The Florida IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

 

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At TotalCareIT™, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • First Name *
  • Last Name *
  • Company Name
  • Phone *
  • Comments



      Who Are We?

      It's Nice To Know Who You're Working With, We Get That

      TotalCareIT™ understands that making a decision means putting your trust in us. We encourage you to find out more about our company and read testimonials from our many satisfied customers!

      About TotalCareIT™
       

      We are not your typical business, We are your business partners

      We live by the idea that your business needs come first, so much so that our CEO Charles Berry has written a letter for you to read showing just how dedicated our team is to not only solving problems but your success!

      Read More
      Our Difference
       

      It's a Secret

      Shhh, don't tell anyone we told you!

      WARNING: We are about to let you in on a secret about how most computer companies really make their money! We will cover the three main types of IT companies and what you can expect out of them.

      Discover What It Is!
       

      Refer A Friend To TotalCareIT™!

      Do you know someone who you think my benefit from our services? Let us know and we will get in touch with them!

      Read More
      Refer a Friend
       
       

      What Our Clients Say

      • Growth is No Challenge
        Orlando
        Dogipot

        Our company has been using TotalCareIT for over 10 years. They have done a great job navigating us through our growth and the IT needs that have come with it. TotalCareIT also has done an amazing job jumping right on things when we have had IT issues so that any business interruptions were minimized. Charles Berry and his team do a great job ...

      • Best Kept Secret
        Satphone Store

        TotalCareIT took over our complex network when our internal IT guy left 10 years ago. They started off by documenting the network and then swiftly made dramatic changes to simplify our infrastructure. I really thought they would just manage what we had as it was in their best interest financially. We really haven’t trusted IT before this as ju...

      • No Curveballs
        ABS Structural

        Due to an unexpected turn of events, we found ourselves in quick need of outsourcing our IT requirements. We were referred to Charles at TotalCareIT; he and Mark quickly jumped into action and seamlessly incorporated what was needed to secure our backup procedure and system updates. Any problems that occurred were dealt with in a swift and eff...

      • Do it Once and Do it Right
        Alpizar Law

        TotalCareIT has delivered fast reliable support since 2003. They manage our Cisco Unified Communications, our network servers and desktops. The have performed numerous reliable upgrades to our software and hardware over the years with attention cost and uptime. In 2010...

      • The Only Customer
        LB Auto Parts

        The people at TotalCareIT set the bar for what a real IT company should be.  Their level of expertise and their knowledge of all things technical are truly astounding.  Their dedication to you as a client will make you feel as though you are their only client, especially with their response time with IT needs or questions, big or small...

      • Out of the IT Business

        As an owner of NSI radiology, I know we are a highly tech dependent company.  With multiple locations in Florida, we found that in house IT could easily be compromised should something horrible happen to any of the people in IT. We needed documentation of our complex network, processes for support delivery, and to make sure that our custome...

      Latest Blogs

      30 Schools Shut Down In Montana After Cyber Attack

      TheDarkOverlord Solutions also went as far as to make graphic death threats against the children attending the schools, taking advantage of the memory of recent school shootings. This hack resulted from the Columbia Falls district server being targeted, which contained all sorts of personal data belonging to residents of the school district. This includes addresses, medical histories, behavioral history, and other information that’s helpful to cybercriminals. Thanks to these events, 30 schools closed and canceled any weekend activities. When class resumed, there was much more security than before.

      TheDarkOverlord Solutions, true to its name, targets individuals that have particularly lucrative data on the line. In July 2017, they were responsible for a major information harvest from healthcare providers which resulted in almost 9.5 million records going up for sale on the black market. These records were reportedly stolen from a clinic, a healthcare provider, and a health insurance provider.

      This same group also reached out and made their name known by stealing media from Netflix. The popular series Orange is the New Black was released prior to its actual release date, thumbing the nose of the audio post-production studio that provided a ransom of $50,000. It just goes to show that you can never trust a thief!

      Therefore, all signs point toward the Columbia Falls school district to not pay the ransom demanded of them. They made the correct choice by not giving in to the demands of hackers, as there is no reasonable expectation that they will actually hand over their data. If they do decide to pay the ransom, it’s money that’s just going toward funding further ransomware attacks. Plus, if they are willing to pay, it just shows that the tactic actually works.

      The best way to stay secure is to protect your organization against all types of threats. To learn more, reach out to TotalCareIT™ at 321-259-5500.

      Learn More

      Data Security Has to Be A Priority For Your Organization

      The fact is that there is a significant chance that your personal or non-public business information has been compromised in some way but, legally, the company that lost your information was not obligated to make you aware of the event. For your own benefit, understanding what your rights are when it comes to data breach laws is the first step in protecting your data. For example, do you know what information is considered ‘personal’? Are there ways that your data could have been lost or stolen but the offending entity was not compelled by law to notify you for some reason? The answer is yes.

