The Miller Group

Supporting St. Louis small businesses since 1985, The Miller Group is a full-service information tec Louis' premier, full-service IT providers.

We specialize in eliminating your business's downtime due to IT errors. The Miller Group is a family owned and operated technology company providing fully managed services to small and medium sized businesses. From computers, servers and phones to hardware, networks and infrastructure, The Miller Group delivers complete service either in place of or along side your IT department. We approach our c

07/18/2024

Have you ever tried to access a website or online service - only to be denied access?

You may have experienced the effects of a Distributed Denial of Service (DDoS) attack.

These malicious attacks overload a website or network with a huge amount of traffic, causing it to crash and become unavailable to legitimate users.

DDoS attacks can have serious consequences for your company. Not only can they disrupt operations and result in loss of revenue, but they can also damage your reputation and erode customer trust.

How can you protect your business from these types of attacks? Here are a few tips:

โ€ข ๐—ฆ๐˜๐—ฎ๐˜† ๐—ถ๐—ป๐—ณ๐—ผ๐—ฟ๐—บ๐—ฒ๐—ฑ: keep up to date on the latest DDoS attack trends and techniques so you and your team can better prepare for potential threats.

โ€ข ๐—ฅ๐—ฒ๐—ด๐˜‚๐—น๐—ฎ๐—ฟ๐—น๐˜† ๐˜๐—ฒ๐˜€๐˜ ๐˜†๐—ผ๐˜‚๐—ฟ ๐—ฑ๐—ฒ๐—ณ๐—ฒ๐—ป๐˜€๐—ฒ๐˜€: conducting regular stress tests on your network can help identify potential vulnerabilities that attackers could exploit.

โ€ข ๐—œ๐—ป๐˜ƒ๐—ฒ๐˜€๐˜ ๐—ถ๐—ป ๐——๐——๐—ผ๐—ฆ ๐—ฝ๐—ฟ๐—ผ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป: consider investing in a DDoS protection service to mitigate the effects of an attack and keep your business running smoothly.

โ€ข ๐—›๐—ฎ๐˜ƒ๐—ฒ ๐—ฎ ๐—ฟ๐—ฒ๐˜€๐—ฝ๐—ผ๐—ป๐˜€๐—ฒ ๐—ฝ๐—น๐—ฎ๐—ป ๐—ถ๐—ป ๐—ฝ๐—น๐—ฎ๐—ฐ๐—ฒ: create a plan for how to respond to a DDoS attack, including who to contact and the steps to take to minimize the impact.

Don't let a DDoS attack bring down your business!

By implementing these proactive measures, you can better protect your company from the potentially devastating effects of a DDoS attack. And remember, it's always better to be prepared than caught off guard.

07/16/2024

Is your company running into frequent technology issues? Are you constantly struggling with outdated systems, slow response times, or security vulnerabilities?

If so, it may be time to consider an IT upgrade.

However, before making any major changes, there are some important questions that every business should ask themselves:

1. What is the purpose of the upgrade? Be clear on what your current technology limitations are and which specific areas need improvement. This will help determine what type of upgrade would be most beneficial.

2. What are the expected benefits? Clearly define what you hope to achieve with an upgrade, whether it's increased efficiency, better security, or improved customer experience.

3. What is the long-term cost? Consider not just the initial investment, but also ongoing costs such as maintenance, training, and potential upgrades in the future.

4. Are there any compatibility concerns? Ensure that the new technology will integrate seamlessly with your current systems and processes.

5. Have we consulted with IT experts? Don't make an IT decision in a vacuum - consult with experts who have experience and knowledge in the specific area you are looking to upgrade.

07/11/2024

Many of us know what to look out for when it comes to phishing scams. We're wary of suspicious links, urgent requests for sensitive information, and grammatical errors. ๐ŸŽฃ

However, there is a type of phishing attack that often goes unnoticed โ€“ conversation hijacking.

This type of attack involves hackers infiltrating ongoing email conversations between two or more parties and using this trust to their advantage.

So, one minute you could be discussing business with a trusted colleague, and the next, you could be unknowingly sharing sensitive information with a hacker posing as your contact.

Scary, right?

