Category: IT, Disaster Recovery, CyberSecurity blog

ITComplete Suite of IT Services:
Outsourced IT,
Data Backup & Disaster Recovery,
Network/Cyber Security

June 28, 2017 David Gemma

Business Continuity, Disaster Recovery & CyberSecurity

Prior, Proper, Planning

By Ken Rode, Director of IT Services, UNAPEN Inc., and a member of  ASCII since 2014

Earlier this month I reviewed WannaCry Ransomware. Now we have a new variant wreaking havoc in Europe and the US dubbed Petya. The interesting/annoying/scary thing about this one is that it includes the ability to leverage one vulnerable machine against your entire network. This means it is no longer sufficient to only protect your “important” machines. One vulnerable system no matter how inconsequential it is to you, could cause major issues within your network…..just as Merck, Maersk and others learned yesterday.

Our Partners at Datto have released an update that you can view here Massive Ransomware Attack Spreading across the Globe

The protections you need are the same as they were with WannaCry (see below); the new lesson is that you need these protections on every system that has access to your network.

Let's Cover the Basics (again for anyone that missed the previous article)

1.)    Keep your systems up to date – These attacks are exploiting a hole that was patched in March.  With all the tools and services available to ensure your systems are patched, it is negligent to not have applied this update by now.  Through ITComplete™, UNAPEN can even resolve the issue for operating systems that Microsoft no longer supports.

2.)    The attack has known signatures - so using a reputable, fully featured malware protection package should help block infections.  The key is to ensure these protections are on, operating properly and reporting to the correct people if an issue is discovered.  Trend Micro Worry Free Business Security is incorporated into UNAPEN ITComplete™ and has the protections needed.

3.)    Finally, the goal of ransomware is to collect ransom - even if an attack got through the first two protections (as WannaCry would not) you only need to pay ransom if you can’t recover on your own.  Active Business Continuity Systems like ITComplete DataSafe™ allow clients to spin up a clean copy of a protected system in minutes to recover from a hardware, software, or even malware issue.

Enjoy!

 

Avoid Business Disruptions: Protecting Your Clients and Your Firm

Get flexible IT services at an affordable fixed monthly cost with UNAPEN ITComplete.

Create comprehensive Data Backup & Disaster Recovery solutions with UNAPEN ITComplete DataSafe.

Harden your firm against Cyber Security Attacks with UNAPEN ITComplete NetScan.

May 15, 2017 David Gemma

Business Continuity, Disaster Recovery & CyberSecurity

Prior, Proper, Planning

By Ken Rode, Director of IT Services, UNAPEN Inc., and a member of  ASCII since 2014

This month, the SANS OUCH! newsletter focuses on the recent WannaCry ransomware and how you can protect yourself from similar attacks.

Personally, it amazes me that attacks like this are even still an issue for any reputable company as the protections to prevent them are reasonably affordable and are essentially a baseline of security that any firm should have.

Let's Cover the Basics

1.)    Keep your systems up to date – These attacks are exploiting a hole that was patched in March.  With all the tools and services available to ensure your systems are patched, it is negligent to not have applied this update by now.  Through ITComplete™, UNAPEN can even resolve the issue for operating systems that Microsoft no longer supports.

2.)    The attack has known signatures - so using a reputable, fully featured malware protection package should help block infections.  The key is to ensure these protections are on, operating properly and reporting to the correct people if an issue is discovered.  Trend Micro Worry Free Business Security is incorporated into UNAPEN ITComplete™ and has the protections needed.

3.)    Finally, the goal of ransomware is to collect ransom - even if an attack got through the first two protections (as WannaCry would not) you only need to pay ransom if you can’t recover on your own.  Active Business Continuity Systems like ITComplete DataSafe™ allow clients to spin up a clean copy of a protected system in minutes to recover from a hardware, software, or even malware issue.

Enjoy!

Get the Newsletter

Here is a link to the SANS OUCH! newsletter

OUCH! is published by the SANS Securing The Human program and is distributed under the Creative Commons BY--‐NC--‐ND 3.0 license. Permission is granted to distribute this newsletter as long as you reference the source, the distribution is not modified and it is not used for commercial purposes. For translating or more information, please contact ouch@securingthehuman.org.

 

Avoid Business Disruptions: Protecting Your Clients and Your Firm

Get flexible IT services at an affordable fixed monthly cost with UNAPEN ITComplete.

