Field Engineer Sam the Man!

Sam is a motivator who enjoys his work and has been in IT for 16 years.  He is dedicated to God and his family.  He served four years of active duty in the United States Marine Corps and deployed to Iraq during Operation Iraqi Freedom.  While deployed Sam used cutting edge technology that allowed him to develop as a technician and a leader.

In his time off Sam enjoys golf, shooting and building battle bots with his kids.  His son and he got the idea after watching a youtube video and built their first couple bots last summer.  They plan to build a bigger bots next year.  Sam is a foodie.  He and his wife love to cook and try new foods. Most people who talk to Sam say he is very humble but still likes to take charge of a situation. 

Who’s Lurking in Your Computer?

Who’s Lurking in Your Computer?

Why do you need to worry about getting cyber security support? According to recent data, SMBs with less than 250 people, are the target for cyber attackers to camp out on their systems for an average of 51 days.  That’s almost 2 months' worth of business data that is...

read more

3 Remote Work Security Tips

  Copied from our trusted source at Trend Micro Remote and hybrid work environments are here to stay, which means CISOs need to establish an effective security strategy for managing the expanding attack surface. Organizations can no longer afford (quite...

read more

DCNC Inc. Cloud Computing

DCNC Inc. Cloud Computing In an increasingly mobile world where workers are finding ways to work remotely in an efficient manner, security and accessibility are two factors of increasing importance. Employees and employers alike need to be able to quickly access files...

read more

Co-Managed IT- 4 Benefits

The complexity of business technology has increased to the point where most organizations today require somebody in-house with a technical skillset. Whether it's managing IoT technology, hardware maintenance, or specialized software, companies often need to have a...

read more

Cloud Backup

Why Office 365 Customers Need a Backup Solution   Many business owners using Office 365 believe that their data is totally secure. The reality, however, is a different story. Although Microsoft offers many benefits in productivity, efficiency, and collaboration...

read more

Why Wait For A Security Breach?

Today’s digital age is ripe with people looking to take advantage of weak systems.  From Remote Monitoring and Maintenance to Backup and Disaster Recovery, we provide around the clock IT support services to ensure what you want to be kept safe, stays safe!

read more

9 Ways Your Employees Can Lead to a Breach

We all do it, use one set of login credentials everywhere on the web.  For work, for shopping, for banking; studies show that individuals reuse login credentials for at least 5 different applications.After all, we all have way too much to remember and the thought of...

read more

0 Comments

Cloud computing
Cloud computing
comanaged IT services

©1998-2022 DCNC, inc

All rights reserved

Privacy Policy