Reliable Network and Infrastructure Support (Stroudsburg)
‹image 1 of 1›
offered in person
QR Code Link to This Post
You may already have someone who handles desktop support and basic networking support in-house, but when that person spends hours troubleshooting why the network drops every time the coffee pot turns on (this actually happened), you realize that Juan Valdez is not going to ride in on his mule to save your client list.
Last month, I visited my accountant’s office and found it in a full panic. Their networked printer had stopped working, and when they rebooted the system, which was apparently the usual fix, nothing came back online, including devices that had previously been functioning. We ended up working out an on-the-spot bartering agreement, but the bigger takeaway was that their overall IT setup was a disaster. This got me thinking about other similar offices that I have been in over the years. I’m retired, which gives me the flexibility to be more available when someone needs me. While many go East every weekday morning, there is also a need here for support.
If your home or business network needs help, an upgrade, or a full buildout. If your desktops have outdated virus/infected software. If you want a standardized configuration for each system within the office.
If you need tech help, reach out for more information!
*Ideal for small office to Multi-Floor Environments (Up to ~5 Floors) and shared resources between office locations:*
I will tell you what is actually happening, what needs to be fixed, and what does not. Then you decide how to move forward with realistic expectations. I am not going to try to dazzle you with 3-letter acronyms or corporate buzzwords.
----------------------
For longer-term projects and issues:
*Security, Privacy, and Encryption*
I could help protect the data that keeps your business running. Full-disk encryption, secure file containers, hardened systems, and layered authentication for offices handling client lists, financial records, or sensitive files. If a laptop walks off, your data stays locked down. No overcomplicated corporate security theater. Just practical protection that works quietly in the background.
Privacy Hardening and Digital Footprint Control
Most systems leak more information than people realize. I set up privacy-focused cleanup tools, reduce leftover traces, and tune Windows environments to cut unnecessary telemetry and background noise. Secure remote connections and privacy-focused networking options are available for professionals who travel or want fewer eyes on their business activity. Clean systems. Less tracking. Fewer loose ends. But remember that there may be a tradeoff between functionality and maintaining privacy.
*Forensic-Aware Protection, Built by Someone Who’s Been in the Trenches*
With a security and forensic background, I build setups that last rather than stacking patchwork fixes onto old problems. Access controls, encrypted backups, network segmentation, and real-world hardening that stays usable day-to-day. I’m a sneakers, jeans, and sweatshirt type of guy, not a suit trying to sell you the Brooklyn Bridge. I show up, figure out what’s actually wrong, and make it stable.
*Crypto Privacy and the Myth of “Anonymous”*
A lot of people assume Bitcoin is invisible or untraceable. It isn’t. Every transaction lives on a public ledger forever, which means activity can often be analyzed long after the fact. From a privacy and forensic standpoint, real protection comes from understanding how wallets, addresses, and basic operational habits work together, not from chasing internet myths. I help clients set up practical security and privacy practices so they use crypto responsibly without exposing themselves to unnecessary risk or false expectations. Also, the security of devices that access it. Cold storage is a longer-term option. And most important!!!! - The realization that when your coins are held by the most common exchanges, you have technically loaned them to that company, and if that company goes belly-up the next day, more than likely your coins are gone, or you join a list of people to be handled by a bankruptcy trustee.
WHAT I DO:
• Network design and build-outs
•Break/fix troubleshooting with practical solutions — this is where I do my best work
•Structured cabling planning and wireless coverage design
• Managed switching, VLAN segmentation, and traffic isolation
• Performance tuning and cleanup of legacy network issues
• Secure remote connectivity and site-to-site encryption tunneling
• Backup strategy design, NAS deployment, and recovery planning
• Office moves, rack and stack, staged workstation rollouts
WHAT I DO NOT DO
• I am not a software (applications) guy
• Work on or in specialized software that was created for your business
• I do not program or create apps
• I do not do OS Upgrades unless everything is fully backed up, running in parallel to the old version, and software/server/vendor support is available.
• I will not know your setup as soon as I walk through your doors, and possibly not be familiar with your hardware if it’s not mainstream or is not researchable
• Work in environments that are disasters and expected to work miracles – I can fix it, but it may run beyond the original scope of the job and available resources.