Create comprehensive Data Backup & Disaster Recovery solutions with UNAPEN ITComplete DataSafe.

Harden your firm against Cyber Security Attacks with UNAPEN ITComplete NetScan.

May 5, 2017 David Gemma
UNAPEN, UNAPEN ITComplete, Datto, Ransomware, Datto Ransomeware, cyber security, cryptolocker, phishing, hacking, ITComplete DataSafe, DataSafe, Disaster Recovery, Business Continuity, Disaster Recovery Financial Services, Business Continuity Financial Services, BDR, Backup and Disaster Recovery, Ransomeware protection

ABOUT THIS REPORT

With survey findings gathered from 1,100 Managed Service Providers (MSPs) in the US, Canada, Australia, the UK and around the world, Datto’s report provides unique visibility into the current state of ransomware from the perspective of the Channel and the small businesses who are dealing with these malware infections on a daily basis.
The report provides a wealth of detail into ransomware, including its frequency, the most common strains, the industries and systems most targeted, the impact, and the strategies and critical business solutions necessary to ensure recovery and continuity in the face of the growing threat.

UNAPEN & DATTO

  • - Working together to prevent ransomware

  • - Enabling your firm to maintain operations even if you suffer a ransomware attack!


 

ITComplete™

A multi-layered IT strategy that protects your firm, your clients and your budget!

MSP, IT, IT Services, Outsourced IT, Managed IT, UNAPEN, ITComplete, DATASAFE, NETSCAN, ITCOMPLETE DATASAFE, ITCOMPLETE NETSCAN

 

Outsourced IT Services

 

UNAPEN, UNAPEN ITCOMPLETE, ITCOMPLETE, ITCOMPLETE DATASAFE, ITCOMPLETE DISASTER RECOVERY, ITCOMPLETE BUSINESS CONTINUITY, ITCOMPLETE DATA BACKUP

Local & Cloud Data Backup,

Business Continuity

& Disaster Recovery

 

 

 

ITComplete NetScan - Network & Security Assessment from UNAPEN

 

Cyber Security

August 2, 2016 David Gemma

Business Continuity, Disaster Recovery & CyberSecurity

Prior, Proper, Planning

Getting Ahead of Business Disruptions with Strategic Thinking

Business continuity is a thoughtful process that describes a complete solution for backup and disaster recovery. A true business continuity solution will protect data on-premise and in the cloud, and also details a data restoration strategy.

Unfortunately, many firms take shortcuts in these areas due to the historically high costs of implementing comprehensive solutions.

New SEC rules for RIA firms

US businesses lose billions of dollars each year to data loss, and recent studies indicate that if your data center is down for more than a week, the likelihood of bankruptcy escalates significantly.

The SEC is defining new rules for Business Continuity Planning for RIAs to help protect investors from the fallout of this type of occurrence.

In this eBook, topics cover:

     - Outdated practices that create a false sense of security

     - The costs of cyber attacks and downtime

     - Best practices for IT in Financial Services

And more

To get your copy of Financial Services Firms: Add Business Continuity to Your Bottom Line, click here.

Avoid Business Disruptions: Protecting Your Clients and Your Firm

Get flexible IT services at an affordable fixed monthly cost with UNAPEN ITComplete.

Create comprehensive Data Backup & Disaster Recovery solutions with UNAPEN ITComplete DataSafe.

Harden your firm against Cyber Security Attacks with UNAPEN ITComplete NetScan.

June 22, 2016 David Gemma

Outsourced IT, Data Backup, Disaster Recovery & CyberSecurity

Protect Your Business 

Cyber Attacks Take Another Nasty, but Preventable, Turn

By Ken Rode, Director of IT Services, UNAPEN Inc., and a member of ASCII 

Recently there have been several high profile attacks against weak passwords and remote access utilities.

Like lions picking off the weakest gazelles in a herd, hackers are compromising weak systems in order to obtain passwords and then using those passwords in an attempt to access more secure systems.

People using TeamViewer, GoToMyPC and other remote access tools have been reporting unknown users taking over their systems.

All investigations have pointed to these victims using the same weak password on multiple systems and not enabling 2-factor authentication where it is available. See Two Factor Hack – Why Your Clients Might Not Be As Safe As You Think They Are!

People using good password policies and extra security where they can have been spared this nightmare.

