Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

Info Advantage is Looking to Hire a Help Desk Technician!

Interesting in joining the Info Advantage team? We currently have an opening for a full-time, salaried Help Desk Technician position available! 

Info Advantage, a local solutions provider and consulting firm, is seeking to augment our technical team by adding a qualified helpdesk technician to support our expanding client base in a variety of computer networking environments. Valid drivers license and reliable vehicle required. 

Candidate must possess technical skills within the Microsoft networking environment.

Certifications a plus Microsoft(MCSE)/Cisco, VMWare and Citrix. 

- Self-motivated and well-focused individual with a user-friendly personality. 
- Excellent organizational skills and attention to detail essential. 
- Strong verbal and written communication skills required. 
- Must be able to adapt to use of different computer based systems and software. 
- Education and training that provides the level of knowledge, skill and expertise required. 
- Project management skills a plus. 
- Be a contributing member of the Info Advantage Team 

- 2+ Years of Experience or qualified schooling 
- MS Office Suite 
- Troubleshooting hardware/software 
- Windows Administration 
- Understanding of LAN/WAN architecture 
- TCP/IP principles. 
- Firewall/VPN/Internet Appliances 
- Backup & Disaster Recovery 
- Internet and network security 
- Virtualization Solutions 
- Ideal Candidate 

Info Advantage is an energetic, young-minded, team oriented technology firm. We live and breathe this stuff and we love working with our clients. We seek the same in all of our employees and offer them the following benefits:

- Fun work environment 
- 401k 
- Paid vacation 
- Sick & Personal Time 
- Vacation Time 
- Paid medical for individual 
- Family medical and dental available 
- Certification tracks and training materials 


Please send your resume in MS Word format to: with the following Subject line: Resume for Helpdesk position.

You can also apply on our site at the employement page under the 'About Us' section.

Info Advantage Inc is an equal opportunity employer. Please, no third party recruiters or H1-B Visa candidates. No direct calls, we will respond to your resume once submitted. 

We are a small, fun, young-minded company that is customer focused and growth oriented. Come join our team!

Continue reading
0 Comment

Top Four IT Issues Every Business Should Be Aware Of

Regardless of how your business’s administration is set up, you should be aware that anyone in a position of authority must have a basic understanding of how IT, and its related responsibilities, functions for your business. Here are four ways that you can learn more about how IT works within your organization.

Know Who to Contact for Support
As a leader within your organization, you need to lead by example. You should be aware of who to contact within your company for any IT-related issues, and this contact information should be shared with other employees within your organization. By cooperating with IT, your business can improve operations so that you don’t encounter a roadblock when it comes time to upgrade to more recent technology, or perform maintenance on critical hardware and software.

Working with Vendors
Dealing with vendors is part of doing business with technology. Your organization likely has several different vendors for your various hardware and software solutions. Knowing how to communicate with them is key to getting the most from your products. In other words, you should at least be privy to information concerning your organization’s relationship with its vendors.

Basic Security Best Practices
This is a part of business that all of your employees should be familiar with. Data security is one of the most crucial parts of running a business, and your team needs to understand this if you want to ensure maximum security. Examples of basic security best practices include the following:

  • Employees should use long, complex passwords.
  • Employees should use two-factor authentication.
  • Employees should be able to identify potential online scams.

Managing Laptops and Mobile Devices
If your employees bring their own devices (BYOD) to the workplace for use on your company network, you have a responsibility to ensure that they’re following proper protocol. Do you have a BYOD policy? If not, you should consider setting one up. You need to have some sort of oversight in regards to what data is being used and accessed on what devices. The idea is to restrict the flow of data through permissions so that you can know how it’s being used, and to limit its exposure to threats.

This might seem like a lot to take in, but you don’t have anything to worry about. Most of these issues can be resolved simply by having an IT technician on-hand to consult in times of need. If you don’t have an in-house IT department, this might seem like an impossible task. Thankfully, Info Advantage makes it easy for your business to keep your technology functioning properly and running without incident; all thanks to outsourced managed IT services.

Info Advantage can handle the everyday management and maintenance of your IT systems, and act as a consultant, helping you make educated decisions about the future of your technology systems. For more information, give us a call at (585) 254-8710.

