Author Page

About Red Level

As a comprehensive technology services company, Red Level delivers customized scalable technology solutions designed precisely to our client's unique needs – solutions that accelerate growth, reduce costs and enable collaboration. As a preferred partner to technology leaders such as Microsoft, DellEMC, and VMWare, we deploy the most advanced business technology solutions, ensuring optimal reliability, productivity and value.

Red Letter IT Newsletter – June 2018

There's nothing like jumping right into a summer heat wave!  With sunblock, beaches, parks, and vacations, let's take a look at these 5 quick but important IT stories you should know about: MICROSOFT 365 BUSINESS - BETTER WORKFLOWS & PROCESSES: Detroit Wallpaper Engaged with Red Level to Implement Powerful Tools to Consolidate and Simplify Everything from Finanical Data to Sales Presentations "I would say that we have probably reclaimed at least 10–15 percent of our budget by preventing waste through timely collaboration." (Andi Kubacki, Co-Founder, Detroit Wallpaper) TECH NEWS: Save Money & Time in Your Journey to The Cloud Learn how reserve instances, automation, auto shut down features, and more can give you smart strategies for better security, performance, and cost savings. BLOG: Red Level Expands Datacenter Presence = More Flexibility, Choices, Power, & Protection Datacenter capacity doubled in Grand Rapids for expanded services and advanced solutions like added redundancy and data security. ...

2023-02-16T16:01:37+00:00

Red Letter IT Newsletter – April 2018

Are we skipping spring and going right into a summer heat wave?  With the constant weather changes in Michigan, let's take a look at these 5 quick IT stories you should know about: BUSINESS GOES ON WHEN THE LIGHTS GO OFF!: A powerful Disaster Recovery plan from Red Level, Bower Management is building a stronger, more resilient business Can your company weather any storm? TECH NEWS: By the end of 2018, spending on IT-as-a-Service will be $547 Billion! Cloud platforms and Cloud services adoption are increasing in the mid-tier and small & medium businesses (SMB), leading researchers including Forrester to adjust their forecasts upward. BLOG: MiCloud - Enterprise-Grade Cloud Services for SMBs MiCloud offers significant advantages - Scalability, control, and personalization TECH SPRING CLEANING 2018 = SUCCESS: Dell Technology Roadmap + Client Device Security, Patching/Updates & Network Security We were able to recycle many more devices, servers, phones and old IT junk than last ...

2023-02-16T16:01:37+00:00

Email Phishing Becomes A Bigger & Bigger Threat

Phishing threat is no joke, despite the widows and princes. The phishermen are out there – just make sure you don’t get caught. Imagine: You come into work one morning and open a typical, innocuous-looking email. Unknown to you, that sets in motion a chain of events: Malicious code within the virus embeds itself within your laptop, forcing it to perform a series of hidden procedures that open gateways to your data, send spam emails to your contacts, and reproduce copies of the code. By lunchtime, several of your colleagues’ machines are doing the same thing. Twenty hours later, your entire network is infected, and all 70 employees are idled for two days! Can it happen? It happened recently to a Red Level client.  By opening a single email, business ground came to a complete halt for two days, costing the company capital, revenue, and opportunity. Sadly, it’s something we ...

2023-02-16T16:01:38+00:00

April Showers Brings May Security By Avoiding Attacks

The cyber security threat landscape is evolving, most companies’ solutions are not solving these attacks. Attackers are spending more than 287 days on average in companies they breach – and the amount of damage done in that time is astonishing. Three-quarters of those breaches are directly linked to the mismanagement or theft of user credentials.  What is most alarming is that companies’ solutions cannot solve the problem. Expect breaches to happen, instead of struggling to protect your business from outside threats.  So what can you do?  Rely on detection and containment to best secure your environment. What if your employees need to access information from outside the office and often from their own devices?  More importantly, how do you ensure that your data stays safe and out of the reach of likely attacks? One recommendation is to rate your mobility landscape. One question to ask yourself is, “How well am ...

2023-02-16T16:01:38+00:00

Red Level’s Kyle Hildebrand is Unstoppable!

Our very own Kyle Hildebrand was recently promoted to Network Administrator from his previous role as a Senior Helpdesk Specialist to meet our clients growing needs.  He's unstoppable as he also won the Red Level 2017 Professionalism Award where he demonstrates enthusiasm, openness, diversity, teamwork, accountability, and a sense of purpose for the company. Kyle received high praise for his Office 365 migration project including OneDrive and Skype for Business training with a prominent automotive and aerospace organization. Some of his expertise includes: Support relating to complex technical issues involving Microsoft’s core business applications, especially Office 365 and directory synchronization Support for backup systems/disaster recovery solutions Support of peripheral devices/technology such as printers, copiers, scan-to-email/folder Mobile device support for various platforms including iOS and Android Do you want more information on Office 365, Skype or Disaster Recovery?  Maybe superstar Kyle will work on your next project!

