Computerease

INC 5000

INC 5000

INC 5000 Computerease Named to the Inc. 5000 List of America’s Fastest-Growing Private Companies Recognition reflects decades of steady growth, client relationships, and disciplined leadership. March 2026 Computerease has been named to the Inc. 5000 list of America’s fastest-growing private companies, a national recognition of sustained business growth and long-term operational performance. The recognition reflects years of steady investment in people, processes, and client relationships as the company has continued to expand its services as a managed IT and cybersecurity provider. The Inc. 5000 list highlights privately held companies across the United States that demonstrate exceptional growth over a multi-year period. The annual ranking has become one of the most recognized benchmarks of entrepreneurial success and business expansion. Many well-known companies appeared on the list during their growth years, including organizations such as GoPro, Chobani, and Intuit. Inclusion on the list reflects not only growth, but the ability to sustain that growth through strong leadership and operational discipline. For Computerease, the recognition represents a long-term approach to building a business rather than short-term momentum. Founded in 1984, the company has spent more than four decades helping small and mid-sized organizations improve operations, strengthen security, and make informed technology decisions. Over that time, growth has come through consistency, investment in its team, and a focus on serving clients well. “Growth in business rarely comes from a single moment. It comes from consistent decisions, strong teams, and a commitment to serving clients well over time. Being recognized on the Inc. 5000 is meaningful because it reflects the steady work our team has done for many years to support the businesses that rely on us,” said Ryan Haislar, CISSP, President of Computerease. The recognition comes at a time when the managed services industry continues to evolve. Consolidation, acquisitions, and changing ownership structures have become more common across the MSP landscape. While many providers are shifting direction, Computerease has remained focused on long-term stability, consistent leadership, and building lasting relationships with the organizations it supports. As a second-generation business owner, Haislar emphasizes decisions that will continue to hold value over time. That approach has shaped how the company delivers both managed IT services and cybersecurity solutions, ensuring that technology supports business growth rather than creating unnecessary complexity or risk. For clients, the results of that approach are seen in practical outcomes. Businesses gain confidence in their systems and security posture, internal teams receive support when needed, and technology becomes a reliable foundation for growth. These outcomes are the result of steady execution and long-term thinking rather than short-term gains.While recognition such as the Inc. 5000 highlights measurable growth, the company views it as a reflection of the work that happens behind the scenes. The day-to-day decisions, process improvements, and ongoing commitment to clients are what ultimately drive results over time. For Computerease, the goal remains consistent. Continue building a strong team, continue supporting clients, and continue improving the systems that help businesses operate securely and efficiently. The recognition serves as confirmation that this disciplined approach to growth continues to move in the right direction. About Computerease Computerease is a managed IT and cybersecurity company founded in 1984 that helps small and medium-sized businesses improve productivity, protect their data, and navigate technology change with confidence. Led by CISSP-certified president Ryan Haislar, Computerease combines strategic technology guidance with responsive support to help organizations stay secure and competitive. 

Read More
Wake Up Call For Small Business Owners In The Aftermath Of The Solarwinds Cybersecurity Attack

Wake Up Call For Small Business Owners In The Aftermath Of The Solarwinds Cybersecurity Attack

