Looking to hire IT staff?


Play the video below to learn more about the solutions Digital Seattle can offer to your IT challenges



Managed IT Services

IT support in Seattle, offering intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution and IT support available in Seattle.

read more

Cloud Hosting Solutions

Proactive IT support can reduce infrastructure costs, collaborate, allowing Seattle businesses to get more done with our unique cloud solutions.

read more

Digital Seattle, Inc., is proud to announce its inclusion in the prestigious Channel FutureMSP501 2023 listing!

Read more ...

Your data is your business...protecting it is ours.

At Digital Seattle, we understand business. We consult. We provide IT support and solutions to solve everyday challenges for Seattle Businesses. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • First Name *
  • Last Name
  • Phone *
  • Comments
      • Who Are We?
      • Refer A Friend
      Who Are We?

      It's Nice To Know Who You're Working With, We Get That

      Digital Seattle understands that making a decision means putting your trust in us. We encourage you to find out more about our company and read testimonials from our many satisfied clients!

      About Digital Seattle
       

      Refer A Friend To Digital Seattle!

      Do you know someone who you think might benefit from our services? Let us know and we will get in touch with them!

      Read More
      Refer a Friend
       

      What Our Clients Say

      • One-stop-shop

         

        We know that we are in good hands and can trust the feedback we get from Digital Seattle in all aspects of our technology management. From server maintenance and back up, new hardware ordering & service, annual software licensing, IT problem resolution, etc., our issues are handled more smoothly, quickly, and in a more cost effective manner than trying to provide all of these services in-house.

         

        Digital Seattle helps keep us on the leading edge and current with things including our annual “state of our systems” review that provides feedback about new trends, what other similar firms are doing and changes that may be coming up. All of this leads to our ability to make good decisions about purchases and resource allocation. The length of our history together speaks to the confidence and comfort level we have with the team at Digital Seattle and the services they provide.

        Jeff W., Client for 20+ years
      • Deep knowledge of our property & intricate systems

         

        Over the past 20 years of working with Digital Seattle, we have benefitted from their familiarity of our property and intricate systems. Any updates or additions we have had were made seamless due to the experience and knowledge already in place because of employee retention. They have built a strong rapport and familiarity with our staff, making any technical issues that arise easy to address and solve swiftly and with ease. We have always felt cared for by the team, and that our concerns are valid and given the attention they need.

        Shelley W., Client for 19+ years
      • High level of service & commitment

         

        Digital Seattle is proactive in the maintenance and security of our network and systems... and keep us ahead of the game by ensuring our software and hardware is working at peak performance. Keeping our systems running without down time is extremely critical. Their level of service and expertise is fantastic. I think we all sleep a bit better at night knowing we have true IT professionals working on our behalf!

         

        Everyone is very friendly and helpful. We also like the fact that they offer other services; such as the recent upgrade of our phone system to a cloud based system that saved us a significant amount of money, while providing ease of use and all the features you'd expect in very high end systems. We highly recommend their services! Having worked with DS for many years now, we really appreciate the consistent high level of service and commitment to keep us running smoothly! Thank you!

        Mitch M., Client for 9+ years
      • Positive change, Stability & Peace of Mind

         

        Since retaining Digital Seattle in 2016 for our IT support, we have transitioned our business forward to a new server, desktop computers, and other devices supported by frequent off site backups. Our employees have also become more efficient due to our immediate access to IT professionals. All of this positive change came about after a thorough review, followed by qualified recommendations from Voiko Tanev and his IT specialists. It is reassuring to know that our network is constantly monitored for updates, issues, security and firewall optimization. Thank you for providing tremendous stability and peace of mind with this aspect of our business.

        Carin K., Client for 3+ years
      • Clear Professionalism & Efficiency

         

        In contrast to our past providers, Digital Seattle’s professionalism was apparent from the first day we sat down to talk with them about a potential collaboration. Their knowledge of the industry is up to the minute, and their staff is very experienced. They have solved every single computer, network or server related problem our staff has experienced since we brought them on, and they have done it fast. Several times they identified a hacking threat that could have cost us many thousands of dollars, and neutralized it. 

