The K.I.S. Blog for Monday, October 16, 2017

Listen to our new radio ad here! 

Our new radio ad, featuring K.I.S President Jody, and our Sales and Marketing Coordinator Jenna, is now live on 107.5 Kool FM. Playing weekdays at 5:30 and 6:00 a.m. Check out the audio clip here:






The K.I.S. Blog for Monday, August 14, 2017


7 Steps to help limit your chances of getting hit by a ransomware attack


1. Do not trust the e-mail display name – Do not trust the name that is displayed. If it looks suspicious, don’t open the email.

2. Look, but don’t click – Hover your mouse over any links embedded in the body of the email. If the link address looks strange or nonstandard or you don’t recognize it, don’t click on it.

3. Don’t enable macros in document attachments received via e-mail

4. Check for spelling mistakes – Legitimate messages usually do not have major spelling mistakes or poor grammar.

5. Do not give up personal information – Legitimate companies and financial institutions will never ask for personal credentials via email.

6. Beware of urgent or threatening language – Invoking a sense of urgency or fear is a common phishing tactic.

7. Don’t believe everything you see – Just because an email has convincing brand logos, language, and a seemingly valid email address, does not mean that it is legitimate.




The K.I.S. Blog for Friday, June 30, 2017


K.I.S is now offering a full range of Fortinet IP Telephones


Kempenfelt Imaging is now Fortinet certified. We offer complete business telephone systems to accommodate your organization’s individual needs. Some of the features that accompany Fortinet IP phones are:
  • Visual Notifications
  • Auto discovery for easy setup
  • Conference calling
  • Speed dialing
  • Do Not Disturb
  • One touch transfers
  • HD Quality Audio


Call us for more details, or click here for more information

The K.I.S. Blog for Monday, June 26, 2017


Taking a proactive approach to protecting your organization from Ransomware


Recent cyber threats and attacks, such as WannaCry and CryptoLocker, remind us of the importance of having the necessary backups and antivirus in place to protect our information. Different strains of ransomware can spread automatically across all workstations in a network, compromising workstations and servers alike.


KIS IT always recommends exercising extreme caution when you get an email with an attachment you did not ask for. For example, if you see a .zip file in the attachment, never click on it.  Instead delete the whole email.  Normally no one would send a Zip file.  Remember: “If in doubt, throw it out!”


If you are a Managed Services Client of ours, our engineering team routinely patches our clientele’s Windows operating systems, and we are confident that the security measures we have employed will stand up against these types of attacks and our recovery systems would allow us to recover rapidly should you become compromised.


If you are not a Managed Services client of ours, you may want to consider becoming one.  We will proactively monitor and maintain the health of your network and fully support your end users.  Our Security specialists will help ensure that you have the right layered security in place to help prevent problems and we will help to create disaster recovery plans to support your business if one occurs.  Our goal as your managed IT partner is to help you reach your goals while minimizing business risks.
If you or a co-worker are concerned that you may have clicked on something or have an active infection, it is imperative to report it immediately to your IT staff or to us.  Unreported Incidents can lead to mass infections and widespread network damage that otherwise could have been addressed quickly.




The K.I.S. Blog for Friday, June 23, 2017


Why our clients choose our Managed Anti-virus Solution


Keeping your business protected requires more than just off the shelf software. Our Managed Anti-virus solution delivers enterprise class protection, and is maintained 24/7 by our technical team, keeping your business secure while saving you money.


Stand-alone Anti-virus Software

* Provides a point solution to specific issues

* Requires manual monitoring and maintenance to remain current and effective

* Relies on end-user decisions for operation

* Does not provide consistent version control across desktops

* Does not provide centralized management




Managed Anti-virus

* Provides proactive and comprehensive security, monitoring and management

* Centralizes the deployment and updating of software to ensure coverage and consistency

* Automates management processes to avoid errors and reduce costs

* Leverages expert IT skills