Continue reading
0 Comment

10 Common Security Mistakes to Keep an Eye On

10 Common Security Mistakes to Keep an Eye On


Most companies have to have a workforce, generally one of considerable size. Unfortunately, the more users you have, the more potential risks you run into. Of course, your workforce doesn’t collectively intend to be a security risk, but the digital world is a complicated place, with threats around every corner and malicious programs just waiting for your employed end-users to slip up. Here are ten such honest slip-ups to watch out for:

  1. Clicking on Risky Websites - The web is pretty big, so when an employee has been searching for something and finally manages to find a link, they might not always think about the source. As a result, your network and files could be subject to any number of threats. Be sure to emphasize to your employees that there is such a thing as “too good to be true,” especially on the Internet.
  2. Weak or Personal Passwords - As much as your employees might love their dogs, cars, or a particular date in time, a password is no place to express that love. Also, if they actually use “password” as their password, they are just begging for trouble. Encourage them to use private, randomized strings of numbers and letters as insistently and consistently as possible.
  3. Lax Habits in Mobile Security - You may have the latest versions of spyware and virus blockers on your company desktops, but do your employees have the same on their tablets, phones, and other portable electronics? Without the same security, once they are connected to your network, these devices leave your network wide open for breaches. Be sure your employees aren’t leaving points of access to your network without safeguards by establishing mobile device policies and a BYOD (Bring Your Own Device) policy.
  4. Using Insecure Connections to Access Sensitive Data - Are your employees reviewing company files on their lunch break by using the local fast food franchise’s free Wi-Fi? If they are, it is recommended that
     you put a stop to it; as public Wi-Fi hotspots are prone to have malware lurking about.
  5. Lost or Stolen Unencrypted Tech - So an employee is riding the bus to work, and leaves their company phone behind when they disembark. Without encryption software, that phone is potentially an encyclopedia of company data and information for sale to competitors, as well as a free pass into company files and email. Enforcing encryption policies helps to mitigate this risk.
  6. Shadow IT - An employee decides that they prefer a different program to perform their job-related task and downloads a copy of that program onto their company desktop without the knowledge of the IT department. Besides the question of compatibility with your systems, it spreads your company data into yet another system, but this time you don’t have control over it. Plus, there is always the risk that the download will come with a bonus - vulnerabilities that could allow malware to hitch a free ride into the network. Be vigilant regarding the use of unapproved, personally downloaded applications.
  7. Phishing Calls/Personalized Phishing Emails - One of your HR employees checks their email and finds what looks to be a job application directed specifically to them, using their name, title, and other personal identifiers. They click on the included link, not realizing that the email was actually from a hacker who did a bit of research on Facebook and LinkedIn, and downloads a mess of viruses. Impress upon your employees the importance of private social media accounts and the careful consideration of any linked content from unknown senders. Similarly, make sure your employees can recognize and appropriately handle phishing telephone calls for both live callers and robocalls, and understand the importance of not sharing company information compulsively.
  8. Personal Email Use - The news has presented enough evidence in recent years to prove that using a personal email account for work purposes is never a good idea. Beyond the implicit unprofessionalism of some usernames, personal accounts tend to be more vulnerable to malicious programs than their corporate counterparts are. Encourage your employees to keep work and personal emails separate.
  9. Leaving Workstations Unattended - As unfortunate as it is, not all employees will be completely on the up-and-up. Some will attempt to view information they aren’t cleared to access, often for purposes of corporate espionage. This task becomes remarkably easy when a workstation is left unattended while still active. The fix is relatively easy to establish; just remind employees to log off of their desktop (or at least lock it) before they leave their post, and enforce it appropriately.
  10. Using Random Memory Devices - It makes no sense to carefully craft your system defenses if your employees are going to find a random USB drive lying on the street and plug it into their workstation, subjecting your network and files to whatever malware might happen to be on the device’s storage.

While human error is impossible to avoid entirely, you can minimize your risk of a security breach by implementing these policies for your workforce and educating them on best practices. For more information about industry best practices when dealing with company data, give Info Advantage a call at (585) 254-8710.


Continue reading
0 Comment

Moving Your Office? Make Sure Your Tech Can Handle It First

Moving your office is a difficult task. Moving furniture, personal objects, and technology can be a hassle that you don’t even want to think about. There’s nothing easy about moving your office’s technology to a new location, and we’re not going to let you do it alone!

For reference, let’s examine the technology that you’re currently using in your office. You probably have plenty of workstations; one for each employee, and some spares just in case something happens. These workstations need to be connected to your business’s network so that users can access mission-critical software, crucial information systems, and other important resources. A cabling infrastructure can quickly grow uncontrollable, especially if you’re not practicing proper cabling procedures.