         

         For a fair fee, they have given us an iron clad disaster recovery backup system, cyber security, all-hours access to fast tech support from knowledgeable staff (even when most of us are working from home), and we now have state of the art hardware. If any architecture firm is not covered in these areas, their risk is huge. Digital Seattle has given us peace of mind that has allowed us to conduct business quickly and efficiently even when working remotely.

        Larry J., Client

      Latest Blogs

      USB-C? Thunderbolt? What Ports Should My New Laptop Have?

      If you look at the loadout of ports on a new laptop or desktop and you are confused, we don’t blame you. Between awkward naming conventions for ports, a lack of education on the differences between these technologies, and brand new legislation for companies like Apple to ditch their proprietary technology to use something more standard, it can be daunting to make sure you get a device that connects to the other devices you already have.

      We’re going to break down these new ports, from USB to Thunderbolt to HDMI, and help you make the right decisions before you purchase that new device.

      The ABCs of USB-C

      Most everybody is pretty familiar with the gold-standard of device ports, USB. For a lot of us, it’s been the standard for most of our lives, and only those of us who are a little older remember the finicky PS/2 connectors for computer accessories like mice and keyboards, or the old 15-pin serial ports on computers in the mid-90s.

      Granted, there are still specialized devices that might use these older ports, especially in manufacturing, older inventory management or point of sales systems, and healthcare, but for most general computer usage, USB has been the trusted port that more-or-less handles everything the average user throws at it. It’s right in the name; USB stands for Universal Serial Bus, and it allows for both data transfer and a decent amount of electrical transfer so you can power, say, a webcam, and still have enough throughput to also transfer the digital video that it captures in real-time.

      Standard ports and a smarter, pin-less design means they are easier to plug in and unplug from a computer or laptop without damaging the device or the cable, and as long as you can get by with the limitations of how much electricity and data you can send through the cable, virtually any device manufacturer could use the technology. For the first time, you could almost guarantee that a modern device could connect to a modern laptop or desktop without a lot of hassle or specialized cables.

      USB standards have evolved over the years, with different, more compact ends that fit into smaller, more compact devices. We had Micro USB which was popular in Android phones for several years, and is still used for power banks, and charging small devices these days. Then there was its bigger, but awkwardly-named Mini USB, which was popular in digital cameras and camcorders, some scanners, and other devices. Apple introduced their own proprietary 8-Pin Lightning cable for the iPhone and iPad line, and over the last few years, more and more devices have standardized to USB Type-C, which has a much easier to use connector (no more flipping your cable over because it’s upside down!) and boasts some amazing transfer and charging speeds.

      USB Type C is the New Standard, But There’s a Spectrum of Devices and Cables

      While the standardization of USB-C is a great thing, the exact capabilities of a cable and a USB-C device will vary. Specific charging bricks will support certain charging speeds, certain cables will be rated for specific charging speeds too, and the same goes for data transfer speeds.

      This is where you start seeing numbers being used, like USB 2.0, which is a slower data-transfer rate (maxing out at around 480 Mbps). That’s still pretty fast, but if you are transferring a lot of data from, say, an external hard drive, you’ll want better. USB 3.1 Gen 2, however, has data-transfer rates of up to 10 Gbps, which is over 20 times faster than USB 2.0. At this point, you’ll be limited to how fast either device in question can actually read and write the information, but you certainly won’t be bottlenecked by your USB connection.

      This means that when buying a device like a laptop or desktop, you’ll want to not only see what type of connectors the device has ports for, but what those ports are actually rated to do.

      A new laptop with a few USB-C ports might be all you need, but if they are all rated to be USB 2.0, then you can expect slower transfer speeds when connecting to hard drives or pulling video off of a camcorder. If that’s not something you are going to be worried about very often, then you are probably fine, but it really depends on your intended use.

      Then, you’ll want to make sure that the USB cables you buy are rated for those speeds, or make sure you use the ones that came with the device you are plugging into your desktop/laptop.

      What About the Old USB Standard?

