Learn From The Experts

Knowledge is power, and the team of IT experts at Lehigh Valley Technology Company continues to work to educate you on everything you need to know for you and your company’s safety.

Watch our series of Learning Videos and read our monthly blog posts about crucial topics, such as how to combat cybercrime and the latest news in cybersecurity.

To stay updated each month, subscribe to our YouTube channel and sign up for our email newsletter, where you’ll receive updates in your inbox.

Watch IT Learning Videos
Read the Latest IT News

Frequently Asked Questions

What is IT Support?

IT Support is defined by the Cambridge Dictionary as technical help or knowledge provided by computing experts; a team or department in a company or organization that provides technical help to people who have problems with its computer systems.

At Lehigh Valley Technology Company, IT support is designed to provide you with the peace-of-mind knowing your data is secure, your technology is running as it should, and expert technicians are available in the event of emergency. Learn more about our IT support services.

What is a Managed IT Service?

A Managed IT Service can be explained as a preventative solution that adds reliability to your network and devices, thus keeping your data secure and systems running safely and properly. A customized plan is formulated based on your current and future business goals.

By outsourcing your IT to a managed services provider, your ability to embrace fresh solutions and systems will be turbocharged. And, of course, the improved affordability that this offers goes without saying. Learn more about our services.

How much should my company spend on IT?

A better question is would you rather spend money to prevent a cyberattack or spend money to react to a cyberattack? Many businesses won’t spend the money to keep a cyberattack from occurring, and as a result, get stuck paying even more to fix it. Let’s develop a plan that best suits your company’s needs.

What is a cloud-based service?

Companies use cloud-based services regularly throughout their day, whether it is to save and send files to one another or to write up a document or spreadsheet. Cloud services allow users to access all features and files of the system without having to keep the bulk of that system on their own computers. Some companies are seeing substantial gains from their continued cloud engagement. They’re benefitting even amidst global disruptions because they recognize the cloud as a launchpad for innovating and new ways of operating. Read more information about cloud services.

What devices and systems are targets for hackers?

Any operating system could potentially be a target for a hacker. Without the right protective technologies and systems in place, businesses are more vulnerable than ever. Cybercrime is rising every day in addition to ransomware and general hacking. Businesses need to think about how cybercrime is impacting them outside of the workplace as well as to their employees.

Can you tell if your email has been hacked?

You can’t sign in to your email because your password has been changed. This is one of the most obvious signs that your email has been hacked. The fact that your email password has been rejected as incorrect and you haven’t changed it may indicate that it has been changed by someone else.

What makes LVTC different?

What sets us apart from other IT servicers is first and foremost that we are comprised of a team of experts that only focus on specific skills, like cybersecurity. Additionally, our team is also always on the same page to ensure a holistic approach to keep you, your company, your employees, and your data safe and your devices running smoothly. Our commitment to excellent customer service remains unparalleled in the industry. Learn more about us.

How long has LVTC been in business?

Since 2012, and we are thrilled to be celebrating our 10-year anniversary this year.

Who owns LVTC?

Scott Gingold is the President and CVO of Lehigh Valley Technology Company. He is proud to be actively involved in the business every single day, as this is truly a profession for him.

Is ownership actively involved in the business?

Absolutely. Scott finds joy in his daily involvement and has relationships with every one of our clients.

Is LVTC insured?

Yes, in fact, we led the industry as the first local IT company to obtain cyber liability insurance and errors and omissions coverage.

Is the team at LVTC actual employees (W2) or are they 1099’s?

Our team of specialists that work directly with clients, client devices and client networks is derived of actual W2 employees. Additionally, our team extends with 1099 experts that are hired for work outside of client-related services, such as for marketing.

Does LVTC do a background check on employees?

All W2 Employees that work with clients, client devices, and client networks have gone through stringent background investigations before they are hired. All of which also sign nondisclosure agreements.

Does LVTC mark up hardware?

No, we absolutely do not markup hardware. For example, when a client needs new severs, we will scope out the work and make a recommendation. The client pays the vendor directly. We receive it, install it, and do all the technical work.

Is LVTC available 24x7x365

Yes. We are here, in the office, Monday through Friday 8:30 AM through 5:00 PM. Our Help Desk Services offer 24-hour, 7-day a week support for companies who operate multiple shifts or have employees working from various time zones and countries. In addition, an on-call technician is always available for emergencies 24/7, 365 days of the year (even on holidays!)

Is LVTC HIPAA compliant?

Yes, we are one of the only local IT companies to have that are HIPAA Sealed Compliance. Every year we update our training on HIPAA compliance in accordance with the HIPAA Security Rule.

What size company will LVTC work with?

Whether you have 5 employees, or 5,000 we will tailor a program to meet your specific needs and technology goals.

Cloud service and security consists of a set of policies, controls, procedures, and technologies that work together to protect cloud-based systems, data, and infrastructure. As businesses grow, it is becoming more and more difficult for individuals and organizations to keep all their vital information, programs, and systems up and running on in-house computer servers.

Have a question about our IT services or want to speak to one of our experts? Give us a call at 610-866-2828 or fill out our online contact form.