I was even notified from a couple of hobby-related sites I belong to that the administrators of those sites are forcing password changes due to this issue.  See ‘Short Passwords Lead to Millions of Compromised Accounts’ in the UNAPEN May 2016 Newsletter.

 

So How Can You Protect Yourself?

Top 3 ways to reduce Hacker Threat:

  1. Use strong passwords… sentences, multiple character types, spaces, etc. – see How to Create a Strong Password and Remember It
  2. Use different passwords for each online service you use…particularly those that protect sensitive data. There are password managers you can use that help create, store and use multiple complex passwords – see The Best Password Managers for 2016 for a review. Personally, I like LastPass and Dashlane.
  3. Turn on additional security whenever it is available, …typically a one-time password sent via either email or text message…if available, text message is a better choice than email.

 

Proactively Protect Your Firm from Hackers!

To find out how to get flexible IT services at an affordable fixed monthly cost, check out UNAPEN ITComplete.

Have a Plan in Case Something Does Go Wrong!

To find out how to get comprehensive Data Backup, Business Continuity & Disaster Recovery services, check out UNAPEN ITComplete DataSafe.

 

June 10, 2016 David Gemma

Outsourced IT, Data Backup, Disaster Recovery & CyberSecurity

Prepare Your Business Today

New eBook | Read it now ›

The Many Flavors of Ransomware Today

More and more, ransomware has emerged as a major threat to individuals and businesses alike. Ransomware, a type of malware that encrypts data on infected systems, has become a lucrative option for cyber extortionists.

When the malware is run, it locks victim’s files and allows criminals to demand payment to release them.

Organizations of all types and sizes have been impacted by ransomware, but small businesses can be particularly vulnerable to attacks.

Ransomware is on the rise

In a recent study conducted by security software vendor McAfee Labs, researchers identified more than 4 million samples of ransomware in Q2 of 2015, including 1.2 million new samples.

That compares with fewer than 1.5 million total samples in Q3 of 2013 (400,000 new). Ransomware is distributed in a variety of ways and is difficult to protect against because, just like the flu virus, it is constantly evolving.

In this eBook, our partners at datto cover:

  • Top 7 common types of ransomware that threaten businesses today
  • How the malware is spread
  • Best practices for protecting your business
  • And more

To get your copy of The Business Guide to Ransomware: Everything to know to keep your company afloat, click here.

 

Avoid Ransomware by Proactively Protecting Your Firm

To find out how to get flexible IT services at an affordable fixed monthly cost, check out  UNAPEN ITComplete.

To find out how to get comprehensive Data Backup & Disaster Recovery services, check out  UNAPEN ITComplete DataSafe.

 

May 18, 2016 David Gemma

By Ken Rode, Director of IT Services, UNAPEN Inc., and a member of ASCII since 2014

Protect Both Your Own and Your Clients’ Personal and Professional Data

 

Two factor authentication (2fa) is available with many Internet sites and services (though you may need to manually choose to use it) and it can greatly increase the security of your clients’ accounts.

Rather than simply relying on a static username and password, 2fa introduces a second authentication entry such as a onetime password sent via text to a cell phone, an ever-changing code entered from a physical token or token app on a smartphone, or a one-time password sent to an email address.

Of these three options, there is one that is less secure and may even equate to a completely false sense of security.

Read the full article published in BusinessSolutions magazine here

Find out how you can protect your firm on an ongoing basis with:

 

UNAPEN, ITCOMPLETE, OUTSOURCED IT, MANAGED IT SERVICES, MSP

DATASAFE Logo1 transparent

ITComplete NetScan - Network & Security Assessment from UNAPEN

 

 

 

 

 

March 27, 2016 David Gemma

Business Continuity Solutions in Financial Services since 1995

UNAPEN, Inc. has been a premier solution provider in the Business Continuity and Disaster Recovery(BCDR) business for over 2 decades.  We initially provided these services for investment management firms with over $10 billion in assets under management(AUM), and then scaled our solution down by a magnitude to be able to provide the same services for firms with $1 billion AUM around the turn of the century.

The problem was that over 80% of RIA firms are below the $1 billion mark, but they have the same needs and have to adhere to the same SEC guidelines for BCDR as their larger counterparts.