At the end of 2020 a cybersecurity company, FireEye, made a disturbing discovery. Their systems had been infected with malware. Cybercriminals had maintained access to their systems for at least 9 months, completely undetected. It was the beginning of an unfolding story that continues to rock the nation. FireEye is highly reputable cybersecurity company, and they were first alerted to suspicious activity when someone noticed two phones registered to one employee. Their investigation revealed that there was a string of malicious code in their software, Orion, created and maintained by the company, Solarwinds. The software Orion is used by companies and federal agencies to monitor activity on a network. This malicious code allowed hackers a “back door” into each private company and federal agency using the Orion software. Corrupted software update spread massive infection Through a complex process, Russian (alleged) hackers replicated an Orion software update with the addition of 3500 undetectable lines of malicious code. Solarwinds released this altered and corrupted software update to all it’s Orion software clients including private companies and federal agencies. The hackers rented space on domestic US servers to fly under the radar of the federal government’s international cybersecurity watchdog agencies, the National Security Agency (NSA) and the military’s U.S. Cyber Command. Federal agencies and private sector cybersecurity companies are still collaborating on the investigation for how and why this cyberattack happened, and how to prevent future attacks. Experts agree that the hacker’s novel techniques contributed to it’s devastating impact and the federal government recently warned the private sector of increased cybersecurity threats. Complacency is the biggest risk Hackers are continually developing new strategies to gain access to a target’s network, servers, and computers. It’s a constant threat with lucrative rewards that shows no sign of slowing. There are news stories every few days about another cyberattack wreaking havoc on another business or organization. A school district in Missouri fell victim to ransomware and canceled in person learning for the day. A company operating a huge pipeline ceased operation in the past week due to another cyber threat. You can’t help but hear about these stories repeatedly featured on the nightly news. There’s a wakeup call needed for all small business owners in the aftermath of the Solarwinds cyberattack. Complacency is not an option because with cybersecurity it’s not a matter of if an attack will happen, but a matter of when an attack will happen. The Solarwinds cyberattack was simple and ruthless in its delivery through a routine software update. No one saw it coming! Federal government agencies and sophisticated cybersecurity companies were oblivious to what was going on in their own networks. Do you know what is possibly operating on your own network? When was the last time you scanned your network and systems to proactively check your security? What measures do you have in place to protect your network? Do you have a plan in case you have a data breach of sensitive client data or valuable files? It’s tempting to think that these attacks only happen to the “big guys” like Solarwinds, not a small business who has a lot less to steal. In fact, the opposite is true. 95% of all cyberattacks are aimed at small and medium businesses. Complacency is not an option for any small business owner. The good news is that you’re not alone. Every single small business owner is facing a similar uphill battle trying to protect their business from cyberattacks. There’s new cybersecurity solutions being developed for the latest threats and tried and true network and endpoint protections available. The first step is to get a baseline of where you are currently with your cybersecurity, and then make a plan to add any additional layers of protection needed.

Read More
The Dark Reality Of Heartless Cybercriminals Targeting Healthcare & Businesses In 2020

The Dark Reality Of Heartless Cybercriminals Targeting Healthcare & Businesses In 2020

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) released a warning to hospitals and the healthcare industry about a significant increase in ransomware attacks targeting hospitals and the healthcare industry.  Important Note: This article focuses on ransomware attacks in healthcare, but EVERY industry has a significant risk of attacks by cybercriminals and ransomware! The people behind these attacks aren’t the lone actors we sometimes envision sitting in a dark basement plotting against the world. Cybercriminal rings are organized businesses with financial backing and resources. Their goal is to scale their processes to get as much cash as possible from unsuspecting organizations that fall victim to their ransomware. They heavily invest in the latest malware variants and employ professional teams whose SOLE PURPOSE is to trick you or your team member into clicking a link in an email or downloading a file. These hacking organizations are heartless. They are out to get you. They’re targeting hospitals and the healthcare industry at this critical time during a global pandemic because they know that people are tired and stressed and are much more likely to be tricked by a malicious email phishing attack. I hear stories about healthcare organizations within the St. Louis area losing tens of thousands of dollars due to a ransomware attack. It makes me furious that hackers and cybercriminals are targeting organizations that are trying to HELP SICK PEOPLE! There’s no other way to describe these vile people besides greedy and malicious. Yet, so many people are unaware of the threat lurking in their email inbox. The most talented criminals and villains make it seem like they’re not real threats. They wear a friendly mask and hide amongst the emails from our coworkers, our favorite restaurants, and our messages for everyday work. Right now, I am sure your email inbox is flooded with obvious SPAM messages that most people can easily identify. These are the work of low-grade cybercriminal rings, not the same sophisticated organizations behind the most recent ransomware attacks. The advanced hackers have invested heavily in malware variants and psychological tactics to trick you and your employees. And, their investment has paid off. The evidence of lucrative profits from ransomware is a rapidly growing market. The individual ransom of 1,400 clinics, hospitals, and other healthcare organizations varied from $1,600 to $14 million per attack. People are increasingly paying the ransoms after ransomware infection (CyberEdge report) 2018 – 39% paid the ransom 2019 – 45% paid the ransom 2020 – 58% paid the ransom Healthcare isn’t the only industry being targeted. Every business is at risk! These cybercriminals plot and scheme every possible way to steal money from businesses like yours, trying to make an honest living. Now is the time to rally your team and embrace a call to arms to protect your organization and business’s purpose and mission. Complacency is the commonality that cybercriminals are counting on when strategizing the best way to attack your business and steal your money. You can’t afford to rely on hope as a strategy to keep your business protected! Thankfully, there’s an army of “good guys” working diligently to help keep your business protected. The same next-generation antivirus, email SPAM filtering solutions, and cutting-edge cybersecurity protections used by large enterprises are now available for small and medium businesses. In addition to technology solutions to keep your business protected, every member of your team is a critical part of your overall ransomware protection strategy. A single click on a link in a malicious email can circumvent ALL the security protections in place. So, training and testing every member of your team is critical.

