battery

How to avoid malicious phone apps and limit the information they collect about you.

By Chad Miller | July 19, 2019

If you are like me, your cell phone is a part of your identity. It is the first thing you reach for when you wake up and the last thing you check when you go to sleep. You check the weather, the latest sports scores, look up movie times, order a rideshare, get the latest…

Read More

Do You Use the Same Password for Multiple Sites? Here’s Why That’s a Bad Idea

By Chad Miller | July 18, 2019

By Michael McCool Do you currently use a password manager? If not, you are probably reusing the same password or variations of the same password for every site you visit. This is a really bad idea. It’s not really a matter of if one of the sites you visit will be hacked, but when. The…

Read More

Municipalities and Small Businesses Take Notice: Cybercriminals are After You

By Chad Miller | July 2, 2019

Two municipalities were hit by ransomware last month and forced to pay approximately $600,000 each to regain access to city email and computer systems. One city, Riviera Beach, Florida, has roughly the same size population as the Kirkwood-Des Peres area where our offices are located. For three weeks, Riviera Beach’s email and computer systems were…

Read More

The Miller Group again named to list of 501 top MSPs in the nation.

By Chad Miller | June 25, 2019

12th Annual MSP 501 Identifies Top Forward-Thinking Global MSPs & Leading Trends in Managed Services The Miller Group has been named as one of the world’s premier managed service providers on the prestigious 12th annual Channel Futures MSP 501 rankings. Every year, MSPs worldwide complete an extensive survey and application to report their product offerings, growth…

Read More

Joe’s Musings: Dattocon, FBI’s Most Wanted Hacker, ex-CEO of billion dollar company, a party on the U.S.S. Midway, and Snoop Dogg

By Chad Miller | June 23, 2019

        A personal experience: Like most industries, the IT world has its fair share of conventions. Most of them are the same; pretty boring, full of your typical IT geeks and the vendors catering to them. Think of Comic-Con, but with computers instead of comic books. Last week I spent 4 days…

Read More
IT Services for Small Businesses in St. Louis

Scoops with Danny Mac

By Chad Miller | June 22, 2019

“My favorite thing about The Miller Group’s service is the people. They’re the most helpful people I’ve ever worked with. In my business, time is of the essence… They do whatever it takes to get my stories up as soon as possible because sometimes information can’t wait.”

Read More

Start using two factor authentication – like yesterday

By Chad Miller | June 12, 2019

Two-factor authentication is an authentication mechanism to double check that your identity is legitimate. Not a week goes by that we don’t receive a frantic phone call from someone with a compromised account. A bad actor has cracked their email password and sent out thousands of spam emails. Each one of these phone calls could have been avoid if they would have enabled two-factor authentication for their account.

Read More

RIGGS Company

By Chad Miller | May 22, 2019

“The honest, knowledgeable, and highly responsive support staff always produces the least amount of downtime for our business.”

Read More

Critical Windows Security Update!

By Chad Miller | May 15, 2019

Earlier this week Microsoft released fixes for a critical Remote Code Execution vulnerability in Remote Desktop Services that affects some older version of Windows and Windows Server. So, why should I care?   Well, if you have a Windows 7 or heaven forbid a Windows XP computer, you need to worry.  If your company runs a Windows 2008 Server or for some reason still a Windows 2003 Server, you better take this warning serious.

Read More

A Flooding Natural Disaster Guide

By Chad Miller | May 1, 2019

Damage due to flooding in the US amounts to an average of almost $8 billion annually. Undoubtedly, small businesses like yours are part of that devastation. But, even if your building is completely underwater, your business data and operations don’t have to be. Learn about the risk factors of flooding, and what considerations to take…

Read More