A few years ago, UNAPEN partnered with Datto to create ITComplete DataSafe, and because of that partnership, we have been able to cost-effectively scale our solution down by another magnitude to firms with $100 million AUM.  Advances in technology have now enabled the majority of the RIA community to afford the same comprehensive local and remote data backup and data replication/restoration strategies from hardened, bi-coastal facilities that the big firms use(all data residing on US soil) – truly a dream-come-true that levels the playing field for most of the industry.

Download the Free eBook here – The 4 Business Continuity Planning Essentials

UNAPEN now offers Cyber Security solutions – Check out our ITComplete NetScan solution here.

Need Fixed-Cost IT Outsourcing? – Check out our ITComplete solution here.

Business Continuity for Non-Profit Organizations(NPO)

As our success grew in the investment management industry, partners at these firms asked us if we could help out in other industries.  Many of these partners sit on Boards for NPO and these organizations had limited budgets, but, like the smaller RIA community, have the same needs as larger organizations.  UNAPEN met the challenge and extended our BCDR solutions to the NPO community and offered reduced pricing to reflect our appreciation for the great services that these NPO are providing and in recognition of their budgetary limitations.

Business Continuity for Any Industry

With our success in the NPO arena, the UNAPEN BCDR solution is now industry-agnostic – we provide these long-tested solutions to any firm/company/organization with a minimum of 10 computers which can be any combination of workstations, servers, laptops, and tablets.

Find out more about our BCDR solutions by calling us at 203-269-6111.

 

David Gemma is a Managing Director and CMO at UNAPEN, Inc. (What’s a UNAPEN?)

Connect with David on Google+

 

 

May 8, 2015 David Gemma

Mitigating CyberSecurity Risks & Threats

The SEC’s Division of Investment Management released a CyberSecurity Guidance Update for April 2015 for Investment Funds and RIAs to help address and mitigate CyberSecurity risks and threats.

They are clear in stating “…that is it not possible for a fund or adviser to anticipate and prevent every cyber attack. Appropriate planning to address cybersecurity and a rapid response capability may, nevertheless, assist funds and advisers in mitigating the impact of any such attacks and any related effects on fund investors and advisory clients, as well as complying with the federal securities laws.” (more…)

April 2, 2015 David Gemma

Article by Ken Rode, Director of IT Services at UNAPEN, Inc.

Network Vulnerability Scanning vs. Penetration Testing

Recent high-profile incursions into all types and sizes of corporate networks demonstrate why Penetration Testing can be a valuable tool for protecting private data. Finding the holes and weaknesses in your network protections before the bad guys do can save astronomical amounts of money as well as your firm’s reputation. However, many RIA firms still have trouble justifying the tens of thousands of dollars a comprehensive Penetration Test will cost. This is where Vulnerability Scanning comes into play.

Read More

February 25, 2015 David Gemma

Article by Ken Rode, Director of IT Services at UNAPEN, Inc.

Technology is Changing the Game

One of the biggest factors is the belief that if there is a problem that can’t be solved remotely, your IT provider can be there to fix it quickly.  However, with the advent of Managed IT Services, including remote access in recent years, this has become much less critical and providers using the proper tools can actually respond faster remotely than they could if required to be on site. (more…)

January 27, 2015 David Gemma

Article by Ken Rode, Director of IT Services at UNAPEN, Inc.

 

The New Windows 10

Clearly bowing to the almost complete condemnation of Windows 8/8.1 in the enterprise, Microsoft announced on September 30, 2014 the planned release of Windows 10.  This version returns to a more Windows 7 like desktop interface while also retaining the benefits offered in Windows 8/8.1. In April 2015, Microsoft is expected to provide an official release date; the current expectation is sometime late in 2015. (more…)

October 24, 2014 David Gemma

NOTICE BY KEN RODE, Director of IT Services at UNAPEN, Inc.

Yet another major case of “malvertising” has been reported.  This is nothing new (a famous case occurred on the NY times web site over 5 years ago).  This sort of hacker attack works by going after the companies who serve up advertisements to sites such as newspapers, fantasy sport sites, yahoo, msn, match.com, etc.  If your browser plugins are not up to date, simply opening a page that is showing one of these infected ads can automatically infect your computer. (more…)

August 27, 2013 David Gemma No comments exist

Learn About the Latest in Disaster Recovery Solutions for Financial Services

September 19th, 2 PM EST    Sign Up Here Today

Presented by:
David Gemma, Chief Marketing Officer, UNAPEN, Inc. and Ken Rode, Director of IT Services, UNAPEN, Inc.

