The Central Ohio IT Experts

We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Reduce downtime, increase profitability, and make your technology work for you.

read more

Spam Protection

Protect your business from threats through your inbox

read more

Backup & Disaster Recovery

Ensure peace-of-mind with the most complete data backup solution available.

read more

Microsoft Office 365

Have all team members work and comment on the same project from different locations.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Amaxx, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • Do you have questions about Managed IT Services and what they can do for your company?
  • First Name *
  • Last Name *
  • Company Name
  • Phone *
  • Comments

      What Our Clients Say

      • Focus Logistics Solutions

        As a small, growing business we rely heavily on Amaxx to keep our systems running optimally and also rely on them to keep in step with our growth needs. Their solutions are effective, practical and scalable. They allow us to focus on our core business and at a moment’s notice Amaxx facilitates any need we have regardless of our users technical abilities. Amaxx is a part of the “value add” solutions we offer to our clients every day.

      • Shelley Metz Baumann Hawk, Inc.

        Working for a small structural engineering firm, I have to wear many hats around the office. Maintaining and managing the IT systems is just one of those hats but there is not enough time in the day for me to do everything effectively. Amaxx is my invaluable partner. They can easily take care of the everyday tasks such as monitoring the health of our network, managing our security protocols, verifying all PCs and Servers are properly updated, and fielding help desk calls to be sure all my fellow employees are running efficiently. They handle large projects such as server installs with similar ease, and goes to great lengths to do it in such a way that allows the office to continue to function with as little downtime as possible. The attitude of the Amaxx staff is not one of superiority. In fact, it is quite the opposite. They make you feel at ease and let you know that they are your partner. Amaxx always has the best interest of your company at heart.

      • I had the pleasure of working with Amaxx for two years while I was managing the IT for a large community. IT was just one "small" part of my job, so I really had limited hours allotted to take care of the 60+ workstations and servers. We also needed to upgrade some parts of our infrastructure to deal with the increasing demands of our clients, expand our Wi-Fi, and get better use of our medical charting systems. The team at Amaxx was always available, and they provided great direction and advice. They always considered our bottom line in the process, and followed through until everything was completed. For our regular/daily operations I really had no concerns because Amaxx is a great IT vendor, and I knew that I could rely on them. My favorite service is their 24-hour monitoring.

        Working at a 24-hour facility, it is nice to go home and actually not fret over "what could happen." If anything went wrong with our server, it was the Amaxx crew getting wake-up calls in the middle of the night... not me. I came into work a few mornings and they were already there to repair some problems or do a necessary upgrade. They have always gone above and beyond and are very friendly as well.

      Latest Blogs

      Tip of the Week: 4 Accessories Every Smartphone Needs

      Portable Battery Pack
      Sometimes, no matter how much you charge your battery, you might find yourself falling short of the juice required to work while on the go. You aren’t always going to have access to an outlet, and even a quick charge may not be enough to get the job done. In instances like this, a portable battery pack is a huge help. There are battery packs available that are compatible with modern USB technology, so all you have to do is plug in your phone to charge your device. For starters, you can check out this one made by Anker.

      A Long USB Cord
      Your typical smartphone charging cable is generally only a few feet long, which means it’s easy to come up short when you need a charge. If you regularly find yourself needing the extra length, you can try out this huge USB cord by Anker. It makes a perfect partner for the portable battery pack we brought up. Plus, this cord is built out of some pretty hefty material, which means that you won’t have to worry about your pet chewing it, or severing it unexpectedly when moving a heavy piece of furniture around. With reinforced stress points, the cord can be bent and wrapped up for quite a bit, making it a long-lasting solution to your USB cord woes.

      Bluetooth Headset
      How often do you find yourself sick and tired of holding a phone to your face while trying to get work done? In cases like this (particularly long meetings with no end in sight), a Bluetooth headset for your smartphone can come in real handy. All you have to do is tether the device to your smartphone, pop it in your ear, and voila--you have a hands-free way of talking on the phone while getting to your work.

      Other Bluetooth Technology
      Basically, anything that uses Bluetooth technology is great for your smartphone, as it allows you to wirelessly tether devices to it. For example, you could use a wireless keyboard when you need to write a document or email. If you want to listen to music, you could hook up a pair of Bluetooth headphones so as not to bother others who might be in the vicinity.

      What are some other great accessories that you can use for your mobile device while out and about? Be sure to let us know in the comments, and subscribe to our blog for more great tips and tricks.