      USB-A is going to go away eventually, but most desktops still come with USB-A ports, and a lot of laptops might still throw one or two in there for you too. If you still have devices that connect with USB-A, you’ll want to check before purchasing your laptop. Personally, we think it’s a good idea to have a USB-A port on any laptop just in case. There are adapters to convert USB-C connections to USB-A ports, so if you’d rather get a laptop that is actually too thin to support the thicker USB-A port, you can usually get by with an adapter, but remember that you won’t be able to take advantage of the power delivery and data transfer speeds of USB-C.

      Thunderbolt Strikes Back

      Thunderbolt is confusing. The ports look the same as USB-C ports. The cables look the same as USB-C cables. They essentially do the same thing, and on most devices, a USB-C port can accept Thunderbolt devices and a Thunderbolt port can accept USB-C devices.

      On most devices, the only way you can tell the difference between a regular USB port and a modern Thunderbolt port is a little bolt of lightning symbol next to the port.

      So what’s the difference?

      Thunderbolt ports are much faster at transferring data compared to USB-C. This is ideal for transferring large amounts of data quickly, like when working with video files or huge, complex AutoCAD documents. It’s also used for connecting 4K monitors and Thunderbolt expansion hubs to a computer. For instance, if you want to dock your work laptop to a hub that is connected to a few monitors, ethernet, mouse and keyboard, and other peripherals, one single Thunderbolt port is enough to feed all of that back into your laptop.

      If you connect a USB-C device into a Thunderbolt port, or you connect a Thunderbolt cable into a regular USB-C port, the connection is simply limited to the slower USB-C speeds. USB-C can still be pretty fast, but when it comes to specific use-cases, Thunderbolt can really blow it out of the water. Currently, Thunderbolt 4 is the latest standard, and can support up to two 4K displays, and have a data transfer rate of up to 32Gbps, which is over three times faster than the fastest USB-C, and over 50x faster than what most USB-C standards get. As you can see, it’s pretty significant.

      On top of that, Thunderbolt has the ability to wake your computer up if a mouse or keyboard that is connected to a hub is touched, a feature that is missing from most USB-C devices.

      In other words, Thunderbolt might be something to look for when buying a new desktop or laptop. If anything, it ensures that your device is more future-proof to take advantage of this type of interface, and if you never end up needing to use it, well, it’s still a valid USB-C port.

      The Elephant in the Room; Apple’s Lightning Connector

      We can’t talk about port standards without at least touching on the Lightning port. For years, this has been Apple’s proprietary standard for their iPhones and iPad devices. Apple users weren’t able to simply use any standard cable to charge their devices or transfer information, Apple wanted customers to buy their specific cable.

      We get it, sort of. If you produce a device where the utmost quality and attention to detail is important, then you’ll want those standards applied to every aspect of it, including the charging cables. The problem is that Lightning cables tend to be more delicate and prone to issues compared to the standard USB cable. Plus, it really just made it that much more difficult for an Apple user to charge their iPhone in a room full of Android users, and vice versa. It’s not like the Lightning cable is more or less capable than standard USB-C.

      Thankfully, rulings by the European Union are now requiring that USB-C becomes the standard for phones, which will get the world much closer to having fewer variables when it comes to USB ports and cables. By the end of 2024, USB-C will officially be the standard for smartphones, tablets, digital cameras, headphones, portable speakers, e-readers, and more.

      Video Output Ports

      Finally, we get to the last port type to consider, and this one is going to be the most specialized. HDMI and HDMI mini ports are designed to transmit video and audio. On a desktop, or some high-end gaming laptops, you’ll likely have even more options like DisplayPort too, and older PCs might have the classic VGA or DVI ports.

      If you are buying a laptop, you’ll want to think about how you’ll use it and whether or not you might want to connect it to another monitor. That’s where these other ports come in. If you are happy using the built-in screen and never intend on connecting it to another display, then you can simply ignore this, but don’t skimp on it if you really can’t get work done without having plenty of screen real estate.

      If your device has USB-C ports, and one of those ports is USB-3.1 or above, then you can connect a USB-Hub or USB-C to HDMI dongle that gives you additional video output options. If your device has Thunderbolt 3 or 4, then you can connect the equivalent of one or two 4k monitors to the device, respectively.