Another problem that often comes up is the task of equipping your team with the right communications solutions. Setting up phone lines for each of your employees can be challenging, and you often need to consult both your budget and your organization’s floor plans in order to adjust for growth. There’s no better time to plan for the future and ensure that you can add or remove phone users as needed, than when you move to a new building.

Then, there’s the topic that you might not even want to think about; moving your physical files. Lugging around heavy and unwieldy filing cabinets can be a pain in the neck. You should be asking yourself if you’re willing to forsake physical file storage in favor of a digital file storage format. You also need to consider which files you absolutely need to keep, and which ones you can do without. It’s imperative that you perform a full assessment of your business’s current assets, paper or otherwise, and ensure that you take only what you need. Doing so can lessen the burden of moving your office. Be certain to shred any outdated files that contain sensitive information before disposing of them.

Info Advantage can assist your business with solutions specifically designed to increase mobility and communications in the workplace; many of which can make your move easier and improve operations.

  • Voice over Internet Protocol (VoIP): With VoIP, your business can take advantage of telephony communication from anywhere with an Internet connection. Since the only connection you need is your network, you can avoid the complex cabling required for landline telephone systems. You just need to keep a close eye on your network resources and ensure that your bandwidth is enough to handle the quantity of calls. Info Advantage can assist you with both a network assessment and the implementation of your chosen VoIP system.
  • The cloud and virtualization: Delegating information to your entire workforce can be challenging, but with cloud computing, it’s as simple as providing access to the Internet. Your employees can access software, data, and other important information through the cloud, all wirelessly without the need for intensive cabling. As long as your team has an Internet connection, they can use WiFi to connect to the cloud and access critical information. This allows for anytime, anywhere access.
  • Electronic records storage: If your organization is having trouble with file storage, Info Advantage can equip your business with a solution that’s designed to help you eliminate unnecessary physical file storage systems in the office. Instead, you can store your files in a digital, compliant space, that’s optimized for your file’s security. Since your files will be stored digitally and protected with data backup and such, you’ll be able to quickly get back up to speed without the frustration of digging through bulky filing cabinets.

Moving your office is a great reason to start fresh with your technology solutions. To get started, give Info Advantage a call at (585) 254-8710.

Continue reading
0 Comment

Job Automation: Robots Aren't Taking Over Quite Yet

Job Automation: Robots Aren't Taking Over Quite Yet


Companies are always looking to improve their operations by eliminating unnecessary costs. It’s a part of business, no matter how you look at it. However, as automation technologies grow more advanced, some of the more mundane (and even some professional) positions are at risk of getting replaced by cheaper, more efficient robotic systems.

We see this all the time in certain industries like manufacturing and retail, where there’s no longer a need for specific positions due to autonomous systems taking their place. While this trend is capable of increasing these organizations’ bottom lines, it simultaneously puts people out of work. Surprisingly, the quality of work by automated systems could be largely variable and unpredictable. So, until the details get sorted out, it’s likely that automated systems will have to be babysat, with humans jumping in to save the day should something go wrong.

This presents another possibility; rather than replacing workers, automated technology could be used to augment their capabilities. For example, there are writing programs that are capable of putting together articles much faster than the way the human mind can. However, these articles are often devoid of emotion and can’t connect on the same level as a human author can. So, for now, there are certain jobs that automation can’t touch, but how long will it take for automation technology to catch up?

Please keep in mind that we’re not insinuating that technological advancement is bad; we’re just trying to raise awareness for how it affects the worldwide economy and job market. It doesn’t matter if a specific technology can eliminate work for manufacturers and businesses if it puts hundreds of thousands of people out of work.

Yet, in many cases, technological advancement can be exceptionally beneficial. Consider, for a moment, how outsourcing can help your business. When you outsource to a third party, you’re essentially receiving a good or service from someone else. You’re purchasing their professional skills for the good of your business. So, in a manner of speaking, you’re augmenting your business’ IT with a valuable automated service in the form of our talented technology professionals.

At Info Advantage, we aren’t looking to replace your internal IT department. Rather, we want to work with them and help your business achieve its greatest potential. Regardless of your current IT’s role in management and maintenance, we can pick up the slack where they fall short. We’re firm believers in working together for the betterment of our clients. If your internal staff doesn’t have the time or skill necessary to perform regular IT maintenance, Info Advantage can step in and handle this responsibility for you. If the opposite is true, and your team doesn’t have time to implement new innovative solutions, we can perform this role for you.

Ultimately, our professional IT technicians are more potent and valuable than any robotic IT system can be. To learn more about co-managed IT, give us a call at (585) 254-8710.


Continue reading
0 Comment

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Blog Archive

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name