WE ARE BROADTEK.

Broadtek is a premier provider of advanced technology services, network design, implementation, and maintenance services.

WATCH

View the films to learn more.

DISCOVER

Broadtek can give your business the tools it needs to engage clients and the consumers of your products and services unlike any other technology company in the industry.

EXPLORE OUR STORIES

SERVICES

Broadtek offers a wide-range of technology services to meet our customer needs. We partner with the leading vendors to bring our clients the best solutions.

NETWORKING

Businesses continue to depend upon stable interconnectivity. Broadtek designs and implements reliable network solutions to help increase your productivity.

READ MORE

CLOUD

Business is transforming as a result of the revolution in connectivity. Broadtek provides reliable cloud solutions with cost-effective and scalable hosted services.

READ MORE

COMMUNICATION

The increase in bandwidth requirements drives businesses to re-evaluate their current voice and data services. Broadtek partners with over 40 carriers to research and deliver appropriate connectivity options for our clients.

READ MORE

COLLABORATION

Broadtek's collaboration solutions include a unified platform for voice, video and IM. We can design a solution to help accomplish your business objectives.

READ MORE

SECURITY

We provide security solutions that adapt to the ever-changing threat landscape. This proactive response assures that critical data is shielded from exploits.

READ MORE

HARDWARE / SOFTWARE

Companies still rely on hardware and applications to facilitate tasks. Broadtek installs practical systems, provides software licensing along with support options.

READ MORE

VIRTUALIZATION

Today's businesses require efficient and scalable core technology operations. Virtualization provides for consolidation of the physical infrastructure giving IT environments reduced total cost of ownership.

READ MORE

MANAGED

We have a variety of managed service offerings to keep your company secure. This allows you to focus on running your business, not your technology.

READ MORE

Broadtek has been our partner through substantial growth over the last few years. Their advice and expertise has helped to ease the growing pains and achieve our IT goals.

LARRY WAGNERIT Director, Community Counseling Center

OUR PARTNERS

  • Client 1
  • Client 2
  • Client 3
  • Client 4
  • Client 5
  • Client 6
  • Client 7
  • Client 8

MEET OUR TEAM

  • matt-02

    MATT HOPKINS

    Director of Sales & Marketing
  • donnie-01

    DONNIE LAWSON

    Director of Technical Services
  • ellen-02

    ELLEN KIRCHDOERFER

    Director of Operations
  • ashley-03

    ASHLEY MCDANIEL

    Account Manager & Marketing Coordinator
  • gavin-02

    GAVIN THOMAS

    Inside Sales Representative
  • jeff-02

    JEFF HAY

    Account Manager & Telecom Specialist

Broadtek has always been a great company to do business with and their technical staff is second to none. We have used their expertise on several projects over the years, but the one that stands out recently is our conversion to virtual. Their staff knew exactly what was needed and made the process seem easy.