      If this all sounds complicated, it absolutely is, but it’s definitely worth considering when buying a new device, because if your usage requires you to dock it or connect more than one other screen, you’ll need to know what your options are, and determine if you need to purchase a hub, different monitors, or something else in between.

      Other Ports, and Our Recommendations

      Of course, USB, Thunderbolt, and HDMI aren’t the only ports on a laptop or desktop. Some laptops might still have headphone jacks for connecting headsets, ethernet ports for connecting directly to a network instead of using Wi-Fi, and a charging port. Some extremely thin laptops might forgo the charging port and use one of your USB ports to draw power, which means you’ll be left without a port while charging the device.

      While we’d love to tell you that the best loadout simply gives you half a dozen of everything, compromises are always made to keep laptops small and light. Here’s what we recommend looking for when purchasing a laptop, at bare minimum:

      • At least one USB-A port for connecting to older devices.
      • At least one USB-C port that isn’t also your charging port
        • That USB-C port should be USB-3.1 or higher if possible
      • If it’s available, try to get a device with Thunderbolt for the sake of future-proofing
      • HDMI or HDMI-mini so you can easily connect to another monitor without needing additional hardware.
      • A headphone jack - sometimes we just like wired headphones better than Bluetooth!

      Not every device will hit this sweet spot, and your use case might demand more or fewer ports, but at least make sure you understand what specifications your USB-ports are so you can have the flexibility you might need.

      Need Help Purchasing Hardware for Your Business?

      Give the business technology experts at Digital Seattle a call at (206) 709-9556 and we can help your business acquire the hardware it needs.

      Learn More

      Social Media Scams are on the Rise

      Phishing Scams

      Phishing scams involve tricking users into revealing sensitive information, such as login credentials, payment card numbers, or personal details that can lead to access to secured accounts. There are over 3.4 billion phishing emails sent daily, and as a result, nearly everyone has come into contact with a phishing attack at some point in their computing life. Some phishing scams are more sophisticated than others; and the ones you see on social media often come in the form of fake messages from hacked accounts.

      Fake Profiles and Catfishing

      Speaking of fake profiles, scammers create fake profiles to impersonate someone else, often with attractive photos and an enticing persona. Sometimes they are able to hack people you interact with frequently. Obviously, this can be problematic. These scammers aim to build trust with unsuspecting individuals, often for financial gain or emotional manipulation.

      Investment Scams

      Scammers promote fake investment opportunities on social media, promising high returns or other benefits. Unsuspecting victims may invest money into these schemes, only to lose their funds with no recourse for remediation available. These can include seemingly benign activities that promise ease to profits.

      Fake Giveaways or Discounts

      Scammers impersonate celebrities, brands, or influencers and announce fake giveaways, asking users to provide personal information or pay a fee to enter. The promised prizes are never delivered and you are out your money.

      Survey and Quiz Scams

      These scams involve enticing users to complete surveys or quizzes that request personal information. People can glean quite a lot from a person’s social media account, so filling in the gaps can result in scammers gaining access to personal information that users don’t volunteer. Scammers can use this data for identity theft or sell it to third parties.

      Impersonation Scams

      Scammers impersonate friends, family members, or trusted individuals to request money or sensitive information. They may use compromised accounts or personal details to make their impersonation more convincing.

      What You Can Do to Protect Yourself

      There are plenty of other types of scams going around on social media. Here are some tips on how to circumvent these scams.

      • Be cautious about sharing personal information.
      • Verify the authenticity of profiles or accounts before engaging with them.
      • Avoid clicking on suspicious links or downloading files from unknown sources.
      • Use strong, unique passwords and enable two-factor authentication.
      • Be skeptical of unsolicited messages or requests for money.
      • Report suspicious activity to the social media platform and local authorities.
      • Stay informed about common social media scams to recognize them.

      Remember that social media platforms have their own policies and reporting mechanisms to deal with scams and fraudulent activities. Staying vigilant and educating yourself about online safety is crucial to protect yourself from social media scams.

