Get Started Today!  (415) 295-4898

The Bay Area IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At 415 IT, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

Do you have questions about IT Services and what they can do for your company? Fill out this simple form with your questions and our team respond promptly!

What Our Clients Say

  • ...there is virtually no down time...
    Vine Solutions

    Before Vine Solutions hired 415 IT, we tried to manage our IT on an as needed basis and our systems were a mess. Since hiring 415 IT, I feel like we have our very own IT person in house; they handle all of our IT needs and do it so there is virtually no down time during our business hours which is important for our growing business. 415 IT is my trusted IT source and has been involved in virtually every IT business decision that has allowed our business to prosper.

  • ...trusted advisor...

    415 IT has been managing our systems and technology for years. They are our trusted advisor when it comes to IT.

  • Very quick response time

    Very quick response time, as soon as an issue arises I receive a call back. We needed a new server installed within 1 week’s time and 415 IT made it happen without a glitch. Although our dedicated tech does not have a desk here, I feel as if we have access to his expertise immediately. Thanks for your great service.

  • ...professionalism and positive attitude.

    Gerken Capital Associates has been using the services of 415 IT for a number of years. We are always pleased with their professionalism and positive attitude. 415 IT is always on top of the latest technology and is able to accommodate us in a timely manner.

  • ...thrilled with 415IT.

    As a small business owner I am thrilled with 415IT. 415 IT replaced our traditional phone system; now we have increased functionality, great call quality all for a low price. We run a distributed business; 415 IT keeps our IT infrastructure running seamlessly. 415 IT is extremely responsive and a very reliable support. I highly recommend this firm.

  • The staff is great...

    We have been using 415IT for all our computer needs and have finally found a Company we can rely on for prompt and excellent service. The staff is great and they go above and beyond anything we have experienced before. It is very comforting to know that if we have problems with our computer system, that we have a Company that can provide with same day service.

  • ...I can concentrate on my job...

    As an entrepreneur running multiple business, I am absolutely dependent on technology for a competitive edge. With 415 IT managing our systems I can concentrate on my job, not my technology. When I have strategic questions about how to leverage technology to accomplish business goals, 415 IT acts as my virtual CIO. 415 IT enables me to make smart investments in our IT resources.

  • ...quick to respond to crises.

    Our firm, BCI Capital Management, has been utilizing the services of 415 IT since September, 2006. The service has covered a wide number of needs, ranging from the set-up of cell phones and recommending new hardware and software — to completely updating and streamlining computer networks. The staff are quick to respond to crises. The quality of service has been excellent. The cost of the service has been very reasonable.

  • Curteous and professional...

    Curteous and professional, I rely on 415it to help me keep our operations running smoothly. They are reliable, quick to repond, and incredibly knowledgeable. Everything they have reccommended has been an major improvement in effciency and productivity. I highy recommend them!

  • ..made our business more competitive.

    415IT has made our business more competitive. Thanks to their re-design of our computer network and immediate response to each and every support call there is no down time for our business communications. And I can actually understand them when we discuss solutions—no undecipherable tech speak!

  • ...excellent advice...

    415 IT was recommended to us by a client who found their services excellent. We could not agree more. 415 IT helped us move our offices seamlessly and install new systems; the staff are ALWAYS available to answer our questions and get our computers, emails, phones, everything, up and working. No question too dumb (or difficult). Finally, they have given excellent advice on acquisition of new phone systems, additional computers and software updates which have served us well. We are a law firm, so constant access is a must, including from outside the office. The 415 IT team has provided us equipment to provide our services from inside the office, and remotely, without interruption. We are grateful to 415 IT, and the entire staff.

  • ...completely organized and managed professionally.

    415IT is the most fabulous IT Solutions groups we’ve ever had at Juice Beauty! All of our computer hardware and software needs are completely organized and managed professionally. For several years, we have consistently received solid and valuable advice on every aspect of our computer needs including security, software, hardware, latest updates and more. One of the most valuable services 415 IT provides is that they are incredibly responsive and take ownership with ANY technical problems so we have zero downtime. We love our IT service from them!!

  • ...they always deliver.

    Since we signed on with 415 IT in 2005 they have become a part of the Canyon family. Our technology initiatives have consistently rolled out quickly, efficiently and without downtime. We travel a lot, when we call from a different time zone needing support, they always deliver. Finally a tech firm we can count on.

Latest Blogs

Tip of the Week: Here’s How to Calculate Your Projects ROI

Costs

The first thing you will want to do is gather the receipts and create a detailed cost analysis of the project, breaking the costs down into separate categories. The category breakdown will be advantageous when you start to assess the different costs, and how those investments make a huge difference when trying to determine the viability of a project.

To configure this, you will want to start with the single-project costs. These include:

  • Supplies & materials
  • Labor
  • Power & fuel
  • Subcontractor services

Once the costs have been firmly reported, it is time to start looking at the potential benefits of the proposed projects.