SKIPPER COWANIT Manager, The Bank of New Madrid

CONNECT

2015
Security
We have long known that People are the weakest link in security. Organizations today realize they can have the best security technology money can buy, but if one employee clicks a link or downloads an attachment from an email, all that security gets thrown out the window. Organizations are beginning to provide more training and education to their employees to help ensure everyone is doing their part to prevent attackers from gaining access to our networks and stealing our information. Testing Your People
There’s one caveat to more training and education: how do you know if it is working? The answer is to test your People. We already test our Technology via Vulnerability Assessments and Penetration Tests. Most organizations are required to test their Processes (typically an annual IT Audit). But if we know that People are our weakest link, shouldn’t we be testing our People at least as much, if not more, than our Technology and Processes? Creating a Culture of Security
Testing your People is not difficult, but it’s only half the battle. The difficult part comes after individuals fail an assessment. How does your organization handle failed Social Engineering Assessments? Most organizations do not take the results of the assessment seriously or simply respond with additional training. However, the key to creating a stronger culture of security is to hold our people accountable. A failed Social Engineering Assessment shows that your organization has serious weaknesses in its People, which creates a very big risk to your business. Holding your People accountable for failing Social Engineering Assessments or creating security weaknesses is a struggle for most organizations. However, in order to create a culture where everyone is expected to treat cybersecurity seriously, holding our People accountable for creating additional risk to the business has to be a priority. Don't Create Fear of Security
We do have to be careful not to simply punish undesired behaviors such as clicking on bad links. Ruling with an iron security fist typically leads to a fear of security in which your employees will hide their mistakes from you rather than report potential security incidents. “How do we get our People to report security incidents rather than attempting to cover up their tracks?” you might ask. There are a few different ways to get to the desired result, but it’s simply a matter of rewarding desired behavior and penalizing undesired behavior. If we analyze the traditional “don’t click the link” model, it usually looks something like this: sebehaviormodel
You’ll notice the only incentive for employees to not click is fear. Fear of getting in trouble, fear of reprimand, or fear of losing his or her job. Now, an employee clicking on a link creates a HUGE risk to your organization, so there should be some form of penalty involved with the undesired behavior. However, fear itself will not create a culture of security where employees buy-in and value cybersecurity. If we take the process a step further and talk about rewarding desired behaviors, our flow-chart looks like this: sebehaviormodelreward
The best outcome regarding a Social Engineering Assessment is not simply for an employee to ignore the attack but to report it your Information Security or IT Department. Consider providing a reward (the “carrot”) to employees that report attempted phishing attacks on your organization. The reward can vary from large to small; it is completely at your discretion. Many organizations utilize a points-system (gamification) that allows employees to collect points for an extra day of PTO or branded clothing items. There are a lot of ways you can reward your employees. However, we still have an issue with the fear of clicking bad links and hiding the behavior until confronted. Employees that cover up their behavior does not help the organization out in the event of an actual attack, where you’ll be stuck playing catch-up from the start. What happens if we look at the “undesired behavior” of clicking and take it another step further? sebehaviormodelpenalty
While clicking the link is still an undesired behavior, we want to promote a positive action once an undesired behavior occurs. To do that, we want to encourage our People to report their mistake rather than cover it up or simply not tell anyone. If you are performing your own SE Assessment, you’ll be able to tell who clicked, but if it’s an actual attack, you won’t have this insight. Therefore, we want to “reward” this desired behavior (reporting mistakes rather than covering up) by effectively negating the undesired behavior of clicking the link. There’s no actual reward in this scenario, but rather than being penalized, the employee gets back to a neutral state. You can apply this concept to whatever reward process you have implemented as well. The implementation of a behavior-based model for Social Engineering Assessments will help build a strong culture of security at your institution. Be sure to focus on rewarding the desired outcomes (training your People to respond correctly) rather than simply creating the fear of being punished.

How Broadtek and SBS Can Help

At SBS, we want to help make sure you are building a culture of security at your organization. SBS has always had a training and education focus, and we’d be happy to help provide some cybersecurity training to your People. Additionally, SBS has partnered with KnowBe4 to provide your organization with the ability to test your People through automated phishing email assessments. For more tips on building a cybersecurity culture at your organization, take a look at the 10 Key Ideas to Build a Cybersecurity Culture infographic. This article was written by our partner, Secure Banking Solutions. John Waldman, CISA, CRISC - Vice President of Business Development - SBS Institute sbs-logo
Read More
Windows 10
Windows 10

Free Windows 10 Upgrade – Until July 29th, 2016

(And how it does more than just securing your information)

Many of you may be aware that Microsoft is offering free upgrades from Windows 7, 8, & 8.1 on supported machines to Windows 10. However, this free upgrade offer lasts only until July 29, 2016.

The standard operating system for the large majority of our commercial customers is Windows 7 Pro. Microsoft's official end of sale for Windows 7 Pro is the end of October 2016. Thus new PCs purchased after that date will have Windows 10 installed. Microsoft's free upgrade offer for existing Windows 7 Pro (and 8 and 8.1) is an excellent opportunity to get a head start on bringing your installed base of PCs to what will be the next business standard opeating system, Windows 10. Broadtek has installed a sizeable number of Windows 10 systems and upgraded many Windows 7 machines. We are using Windows 10 ourselves and find that it performs well, has excellent compatibility with existing applications, broad printer support, and most importantly is very stable. Regarding performance, it actually requires fewer system resources than Windows 7, and many users find that existing systems perform better on Windows 10 at the same level of memory and processor of a Windows 7 machine.

Click here to upgrade your systems directly from Microsoft. The application is straightforward and we've seen very few problems although some interaction is required per machine that will require your attention during the upgrade process. At Broadtek, we've developed our own process for upgrading a quantity of systems and offer this service to our customers at a low flat rate cost per machine which includes sorting out any problems that might occur during the process.

