mobile Device Security
Keep your mobile phone and its data safe from hackers and thieves by taking these steps. You can also inquire with an IT specialist on Mobile Device Management (MDM) for yourself or your office staff. If you need further advice about smartphone safety and security, CSP, Inc is a proven leader in providing IT consulting and cybersecurity in Raleigh. Contact an IT expert at (919) 424--2000 or send us an email at email@example.com today, and we can help you with all of your mobile device safety, defense, and security questions or needs.