Benefits

Since we are only looking at calculating the ROI of a particular investment, we should talk about how your IT investments may benefit your company. They include:

  • Increased Revenue - New revenue streams increase the worth of the organization and make it easier for a company to adjust if the market shifts.
  • Cost Reduction - You know what they say: You’ve gotta spend money to make money. Investments aimed at strategically reducing recurring costs can be some of the most valuable investments you can make.
  • Capital Reduction - Much like a cost reduction, a capital reduction actually eliminates the large capital expenses that can really hamstring an organization’s operational budget.
  • Cost Avoidance - Investments designed to eliminate bottlenecks, downtime, and other financial drains through improved technology.
  • Capital Avoidance - It’s hard to get more efficient than eliminating one of your costs entirely. Investments in automation can bring with it a great deal of capital avoidance.

The equation to calculate the return on investment for your technology is the same as it would be for any other investment:

ROI = (Benefit)/Cost

All you need to do is take your total benefit (calculated by subtracting your costs from your ultimate gains) and divide it by your total costs. This gives you a simple metric that makes your benefits easy to understand, and thereby enables you to make comparisons much more easily.

Other Considerations

You should also keep a few other qualifications in mind as you plan your next IT investments.

  • What departments in your organization will be affected by any new project investment?
  • How will these new investments impact their jobs?
  • Are you focused more on seeing an ROI that’s financially quantifiable, or are you more concerned with less tangible, qualifiable benefits?
  • What - if anything - could potentially go wrong during the implementation of your IT improvements?

415 IT can help you decide what your best moves are concerning your information technology. Reach out to us at (415) 295-4898 to learn more.

Learn More

Our Top 7 List of IT Myths and Wild Conspiracies

Myth #1 - Macs Are Secure and Don’t Get Viruses

To debunk this myth, we actually need to take a step back and admit that it’s based in a couple of truths. The average Mac user has probably not seen much malware on macOS, but we’ll get to that in a moment. If you look at the strict definition of a computer virus as being a type of malware that spreads on a computer from one file to another, Macs technically don’t get viruses. Viruses are quickly becoming a thing of the past on other modern operating systems like Windows 10 as well, due to built-in security and the fact that the common computer virus in the strictest sense is essentially becoming obsolete.

Other types of threats, including malware, phishing attacks, and ransomware can infect Macs. On top of that, compared with Windows PCs, which dominate with a 91.76% market share, Macs have a lower risk of getting infected just because hackers know it’s more effective to focus on malware that either infects Windows or that doesn’t care about what type of system you are on (like online phishing attacks).

Either way, you aren’t out of the woods by making the switch.

Myth #2 - Blowing on Cartridges Before You Play

This one came up a few times when we surveyed our techs, so we had to include it. It goes all the way back to the mid-1980’s. Back then, many households had the Nintendo Entertainment System, and video games came on big five-inch plastic cartridges. Sometimes, when sliding a game into the console, it wouldn’t boot the game. The common practice for kids and teenagers everywhere was to pull out the cartridge and blow on the connectors and try again.

The thought behind this was that dust had collected on the electronic connectors, which could cause issues. Unfortunately, it was more likely that the connectors just didn’t get situated where they were supposed to when the game was inserted, and it just needed to be pulled out and put back in.

The problem with blowing on sensitive terminals of a cartridge is that the human breath contains a lot of water vapor, and over time that moisture can cause damage to the hardware.

Myth #3 - Google Plays Favorite to Sites that Pay

When you do a Google search, you’ve probably noticed that a few listings in the results show up as ads. Businesses can set up a budget with Google to run ads that show up within a certain geographic area for certain searches to help drive traffic to their sites. However, as web surfers, most of us inherently know when content is an ad, even at a glance. Only about 20% of traffic ends up clicking on an ad, although that’s more than enough to make Google’s ad service highly profitable and beneficial for businesses.

That said, all of the main 10 results that aren’t paid for are not affected at all by Google Ads. These are called organic results. When people talk about SEO, this is what they are referring to. Paying for ads doesn’t affect your ranking in the organic results, so if you don’t show up in the organic results, you’ll stop showing up entirely if you stop paying for ads.

How do you rank in the organic results of Google? It’s pretty complex and there’s no simple answer, but it’s about building good content and making your website user-friendly. Google’s goal for the search engine is to provide the best, most relevant sites when people search for something, so there aren’t many ways to “trick” the system.

Myth #4 - Charging Your Smartphone Overnight Ruins the Battery

This myth was sort of true at one point, but modern smartphone batteries have come a long way over the years. Now, technically, keeping your phone plugged in while it’s full is a little more stressful for the battery, because the battery goes into a trickle charge mode that keeps it topped off at 100 percent, but it’s a far cry from ruining the battery.

This state can cause the phone to heat up a little, in the same way that watching Netflix or playing a game can cause the phone to heat up. Excessive heat IS something to worry about, as it can slowly cause wear and tear to your device. That’s why Apple and some other phone manufacturers suggest not using restrictive cases on high-end phones. Locking in that heat can exacerbate the problem.

Instead of worrying about overcharging, it’s better to make sure you aren’t suffocating your phone. Some experts suggest taking it out of the case while charging overnight, and avoid tucking your phone into bed with you. Surrounding it with your big comfy blankets or stashing it under your pillow can slowly wear out your phone. Instead, stick with a cool flat surface or a small dish.