      Learn More

      Let the 80/20 Rule Be Your Guide for IT Security

      This rule, often called the Pareto Principle, is defined as such by Investopedia: “[the Pareto Principle] specifies an unequal relationship between inputs and outputs. The principle states that 20 percent of the invested input is responsible for 80 percent of the results obtained. Put another way, 80 percent of consequences stem from 20 percent of the causes.”

      In other words, the Pareto Principle is a strategy that attempts to explain how you should delegate your organization’s security resources in order to maximize the security you get. In this case, you are using your assets to protect your network from online threats. However, you might realize that even if you search and search for network vulnerabilities, you won’t find all of them. There are simply too many threats out there to identify. Instead, you use the Pareto Principle to identify where you can do the most good for your organization's network security.

      This principle can also work in reverse; only 20 percent of the vulnerabilities on the Internet lead to 80 percent of the data loss. When you think about it, this makes sense. How often do you hear about major data breaches in which multiple vulnerabilities were exploited? Instead, it’s usually just one major hack that led to many compromised accounts.

      Yet, the biggest part of effectively using the 80/20 rule is determining what your priorities should be, and which threats are the most dangerous. After all, if everything is a priority, then nothing can get done. This results in all-around subpar security that leaves large threats unchecked.

      A penetration test can help Amaxx  to find where your organization's most important security flaws lie. We can locate and resolve your most critical security flaws through a process called Remote Monitoring and Management (RMM), which allows us to connect to your office’s technology solutions and issue the required patches and security updates without an on-site visit. In fact, most situations will only call for remote access, so you can save both time and money with an RMM tool.

      In fact, there’s one solution that is capable of protecting the majority of your network without much effort at all. It’s called a Unified Threat Management solution, and it includes all of the major components of network security in one convenient package. With an enterprise-level firewall, antivirus, spam blocker, and content filter, you can know with certainty that one solution covers the majority of the challenges presented by network security.

      With Amaxx’s managed IT services, you’re creating many opportunities for enhanced network security, improved network performance, and optimized operations. To learn more about how we make technology work for you, reach out to us at 614-923-6700.

      Learn More

      From Heart Attack to Hack Attack: Hackers Can Now Control Pacemakers

      The researchers made a note to describe the dangers of using implantable cardioverter defibrillators, from a hacking standpoint. Many modern pacemakers have the ability to communicate with other devices. While this capability is designed as a benefit to the patient, allowing the devices to be examined without an invasive surgical procedure, it can have dire consequences if hacked. If the patient is away from the doctor’s office within two hours, the pacemaker can still receive signals from other devices, thus making it vulnerable to a cyber attack.

      Hackers can send a signal to the pacemaker that keeps the device from returning to “sleep mode,” which is what makes it vulnerable to exploitation. By analyzing the signals sent to the tested devices, researchers could spot various ways that a hacker would use this exploit. The results varied from draining the battery’s life to stealing personal data that may be stored on it. In other words, the hacker can make the patient’s life rather difficult by either turning off the device, or stealing data and using it to steal their identity. Hackers could even activate the pacemaker’s resuscitation shock without need, jolting the heart and making things difficult for the victim.

      There are at least 10 different types of lifesaving devices that are vulnerable to this simple exploit. In fact, the hacker doesn’t necessarily need to know anything about the device itself. The reason why these devices are so vulnerable is thanks to the manufacturers not believing that pacemakers are clear targets of cybercriminals. This led them to release the devices without the IT security necessary to prevent these targeted attacks. The lesson learned: “Nobody will consider pacemakers a target,” is no excuse to use lackluster security.

      Keep in mind that this study was conducted by researchers, rather than hackers. Still, have you ever considered the fact that your organization could be at serious risk? Some SMBs are under the impression that their small size means that they aren’t a target. However, most hacking incidents aren’t targeted events, and are instead massive campaigns meant to infect anything and anyone who happens to click on the wrong link. Furthermore, all businesses have some data that’s worth stealing, like employee records and financial credentials, and it needs to be protected properly.

      If you want to maximize your company’s security, give Amaxx a call at 614-923-6700.

      Learn More

      Know someone who would benefit from Amaxx? Let us know!

      Latest Blog Entry

      Smartphones are very convenient technologies, but with a couple of improvements to your device repertoire, you can drastically improve both your user experience and the value of your device. Here are four smartphone accessories that can enhance the way you use your mobile de...

      Latest News

      Amaxx launches new website!

      Amaxx is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login

      Remember me