RT_it_icon

IT SERVICES

Your business, enhanced. Explore our full suite of managed IT services from on the ground network configuration to cloud storage and everything in between.

Learn more

RT_it_icon

CENTREX PHONE SYSTEMS

Designed with our customers in mind, IP Centrex Packages span features from the essential to the all-inclusive.

Learn more

RT_it_icon

SECURITY SYSTEMS

Never compromise when it comes to the safety and security of your family and business. We offer customized security systems that deliver consistent quality performance even in the harshest environments.

Learn more

As a technology solutions provider our goal is to provide our clients with a secure and operational network in order to run their business proficiently by providing high quality technical service with our certified IT staff.

ReadiTech is your business solution.

Our goal is to integrate with your business in order to help it achieve a seamless and hassle-free network and computer operation.

Contact us today

ReadiTech has been providing service for over 60 years.

Discover more about our services straight from our ReadiTech technicians.

<Learn more ReadiTech’s parent company DRN>

 

Our Weekly Blog

Social Engineering: Gone Phishing

  In recent years we have seen more and more conflict on the cyber battlefield.  As more attacks and breaches occur, more and more resources go into defensive actions.  Firewalls, strong passwords, and updating software are essential to securing the home front.  However, when considering cyber defense, you must not forget that the most commonly exploited component is the human.  This exploit is commonly called social engineering.  Why bother learning the skills to hack into a computer when it is easier to trick, manipulate, or intimidate a person into handing over their credentials?  Thoughts like this have led to a surge of hacking by use of psychology.  Hopefully shedding some light on what is out there will help you identify these scams before you fall victim to them. Think of social engineers as related to the classic conman because both use similar tactics.  The only difference now is the medium.  Social engineers primarily use email due to how simple it is to reach large groups of people.  The general term for email scamming is phishing.  Just like the conman you will see scare tactics, fake urgency, deals too good to be true, and impersonations.  Phishing emails always have a subject line that catches the eye, examples:  Cancellation of Health Care Coverage, IRS Tax Inquiry, Bank Account Overdrawn, Get 90% Off New iPad Order Now.  You can also expect all caps and excessive amounts of exclamation points.  If you suspect an email to be a phishing attempt don’t click any links or attachments.  To distinguish between the imposter and the original hover your mouse over the sender address compare it... read more

Inside the Business World

My name is Alyssa Nishek. I would like to tell you about my experience as the Marketing Intern at DRN/ReadiTech for the summer; everything only an insider would know. Before I inform you on the details of my internship, I first need to tell you a bit about myself. I graduated from Ellendale High School this year. I plan on attending NDSU in the Fall to pursue degrees in both Communications and Criminal Justice. My goal is to become a lawyer. I grew up in a small town, but have seen forty of the US states. I don’t plan on living in the Midwest my whole life. I have a passion for music, family, reading, writing, traveling and dogs. Summer jobs have been part of my life for five years now. I first started as a babysitter, then I moved up on the totem pole to lawn mowing for two years, next came waitressing for a summer, and finally, the most prestigious of them all, my internship at DRN/ReadiTech. I had a few initial worries going into this internship. First was that I wouldn’t be able to enjoy the summer weather, as I did in past jobs, sitting inside all day at a desk. First world problems, I know. Second, I would have a desk job, eight to five every day. My jobs the past five summers had very flexible hours and as long as the work got done I could pretty well choose when I wanted to work. That being said I wasn’t sure I was ready for the kind of commitment that came with the internship. Lastly,... read more

Cloud Hosting

To understand hosting, you first must understand the cloud. Simply put it is a mega server hardware that can run many machines using combined hardware resources. These mega servers can be hosted by anyone, so the cloud is made up of a lot of companies across the globe that offer these services. Now you don’t have to outright buy equipment that depreciates, and you won’t have to manage it. You can essentially rent it from a hosting company and they take care of the back end of things.  There are several types of machines hosted in the cloud from web hosting and services to backup your regular Windows 10 machine and many more. Here at DRN ReadiTech we are a hosting services provider. We host websites, email hosting and customer servers here in-house. So, what’s the process? You must have a hosting need. Whether you want an e-mail hosting provider or a new website. Then you must find a hosting provider that you trust. There are different compliances hosting providers must abide by to ensure the safety of their customers data and machines. After you find some cloud providers and know your needs, you compare. Cost is very important – some people charge based on the amount of resources you use, some charge based on the number of machines, or some charge based on the bandwidth you take up. It’ll be wise to figure out what price structure benefits you most. Next, physical and geographical location. Where would your data and the machines be stored is something to take into consideration. For example, you don’t want your machine anywhere... read more

Readi. Set. Go!

Get started today.