IT Support Specialists

Adam Thorn is an IT Support Specialist, helping small business owners since 2003. Adam is the president and lead consultant here at TUCU.  Here is a run down of some of the the technology we use to protect small business from cyber threats. For help with your technology management, schedule a free consultation with us. 

Secure Devices

Antivirus is not enough, but we have you covered. 

Antivirus is a single layer in a security solution. AV alone can only block roughly one third of today’s cyber threats. 

You need better protection. Our basic computer security plans offer you an affordable solution for secure devices.

secure employee computer concept -BF


Remote Monitoring & Management tools to monitor hardware health and processes running on computers. RMM alerts us to small problems before they become issues that cause you downtime.

Managed Antivirus

Managed antivirus means we install and update your AV daily, take care of any notifications that pop up, and run regular scans to help keep every computer safe.

Patch Management

Prevent exploits and vulnerabilities with automatic patch management for all devices, OS, and common 3rd party applications.

Managed EDR

Endpoint Detect & Repair (EDR) tools help with ransomware prevention. Block threats before they can gain a foothold.

Application Security Controls

Block spoofed apps, risky apps and malicious browser extensions. Prevent staff from accidentally installing malware or uninstalling security software. 

Document & Email Backup

Cloud storage like OneDrive or Google Drive is not the same as backup. Make sure your files are safe. Add email & file backup to cover you in all scenarios.

Network & Cloud Solutions

Local and cloud networks designed with security and scalability baked in. 

remote desktops concept client WM2

Remote Desktops

TUCU is 100% virtual. We can help you with your cloud infrastructure and Azure virtual desktops, virtual servers and more. 

Windows Servers

As authorized resellers and certified partners, we can provision, configure and support virtual and physical Windows Servers.

Ubiquiti Networks

Powerful, reliable, cloud enabled and affordable network switches, firewalls and WiFi access points.

(Yes, we support Meraki,  Aruba and others too.)

Microsoft 365

As certified Microsoft partners since 2003, you can rest assured that your Microsoft 365 management is in good hands here.

Google Workspace

As certified Google Cloud partners, we are here to help you setup, migrate and manage your Google Cloud accounts.

Cloud File Sharing

Both Microsoft and Google offer excellent cloud file storage and sharing options. We will configure and support your Microsoft OneDrive &, SharePoint and Google Drives. 

Microsoft Teams

Your communication and collaboration hub includes team chat, file sharing, whiteboards, video calls and conferences and so much more. 

Microsoft Teams Phone

Modern voice solutions with a dedicated phone number and the convenience of Microsoft Teams. 

Cloud VoIP

Cloud hosted VoIPsolutions can be highly customed to your needs, with digital reception, ring groups, call cascades and more. 

Identity & Governance

Who, what, where, when and why fully managed across your IT infrastructure. TUCU’s Identity Access Management services are delivered using the power of Microsoft Security tools.

cloud security solutions client

Azure Active Directory

The core of your cloud IT infrastructure. Bind devices to your domain and authenticate signed in users to Microsoft services. Apply basic security policies to protect your organization.

Azure AD Identity Protection & Governance

Discover, investigate, and remediate identity-based risks within your organization. Define who can access what with powerful tools to protect and audit resource access. Improve visibility into permissions and make assigning and revoking access easier for your team and your IT company.

Microsoft Identity Manager

Eliminate risky data sprawl. Simplify new device setups. MIM enables you to easily provision and manage identities local and cloud networks. Grant access to Trusted Devices. Block all others. Stay safer in a risk filled world.


External Identities

No more public sharing of data without control. Share and collaborate with contractors, clients and partners with seamless and secure access.

InTune & Microsoft Security Tools

We use a variety of tools and policies to help you protect your organization, including:

A database of standardized configurations for computers or mobile devices, applications and compliance policies.

Automatic Provisioning and binding of new or wiped computers to your Azure tenant and policies.

Configuration Profiles which “push” security policies to every device (e.g. encryption, set screen lock, etc).

Compliance Tools to ensure every device has those prescribed configurations applied.

Data Security

You can’t stop what you can’t see. Our cloud & data security solutions are built on Microsoft and designed to help SMB’s safeguard data from evolving threats.

it governance compliance services concept-handshake

Defender of Cloud Apps

Safeguard your cloud services with Microsoft Defender for Cloud Apps. We use these tools to protect your cloud apps to prevent attacks, data loss and exfiltration, and ensure secure access for your team.

Defender For 365

Phishing attacks are a top threat, and they keep evolving. Prevent these stealthy attacks from sneaking past your staff and infiltrating your accounts with Defender for Office 365.

Defender For Cloud

An unsecured cloud network is an open invitation to attackers. We use Defender for Cloud to continuously assess, secure, and protect your cloud environment.


Information Protection and DLP

Take great care of your information without overly restrictive blanket approaches that stifle work flows. TUCU will help you classify, label and secure sensitive information with Microsoft Purview Information Protection.  This is DLP for modern work.

Sentinel & SIEM

Cyber threats keep evolving while organizations often have no or low visibility and control over their IT systems. Sentinel and SIEM solutions give you visibility, the ability to respond to threats fast, and the ability to rebuild what happened after any security incident.

Our Strategic IT Services

Outsource your IT management to our dedicated team. 

Focus on your business while we oversee all things technology related. 

Our IT Services →


Schedule A Consultation