The Central Ohio IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Reduce downtime, increase profitability, and make your technology work for you.

read more

Spam Protection

Protect your business from threats through your inbox

read more

Backup & Disaster Recovery

Ensure peace-of-mind with the most complete data backup solution available.

read more

Microsoft Office 365

Have all team members work and comment on the same project from different locations.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Amaxx, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • Do you have questions about Managed IT Services and what they can do for your company?
  • First Name *
  • Last Name *
  • Company Name
  • Phone *
  • Comments

      What Our Clients Say

      • Focus Logistics Solutions

        As a small, growing business we rely heavily on Amaxx to keep our systems running optimally and also rely on them to keep in step with our growth needs. Their solutions are effective, practical and scalable. They allow us to focus on our core business and at a moment’s notice Amaxx facilitates any need we have regardless of our users technical abilities. Amaxx is a part of the “value add” solutions we offer to our clients every day.

      • Shelley Metz Baumann Hawk, Inc.

        Working for a small structural engineering firm, I have to wear many hats around the office. Maintaining and managing the IT systems is just one of those hats but there is not enough time in the day for me to do everything effectively. Amaxx is my invaluable partner. They can easily take care of the everyday tasks such as monitoring the health of our network, managing our security protocols, verifying all PCs and Servers are properly updated, and fielding help desk calls to be sure all my fellow employees are running efficiently. They handle large projects such as server installs with similar ease, and goes to great lengths to do it in such a way that allows the office to continue to function with as little downtime as possible. The attitude of the Amaxx staff is not one of superiority. In fact, it is quite the opposite. They make you feel at ease and let you know that they are your partner. Amaxx always has the best interest of your company at heart.

      • I had the pleasure of working with Amaxx for two years while I was managing the IT for a large community. IT was just one "small" part of my job, so I really had limited hours allotted to take care of the 60+ workstations and servers. We also needed to upgrade some parts of our infrastructure to deal with the increasing demands of our clients, expand our Wi-Fi, and get better use of our medical charting systems. The team at Amaxx was always available, and they provided great direction and advice. They always considered our bottom line in the process, and followed through until everything was completed. For our regular/daily operations I really had no concerns because Amaxx is a great IT vendor, and I knew that I could rely on them. My favorite service is their 24-hour monitoring.

        Working at a 24-hour facility, it is nice to go home and actually not fret over "what could happen." If anything went wrong with our server, it was the Amaxx crew getting wake-up calls in the middle of the night... not me. I came into work a few mornings and they were already there to repair some problems or do a necessary upgrade. They have always gone above and beyond and are very friendly as well.

      Latest Blogs

      Tip of the Week: 5 Steps You Can Take to Foil the Plans of Hackers

      Protect Important Security Credentials
      Hackers naturally target the credentials of important figures within an organization. This could entail stealing the usernames or passwords from someone who has access to crucial, mission-critical information, like the administrator of your IT department or your business’s C-Suite staff. Therefore, it’s important that you ensure these credentials are protected by encryption, and that they’re as long and complex as possible. If you store them anywhere, it should be in an encrypted password manager, where only they can access them.

      Restrict Admin Access
      Similar to the above point, you want to restrict access to certain locations of your network on a per-user basis. This means keeping the average joe from peeking at information like financial credentials and personally identifiable information, among other things. The fewer people who have access to important information, the less likely it is that this data can be stolen. Therefore, your users should have access to only information that they need to do their jobs properly, and nothing more.

      Augment Password Security with Best Practices
      If you’re using a password manager, you can implement all sorts of password best practices to further augment your organization’s security. For one, password managers make it so that you can feasibly use different complex passwords for every single one of your online accounts. This is important, seeing how long, complex passwords that utilize upper and lower-case letters, numbers, and symbols are very difficult to remember on their own.

      Cut Down on Shadow IT
      Hackers love to take advantage of forgotten-about technology solutions to infiltrate networks. While you might be patching all of your organization's crucial software solutions, you might be neglecting that open source word processor that an employee downloaded one day. You should emphasize to your team that if they need a solution to do their job properly, they should go through the proper channels (like through IT or management) before implementing an unapproved solution.

      Train Your Staff on IT Best Practices
      While it’s helpful that you understand IT best practices, this can only get you so far. You should make IT security a part of company culture by thoroughly educating your staff on how to stay safe online. Teach them what to do if they suspect that they’ve been hacked, and help them avoid dangerous threats, including malicious links, spam phishing attacks, and unsolicited email attachments.

      To learn more about cyber security, reach out to Amaxx at 614-923-6700.

      Learn More

      According to FBI Director, Privacy is a Misnomer

      Do you remember the controversy concerning Apple and the FBI? It was a case that swept the country and encroached on unprecedented ground. The FBI demanded that Apple release information on how to unlock an encrypted iPhone that was connected to a terrorist attack, but Apple chose to vehemently refuse the FBI, stating that it would be endangering the entirety of their consumer base by doing so. The FBI threatened Apple with lawsuit after lawsuit, but in the end they were able to unlock the device without Apple’s help.