But there are steps you can take to protect your business from conversation-hijacking phishing attacks:

โœ… ๐—˜๐—ป๐—ฐ๐—ผ๐˜‚๐—ฟ๐—ฎ๐—ด๐—ฒ ๐—˜๐—บ๐—ฝ๐—น๐—ผ๐˜†๐—ฒ๐—ฒ๐˜€ ๐˜๐—ผ ๐—ค๐˜‚๐—ฒ๐˜€๐˜๐—ถ๐—ผ๐—ป ๐—จ๐—ป๐˜‚๐˜€๐˜‚๐—ฎ๐—น ๐—ฅ๐—ฒ๐—พ๐˜‚๐—ฒ๐˜€๐˜๐˜€: Remind your employees to always question any unusual requests, even if they seem to come from a familiar contact. Encourage an open-door policy for reporting suspicious activity.

โœ… ๐—จ๐˜€๐—ฒ ๐— ๐˜‚๐—น๐˜๐—ถ-๐—™๐—ฎ๐—ฐ๐˜๐—ผ๐—ฟ ๐—”๐˜‚๐˜๐—ต๐—ฒ๐—ป๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: Require employees to use multi-factor authentication for all business accounts. This adds an extra layer of security and makes it harder for hackers to gain access.

โœ… ๐— ๐—ผ๐—ป๐—ถ๐˜๐—ผ๐—ฟ ๐—˜๐—บ๐—ฎ๐—ถ๐—น ๐—”๐—ฐ๐—ฐ๐—ผ๐˜‚๐—ป๐˜๐˜€: Keep a close eye on email accounts and watch for any unusual activity or login attempts. If anything seems out of the ordinary, investigate further.

Is your company taking steps to protect itself against conversation hijacking?

07/10/2024

๐—–๐—ฒ๐—น๐—ฒ๐—ฏ๐—ฟ๐—ฎ๐˜๐—ถ๐—ป๐—ด ๐—˜๐˜…๐—ฐ๐—ฒ๐—น๐—น๐—ฒ๐—ป๐—ฐ๐—ฒ: ๐—ง๐—ต๐—ฒ ๐— ๐—ถ๐—น๐—น๐—ฒ๐—ฟ ๐—š๐—ฟ๐—ผ๐˜‚๐—ฝ ๐—ฅ๐—ฒ๐—ฐ๐—ผ๐—ด๐—ป๐—ถ๐˜‡๐—ฒ๐—ฑ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐Ÿฎ๐Ÿถ๐Ÿฎ๐Ÿฐ ๐—–๐—ต๐—ฎ๐—ป๐—ป๐—ฒ๐—น ๐—™๐˜‚๐˜๐˜‚๐—ฟ๐—ฒ๐˜€ ๐— ๐—ฆ๐—ฃ ๐Ÿฑ๐Ÿถ๐Ÿญ! ๐ŸŒŸ

Weโ€™re thrilled that The Miller Group has secured a coveted spot on the prestigious 2024 Channel Futures MSP 501 list! ๐ŸŽ‰ This recognition underscores our commitment to innovation, technical prowess, and strategic partnerships within the global technology landscape.

"๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜ฉ๐˜ฐ๐˜ฏ๐˜ฐ๐˜ณ ๐˜ณ๐˜ฆ๐˜ง๐˜ญ๐˜ฆ๐˜ค๐˜ต๐˜ด ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฉ๐˜ข๐˜ณ๐˜ฅ ๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฅ๐˜ฆ๐˜ฅ๐˜ช๐˜ค๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฐ๐˜ง ๐˜ฐ๐˜ถ๐˜ณ ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ณ๐˜ฆ ๐˜ต๐˜ฆ๐˜ข๐˜ฎ. ๐˜–๐˜ถ๐˜ณ ๐˜ง๐˜ฐ๐˜ค๐˜ถ๐˜ด ๐˜ฉ๐˜ข๐˜ด ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜บ๐˜ด ๐˜ฃ๐˜ฆ๐˜ฆ๐˜ฏ ๐˜ฐ๐˜ฏ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ท๐˜ช๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ฐ๐˜ถ๐˜ณ ๐˜ค๐˜ญ๐˜ช๐˜ฆ๐˜ฏ๐˜ต๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ช๐˜ฏ๐˜ฏ๐˜ฐ๐˜ท๐˜ข๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜ด๐˜ฐ๐˜ญ๐˜ถ๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฆ๐˜น๐˜ค๐˜ฆ๐˜ฑ๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ ๐˜ด๐˜ฆ๐˜ณ๐˜ท๐˜ช๐˜ค๐˜ฆ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ต๐˜ฉ๐˜ช๐˜ด ๐˜ณ๐˜ฆ๐˜ค๐˜ฐ๐˜จ๐˜ฏ๐˜ช๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ถ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ค๐˜ฐ๐˜ณ๐˜ฆ๐˜ด ๐˜ฐ๐˜ถ๐˜ณ ๐˜ค๐˜ฐ๐˜ฎ๐˜ฎ๐˜ช๐˜ต๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต ๐˜ต๐˜ฐ ๐˜ต๐˜ฉ๐˜ฐ๐˜ด๐˜ฆ ๐˜จ๐˜ฐ๐˜ข๐˜ญ๐˜ด.โ€ -๐—•๐—ฟ๐—ฎ๐—ป๐—ฑ๐—ผ๐—ป ๐— ๐—ถ๐—น๐—น๐—ฒ๐—ฟ, ๐—–๐—˜๐—ข ๐—ผ๐—ณ ๐—ง๐—ต๐—ฒ ๐— ๐—ถ๐—น๐—น๐—ฒ๐—ฟ ๐—š๐—ฟ๐—ผ๐˜‚๐—ฝ

The Channel Futures MSP 501 list is a valuable resource for the managed services community, offering insights into the metrics and performance data that make the MSP industry unique. With the development of its new research branch, Channel Futures will use the data from MSP 501 applicants to create in-depth reports, market intelligence insights, robust data sets, and trend reports, further benefiting the industry.

"๐˜Š๐˜ฐ๐˜ฎ๐˜ฑ๐˜ข๐˜ฏ๐˜ช๐˜ฆ๐˜ด ๐˜ญ๐˜ช๐˜ฌ๐˜ฆ ๐˜›๐˜ฉ๐˜ฆ ๐˜”๐˜ช๐˜ญ๐˜ญ๐˜ฆ๐˜ณ ๐˜Ž๐˜ณ๐˜ฐ๐˜ถ๐˜ฑ ๐˜ฆ๐˜น๐˜ฆ๐˜ฎ๐˜ฑ๐˜ญ๐˜ช๐˜ง๐˜บ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฆ๐˜น๐˜ค๐˜ฆ๐˜ญ๐˜ญ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ช๐˜ฏ๐˜ฏ๐˜ฐ๐˜ท๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ต๐˜ฉ๐˜ฆ ๐˜”๐˜š๐˜— 501 ๐˜ญ๐˜ช๐˜ด๐˜ต ๐˜ณ๐˜ฆ๐˜ฑ๐˜ณ๐˜ฆ๐˜ด๐˜ฆ๐˜ฏ๐˜ต๐˜ด. ๐˜ž๐˜ฆ ๐˜ญ๐˜ฐ๐˜ฐ๐˜ฌ ๐˜ง๐˜ฐ๐˜ณ๐˜ธ๐˜ข๐˜ณ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ฆ๐˜ฏ๐˜จ๐˜ข๐˜จ๐˜ช๐˜ฏ๐˜จ ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ต๐˜ฉ๐˜ฆ๐˜ฎ ๐˜ต๐˜ฉ๐˜ณ๐˜ฐ๐˜ถ๐˜จ๐˜ฉ๐˜ฐ๐˜ถ๐˜ต ๐˜ต๐˜ฉ๐˜ฆ ๐˜บ๐˜ฆ๐˜ข๐˜ณ ๐˜ต๐˜ฐ ๐˜จ๐˜ข๐˜ช๐˜ฏ ๐˜ช๐˜ฏ๐˜ด๐˜ช๐˜จ๐˜ฉ๐˜ต๐˜ด ๐˜ช๐˜ฏ๐˜ต๐˜ฐ ๐˜ช๐˜ฏ๐˜ฅ๐˜ถ๐˜ด๐˜ต๐˜ณ๐˜บ ๐˜ต๐˜ณ๐˜ฆ๐˜ฏ๐˜ฅ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฃ๐˜ฆ๐˜ด๐˜ต ๐˜ฑ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ฆ๐˜ด." -๐——๐—ฎ๐˜ƒ๐—ถ๐—ฑ ๐—ฅ๐—ฎ๐—ณ๐—ณ๐—ผ, ๐— ๐—ฆ๐—ฃ ๐—˜๐—ฑ๐—ถ๐˜๐—ผ๐—ฟ ๐—ฎ๐˜ ๐—–๐—ต๐—ฎ๐—ป๐—ป๐—ฒ๐—น ๐—™๐˜‚๐˜๐˜‚๐—ฟ๐—ฒ๐˜€

