Existing customers click OK below to open up your e-mail client to submit a support request. Note: if you are not an existing customer, your support request will be ignored. If you wish to become a customer, please click on the "Contact Us"
Existing Customer
New Customer
Our Insights
Discovery I.T. is your trusted Information Technology & Information Systems Support company in Nederland, Beaumont, Port Arthur, Orange and all of East Texas.
Financial service firms: beware. Your data is a target. A new report out of the United Kingdom (UK) cannot underscore enough the severity of the issue. But it is nothing new. The FBI has put the alarms on since 2011, from threats of account takeovers to third-party payment processor breaches to securities and market trading exploitation […]
It may surprise you, but Microsoft Office 365 has a fantastic solution for creating simple quizzes, polls and surveys — and you already have access to this functionality! Microsoft Forms is relatively new, as it was only launched in June 2016, but this lightweight web app is an excellent way to gather feedback or plan […]
Less than a year ago, the European Union instituted the General Data Protection Regulation (GDPR) to protect customer rights to data privacy. The regulation created quite a stir in May 2018 when it was enacted, and has recently created even more of a stir because the first fines for non-compliance have been levied. While the EU granted […]
Citrix said the FBI warned them on Wednesday, March 6th that hackers compromised its IT systems and stole “business documents.” Citrix doesn’t know precisely which documents the hackers obtained nor how they got in. It’s suspected that this is a sophisticated cyber espionage campaign supported by a nation-state. The consequences of the Citrix security incident could affect a broader range of targets, as the company holds sensitive data for […]
Tired of Not Getting Reimbursed for Business Expenses? Never Lose Your Receipts Ever Again! Maintaining receipts is a fact of life for many people, but it can be extremely frustrating. Tiny pieces of paper that have to be maintained and categorized long enough to submit your expenses for reimbursement — who has time for […]
There’s no better means of promoting a professional business today than the use of online reviews. Positive third-party online reviews can take your law firm to the next level. Personal referrals and word of mouth have their place in drumming up new business, but they will never come close to the exposure you can receive through […]
Daylight Saving Time for 2019 starts on Sunday, March 10th. I’m sure you know how Daylight Saving Time (DST) works, but did you know not everyone in the US observes this time change? Arizona hasn’t observed DST since 1967, and Hawaii has never used DST. Michigan skipped DST from 1969 – 1973, while Florida is […]
With the ever-increasing rate of digital interconnectedness and accessibility, IT systems are more at risk of attack by hackers and spies than ever before. Yet, many companies still haven’t seriously addressed the issue of cybersecurity in their organizations. If you have concerns about the preparedness of your business, now is the time to start taking steps to protect your data. A […]
The sudden development of IT problems can quickly throw your team’s workday off track. Even simple login issues can prevent you and your employees from getting any work done until you can fix the problem. To do so on your own, you may have to spend hours troubleshooting, sometimes without getting anywhere. If you have […]
Reviews, testimonials and referrals are important to growing a contracting business. In fact, reviews are the backbone upon which a business can establish a working relationship with their local community. In today’s world, people can come to know you, like you and trust you (or not) via the reviews they read about your business. This […]
What is ransomware? Ransomware is an unusual type of threat because it holds your files for ransom while leaving your systems essentially otherwise operational. A piece of malicious software enters your network and applies an encryption algorithm to your computer files, rendering them unavailable. The files are still there, and you can see them in a file […]
It is not an overstatement to note that today’s successful construction companies depend on their IT systems as much as they do any hammers and nails. Successful contractors find integrating the role of a quality IT partner critical to meeting budgets and deadlines while maintaining profitability. It’s All About the Right Information at the Right […]