2023-02-16T16:01:38+00:00

Red Letter IT Newsletter – February 2018

Hopefully, the winter blast we've been experiencing has finally subsided.  Now with this mini heat blast into the 40s, take a look at these 5 quick IT stories you should know about: WHAT ARE THE FIVE W'S OF MANAGED SERVICES? Who, What, Where, When, and How for Managed Services A quality IT provider should feel like part of your company’s family, like a natural extension of or another department within your business. TECH NEWS: Managed Services Provider Checklist Marco D’Aristotile, Red Level Help Desk Manager, Explains How Managed Service Providers Become Outsourced IT Departments. BLOG: Two Advanced Security Certifications = Better Security For You Information security is a significant area of concern these days – and it ought to be. TECH SPRING CLEANING 2018: April 19 - Out with the old. Preview the new Stay tuned for more details on this April 19th event which will include a Dell EMC device bar, lunch, networking, ...

2023-02-16T16:01:39+00:00

What are The Five W’s of Managed Services?

WHO takes care of Managed Services? IT providers focus on the small to medium-sized business market where it’s common to find companies outsourcing their IT services. A quality IT provider should feel like part of your company’s family, like a natural extension of or another department within your business. WHAT exactly are Managed Services? Managed services are a package of IT systems and solutions for your company provided by a competent service provider. The tools they provide leave you free to focus on other aspects of your business. Some forms of managed services include PC and network device alerts, network security, data backup and recovery, and overall system management and maintenance. WHERE should I begin? Take a look at the size of your business and clientele. How important is their data to you and your business? Data security is defined differently at every company Think about service outage situations and ...

2023-10-03T21:20:37+00:00

Red Level’s Ed Baustert Attains Two Advanced Security Certifications = Better Security For You

“The threat landscape is always changing, and changing at a very rapid rate” For most companies, information security is a significant area of concern these days – and it ought to be. Hardly a week goes by without news of a new high-profile hack, data theft or intrusion striking a major enterprise, causing incredible damage to reputations and bottom lines. Meanwhile, the countless smaller companies being compromised, often with devastating results, seldom come to broader attention. The era of complacency about a network and data security is well beyond over: The abundance of sophisticated malware and the seeming freedom of powerful hacking groups has seen to that. Red Level believes that being anything less than high alert concerning security threats effectively invites intrusion; we strive for continuous improvement where security is concerned, adding new tools, tactics, and knowledge to help our clients mount an ideal defense. Recently, Red Level Help ...

2023-02-16T16:01:40+00:00

3 Pillars of the High-Performance Digital Workplace

Ask any random group of employees how they’d characterize their company’s intranet and chances are their responses will be less than enthusiastic. Usually, there are good reasons: The intranet is a confusing labyrinth where vital information seemingly goes to hide; it’s a drab top-down exercise in one-way announcements; or it’s a rarely-viewed, seldom-updated ghost town. In other words, it’s neither the best business tool nor the best representation of a digitally-empowered business. But why does it matter? It is the cornerstone of your digital workplace that consolidates your organizational information and connects your employees. Red Level knows that a better digital workplace is not only possible, but it’s also easy to create and administer, provided companies take the right approach and use the right tools. On August 21, digital workplace architect and Microsoft MVP, Vlad Catrinescu will share “Three Pillars of a Great Digital Workplace Strategy” in a live webinar ...

2023-02-16T16:01:40+00:00

Building a Successful SharePoint ECM/ERM System in the Real World

If you listen to what is often said about SharePoint in enterprise records management (ERM), you might conclude that it is a mile wide and an inch deep.  In other words, the conventional wisdom seems to be that SharePoint has a broad set of capabilities in theory, but in practice lacks the depth of its competitors such as Documentum, OpenText, and Laserfiche.   But this comparison isn’t really fair, for three reasons:   SharePoint “out of the box” costs a fraction of what these other products do.  SharePoint’s competitors are often an amalgamation or “marketing bundle” of a variety of different products that have been purchased or licensed by the OEM, and often indifferently integrated with each other.  The implementation of “enterprise-class” ECM systems usually includes a consulting engagement, whereas SharePoint is often “thrown in” without the same level of forethought.   In reality, the reasons that ECM projects fail, whether on SharePoint or something else, ...

2023-02-16T16:01:40+00:00