This achievement would not have been possible without our team's hard work and dedication. We are proud to continue delivering exceptional service and innovative solutions to our clients.

For more information and services, please visit https://www.themillergroup.com

07/09/2024

The dark web is like the ocean's depths - vast, mysterious, and full of hidden dangers.

For businesses, the dark web poses a significant threat to their sensitive information, finances, and reputation.

Here are five of the most common threats on the dark web:

๐Ÿญ. ๐—ฆ๐˜๐—ผ๐—น๐—ฒ๐—ป ๐—–๐—ฟ๐—ฒ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—ฃ๐—ฒ๐—ฟ๐˜€๐—ผ๐—ป๐—ฎ๐—น ๐—œ๐—ป๐—ณ๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: Businesses face the risk of their employees' credentials, customer data, or financial information being sold on the dark web. These can be used for identity theft, and other malicious activities.

๐Ÿฎ. ๐—ฅ๐—ฎ๐—ป๐˜€๐—ผ๐—บ๐˜„๐—ฎ๐—ฟ๐—ฒ-๐—ฎ๐˜€-๐—ฎ-๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ (๐—ฅ๐—ฎ๐—ฎ๐—ฆ): One of the most prevalent threats on the dark web is RaaS, where hackers can purchase ransomware to launch attacks on businesses without advanced coding skills.

๐Ÿฏ. ๐—œ๐—ป๐˜€๐—ถ๐—ฑ๐—ฒ๐—ฟ ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—–๐—ผ๐—ฟ๐—ฝ๐—ผ๐—ฟ๐—ฎ๐˜๐—ฒ ๐—˜๐˜€๐—ฝ๐—ถ๐—ผ๐—ป๐—ฎ๐—ด๐—ฒ: The dark web also serves as a platform for disgruntled employees to leak confidential information, or hire other hackers to target their company.

๐Ÿฐ. ๐— ๐—ฎ๐—น๐˜„๐—ฎ๐—ฟ๐—ฒ-๐—ฎ๐˜€-๐—ฎ-๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ (๐— ๐—ฎ๐—ฎ๐—ฆ): Similar to RaaS, this service allows individuals to purchase pre-made malware and launch attacks on businesses without advanced technical skills.

๐Ÿฑ. ๐—ญ๐—ฒ๐—ฟ๐—ผ-๐——๐—ฎ๐˜† ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐˜€: The dark web is a hotbed for purchasing and selling zero-day exploits. These vulnerabilities can be used to exploit systems and software that have not yet been discovered or patched.

Partnering with cybersecurity experts, implementing robust security measures, and staying vigilant are key to protecting against these threats.

07/04/2024

Happy 4th of July, everyone ๐ŸŽ‰๐ŸŽ‡

We hope you have a safe and enjoyable day filled with celebrations, good food, and fireworks!

How are you celebrating today?

06/25/2024

Remote and hybrid workplaces have become the norm for many businesses. Between less commute time, reduced costs, and increased flexibility, it's easy to see why this trend is gaining popularity.
But where we see benefits, cybercriminals see opportunity.

They are counting on employees being more relaxed and less vigilant while working remotely. After all, it's only natural to feel more comfortable outside of a traditional office setting.

So, how can businesses protect themselves from the risks associated with remote and hybrid work? Here are some steps they can take:

โ€ข Establish a clear remote work policy
โ€ข Invest in employee education
โ€ข Implement strict access controls
โ€ข Utilize strong passwords and multi-factor authentication
โ€ข Ensure secure remote connections

Does your business operate under a remote or hybrid work model?

If so, what steps have you taken to address the security risks?

06/20/2024

We talk a lot about the importance of cybersecurity training, but if no one is paying attention, is it really effective?