Read More
The 8 Biggest Security Threats To Your Business From Mobile Devices

The 8 Biggest Security Threats To Your Business From Mobile Devices

Today, cell phones and tablets are nearly as powerful and capable as personal computers.  They have allowed so much added functionality when it comes to being able to work remotely and still stay connected to our professional lives.   This can be for better or worse…we are kind of married to our technology after all. Mobile devices are used across every stage of our business, from communication capabilities, line of business systems, special software applications, and even informational resources.  The benefits of having such powerful technology at our fingertips are seemingly endless.  However, there are also increased security risks. So, here are the 8 biggest security risks for using mobile devices in your business. Risk #1 The People In Your Business Even the most diligent members of your organization make mistakes!  Unintentional mistakes can have devastating consequences.  By mistakenly clicking on a phishing email, downloading a malicious app, or accessing confidential company files on their device, employees (and bosses!) can make a simple error and unwittingly take down your entire company! Risk #2 Data Leakage There are many apps that can see AND transmit data – even company data.  Also, there is the possibility of user errors leaking company data by uploading information to a public drive, copying confidential information, or even sending an email to an incorrect person. Risk #3 Social Engineering A social engineering attack is when you try to manipulate a human target into doing something that allows you into their network or their systems.  Using mobile devices for business email is a greater risk of falling victim to a phishing attack because mobile email only usually shows the name of the person, not the full email address.  There’s also the risk of spoofed text messages and malicious messages through various messaging apps. Risk #4 Risks Of Other Wifi Networks When you connect any mobile device (laptops included!) to a public wifi network, others can potentially see any data which is not encrypted.  A hacker can also create an ‘imposter’ wifi network and locally overpower a real network thus connecting you to the hacker’s network.  Are you REALLY connecting to the hotel wifi, or the hacker’s fake wifi with the same name? Risk #5 Out Of Date Devices Manufacturers often don’t update their devices in a timely or effective manner.  Also, consumers are notorious for not updating their devices regularly.  All of these factors increase security risks because routinely updating mobile devices is critical to address known vulnerabilities. Risk #6 Mixing Corporate & Personal Data How simple would it be to mistakenly (or purposefully) upload a business file to a Google drive or to another type of cloud sharing app from your work computer to get access on your mobile device? This is a HUGE security risk! Even the simple act of just having corporate and personal data on a personal mobile device can be a recipe for disaster because we all make mistakes. Risk #7 Poor Password Hygiene Some of us don’t have a passcode or a PIN on the lock screen of our mobile device. This is absolutely critical for security! Also, make sure that you DON’T use the same passwords for your personal and work accounts. And, make sure you don’t use the same username and password in multiple places. Lastly, at every possible chance, use multi-factor authentication (2FA/MFA) to provide an added layer of security. Risk #8 Physical Data Breaches Imagine if you left your phone or tablet somewhere. Now, imagine if you didn’t have any lock screen security or encryption for your device – any stranger would have access to ALL the information on your device, including your company files and email. In a study from Ponemon – 35% of professionals indicated their employer had no mandated security for mobile devices in place – about half of those people surveyed had no password, PIN, or biometric security guarding their devices and had no encryption in place. So, how do you protect yourself and your business? With layers of security. There is no one “magic bullet” that will cover all the bases. Just like there’s no one single way that hackers can steal your company data, there’s no single cybersecurity measure which can keep your business protected. The most important step is to keep yourself educated to the cybersecurity risks facing your business! I’ve taken the time to assemble over 50 quick-read cybersecurity tips that are packed with unique and up-to-date real-world solutions that keep you one step ahead of the bad guys. We offer this service FREE to business owners (and employees) who are concerned about cyberattacks and data breaches. And while we cannot ever guarantee you won’t be breached, the security secrets you get WILL significantly reduce your risk.

Read More

Contact Us Today To
Schedule Your Discovery Call