• MicroTech Services

    MicroTech Services

    A local Michigan company providing individualized solutions for businesses in Mid-Michigan.

  • AVTECH Environment Monitoring

    AVTECH Environment Monitoring

    • Monitoring your environment has never been easier. AVTECH has over 27 years of experience protecting the most important data centers in the world. Protect your assets today using the world's most popular temperature and environment monitoring products, now with cloud monitoring through GoToMyDevices.com.

  • Isonas Access Control

    Isonas Access Control

    • The new Pure IP™ hardware family from ISONAS offers a suite of products that allow you to customize your access control solution.

Catalogs

Lenovo November Catalog

AV Tech Enviroment Monitoring Catalog

Cloud Services

MicroTech Services offers cloud services including Microsoft Office, Backup & Recovery, Anti-Virus and Employee Monitoring. Just to name a few.

Forms and Questionnaires

New customer allows for discounted prices from select vendors.

Security Questionnaire requests a basic wish list for your security needs.


Now Open for Business

Security anyone?

Datarecovery.com Authorized Partner
“At Datarecovery.com, our goal is to provide fast, reliable, and affordable data recovery solutions while providing an outstanding customer experience. Follow the link below to receive a free overnight shipping label to our nearest lab, a free evaluation and a 10% discount.”

HackerGuardian PCI Scanning
Provides businesses, online merchants and other service providers who handle credit cards online with a simple and automated way to stay compliant with the Payment Card Industry Data Security Standard (PCI DSS). Approved by the PCI Security Standards Council®
Security Awareness Tip of the Day
Aug 16, 2019
A common method cyber criminals use to hack into people's computers is to send them emails with infected attachments. People are tricked into opening these attachments because they appear to come from someone or something they know and trust. Only open em…
Aug 15, 2019
Cyber criminals now have a wealth of information on almost all of us. With so many hacked organizations now a days, cyber criminals simply purchase databases with personal information on millions of people, then use that information to customize their att…
Aug 14, 2019
Leaving your seat? Ctrl--Alt--Delete! Make sure you lock your workstation or laptop while you are away from it. On a Mac? Try Control--Shift--Eject/Power.