Research shows that traditional cybersecurity training methods (think: long lectures and boring videos) are not as engaging or memorable as we'd like them to be.

So, how can businesses make sure their employees are fully absorbing these important lessons?
Here are a few strategies to consider:

โ€ข Use interactive and gamified learning techniques
โ€ข Make it relevant to their daily work
โ€ข Incorporate real-world examples and scenarios
โ€ข Encourage active participation through quizzes or exercises
โ€ข Provide ongoing training and refreshers to reinforce learning

By using these tactics, businesses can create a more engaging and effective cybersecurity training program for their employees. In turn, this can help prevent costly data breaches and protect sensitive information. It's a win-win!

06/18/2024

According to Google, 52% of people reuse the same password for multiple accounts. While it may be convenient, this practice puts businesses at risk of credential-stuffing attacks.

But what exactly is credential stuffing, and how can businesses protect against it?

In simple terms, credential stuffing is when hackers use stolen credentials (usually obtained from dark web marketplaces) to gain access to multiple accounts.

It's like if you had the same key holder for your house, car, and office - if someone gets hold of that key chain, they have access to everything.

So, what can businesses do to protect against credential stuffing?

โ€ข Educate employees on the dangers of reusing passwords and encourage them to use unique ones for every account.
โ€ข Regularly monitor employee accounts for any unusual activity.
โ€ข Consider using a password manager to generate and securely store unique passwords for each account.
โ€ข Utilize web application firewalls (WAF) to monitor and block suspicious login attempts.

Remember, the more layers of protection you have in place, the less likely it is for hackers to successfully gain access through credential stuffing. Stay vigilant and prioritize security to protect your business and its sensitive data. ๐Ÿ”’

06/16/2024

To all the fathers and father figures out there, we want to wish you a very !

How will you be celebrating this special day? Share your plans or your favorite memories with us in the comments below!

06/13/2024

Many small business owners mistakenly believe cloud services are a silver bullet - that once they migrate their data to the cloud, all their IT woes will disappear. ๐ŸŒฅ๏ธ

However, this is not always the case.

While cloud services offer numerous benefits, such as cost savings, scalability, and accessibility - they also require proper management and maintenance.

This is where managed service providers (MSPs) come in. They act as a partner for businesses, handling the day-to-day management of their cloud services to ensure smooth operations.

But what exactly is the role of MSPs in cloud services? Here are some key responsibilities they take on:

โ€ข Setting up and configuring a business's cloud infrastructure, including choosing the right service provider and managing user access.

โ€ข Monitoring and troubleshooting any issues that arise with the cloud services, such as downtime or security breaches.

โ€ข Implementing updates and patches to ensure the cloud services are running efficiently and securely.

โ€ข Providing ongoing support and maintenance, such as data backups and disaster recovery plans.

06/06/2024

Zero-day exploits can have devastating consequences for businesses.

These types of vulnerabilities target unknown weaknesses in software, making them particularly dangerous because there is no existing defense or patch.

As a result, hackers can easily gain access to systems without being detected.

So, how can businesses protect themselves against these types of attacks?

Here are some key strategies:

โ€ข Stay informed about the latest vulnerabilities and patches.
โ€ข Implement strong network security measures such as firewalls and intrusion detection systems.
โ€ข Regularly update and patch all software and hardware.
โ€ข Consider using intrusion prevention systems (IPS) for an added layer of protection.

By staying vigilant and implementing these strategies, businesses can greatly reduce their risk of falling victim to a zero-day exploit.

06/05/2024

In light of the recent data breach at Dell, it's crucial for businesses to take note and learn from this incident.
Here are some key takeaways:

1. Cybersecurity should be a top priority: Dell's data breach serves as a reminder that no business is immune to cyber-attacks. It's important for companies to invest in robust cybersecurity measures to protect their sensitive information and customer data.

2. Transparency is key: In the aftermath of the breach, Dell was quick to acknowledge the incident and inform their customers about the potential risks. By being transparent and proactive in their communication, Dell was able to build trust and credibility with their stakeholders.

3. Regular security audits are essential: Regular security audits can help businesses identify vulnerabilities in their systems and take necessary steps to address them. By conducting frequent security assessments, companies can better protect themselves against potential cyber threats.

