The Orlando IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

 

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At SemTech IT Solutions, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • Do you have questions about IT Services and what they can do for your company? Fill out this simple form with your questions and our team respond promptly!
  • First Name *
  • Last Name *
  • Company Name
  • Phone *
  • Comments:

      Sign up for our Newsletter today!

      • Company Name *
      • First Name *
      • Last Name *
          • Who Are We?
          • It's A Secret!
          • Our Difference
          Who Are We?

          It's Nice To Know Who You're Working With, We Get That

          SemTech IT Solutions understands that making a decision means putting your trust in us. We encourage you to find out more about our company and read testimonials from our many satisfied customers!

          About SemTech IT Solutions
           
          It's a Secret

          Shhh, don't tell anyone we told you!

          WARNING: We are about to let you in on a secret about how most computer companies really make their money! We will cover the three main types of IT companies and what you can expect out of them.

          Discover What It Is!
           

          We are not your typical business, We are your business partners

          We live by the idea that your business needs come first, so much so that our CEO Brian Willcox has written a letter for you to read showing just how dedicated our team is to not only solving problems but your success!

          Read More
          Our Difference
           

          What Our Clients Say

          • Amazing!

            Doing business with SemTech IT Solutions has been a pleasure.  Brian Willcox and team are a great bunch to work with!  They really know their stuff when it comes to eliminating annoying computer issues and making technology actually WORK for businesses.

          Latest Blogs

          Can You Trust Your Mobile Apps?

          Google Play Protect is one measure that is helping users identify malicious apps on their phones. It’s not an actual app on your device--rather, it’s a feature that is implemented on the Google Play app store. Google Play Protect basically scans your apps in the background to detect any dangerous applications on your device. You can manually scan your device for threats as well, improve harmful app detection by extending the scanning to any apps not installed through the Google Play store. To do so, open the Google Play Store App, tap the menu on the left, and scroll down and select Play Protect from the menu.

          One noteworthy downfall of Google Play Protect is that it doesn’t immediately scan an installed app. Instead, what we recommend is before opening the app for the first time, scan it with Google Play Protect first. However, we do recommend approaching any new app with a grain of salt, starting even before you download it from the Google Play store.

          While Google Play Protect can offer some ways to keep your mobile devices safe, you should still consider the following tips to approach downloading new apps as mindfully as possible.

          • Download apps from trustworthy sources: Sometimes you might find a link to an app while looking through frequently asked questions or message boards. Be sure that you don’t download apps from external sources, as there is a higher chance that they could put your business in harm’s way. Make sure that any apps you download are reputable and from the Google Play Store. Most Android phones are set up to not allow this by default.
          • Check app permissions before downloading: Depending on the type of app you’re downloading, it might ask for access to certain information or functions on your device. It’s up to you to determine whether or not the app is accessing too much, or something that doesn’t make sense. For example, a flashlight app shouldn’t need access to your calls or text messages.
          • Implement a Bring Your Own Device (BYOD) policy: Chances are that your employees have multiple devices that they will bring to the office every day, including a laptop, tablet, and smartphone. Therefore, it makes sense that you have a solution implemented that manages risk from these devices. We recommend a BYOD policy that includes whitelisting and blacklisting apps, remote wiping of compromised devices, and comprehensive mobile security.

          To improve the way that your business handles mobile devices and security, reach out to SemTech IT Solutions at 407-830-1434.

          Learn More

          Could You Spot a Social Engineering Attack?

          What Makes Social Engineering Effective?
          Social engineering is the equivalent of pointing to an imaginary spot on someone’s shirt, only to flick their nose when they look down -- by posing as someone trustworthy, a cybercriminal is given the opportunity to do as they will with a business’ data. These attacks have two factors going in their favor.

          First, a social engineering attack isn’t the kind of attack that the average user is on the lookout for. They will have instead heard about botnets and ransomware and other big, external threats, and so won’t think to question what seems to be a legitimate-looking message.

          Secondly, there is plenty of data readily available on the Internet to help build a convincing social engineering attack. This data is referred to as open-source intelligence.

