UTEC Cyber Defenses Hold Strong During Solarwinds, FireEye/Sunburst Attacks

Leading Managed Technology Services Provider Safeguards Customers From Cyberattacks

ANN ARBOR, MI — January 2021 – UTEC, a leading managed technology services provider (MTSP), recently announced that SolarWinds, an IT company trusted by enterprises and government agencies, was breached affecting many government agencies and large enterprises. The US Cybersecurity and Infrastructure Security Agency responded by requiring all federal civilian agencies to review their networks for indications of a breach and to immediately update their software with the most current version provided by SolarWinds. This meant that every day that a SolarWinds Orion customer had not updated to the latest version of the software, they were vulnerable to the attack. However, any UTEC customers who may have been concerned about these attacks, can rest assured that these attacks were already foreseen, monitored, blocked and resolved. Additionally, UTEC customers’ cybersecurity was enhanced and reinforced without any action necessary on the end user’s part. UTEC closely monitors and manages customer networks so that all cyberthreats, like the SolarWinds breach for example, are proactively resolved, oftentimes before the business owner is even aware that a threat has occurred.

When asked for comment, Kevin Van Kannel, President of UTEC, stated, “Unfortunately, these types of attacks are forecasted to increase in scope in the future. Cybercrime isn’t going away, but with new technologies we’ve been able to fortify the integrity of our customers’ networks to the point where it’s an extremely safe cyber-environment. Most small to mid-sized business owners underestimate the likelihood of an attack like this reaching their business, but even though they are ideal targets, with the proper preventative measures in place, they can rest assured that their sensitive data is safe.” He later added, “We’re thrilled to be able to provide that level of peace of mind for our clients, so they can focus on business growth instead of cybersecurity best practices.”

Many of the leading MTSPs, like UTEC, have also integrated artificial intelligence into their cybersecurity services, adding a new layer of protection to their security infrastructure. Businesses with a layered approach are protecting themselves through redundancy, keeping their clients’ data safe and their own organizations strong. While many business owners are just starting to become aware of the exponential growth in cyberattacks, UTEC is doing it’s best to educate the business community in a proactive manner, which is reflective of their cybersecurity methodology.

ABOUT UTEC 

UTEC was established in 1975 in Ann Arbor, Michigan. UTEC is a growing company recognized as a leader in office and information technology solutions and services.

UTEC offers state-of-the-art products and unwavering customer service that has helped grow and expand its operations throughout Michigan.

UTEC employs a staff of over 30 people and provides the following products and services: a variety of IT solutions, including managed network capabilities, multi-function printers & copiers, wide-format printers, managed print services, VoIP phone systems, digital and interactive displays, document management solutions, thermal imaging kiosks, postage meters, and mailing solutions. UTEC can attribute much of its growth over the past several years by specializing in customized IT and Smart Office Solutions.

UTEC’s focus extends beyond the products and services they offer. They arededicated to supporting the local communities they operate, including many non-profit organizations, Chambers of Commerce, high school, and collegiate academics and athletics.

For more information on UTEC’s business products and services, contact UTEC, 1995 Highland Drive, Suite. C, Ann Arbor, MI  48108.  For online company and product information, visit our website at www.utecit.com or email us at info@utecit.com.

SOURCE UTEC

Offshore Drilling Company Follows Best Practices When it Comes to Document Security