As network environments, regulatory mandates and external threats all increase in scope and complexity, the need for layered IT solutions has never been more urgent. Without comprehensive, integrated and proactive approaches to security, efficiency and compliance, managers are leaving their systems virtually unguarded and increasingly subject to plunder.

Our proactive approach to providing Business Continuity solutions means that we don’t wait for something to go wrong, we work closely with you to plan out a multi-layered strategy that continuously protects your firm, your clients and your budget. (more…)

August 1, 2013 Ken Rode No comments exist

Windows 8

Windows 8 was originally released to manufacturing on August 1, 2012 to general disappointment and condemnation.  The primary problem with this new release is its major shift to a tablet-style interface.  In this brief review, I am not going to touch on Windows 8 RT as that is not the OS that people will be using in a business environment and, honestly, it holds no interest for me.  For a low-powered, tablet-only interface, I am very happy with Android.  We will quickly review the original Windows 8 Pro release and then look at the preview release of Windows 8.1 Pro. (more…)

June 17, 2013 Ken Rode No comments exist

UNAPEN Warning:

Hackers using stolen AOL and Gmail info to send seemingly legitimate wire transfer requests to financial services firms is on the rise.

Increased Hacker Activity – Wire Transfer Requests

It is very common to see spam and other messages that appear to come from friends and we are all used to that.  However, over the past several months we have seen an increasing number of AOL, Gmail and other “free” accounts being hacked for more direct profit. (more…)

April 4, 2013 Ken Rode No comments exist

Cyber Attacks

It is no secret that for the past 6 months there have been continual cyber attacks underway against banks and large financial services firms.  Bank of America, JP Morgan Chase and American Express have all experienced targeted and sophisticated cyber attacks*.  Could you be next?  Are you prepared?

The bottom line is there is nothing you can do to prevent your firm from being a target.  Just like a burglar entering your home, you can’t stop them from trying; but there are things you can do to make it more difficult and, ultimately, provide them incentive to attack somewhere else.  To accomplish this, (more…)

July 12, 2012 David Gemma No comments exist

Family Wealth Report – article entitled “Viewpoint: On selecting managed services providers”

4 years ago we put together an article for Family Wealth Report Viewpoint: On selecting managed services providers that used the analogy of a siege on a medieval castle to talk about IT security and Business Continuity for investment managers and wealth managers.  I reread the article the other day and it has stood the test of time rather well, so I thought I’d share it with you in case you missed it the first time – Enjoy!

(If you’re not registered with Family Wealth Report you can get a free 28 day guest logon on the landing page to see the article)

(more…)

June 29, 2012 MaryAnne Rode 1 comment

Start with assessment:

Assess the situation- Take stock of what you have for technology.    How old is the technology you are using.  How long has it been since anyone has performed an audit on the technology?

Assess yourself and your practice- Is the technology used by all people in the company or just some?  How much does your company rely on the technology? (more…)

June 11, 2012 MaryAnne Rode No comments exist

I am here to tell you that in many ways they are not!  Of course there are some similarities in terms of the services they provide and the method they use to provide those services but that is where it ends.  Any IT provider can set up your network and provide antivirus software.  Any IT provider can give you anti-malware and run backups of your data.  (more…)

June 1, 2012 MaryAnne Rode No comments exist

Lately I have been writing more and more about IT service providers and choosing the right one. It occurred to me that some guidelines for what to ask any prospective IT provider may be helpful.  As your company’s dependency on technology grows, your need for IT support grows along with it.

Listed below are ten questions you should always ask any prospective IT provider before signing up with them: (more…)

May 24, 2012 MaryAnne Rode 1 comment

What are Managed IT Services?

In a nutshell, Managed IT Services is defined as an outside firm or service provider who handles your Information Technology needs including system monitoring, backups, security patches, anti-malware,  spam filtering as well as planning for upcoming hardware and software upgrades.  Some companies are even providing the option to rent hardware from them along with a managed network service.  It is an alternative to hiring an employee to handle your IT needs.  It is also a way to tap into several areas of expertise without having to hire a highly compensated employee especially if your IT needs are fairly limited in scope. (more…)

January 27, 2012 UPAdmin

Who is Minding Your Store?

The definition of Managed IT Services can vary greatly from provider to provider but in general, it is defined as an outside firm or servce provider who handles your IT needs including support, system monitoring, backups, patches and spam filtering. Some companies are even providing the option to rent hardware from them along with a managed network service. The main idea is that someone else is minding the store when it comes to IT infrastructure.