          Open-source intelligence can come from a vast array of data sources, which only assists an aspiring social engineer. Through some digging on the Internet, a social engineer can find plenty of information that better informs their attack.

          What the Internet Can Provide
          With the right research, a social engineer can compile an unnervingly comprehensive profile of a business, its employees, its operations, and more. Some very brief and incomplete examples are as follows:

          Technology
          Information about the kind of technology a business leverages is surprisingly common online. Job postings, for example, often identify the hardware and operating system a company uses to ensure that an applicant has a familiarity with the systems they would be working with. The trouble is, this also helps a criminal by identifying which exploits will be effective against a company. Furthermore, if a company isn’t careful, their social media images could provide a cybercriminal with information about their networking hardware.

          Employee Information
          It is also common for people to overshare on social media, which can easily lead to company information being shared as well. This includes, in addition to the access of information many allow to be publicly available via social media, images from within the workplace. Such images often reveal the kind of computer used by employees, as well as the contents of their screens and any information displayed on them.

          Additionally, many people will discuss their work schedule on social media, as well as provide a detailed account of their professional experience, giving a social engineer more data to work with.

          Vendors and Other Companies
          External services that provide for a company can help a social engineer gain access to that company, especially if the service provider uses them as evidence of value on their website. Janitorial services and trash pickup services are especially valuable, as data could potentially be stolen after it leaves a business’ premises.

          In short, while protecting your data with firewalls, authentication requirements, and other digital measures is crucial, it is just as crucial to also ensure that your employees are aware of the dangers that social engineering can bring. Establishing processes to help thwart social engineering attempts is something that every company should do, as it will help to protect them from these attacks.

          For help in planning these processes, reach out to SemTech IT Solutions at 407-830-1434.

          Learn More

          Tip of the Week: Awareness is Key to Mobile Device Security

          Awareness
          Since smartphones are able to connect to the Internet via Wi-Fi, and they can connect to other devices over Bluetooth, the utility these devices bring us is actually immense, even if it’s chock full of potential threats. Today’s hackers have begun to target smartphones and other mobile devices through the use of a litany of breach techniques.

          To ease the risks that come from the growing mobile malware trend, you’ll have to be cognizant of where your Wi-Fi and Bluetooth connections come from. By only connecting to networks that are reliable and secure, you can pretty much use your smartphone as you please, where you please. Your carrier’s cellular signal is encrypted and therefore much more secure than a public connection, including in public charging stations.

          Another thing that every mobile user has to be cognizant of are the permissions they provide certain applications with. Many applications can demand that you share information with their developers that is completely unnecessary. Being aware of what an application wants can help you know when it is prudent to choose when to use an app, and when to rely on your Internet browser. Considering how important your personal data is, understanding when and why it is being used, and keeping control over it will invariably keep you more secure.

          Security
          Speaking of security, there are some security options built-in to your smartphones. No modern day device has as much private information on it as your smartphone. When someone picks up your phone, you obviously don’t want them to have access to everything on it.
          Users can protect themselves by choosing any number of options that ensure that only authorized parties can get into their smartphone. Most phones come with either options to secure the device with a custom PIN, passcode, or pattern. The new flagships, however, ratchet it up a notch. They provide biometric options through fingerprint readers or facial recognition to secure the contents of a device. By utilizing these security features you can ensure that no one but you gets into your phone without your permission.

          Since data security should always be a major consideration, especially when you hold data that you personally don’t own, understanding how to insulate that data from others is key. If your business need to improve your mobile device security policies, contact the IT professionals at SemTech IT Solutions today at 407-830-1434.

          Learn More

          Latest Blog Entry

          You can never know whether or not that app you just downloaded to your smartphone can expose your data or identity to risk. While Google Play and the iTunes store certainly put efforts into ensuring that users can safely browse their app stores, it’s unlikely that they can f...

          Latest News

          SemTech IT Solutions launches new website!

          SemTech IT Solutions is proud to announce the launch of our new website at www.semtechit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

          Read more ...