      At Digital Seattle, we are all about utilizing technology to help you improve your business, whether it be on social media or anyplace else. Being aware of who you are dealing with and how it may affect you is the best way to avoid being scammed.

      Learn More

      Cyberthreats Can Threaten Your Business in Several Ways

      How Cyberattacks Threaten Your Business

      Cyberattacks affect businesses differently than any other threats and have the widest array of outcomes. Cyberattacks are generally attempts to gain access to a business’ technology to steal data, steal money, or extort business owners. This can set up a lot of very frustrating scenarios for business owners and managers. These include:

      Financial Losses

      The bottom line is always a factor and cyberthreats threaten the financial stability of your company. They do this in two very distinct ways.

      • Through Data Breaches - Cyberattacks can result in the theft or exposure of sensitive customer and company data. This can lead to financial losses due to regulatory fines, legal liabilities, and the pain and cost of notifying affected individuals.
      • Ransomware - Ransomware attacks can encrypt a company's data and demand a ransom for decryption keys. Paying the ransom can lead to direct financial losses, and if the data is not recovered, it can result in lost revenue and productivity.

      Reputational Damage

      There isn’t much that can hurt a business quite like an event that causes its clientele to sour on it. Cyberattacks can be a major red flag as they often result in personal information being stolen and leaked or sold. There are two common cyberattack scenarios that cause reputational damage. They are:

      • Outside Data Breach - A publicized data breach can damage a company's reputation and erode customer trust. Customers may be hesitant to do business with a company that can't protect their sensitive information.
      • Sabotage - When insider threats result in data leaks or malicious actions, the organization's reputation can be tarnished. It may be perceived as negligent in its hiring and security practices.

      Operational Disruptions

      Cyberattacks not only present surface challenges, they present operational challenges. When an organization is unable to access systems or is deliberately attacked it can make it practically impossible to continue business-as-usual. Here are two types of attacks that can hinder productivity:

      • DDoS Attacks - Distributed Denial of Service (DDoS) attacks can overwhelm a company's online services and make them inaccessible. This disrupts normal business operations, leading to downtime and potentially loss of revenue.
      • Malware and Phishing - Malware infections and phishing attacks can compromise employee devices and networks, causing operational disruptions as IT teams work to remediate any issue that occurs.

      Legal and Regulatory Consequences

      One aspect of the cyberthreat that may not be immediately evident is the role it plays in regard to regulatory compliance. There are very specific requirements written by governing bodies that require certain security benchmarks to be reached. If those aren’t, and your organization is the victim of a cyberattack, it can be problematic for these two reasons:

      • Non-compliance - Regulatory bodies often require companies to implement specific cybersecurity measures and protect customer data. Failure to comply with these regulations can result in fines and legal penalties.
        Lawsuits - Customers or business partners affected by cyberattacks may file lawsuits seeking damages for any harm suffered. Legal battles can be expensive and time-consuming for the company.

      In order to ensure that you maintain cybersecurity, you need to have a strategy. The IT professionals at Digital Seattle can assess your business and help you develop security strategies that can keep cyberthreats at bay. Give us a call today at (206) 709-9556 to learn more.

      Learn More

      Our Partners

      AIA_Logo.pngDatto_logo_final.pngaxcient-digital-seattle-logo-2022-msp.pngbbb.jpgcertified_reseller_badge-resized.pngcisco.jpgdell-digita-seattle-partners-2022-msp.jpgeaton-digital-seattle-msp-partner-png.pngmicrosoft-partner.jpgmspallianceresized.jpgseattle.jpgsonicwall-digital-seattle-msp-partner-2022.pngsophos.jpg

      Latest Blog Entry

      With technology being so important for all businesses in at least some capacity, it’s no small wonder that effectively using it (and having someone on-hand to manage it all) is tremendously valuable for any company. This is where a managed service provider (MSP) can be helpf...

      Latest News

      Channel Future MSP501 recognition

      Digital Seattle, Inc., is proud to announce its inclusion in the prestigious Channel FutureMSP501 2023 listing!

      Read more ...

      Account Login