Don't wait until you're hacked to look for help. Let us help prevent that attack, and prevent your data being lost if you do get hacked. (read more)
We feel that information should be free. We host a free training class weekly for anyone who wants to learn something. (read more)
Our top ten recommendations for basic security. Every threat model is different, but this is a good start. (read more)
Our CEO, Lisa, has been working in the technology field for over 20 years. (read more)
Tim, our chief of operations, first started playing with computers when he was 13. (read more)
You can contact Lisa and Tim either on Twitter, by email, or by phone. (read more)
One additional note: please quit calling criminals hackers. I am a hacker and I am one of the good guys. We work very hard to try to keep the rest of you safe. You have never once heard of a bank robber referred to as a "Black Hat Banker", and along the same lines, there are no such things as white hat or black hat hackers. The guys out there who attack networks and steal information or ransom your data for payment are criminals, nothing more. Be thankful there are guys like me who try to protect people and stop these criminals.

Lisa contact info Tim contact info
Tim Sayre

I was trained in computer repair by the US Army, and had 2 years experience on IBM mainframes. I was in the 19th Special Forces Group(Airborne) for six years and was system administrator for the CSSCS (Combined Service Support Computer System). I attended ITT Tech, where I graduated with an Associate's degree in 2012, and am currently in my last semester for my Bachelors degree in leadership. I spent 1 1/2 years working as tech support for Ameriprise Financial, have worked as system administrator for eight schools in Kanawha county, and have a very solid working knowledge of all Windows operating systems, Windows Server 2003 and 2008, several Linux distributions, basic networking, database management, and programming. I have also been attending a local class in network security for over three years.
Lisa Philpott

I attended WV State University where I majored in Management and Consulting, then transferred to Information Technology and Computer Science at WV Tech and Marshall University. I am well trained in troubleshooting and repair of both hardware and software. I have been self employed working on technology for several years, for individuals and businesses in the area. I have worked in DOW chemical in 2006 for a roll out of VoIP sytems and to replace all of their computers and printers. I have also worked at CDI as a Level 2 Analyst for Ameriprise FInancial for almost five years. Some of my other areas of expertise include: spyware removal, data recovery, custom built systems, general maintenance, Microsoft Windows operating systems, Microsoft Office Productivity Suites, graphic design, training. I plan to obtain multiple certifications in the IT field, and to complete my Bachelor's degree in the near future.
Our Services

We offer a wide variety of services including computer repair, penetration testing, vulnerability scanning, disaster recovery plans, training, and more. We have technicians available to help protect your network across the state, and in the adjacent areas.

The business model for tech support has shifted from local techs to national call centers without local technicians who put work orders on the internet for the lowest bidder. This is a cost saver for them, as most of the time, work can be done remotely. When a technician is needed, however, you never know who is going to arrive, if they are trustworthy, or if they are skilled. By using our services, you can keep your existing arrangement at no additional cost to you, and no changes to your service. When you have a problem, you will get one of our techs onsite; someone who not only is local and is well trained and background checked, but who is also a neighbor and quite possibly a patron.

When your network has been compromised and your computers are unusable, the last thing you need to be doing is looking for someone who can help get your business back up and running. You need to have a disaster recovery plan in place and tested. This is one of our specialties. Being compliant does not mean you are secure. One of the most important things you can do is have a baackup solution and have it tested.

Although all threat models are different, the threat of an insider is high on the list. Either through malicious intent or inadvertant action, insiders are the cause of many high profile breaches. Our training is thorough and uses industry standards which have been proven in production. The old adage, "an ounce of prevention is worth a pound of cure" is definitely the case here. Tim is extremely skilled at training basic skills to novices, as he is a mentor for the cyberpatriot program of the U S Air Force.
Basic Security

I have been involved in security since 1987 when I had to have a secret clearance to do my job in the National Guard. I have been chief of operations at Kanawha I T Security for four years. I have put together a list of recommendations to help you enhance your security and am sharing it with you.

1. Make your regular computer account a standard user. Up to 94% of all Windows malicious software (malware) is stopped by this one action, combined with proper use of User Account Control (UAC). This is assuming you are using Windows, as most Linux distros create a standard user during installation.

2. Use a password that is at least 15 characters, make them unique to each account, and change them every 30 days. If you insist on taking longer to change them, make them at least 30 characters long. You may choose to reuse them for some of the forums or sites that do not involve finance or personal information, but be aware that when an attacker gets access to any account, they may use it to pivot to other, more sensitive accounts, especially if you reuse passwords.

3. Create an email account that you only use to reset passwords. Put a ridiculously long password on it and enable two factor authentication.

4. Enable two factor authentication (2FA) on all sensitive accounts. This means that when you login to a site, you will get a text message, or some other piece of information proving that you are who you say you are. ATM machines are another example of 2FA, because you have the card and the PIN.

5. Use an adblocker. This is debatable, as on the one hand, it takes away ad revenue from website owners, but on the other hand, there are lots of ads out there serving malware. You can allow ads for certain websites you frequent while blocking those you don't know.

6. Write down your passwords. This also covers passwords, but it is that important, as it is the first line of defense. This allows them to be longer and have them changed more often. You can use a password manager you trust or a small notebook like I do. Some will argue against the paper, but give an attacker physical access and it is game over, period.

7. An often overlooked area is security questions. Never answer them correctly unless you want someone to have access. My technique is to use nonsense. For your high school you could put "cobweb" or for your favorite pet you could answer "city sewer system". Get creative and write them down and they will never be guessed.

8. Always keep your computer up to date. This also means not using unsupported operating systems like Windows XP, as they are no longer updated. This one is not for you, but for me, as it allows criminals to use your computer for illegal activities, such as attacking other systems or to spread malware to other systems.

9. Don't click things just because they say you need to. This should be obvious, but if you get a popup saying your Flash is out of date and to click here to update it, you are asking for trouble.

10. Maybe the most important thing of all is to always back up anything you don't want to lose. I put one folder on my desktop and put everything inside folders in that one. This way, all you have to do is grab that one folder about once a week, or daily if you save lots of things, and put it on an external hard drive. A very important thing to note here is not to leave that hard drive hooked up to a computer, as ransomware can encrypt this drive as well, ensuring that you can never recover anything. If you have a copy of all your important data, criminals cannot erase everything you have or force you to pay to get your data back.

This is not an all inclusive list, nor is it a guarantee that you will not be involved in a breach or attacked by criminals. This is merely a list of basic security procedures you can use with little inconvenience to help keep you out of trouble. If your system is harder to break into than most, criminals will move on to the easier attacks.