Get Started Today!  (415) 295-4898

The Bay Area IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At 415 IT, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

Do you have questions about IT Services and what they can do for your company? Fill out this simple form with your questions and our team respond promptly!

What Our Clients Say

  • ...there is virtually no down time...
    Vine Solutions

    Before Vine Solutions hired 415 IT, we tried to manage our IT on an as needed basis and our systems were a mess. Since hiring 415 IT, I feel like we have our very own IT person in house; they handle all of our IT needs and do it so there is virtually no down time during our business hours which is important for our growing business. 415 IT is my trusted IT source and has been involved in virtually every IT business decision that has allowed our business to prosper.

  • ...trusted advisor...

    415 IT has been managing our systems and technology for years. They are our trusted advisor when it comes to IT.

  • Very quick response time

    Very quick response time, as soon as an issue arises I receive a call back. We needed a new server installed within 1 week’s time and 415 IT made it happen without a glitch. Although our dedicated tech does not have a desk here, I feel as if we have access to his expertise immediately. Thanks for your great service.

  • ...professionalism and positive attitude.

    Gerken Capital Associates has been using the services of 415 IT for a number of years. We are always pleased with their professionalism and positive attitude. 415 IT is always on top of the latest technology and is able to accommodate us in a timely manner.

  • ...thrilled with 415IT.

    As a small business owner I am thrilled with 415IT. 415 IT replaced our traditional phone system; now we have increased functionality, great call quality all for a low price. We run a distributed business; 415 IT keeps our IT infrastructure running seamlessly. 415 IT is extremely responsive and a very reliable support. I highly recommend this firm.

  • The staff is great...

    We have been using 415IT for all our computer needs and have finally found a Company we can rely on for prompt and excellent service. The staff is great and they go above and beyond anything we have experienced before. It is very comforting to know that if we have problems with our computer system, that we have a Company that can provide with same day service.

  • ...I can concentrate on my job...

    As an entrepreneur running multiple business, I am absolutely dependent on technology for a competitive edge. With 415 IT managing our systems I can concentrate on my job, not my technology. When I have strategic questions about how to leverage technology to accomplish business goals, 415 IT acts as my virtual CIO. 415 IT enables me to make smart investments in our IT resources.

  • ...quick to respond to crises.

    Our firm, BCI Capital Management, has been utilizing the services of 415 IT since September, 2006. The service has covered a wide number of needs, ranging from the set-up of cell phones and recommending new hardware and software — to completely updating and streamlining computer networks. The staff are quick to respond to crises. The quality of service has been excellent. The cost of the service has been very reasonable.

  • Curteous and professional...

    Curteous and professional, I rely on 415it to help me keep our operations running smoothly. They are reliable, quick to repond, and incredibly knowledgeable. Everything they have reccommended has been an major improvement in effciency and productivity. I highy recommend them!

  • ..made our business more competitive.

    415IT has made our business more competitive. Thanks to their re-design of our computer network and immediate response to each and every support call there is no down time for our business communications. And I can actually understand them when we discuss solutions—no undecipherable tech speak!

  • ...excellent advice...

    415 IT was recommended to us by a client who found their services excellent. We could not agree more. 415 IT helped us move our offices seamlessly and install new systems; the staff are ALWAYS available to answer our questions and get our computers, emails, phones, everything, up and working. No question too dumb (or difficult). Finally, they have given excellent advice on acquisition of new phone systems, additional computers and software updates which have served us well. We are a law firm, so constant access is a must, including from outside the office. The 415 IT team has provided us equipment to provide our services from inside the office, and remotely, without interruption. We are grateful to 415 IT, and the entire staff.

  • ...completely organized and managed professionally.

    415IT is the most fabulous IT Solutions groups we’ve ever had at Juice Beauty! All of our computer hardware and software needs are completely organized and managed professionally. For several years, we have consistently received solid and valuable advice on every aspect of our computer needs including security, software, hardware, latest updates and more. One of the most valuable services 415 IT provides is that they are incredibly responsive and take ownership with ANY technical problems so we have zero downtime. We love our IT service from them!!

  • ...they always deliver.

    Since we signed on with 415 IT in 2005 they have become a part of the Canyon family. Our technology initiatives have consistently rolled out quickly, efficiently and without downtime. We travel a lot, when we call from a different time zone needing support, they always deliver. Finally a tech firm we can count on.

Latest Blogs

Counting the Reasons for the 3-2-1 Data Backup Rule

What Makes a Data Backup Such an Important Asset?

In a word: insurance.

Data is, as we’ve well established, a crucial component to your business’ continued operations and survival. Tons of it is generated, collected, stored, and updated each day to support our daily lives. If a business were to lose the data that it had accumulated, it would suddenly find itself in a very bad spot.

This is what makes the idea of a data backup such a good one—in many cases, it is this backup that keeps a business from going under. Of course, this requires that the data backup be properly maintained as well.

To put themselves in the position that offers the most success, we generally recommend that businesses prepare their data backups in accordance with the 3-2-1 Rule.

What is the 3-2-1 Rule of Data Backup?

Simple: keep at least three copies of your data, in two mediums or formats, at least one copy of which kept off site and separate from the others.

Why multiple copies? Multiple copies ensure that—should one of your backups become corrupted or infected or otherwise infiltrated, you have a spare or two to fall back on. While we say three, three should really be considered the bare minimum.

