The Orlando IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

 

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At SemTech IT Solutions, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • Do you have questions about IT Services and what they can do for your company? Fill out this simple form with your questions and our team respond promptly!
  • First Name *
  • Last Name *
  • Company Name
  • Phone *
  • Comments:
      • Who Are We?
      • It's A Secret!
      • Our Difference
      Who Are We?

      It's Nice To Know Who You're Working With, We Get That

      SemTech IT Solutions understands that making a decision means putting your trust in us. We encourage you to find out more about our company and read testimonials from our many satisfied customers!

      About SemTech IT Solutions
       
      It's a Secret

      Shhh, don't tell anyone we told you!

      WARNING: We are about to let you in on a secret about how most computer companies really make their money! We will cover the three main types of IT companies and what you can expect out of them.

      Discover What It Is!
       

      We are not your typical business, We are your business partners

      We live by the idea that your business needs come first, so much so that our CEO Brian Willcox has written a letter for you to read showing just how dedicated our team is to not only solving problems but your success!

      Read More
      Our Difference
       

      What Our Clients Say

      • Amazing!

        Doing business with SemTech IT Solutions has been a pleasure.  Brian Willcox and team are a great bunch to work with!  They really know their stuff when it comes to eliminating annoying computer issues and making technology actually WORK for businesses.

      Latest Blogs

      Cops Lock Up Criminals, Ransomware Locks Up Cops

      Before you start to panic over a new type of ransomware, you should know that Osiris is a particular strain of the Locky ransomware. The only difference seems to be the file extension for the encrypted files, which is “.osiris.” The main takeaway from this event is that sometimes even the good guys don’t have what it takes to protect themselves from unfortunate events--a truth all-too-painfully real for a business owner.

      This type of ransomware attack started off just like any other. Out of nowhere, the police were shown a message that claimed their files had been locked down, with paying a fee of $4,000 being the only way of recovering them. The cause for this ransomware was a spoofed email that claimed to be from another part of the police department. In an attempt to get rid of the ransomware, the police followed what’s commonly called a best practice for this type of situation: restore a backed-up copy of the server’s data.

      Unfortunately for them, the backup that they tried to restore from had also been infected, as it was taken after the systems were infected with the ransomware.

      As you can imagine, this caused quite a bit of trouble for the Cockrell Police Department. Included in the encrypted files were photographic and video evidence that could have been used in the prosecution of criminals. Whether or not this particular instance will mean anything for legal battles in the future is yet to be determined, but it sure is convenient for those who are involved with them.

      What this shows us is that ransomware is a threat for anyone who relies on data to perform their daily duties, businesses notwithstanding. A ransomware attack at the wrong time could be enough to completely upend operations, and it forces you to reconsider your approach to cybersecurity. You need to consider every single user of your email solution is a potential outlet of a ransomware attack. It also emphasizes the importance of keeping current backups archived in an off-site location so that you can guarantee you won’t be put in the same situation as these police officers.

      If your business wants to take a stand against ransomware, SemTech IT Solutions can serve and protect you. We can help you implement spam-blocking solutions and security measures to keep ransomware from installing on your devices in the first place. Furthermore, we can help your employees know what to look for so that they don’t make the same mistakes as the Cockrell P.D. To learn more about network security, reach out to us at 407-830-1434.

      Learn More

      What You Should Be Mindful of Before Hosting Your Software in the Cloud

      According to a recent study, predictions say that SaaS offerings will make up 59 percent of the cloud computing workload by 2018--and with more and more businesses utilizing cloud hosting, those predictions seem well founded.

      If you’re looking to move your assets into a cloud environment, they must first be virtualized with other variables taken into consideration. What follows are two crucial considerations to implementing the cloud for your business.

      Are You Ready to Integrate?
      Unfortunately, many mission-critical applications and cloud services don’t play very nicely with each other, which can lead to issues with integration. If you plan to connect all of your most-used services to a new cloud service, you must be sure to test that they comply with integration requirements. In short, you have to do your homework and learn what the cloud service requires. Otherwise, you run the risk of losing resources and experiencing downtime due to incompatibility.

      Is Your Connection Reliable Enough?
      In order for a business to use the cloud, a reliable connection is needed. Can your in-house network provide enough bandwidth to access the cloud, even during peak hours? Does your ISP provide you with consistent Internet service?

      It is common for companies to upgrade their Internet service before making the switch to a cloud solution, to ensure that they have what it takes to support that type of data-intensive activity. Finally, you should look into the cloud service provider you are considering. Can they guarantee your connectivity and uptime?

      These considerations must both be fulfilled if your cloud service is to truly be of benefit to your business operations. We can help you optimize your network, and help you make a seamless transition to cloud-based services. For more assistance, call SemTech IT Solutions at 407-830-1434.

      Learn More

      Tip of the Week: Find Your Lost Smartphone With Ease

      For an iPhone or Other Apple Product
      If your go-to operating system is iOS, the Find My iPhone application can help you if you should find that your device has gone missing. If the device in question is linked to your iCloud account, or has the app installed, you can log into the app from another device to make locating the lost one much easier.

      The app allows you to track the movement of your device, as well as lock the device, and send a message to the finder so they may contact you. Just make sure you set up Find My iPhone while you have your device.

      For a Device with Android OS
      If you can perform a Google search, you can find a misplaced Android device. All you have to do is sign into the same Google account that you use on your device and enter “Find my Phone,” into the search bar. If you’ve connected your Google account to the device, you’ll be able to pull up a small map of the device’s surroundings. You can even ring the device if you’re nearby (and it’s turned on) to help your efforts to find it.

      Finding Other Devices
      Even if you aren’t an Apple user, and your lost device runs an operating system other than Android, you still have options. One of these options is an app called Prey. Able to be installed on up to three devices, you can use Prey to identify who has your device, assuming they have yet to wipe it. All the device will need is the ability to connect to Wi-Fi and have a camera in order for the app to do its job.

      Prey can keep you updated on the status of your device, issuing a new report every 20 minutes. These reports can involve images captured by the device of its surroundings and the person who has it, as well as images of the display itself and notifications of changes made to the device. If you aren’t suspicious of any foul play, you can even send a message to whomever has your device, giving them the ability to contact you directly. On the other hand, you can also lock and/or wipe your device if worse comes to worse.

      To learn more ways to maximize the use of your technology, make sure you subscribe to SemTech IT Solutions’s blog.

      Learn More

      Latest Blog Entry

      Society relies on law enforcement to enforce laws in a fair and just manner, but even the police have their work cut out for them when they are targeted by a cyberattack. A recent incident in Cockrell, Texas shows that not even the police are immune to the threats of ransomw...

      Latest News

      SemTech IT Solutions launches new website!

      SemTech IT Solutions is proud to announce the launch of our new website at www.semtechit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...