Are you settling for the same old same old?

One common approach to IT services and support has been the time and materials model. You have a computer problem and you call your provider . You then wait until they come and fix it. Then you get a bill. You don’t see them again until you have another problem. Then you call them, and wait for them to come and fix things. Then you get another bill. Maybe then you decide this has to stop so the next time you have a problem you spend an hour trying to fix it yourself because you don’t want to get another bill. Now you have spent an hour doing something that has nothing to do with what you are supposed to be accomplishing and chances are your computer is still not working exactly the way you want it to. When it comes right down to it, the time and materials approach means that your provider has no true responsibility for your network.

Is it time for a change?

It is very common for businesses to have what we like to call “current provider preference”. There is a sense of security around a known entity. But, could it be that you are just more comfortable with the devil you know? Do you find yourself saying things like “if only they ….” or “I just wish I was sure that they had….” When it comes to actually changing providers, you are skeptical. Perhaps they make promises to do better or to lower their costs. Ultimately though, it is a matter of trust and if you are spending time second guessing whether or not they are doing their job properly or fairly, you aren’t able to focus on your business and you aren’t getting a good return on your IT investment dollars. Your IT support is only a good value if you are getting the service you need in a timely manner allowing you to focus on doing your job. Don’t settle for anything less.

Why consider Managed IT Services?

There are lots of reasons to consider outsourcing your IT services. Some of the main considerations that drive businesses to consider a managed services provider are:
• limited IT staff or no IT staff at all
• frustration with current IT provider
• a need to update outdated technology
• outgrowing current IT resources
• a budget that doesn’t allow for year round full time coverage of IT needs
Perhaps the most compelling reason to consider outsourcing your IT is, the more time you spend trying to get your technology to work, the less time you have to focus on growing your business.

A good managed IT services provider will align your goals with theirs and help you move away from the trap of only addressing problems when it is too late. They will take a proactive versus reactive approach to your network. By doing this, it takes the distraction of computer issues out of your job and allows you to finally focus on what you were hired to do. Your days will no longer be filled with delays due to computer problems. With computers running smoothly and virus free, you can accomplish your work with greater efficiency.

What’s my first step?

If you are ready for a change and want to stop second guessing whether your infrastructure is secure and well cared for, the first step is to find a good managed services provider. How do you do this? It is important to know what your company’s IT needs are. It is also important to understand what is included in the managed services you are looking to purchase. You will want to evaluate what the true cost of your downtime is. You also need to know that all managed services providers are not created equally. It is important to get recent references and to research the type of services they provide in detail. Some managed services companies provide a fixed cost option which would allow you to contain your IT costs and still benefit from the expertise that you want and need. Doing this research will help ensure that you truly understand what you are purchasing and that it matches your needs. You have no doubt grown to rely on your technology. If it is not working and the person or company you hired is not responding, your business is going to be affected.

Why not just hire someone?

So you may be asking yourself, “why not just hire my own employee?” You may think that if someone works for your company directly that will give you better control over things and an accountability that may not exist when you outsource your IT services. That may be true on some levels however, what do you give up in order to achieve that accountability?

• Access to a resource pool with a broad range of expertise
• Coverage regardless of vacation schedules/sick days
• Freedom from the impact of staff turnover
• Freedom from the cost of benefits/fully burdened salaries

If any of these items are things you currently struggle with, it may be time to consider managed IT services. Managed IT service is no longer a “nice to have”. It affords you greater advantages and fewer drawbacks regarding your IT network. Quite simply, it is the right way to handle your IT needs.

About UNAPEN and ITCOMPLETE™
UNAPEN, founded in 1991, has been providing IT support and services for a wide variety of companies throughout the country. In 2001, UNAPEN began to move toward a more managed service model of providing IT support. ITCOMPLETE, with automated processes and remotely managed support, was first released in 2006. UNAPEN’s technology experts specialize in streamlining operations and workflow across organizations to help your business grow, minimize overhead and provide you a strategic competitive edge over other firms. UNAPEN also offers client relationship management and automated client reporting software tailored for firms in the financial services industry. For more information, visit www.myitcomplete.com or call (203) 269-6111.

Unlock The Potential!

Call UNAPEN, Inc. Today
203.269.6111
Email