CW IT Support

CW IT Support

IT Services and IT Consulting

Wilmington, Nc 465 followers

We keep municipalities safe from cyber attacks.

About us

CW IT Support is a fast growing MSP in Eastern North Carolina. We offer a variety of managed services and support options for our clients. At Computer Warriors IT Support, we believe "We are in I.T. Together!" We serve as a partner with our clients and provide them with peace of mind outsourced IT solutions. Some of our services include Disaster Recovery and Backup Solutions, VoIP solutions, Guaranteed Virus Protection, Network Security, Server and Workstation Maintenance, Emergency Work, Network deployments and installation, etc. Computer Warriors IT Support is headquartered in Wilmington NC about 5 miles from Wrightsville Beach. The company is owned by Brian Satz, a UNCW graduate, who started the company in 2006. They now support hundreds of local businesses and have over 20 full time employees across all divisions. Computer Warriors IT Support is highly focused on providing a 5 star client experience. In order to do this, we maintain high levels of internal standards, such as answering 95% of calls before voicemail, and responding to 95% of tickets within 30 minutes of creation.

Industry
IT Services and IT Consulting
Company size
11-50 employees
Headquarters
Wilmington, Nc
Type
Privately Held
Founded
2006
Specialties
Managed Services, Computer Networking, VoIP, Disaster Recovery, Server Backups, IT Support, IT Consulting, MSP, Structured Cabling, Wireless Networks, Windows Server, Network Security, HIPAA, and PCI Compliance

Locations

Employees at CW IT Support

Updates

  • View organization page for CW IT Support, graphic

    465 followers

    Business owners, BEWARE! The scammers are at it again. A new “overdue invoice” scam is circulating. This scam involves a fake organization sending a past due invoice that needs to be paid urgently. Some have been sent from fake names that look exactly like companies you do work with! Make sure whoever is paying your invoices confirms that the invoice is legit before paying. You don’t want to end up losing $40k to a scammer and still owing your vendor. 📲Need help with cybersecurity? We’re here for you. Book a call with our team to get your FREE Security Risk Assessment so we can find out if and where you’re vulnerable and devise a plan to fix it - https://lnkd.in/gr3a6KDB

    • No alternative text description for this image
  • View organization page for CW IT Support, graphic

    465 followers

    This sounds like a basic tip and yet so many people still reuse passwords or create weak passwords using the names of kids or pets and favorite numbers or even street addresses. Give cybercriminals a challenge and create a strong password that will keep them locked out! 👉Go with an assortment of 12+ letters, symbols and numbers that are arranged in no particular order. 📲Book a FREE 10-Minute Discovery Call with our team of experts to get started - https://lnkd.in/gr3a6KDB

    • No alternative text description for this image
  • View organization page for CW IT Support, graphic

    465 followers

    If we sent a fake phishing e-mail to everyone on your team right now with a bad link or a dangerous attachment, how confident are you that none of them would fall for it? 🧐 If you aren’t 100% sure you’d be safe (and honestly, even if you are), today’s article is for you! We are sharing the S.E.C.U.R.E. Method you and your employees can reference to quickly identify phishing e-mails. It’s a quick checklist that can help you determine whether an e-mail is risky. Click here to read it now - https://lnkd.in/eyVR9jUp

    • No alternative text description for this image
  • View organization page for CW IT Support, graphic

    465 followers

    Business Owners: It’s Cybersecurity Awareness Month, which means it is the perfect time to do a quick check-in to make sure that your network is SECURE! 🔐 Here are a few of the cybersecurity best practices your organization should have in place. 📲For a complete list of everything that needs to be done plus a FREE Security Risk Assessment, book a call with our team of experts today – https://lnkd.in/gr3a6KDB

    • No alternative text description for this image
  • View organization page for CW IT Support, graphic

    465 followers

    There are a few popular apps created by Chinese company ByteDance that may pose serious cybersecurity risks due to how much data they’re collecting. These apps collect: 🚩Your name, age, username, e-mail address, password, phone number and location 🚩Your IP address, cell phone carrier, time zone, device model and operating system 🚩Biometric identifiers, like facial IDs and voiceprints And much, much more! Here are 5 of their apps that you should consider removing: TikTok: Short-form video social media app Lemon8: Social media app focused on fashion, beauty, travel, food and other lifestyle categories CapCut: Video-editing tools and filters Hypic: Photo-editing tools and filters Lark: Collaboration app designed for work 👉🏻 The amount of data TikTok collects is so extensive that it comes dangerously close to cloning your entire phone. 😳 You don’t want that information to fall into the wrong hands! https://lnkd.in/gr3a6KDB

    • No alternative text description for this image
  • View organization page for CW IT Support, graphic

    465 followers

    AI can be a great resource to increase productivity. But, with so many options, many of which are nothing more than “well-marketed junk,” it can be difficult to find the AI tools that are worth their weight. Before you give up and resort to the AI-free way of doing things, we’ve found an AI-powered tool that backs up its claims and, when utilized properly, can streamline operations, enhance efficiency and improve productivity in your organization. Find out what this trustworthy AI-powered tool is! -https://lnkd.in/gXN7P6sP

    • No alternative text description for this image
  • View organization page for CW IT Support, graphic

    465 followers

    Wiping your cookies, cache and history clean can help keep your computer running smoothly, but it also can help keep you secure! Clearing your data helps protect your privacy and minimizes the risk of a cyber-attack by preventing unauthorized access through stored data. Take 5 minutes and do this today! 📲For more support in keeping your network optimized and secure, book a FREE Network Assessment – https://lnkd.in/eAg5i6_p

    • No alternative text description for this image
  • View organization page for CW IT Support, graphic

    465 followers

    As the election nears, many business owners are becoming increasingly concerned with cybersecurity. To ease your mind and ensure you’re properly protected, we’ve compiled 21 critical IT security questions your IT provider should be able to answer on the spot. If they can’t, it’s time to find a new one who will make SURE you are secure. Click here to download the questions for FREE - https://lnkd.in/edRjdpSy

    • No alternative text description for this image
  • View organization page for CW IT Support, graphic

    465 followers

    In mid-July, 8.5 million Windows devices crashed, triggering a “blue screen of death” that couldn’t be fixed for hours, even by rebooting the system. 🚨 Flights were grounded, bank accounts couldn’t be accessed, surgeries were canceled and more. It was complete chaos for thousands of businesses. Sources say it wasn’t a cyber-attack, BUT the real reason behind the attack is alarming and should concern every business owner. 😱 Click here to find out what you need to know about the biggest IT outage in history to protect your company -https://lnkd.in/eHFz7qb6

    • No alternative text description for this image

Similar pages

Browse jobs