4. Invest in employee training: A key factor in preventing data breaches is educating employees about cybersecurity best practices. By providing training and resources to staff members, businesses can empower them to recognize and respond to potential security threats.

The Dell incident serves as a valuable lesson for businesses on the importance of cybersecurity, transparency, and proactive risk management. It's essential for companies to continuously evaluate and strengthen their security measures to safeguard their data and protect their brand reputation.

For more IT Support, please schedule an appointment with us at www.themillergroup.com now

The Miller Group Ranked on Channel Futures 2023 MSP 501 07/05/2023

We are honored to be included on this elite list of global companies. A huge shout out to our clients and our dedicated team!

The Miller Group Ranked on Channel Futures 2023 MSP 501 Discover The Miller Group Ranked on Channel Futures 2023 MSP 501 with The Miller Group - your reliable IT support & services provider in St. Louis.

06/16/2023

Please help us welcome Caroline Giuseffi to TMG! Caroline will be on our front lines coordinating our IT support services. We're thrilled to have her on our team.

Support Technician - Level 1 12/05/2022

Join our Team!!!!

We are looking for a new Level 1 Support Technician responsible for assisting our valued clients.

To learn more about this exciting career opportunity, visit our website: https://themillergroup.com/level1-support-technician/

Support Technician - Level 1 The Miller Group is looking for a service engineer who will handle service requests and resolve or escalate service requests.

09/13/2022

We are in Washington D.C. learning all the latest technology to better serve our clients.

After Apple's iPhone 14 launch event, a few things to consider 09/08/2022

After Apple's iPhone 14 launch event, a few things to consider http://dlvr.it/SXzLGX

After Apple's iPhone 14 launch event, a few things to consider Though enterprise considerations from Apple's big show were a little thin, what Apple announced โ€” and the strategies it's pursuing โ€” would be good for any smart business to heed.

Slack offers new DocuSign integration to streamline e-signature process 09/07/2022

Slack offers new DocuSign integration to streamline e-signature process http://dlvr.it/SXxBHs

Slack offers new DocuSign integration to streamline e-signature process The newly launched DocuSign CLM for Slack allows users to navigate the entire agreement lifecycle directly within Slack

How many jobs are available in technology? 09/06/2022

The latest CompTIA jobs report found that the unemployment rate for the tech industry jumped in August, with the majority of new job postings for emerging tech positions. Meanwhile, remote-work positions have become a permanent part of the landscape. http://dlvr.it/SXsG3J

How many jobs are available in technology? The latest CompTIA jobs report found that the unemployment rate for the tech industry jumped in August, with the majority of new job postings for emerging tech positions. Meanwhile, remote-work positions have become a permanent part of the landscape.

Timeline photos 09/05/2022

Happy Labor Day, Everyone!

Apple pushes out emergency updates to address zero-day exploits 09/02/2022

Apple has encouraged users of older mobile and desktop devices to update their software ASAP, as a vulnerability could allow an attacker to take complete control of older Apple devices. http://dlvr.it/SXflF9

Apple pushes out emergency updates to address zero-day exploits Apple has encouraged users of older mobile and desktop devices to update their software ASAP, as a vulnerability could allow an attacker to take complete control of older Apple devices.

Cyberattack forces Wheat Ridge to close city hall 09/01/2022

A cyber attack hit Wheat Ridge, Colorado. http://dlvr.it/SXcCGP

Cyberattack forces Wheat Ridge to close city hall Many city services are unavailable, but the city said it has no reason to believe any personal employee, resident or business information has been exposed.

Here's How Long Your Wireless Carrier Holds on to Your Location Data 08/31/2022

Here's How Long Your Wireless Carrier Holds on to Your Location Data http://dlvr.it/SXXwkm

Here's How Long Your Wireless Carrier Holds on to Your Location Data AT&T keeps cell-site location information for up to five years; Verizon drops it after one.

Latest Microsoft 365 innovation enables hybrid work collaboration | Microsoft 365 Blog 08/30/2022

From intuitive sharing with OneDrive to driving prioritization with Viva Goalsโ€”hereโ€™s whatโ€™s new in Microsoft 365 http://dlvr.it/SXTjzS

Latest Microsoft 365 innovation enables hybrid work collaboration | Microsoft 365 Blog From enabling hybrid work to intuitive sharing experiences, Microsoft 365 products help organizations do more with less.