Why multiple formats or mediums? Well, consider what would happen if you made yourself two lunches in case it rained, but packed both into a paper bag. With both in a paper bag, the backup lunch would end up equally soggy as the original lunch. Keeping your backup in a different format or storage medium helps prevent it from being impacted by the same thing that damages the original.

Why the offsite version? Keeping a backup offsite helps to ensure that—even if a disaster were to completely annihilate your business’ physical location—the data you rely on would still be accessible to you by virtue of the data backup. This gives us something else that is important to consider: the concept of an “air gap” in terms of data security.

What is an “Air Gap?”

Let’s go back to our “backup lunch” example, for a moment. While having an extra lunch was a good idea—our example made it clear why—keeping it so close to the original removed its benefits. However, if we were to take the same concept of having a backup lunch and add in an air gap (keeping an extra lunch in the break room at work, or stashing a few bucks to order something out, perhaps), we removed the threat of a single disaster preventing us from eating.

In terms of the data on your network, an air gap is just that—physical distance and separation helping to isolate resources and protect them from many threats.

415 IT is here to help businesses like yours manage all the complexities of their technology so that you have more room to succeed. Give us a call at (415) 295-4898 today to find out more.

Learn More

Tip of the Week: How to Take a Screenshot in Windows 10

This simply isn’t a convenient enough option for today’s productivity-focused workflows. Instead, let’s go over how to use Windows’ integrated Snip & Sketch tool, which gives you greater functionality at comparable ease.

Using Snip & Sketch

Snip & Sketch is a utility that offers four options for you to use in terms of your screenshots and can be easily called up by pressing Windows Key+Shift+S. There, you’ll have access to four different screenshot format options at the top of your screen:

  1. A basic box selection, where you click and drag to encompass your selection
  2. A freeform selection that allows you to draw out your boundary
  3. Window snip, which allows you to select an active monitor to screenshot
  4. Fullscreen snip, which takes the place of the Print Screen key and allows you to take a picture of all your monitors simultaneously

Any of these can be useful in the right situation, and these situations are only too common in the workplace.

Hopefully, this will help you communicate more clearly in the office, using images to help get the message across. For more handy tips and other useful IT information, make sure you check back here every so often—and don’t forget to give our team a call at (415) 295-4898 for more direct assistance from us!

Learn More

How’s Your Password Hygiene?

Creating Strong Passwords 

It’s true that passwords can be a pain to manage. Anyone who has been locked out of an account because they can’t remember their password knows this all too well. That’s why it is important to create passwords that are both easy to remember and that are secure enough to protect you. Cybercriminals have tools at their disposal that do a pretty good job of being able to crack passwords, so you need to keep that in mind when you are choosing yours. 

As you set out to create your passwords, you should keep the following two points of emphasis in mind. 

  1. A hacker may try to brute force attack any password that cannot be guessed or cracked, rapidly trying each combination possible.
  2. A password’s security and its resistance to brute force attacks are two different things.

Brute force attacks can really be devastating, but when you create your passwords, you have to keep in mind that any hacker with the will to brute force your computing network and left with the time to complete their hack, will likely find a way into your network. What you are doing when you are selecting a strong, memorable password is trying to make certain that the only way they are cracking your password is through brute force.

Typically we like to encourage that your passwords meet the following metrics:

  • Are longer, typically over 16 characters
  • Use a combination of numerals, letters (with upper and lower case characters), and symbols
  • Don’t use privileged or personal information, or any information that can be tied to you through online searches
  • No common words or numbers
  • No consecutive letters or numbers

So How Do You Optimize Your Password’s Effectiveness?

With those practices, you will be pretty far along, but you also have to understand that the hackers’ tools are extremely powerful. That’s why on top of those suggestions, you will also want to add some complexity to your passwords. Studies have shown that about 41 percent of all passwords are composed exclusively of lowercase letters. If we have access to this information, it stands to reason that someone who makes a living breaking into networks and stealing data knows it as well. Therefore, along with adding symbols, varying cases, and numerals, one strategy is to use a passphrase of random words. 

The reason for this is that, with a password that looks like this “7i&3RkIn&4L1f3” the chances that you remember it if you use the account sparingly is pretty low. Besides, it is not that secure, as it is effectively a complex sentence. Remember, the hacker has to get your password completely correct to effectively gain access, so instead of trying to come up with intricate ways of typing statements that can be easily guessed, try taking three words that don’t have any natural connection, incorporating numbers and some varying capitalization, and padding either side with symbols.

A process like this makes the password more usable. It very likely won’t be guessed, is long enough to protect your account, is effective against the brute force attack, and will be easier for you to remember. 

Speaking of which, since you shouldn’t use the same password for multiple accounts, you will end up with dozens of passwords. Keeping them straight, especially over the long haul (as you will likely have to reset passwords from time to time), is difficult. That’s why we recommend using a password manager. Many people take advantage of the password saving feature inside their browser. This is effective, but we recommend using a third-party manager that features encryption. This tool will be the most secure and reliable; and, you won’t have to worry about remembering every password. 

At 415 IT, we consider cybersecurity one of the most important parts of a business’ IT strategy. Give us a call a (415) 295-4898 to see how we can help you keep your IT assets safe. 

Learn More

Know someone who would benefit from 415 IT? Let us know!

Latest Blog

I hope I don’t have to tell you how important your business’ data is to its continued survival, just as I hope I don’t need to explain why this makes this data a priority to protect, regardless of your business’ size. What I do want to explain is the concept of the 3-2-1 Rul...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...