In our opinion, the Windows 7 end of sale combined with the robust performance and stability of Windows 10 makes a strong case to move to the next Windows standard. Whether you do this on your own or take advantage of our services to assist, we encourage you to make this move before the upcoming deadline. To learn the details of our upgrade services, please contact your Broadtek account representative soon.
Read More
Email
Email Phishing, Spear Phishing

Broadtek Fights Email Phishing & Spear Phishing


Recently, the FFIEC issued a warning to financial institutions of an increased threat of cyber-attacks wherein ransomware is installed on networks in effort to extort ransom from the institutions. Broadtek has identified and cleaned several of these ransomware cyber-attacks which began with a spear phishing email to upper level executives in various sectors. Email Phishing continues to be a commonly used method of attack in most sectors. The Symantec Intelligence Report September 2015 indicated that Finance, Insurance & Real Estate sector made up 27% of the targeted attacks where systems were comprised using spear-phishing. Most targeted organizations had fewer than 250 employees. Spear Phishing is a method of targeting individuals within an organization to obtain personally identifiable information by sending an email that appears to be from a legitimate company.  Spear Phishing emails commonly use one of two types of attack:
  1. The email will contain a link to a website that appears to be an official website. Once the email recipient logs in to the rogue website, the hacker as possession of any personal information typed at the site such as user identification, passwords, and any other information requested.
  2. The email will include an attachment which installs malware to the workstation and network when the attachment is opened.
Spear phishing is an ongoing problem for organizations in all sectors. Email phishing and spear phishing attempts are only successful if the email recipient participates by following a link or opening the attachment file.  The most effective method of protecting against being compromised by a spear phishing attempt is training and education. Conduct regular employee training in your organization, including executive level employees, so they know how to deal with email phishing and spear phishing attacks. Executives are frequently targeted on these attacks because executives have a higher level of access. A few quick tips to implement today to avoid falling victim to email phishing and spear phishing attempts:
  • Do not open emails from unsolicited sources. Delete them immediately.
  • Check link destinations with mouse over.  Verify the URL that should appear in the bottom left corner of your browser.
  • Do not automatically follow warnings and requests within emails.  Call the normal business phone number of the apparent email sender to verify email contents.
Broadtek has partnered with companies specializing in IT security to offer security awareness training in-person, live webcast or recorded webinar for your organization. Call today to schedule your next training session.
Read More
Meraki
Meraki-MX64W-547x300

The SolutionCisco Meraki MX Security Appliance

(And how it does more than just securing your information)

Cisco Meraki MX Unified Threat Management provides the full range of data security protection including firewall, intrusion prevention, anti-virus and anti-phishing, content filtering, safe-search enforcement, malware protection, IPsec VPN connectivity, and more. Plus all of this is included for one cost in a single and simple to understand advanced security license.

Meraki MX will automatically detect and classify the devices attached to your network including notebook computers, iPads, iPhones, and Android devices. You can easily set policies to control access by these devices such as making sure they don’t introduce viruses or vulnerabilities to your network.

Internet content filtering assures that you’re in charge of your company’s Internet resources. You can restrict or report on inappropriate use. A simple interface lets you set rules for the entire network, groups or individual users as you see fit.

Meraki MX lets your provide your customers or guest access to the Internet over your wireless network while keeping them safely segregated from your systems. You can limit how much bandwidth access you give guest machines as well as prevent them from accessing objectionable websites.

Maintaining and managing competing systems to the Meraki MX brings to mind words like difficult, complex, or highly technical. Take one look at Meraki’s cloud based management dashboard and you’ll think of words like simple, intuitive, or instinctive.

Contact Broadtek today to learn how you can enjoy the peace of mind that Cisco Meraki security brings to your organization.


MIKE BUCHANAN

Read More
Load

SUPPORT

Broadtek wants you to have the best experience possible. If you have questions, we are here to help.

OUR CLIENTS

  • Client 1
  • Client 2
  • Client 3
  • Client 4
  • Client 5
  • Client 6
  • Client 7
  • Client 8

CONTACT US


info@gobroadtek.com

PH: 573.335.5157

1315 Broadway , Cape Girardeau, Missouri 63701

SOCIAL ICONS