      Legal Definitions of Personal Information
      Even though each state has their own laws and policies regarding data breaches and notification requirements, there is pretty much a consensus on the basics of what elements or combination of elements constitutes as ‘personal information’ in the eyes of the law. At a minimum, personal information includes:

      1. First name or first initial and last name
                            AND
      2. One or more of the following elements: social security number, driver’s license or state ID number, finance account numbers.

      As mentioned, this does make up the foundation of most secular legislation on data breaches. Many states go a step further, and only consider account information requiring a pin or password as having been compromised if the required pin or password was included with the record that was stolen. That is, if the use of a debit card requires a pin for a transaction, you will not be notified of the data loss unless both your debit card number and the pin are accessed.

      A few of the more progressive states, like North Carolina and Nebraska, include biometrics and fingerprint information as part of their definition of personal information. Similarly, some states, like Missouri have more specific, detailed laws, limiting the legal maneuverability that comes with ambiguity in statutes.

      Even though laws regarding the majority of health and medical information and data policies are covered under the United States’ federally mandated Health Insurance Portability and Accountability Act (HIPAA), a few states do include health-related information in their definition of personal information.

      One more thing that the some of the state laws regarding data breaches of personal information address is that once a relatively high number of records have been stolen, the information holders must also notify consumer reporting agencies in addition to the Attorney Generals of all states that have affected residents. The number of records lost that trigger reporting to a consumer reporting agency tend to number between 1,000 and 5,000.

      When it comes to sectoral legislation, the current statutes are, in general, skewed in favor of protecting the corporate information holder, as opposed to the individuals that have their information compromised.

      • Encryption: In many states, there is specific language that says that if the personal information was redacted or encrypted at the time of the unauthorized access, then no breach or loss of data has occurred. The laws do not address the policy and notification standards for encryption that is broke post-theft.
      • Questionable Non-Personal Information: Depending on the state, some questionable information might be included as non-personal information. For example, the last four digits of your social security number may not be counted as personal information, despite the amount of accounts that only require you to confirm these four digits before making changes to your account.
      • Good-faith Acquisitions: Nearly every state lists ‘good faith acquisitions’ as exemptions to the data breach laws. A ‘good faith acquisition’ is defined a data loss event where the recipient of the personal information in question is employed internally or with a trusted vendor or partner - and is therefore not likely to be misused or further exposed. It’s important to note that businesses are not required to notify anyone in the event that the data breach meets ‘good faith’ requirements.
      • Risk of Harm Analysis: About half of the United States has laws that allow the information-holding entity to run a ‘Risk of Harm’ analysis that is used to determine the likelihood that the personal information compromised is likely to be abused or used in unauthorized transactions by the parties that have obtained it - or may obtain it in the future. In the event that the risk of harm is found to be minimal, they do not have to notify the attorney general of the state for which the analysis was run, nor do they need to notify the parties whose personal information was lost.

      For most small and medium-sized businesses, a data breach, regardless of whether their information was stolen or their network had been penetrated losing client records, has the potential be catastrophic. Working with TotalCareIT™, we can help you take proactive data and network security measures and significantly reduce the chance that your network will fall victim to cybercriminals. Contact us at 321-259-5500.

      Learn More

      Tip of the Week: 3 More Useful Microsoft Word Features

      Changing the Case of Your Text
      Sometimes you might be typing something and accidentally hit the Caps Lock key instead of Shift. Instead of deleting everything and retyping it, you can simply use a new Microsoft Word feature that lets you choose the case of your new text. You can select Sentence case, Lower-case, and Uppercase, as well as Capitalize Each Word and tOGGLE cASE.

      word ib 1

      Automatically Update the Date and Time
      Most businesses will use digital correspondence, but there are times when you’ll have to use direct mail. Most organizations will send out a welcome letter to new clients via traditional postage, with some personalization to match the client. Word can be used to make sure that the information offered in the latter is updated automatically. You can set your templates to auto-update with the current date and time.

      In the Insert tab, click on the Date & Time button. This will open up a pop-up window. Next, just click on the date format and select the Update Automatically box in the bottom-right corner. Your date will automatically be updated every time you open or try to print the document.

      word ib 2

      Eliminate Unwanted Formatting
      When you copy and paste text from a source, it retains the formatting of the original document. If you’re not careful, this text could persist throughout the remainder of your document edits. Thankfully, there is a very simple fix to this issue. Microsoft Word has a keyboard command that you can use to eliminate formatting, and it’s Ctrl + Space. Better yet, you can just use the little eraser button in Word’s settings to eliminate formatting.

      word ib 3

      Want even more great tips and tricks? Visit our blog regularly for more technology-related tips.

      Learn More

      Know someone who would benefit from TotalCareIT™? Let us know!

      Latest News

      TotalCareIT™ launches new website!

      TotalCareIT™ is proud to announce the launch of our new website at www.totalcareit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account Login