Computer Devices

Equipment Sales

You need reliable equipment that won't break the bank. The desktop computers and entry level servers I build have an average useful life of 7+ years! The laptop computers we prefer are typically replaced in their 5th year and require one battery replacement during that span of time. This is definitely bucking the industry's "best practice" of refreshing hardware every 2-3 years. My customers appreciate the ROI, performance and reliability.

I focus on components and equipment built for business which are not usually found in the local store. Durability, security, servicability, suitability affordability are my key criteria.

Computer Devices

Diagnosis and Repair

  • desktop computers
  • servers
  • laptops

I also address the human component - sometimes a new perspective is in order.

ewaste recycling

Responsible Recyling & Data Destuction

Your electronics should be recycled in an ecologically responsible manner. All data storage devices should be securely erased then recycled or destroyed (depending on the requirements of your industry). I can facilitate both objectives or you can contact Natural Evolution, Inc. directly - Tulsa's only certified eRecyler.

Software Proficiencies

Proficiencies

  • Microsoft 365 Premium
  • Microsoft Office 365 E3
  • Microsoft Windows (Desktop and Server)
  • Ubuntu Server
  • Centos 7 Server
  • Intuit QuickBooks multiuser
  • ERPNext Free & Open Source ERP System
network is down image

Network Equipment

All cables, switches, and routers are not created equal. Poorly installed cable will cause drops, lag and crosstalk. Routers meant for the home can't handle the number of connections needed for multiple employees - especially if your business uses Microsoft 365 or Office 365. Cheap, unmanaged switches are simple but can't help you isolate a hijacked computer.

Saving money

VoIP

I can probably lower your telephone bill substantially. Take a look at your monthly call log. Add up the total minutes and divide that into what you pay. If it is more than 3 cents/minute you are paying too much. I champion a service that charges based upon actual usage - you'll be surprised at the rich feature set and low price.

network image

Maintain Ownership of Your Data

  • Maintain complete, current backups of all data offline
  • Ensure your data is replicated to multiple physical locations
  • Enforce 'Need to Know' access for all users
  • Retrain users so that Passwords are never shared, never reused and always very, very long

Risk Assessments

Every person in your business sphere is a link in your business' chain of armor. Recent research revealed that employees are 85% more likely to leak data compared to pre-Covid times!
We need to be cognizant of:

  • Insider Threats: people with access to your data maliciously or unintentionally using it to harm your business. Mitigation focuses on restricting and monitoring access to data by people.
  • Insider Risks: data exposure potentially jeopardizes the business, its employees, customers, and partners. Mitigation focuses on creating barriers, typically with technology.
  • External Threats: employee response to random/falsified/misleading interactions across all modalities (phone, mail, email, text, social media)

You should have a means of knowing when and how inappropriate access occurs so that you can take the appropriate action and prevent recurrance. Unusual activity needs to be rapidly recognized and investigated. The most dangerous thieves lurk in plain sight.

Email

info@pbis-inc.com

Phone

(918) 582-2326

Address

10815 E Marshall St, STE105
Tulsa, OK 74116
United States of America