Ransomware Attacks are on the Rise 08/29/2022

Ransomware Attacks are on the Rise http://dlvr.it/SXQd8Q

Ransomware Attacks are on the Rise Lockbit is by far this summerโ€™s most prolific ransomware group, trailed by two offshoots of the Conti group.

Timeline photos 08/27/2022

A little laughter is good. Have a nice weekend, and remember to disconnect! - From your friendly neighborhood, IT Support & Cyber Security Company.

LastPass Hacked, But User Passwords Were Not Accessed 08/26/2022

LastPass Hacked, But User Passwords Were Not Accessed http://dlvr.it/SXGzCd

LastPass Hacked, But User Passwords Were Not Accessed Hackers stole 'portions of source code and some proprietary LastPass technical information.'

Timeline photos 08/25/2022

Popular graphics site, Canva, is down this morning. http://dlvr.it/SXD1fR

What excites you about Windows 11? Inquiring minds want to know.... 08/23/2022

What excites you about Windows 11? Inquiring minds want to know.... http://dlvr.it/SX6kfr

What excites you about Windows 11? Inquiring minds want to know.... With Windows 11 22H2 arriving soon, some users may be ready to make the jump from Windows 10. If so, I want to hear from you.

Want your business to be the top-listed Computer & Electronics Service in St. Louis?
Click here to claim your Sponsored Listing.

Our Story

The Miller Group has been providing comprehensive IT management services since 1985 with the primary focus on customer service. As your IT partner, we want to manage every aspect of your businessโ€™s technology. Our IT services are meant to be hassle-free so you can deal with running your business. We will handle managing your technology so that it is always reliable and running at peak performance.

Our goal is to be the one-stop-shop for all of your IT services and build a trusting relationship that will last for years to come. With over 400 clients across the Midwest, we provide varying levels of Managed IT Services, Backup & Data Recovery, IT Consulting, Cloud Migration & Management Services, Cyber Security, Secure Website Hosting & Development, and VoIP Phone Solutions for small to medium-size businesses.

Videos (show all)

2018 Year End Video
Water drama at TMG

Telephone

Address


1112 Westmark Drive
St. Louis, MO
63131

Opening Hours

Monday 7am - 5:30pm
Tuesday 7am - 5:30pm
Wednesday 7am - 5:30pm
Thursday 7am - 5:30pm
Friday 7am - 5:30pm

Other Computer Companies in St. Louis (show all)
Envision, LLC Envision, LLC
6 Cityplace Drive Ste 350
St. Louis, 63141

Envision yourself in a great career with the help of Envision, LLC!

GC3 GC3
St. Louis

and they said "nothing can be made out of nothing..."

Alliance Technologies, LLC Alliance Technologies, LLC
St. Louis

Alliance Technologies is committed to providing world-class Managed Services, Network Solutions, Sta

Paratech MSP Paratech MSP
St. Louis

IT Support, Managed Services Provider, Cloud Solutions Provider, VOIP, Backup & Data Recovery

PowerUp PC PowerUp PC
St. Louis

Welcome to PowerUp PC, a custom computer building company based around STL.

SchoolsTodaystl SchoolsTodaystl
Pending
St. Louis, 63021

We work with school districts to develop academic networking scheduling web applications.

Custom PC Builds Custom PC Builds
St. Louis

We build reliable Custom Computers for an affordable price shipped right to your door! The pricing of our PCs is based upon your budget and location. Visit us @ http://custompc-...

Plug Tech Plug Tech
8312 Page Avenue
St. Louis

๏ฟฝCertified Pre Owned.Shop Affordable iPhones,iPads,Android,AirPods,Macs,& more ๏ฟฝ with 1 yr warranty

FV Technology FV Technology
St. Louis

TECNOLOGรA EN TU HOGAR.

Rush Hour Performance Rush Hour Performance
1221 Locust Street #100
St. Louis, 63103

Manonight Computers Manonight Computers
2644 St Vincent Avenue
St. Louis, 63104

IS YOUR COMPUTER RUNNING S---L---O---W? Donโ€™t throw it away! - I can repair it and save you money.

HanuHigh Tech HanuHigh Tech
St. Louis