Oh yeah, and don’t buy cheap knock-off cables. Only get certified cables made or recommended by the phone’s manufacturer.

Myth #5 - Former Microsoft CEO Bill Gates Is Trying to Depopulate the World

Okay, this one isn’t exactly tech-related, other than the fact that we namedrop Bill Gates, but when I asked around for some of the best IT myths the techs could think up, I decided this doozy just had to make the list.

This might be crazier than what you’d expect from the tabloids in the grocery store checkout line, so bear with me. The rumor is that Bill Gates is taking his fortune earned from selling Windows, Office, and Xboxes and putting it towards his James-Bond-villain-esque goal of taking over the world.

There are a lot of crackpot articles to back this up, claiming that the world’s richest nerd is using the Bill and Melinda Gates Foundation to help governments develop a slew of gadgets and solutions to rapidly reduce the world population. We’re talking everything from sneaking chemicals in the water to fake vaccines to a ray gun that makes you sterile. 

My only question is which James Bond actor should we have gone up against the villainous Bill Gates? Personally, I think I’d vote for Pierce Brosnan, but I’d love to hear your pick in the comments!

This conspiracy theory has been debunked many times, and fortunately, Bill Gates is too busy trying to give all of his money to charity to worry about world domination. Since 1994 he’s given more than $60 billion to charity and has been focused on disease research, water sanitation technologies, and childhood mortality. 

Honestly though, a James Bond film about a nerdy villain who announces his notorious plan to take over the world during a TED Talk presentation is exactly what we’d like to see. Make it happen, Hollywood.

Myth #6 - IT Security Doesn’t Matter if I Don’t Have Anything Important on the Computer

We hear this one a lot, unfortunately. You might not store sensitive information on your computer, but your computer does tend to have access to a lot of places that do store your sensitive information.

Do you check your email on your computer? Do you log into social media sites on your computer? Do you shop online or pay bills on your computer? Do you access files and software for your business? If you can answer “yes” to any of these, then your computer is a treasure trove of valuable data that you are putting at risk.

If cybercriminals get access to your email, they can gain access to just about everything else. They can reset passwords or take your accounts and set them up under a new email altogether. They can lock you out of your bank account, your PayPal account, and any other account before you could even know what hit you. Plus, if you have access to your work software, such as your line of business apps or your CRM software, or even just your contacts, then your customers’ data is at risk too.

The bottom line? It’s important to secure your computer.

Myth #7 - Nothing Gets Through the Firewall

Hollywood likes to overemphasize just how effective firewalls can be. Is our rugged hero getting hacked? The plucky young computer nerd who came along for the ride simply needs to turn on the firewall at the last minute to save the day, or in the more dramatic scenes, pull the cables out of the back of the computer.

Firewalls are an important part of your IT security, but they aren’t going to stop everything. In fact, from a strict technical definition, a firewall only really prevents a single type of malware that spreads from computer to computer.

More robust IT security solutions that include firewalls will stop a lot more threats than a firewall will on its own. Businesses need to equip spam-prevention, content filtering, and centralized antivirus/antimalware solutions to run in tandem with the firewall.

Are there any myths or misconceptions in your industry? Share them with us in the comments!

Learn More

65 Bitcoin Ransom Paid by Florida City

A few weeks ago, an unwitting employee of the city of Riviera Beach, a small city just up the coast from West Palm Beach, clicked on a file that wasn’t supposed to be clicked on and it ended up locking large portions of their municipal computing infrastructure. When the initial report came to the City Council, they decided it was high time that they updated their computers and approved to spend nearly $1 million to update all municipal computers. Only then were they told that new hardware is all well and good, but paying to upgrade their computers isn’t going to get their access to data back. 

The only way that was going to happen is by giving over to the hackers demands. They were simple: produce 65 Bitcoin, and the files will be decrypted. Since after the ransomware was deployed, the city email system was unavailable and its 911 dispatchers didn’t have access to computing systems that are necessary for prompt emergency response, the city council acted quickly as to avoid a long, drawn-out situation that could potentially cost the city millions. 

Ransomware victims: Atlanta, GA; Newark, NJ; and Sarasota, FL, had been examples of cities that refused to pay ransoms only to see costs of recovery soar. Currently, the FBI, the Department of Homeland Security, and the U.S. Secret Service are all working on the case.

Typically, we’ve advised ransomware victims not to pay the ransom, since it provides the hackers the resources they need to continue conducting acts of cybercrime. It’s been mentioned repeatedly by IT professionals and cybercrime experts that there is no guarantee that hackers will stay true to their word and decrypt the files once the ransom has been paid. 

Ransomware is a major and continuously-developing problem for municipalities and businesses, alike. For more information about ransomware, subscribe to our blog, or give us a call at (415) 295-4898.

Learn More

Know someone who would benefit from 415 IT? Let us know!

Latest Blog

As you company grows, you will need to invest a good deal of the revenue that you take in to keep operations from falling into complacency. In order to get a good idea what investments would be most advantageous, doing a proactive ROI analysis of project you plan to undertak...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...