      The popular trend of providing mobile devices with encryption has led to increased complications during investigations, and Comey chose to clarify the Bureau’s stance on the privacy of the typical American citizen. While there has to be a reasonable expectation of privacy in houses, vehicles, and even mobile devices, Comey claims that these expectations can reasonably be revoked in a court of law. He says: “With good reason, the people of the United States--through judges and law enforcement--can invade our public spaces."

      This statement prompts yet another question: how does a personal device qualify as a public space? According to Comey, a mobile device actually can be considered a public space: “Even our memories are not absolutely private in the United States,” Comey said. “Even our communications with our spouses, with our lawyers, with our clergy, with our medical professionals are not absolutely private. Because a judge, under certain circumstances, can order all of us to testify about what we saw, remembered, or heard. There are really important constraints on that. But the general principle is one that we’ve always accepted in the United States and has been at the core of our country: There is no such thing as absolute privacy in America. There is no place outside of judicial authority.”

      Additionally, Comey made sure to point out that the FBI has no business telling American citizens how to live and govern themselves, and that the tech companies don’t either. You might recall the open letter that many tech companies addressed to the the FBI last April, demanding that the government cease issuing mandates that would require tech companies to provide encryption keys for their software.

      It’s natural that these Silicon Valley giants don’t agree with Comey. In fact, there are even those amongst his peers who don’t believe he’s right on the matter. Nuala O’Connor, the President and CEO of the Center for Democracy & Technology, as well as the first Federal chief Privacy Officer for Homeland Security, is one of them. She says, “He could not be more wrong on encryption.”

      O’Connor is hardly the only one of his contemporaries who disagree with Comey. Two other notable former government officials had something to say about the FBI’s stance on encryption, and they both spoke at the RSA Cybersecurity Conference. Former Department of Homeland Security Secretary Michael Chertoff claims that forcing Apple to provide software that can hack into an encrypted iPhone would be like “creating a bacterial biological weapon.” Similarly, Mike McConnell, a former Director of National Intelligence, claimed that “ubiquitous encryption is something the nation needs to have.”

      This isn’t a problem that only technology companies have to deal with. It’s something that all users of smart technology (and most technology in general) have to endure. After all, any rulings in favor of the FBI’s stance could be detrimental to user privacy. For example, in the case of Apple creating a software that can crack their iPhone’s encryption, what would happen if this software were stolen and exploited by hackers? It would become a major problem, just like the NSA’s surveillance vulnerabilities that were stolen and sold on the Black Market just this past summer.

      In light of Comey’s response, what are your thoughts on the FBI’s stance on encryption? Do you think that government agencies have the right to access devices, despite invading the privacy of its citizens? Do you think that this “greater good” argument holds water? Share your thoughts in the comments.

      Learn More

      How One Major Government Department is Revamping Its IT Infrastructure

      The current infrastructure, EDUCATE (Education Department Utility for Communications, Applications, and Technology Environment) was the first to move away from an IT environment owned by the government and operated by contractors, to one that’s owned and operated as a service by the contractor--in this case, Perot Systems.

      Perot won the contract bid in 2007 for $400 million, and has since provided comprehensive managed service solutions to the Department of Education. Now, however, the Department is ready for a change.

      Jason Gray, Chief Information Officer for the Education Department, cited the numerous changes made to IT technologies and capabilities since EDUCATE was implemented in 2007 (when he announced that there was interest for new proposals), as well as changes to goals shared the Department of Education.

      The objectives of the new infrastructure, dubbed PIVOT, or the Portfolio of Integrated Value-Oriented Technology, were described in a request for information (RFI) distributed to potential providers. The new infrastructure should, according to the RFI, encourage innovation, optimize the cost to benefit ratio, and show flexibility to make integrating changes in requirements simple. As part of the new initiative, each aspect of the infrastructure (like oversight, hosting data, printing, network services, technical management and integration, and mobile services) will have its own contract written up.

      Most of all, however, the Department of Education wants to focus on the mobile capabilities of their solutions. The RFI predicts a shift from a permanently established office space to an increased utilization of teleworking and hoteling (where workers gather temporarily in a shared space) as a result of the National Strategy for Reducing the Federal Government’s Real Estate Footprint. This would cause a shift of over 6,200 users away from an office environment, certainly achieving the objective of the National Strategy.

      Migrating technology into a new workspace or implementing mobile and teleworking solutions clearly takes considerable planning, and in such cases, it’s best to consult with an expert in the field. Amaxx has the experience necessary to ensure that your IT initiative goes off without a hitch, and that your solutions are optimized for maximum performance. Give Amaxx a call today to see what we can do for your solutions for a lot less than $400 million.

      Learn More

      Know someone who would benefit from Amaxx? Let us know!

      Latest Blog Entry

      Hackers have the ability to cripple systems and steal important (or sensitive) data, and if you’re not careful your business could become their latest victim. Here are five ways that you can make it more difficult for hackers to infiltrate your systems and steal your data. ...

      Latest News

      Amaxx launches new website!

      Amaxx is proud to announce the launch of our new website at www.amaxx.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login

      Remember me