CrowdStrike global IT outage. Unrelated to Global IT.



Regarding the CrowdStrike global IT outage.

Please be informed that Global IT™ is a registered trademark of Global IT Communications, Inc. with the US Patent and Trademark Office, and we vigorously enforce the correct usage of our trademark.

While there has been confusion in the media regarding “Global IT™ outages,” we wish to clarify that neither Global IT™ nor any of our clients were affected by the recent CrowdStrike outage. Throughout this period, Global IT™ maintained uninterrupted operations.

According to reports, the recent CrowdStrike outage occurred due to a widespread disruption in its services, affecting customers’ ability to access and utilize their endpoint protection solutions. The outage reportedly stemmed from an update designed to target malicious system communication tools in cyber attacks, triggering a “logic error” resulting in an operating system crash on Windows systems (Mac and Linux users were unaffected). A logic error means a mistake has been made in coding and caused a bug that can cause the program to malfunction. The update was designed as a patch, meaning it was meant to improve the program rather than cause issues.

Global IT™ and OrangeISP.com maintained Cloud operations seamlessly without fault.

Global IT™ evaluated CrowdStrike as a potential vendor but did not select or recommend them due to specific technical considerations informed by our extensive 20+ years of experience in enterprise technical infrastructure and systems.

Global IT™ is a prominent privately held technology management firm specializing in MSP (Managed Services Provider), MSSP (Managed Security Services Provider), CSP (Cloud Services Provider), and other related services since 2004. Our service offerings are designed to support our clients’ technology needs effectively.

For further information about Global IT™ services or if you have any inquiries, please do not hesitate to contact us at info@globalit.com.

CEO Anthony (Tony) Williams Rare

https://info.globalit.com/wp-content/uploads/2024/07/tony-globali-it.jpg|https://info.globalit.com/wp-content/uploads/2024/07/CrowdStrike.png|https://info.globalit.com/wp-content/uploads/2024/07/Global-IT-with-trademark.png|https://info.globalit.com/wp-content/uploads/2024/07/CrowdStrike2.png Case Studies

How Much Does Managed IT Cost in Los Angeles?

Many companies in Los Angeles use managed IT to improve productivity, protect their valuable data, and stabilize their costs.

Yet, what are those costs exactly? How much should a business in Los Angeles expect to pay for managed IT support? Let’s explore that question.

First Things First: The Absolute Essentials

Before we answer the question “how much should a business in Los Angeles expect to pay for managed IT support”, we need to delineate the essentials. Here’s what you need to look for.

  1. 24/7 Service– An experienced managed IT provider will answer phone calls 24/7. That way they can deal with emergencies like internet outages, malware infections, and data loss at any time.
  2. Vendor Certifications- A managed IT company is only as good as its techs. Look for technicians that have Cisco, Microsoft, and C++ experience. Additionally, they should know Quickbooks and a wide variety of IT tricks.
  3. Errors and Omissions Insurance- Once in a blue moon, managed IT companies make a mistake and cause serious financial damage to a company. This usually happens through data loss or equipment damage. Errors and omissions insurance ensures your company will be compensated if that happens. Don’t hire a managed IT firm that doesn’t have it.
  4. On-Site Support- Many companies don’t include on-site support as part of their monthly subscription. Yet, on-site support is a necessity sooner or later. Find out how many on-site hours are included each month in your subscription. Also, ask how much they charge after you’ve surpassed that limit.

How Much Does Break-Fix Tech Support Cost in Los Angeles?

IT firms and businesses are moving away from break-fix because it’s expensive for both sides. When a company manages your IT, they can prevent problems before they happen.

Break-Fix tech support costs $125 to $225 an hour in Los Angeles. Most companies have a 1.5-hour to 2-hour minimum. That minimum may vary depending on the managed IT firm’s proximity to your business. For example, some Los Angeles IT firms have lower minimums for businesses in the same city.

How Much Does Managed IT Cost in Los Angeles?

Managed IT has a fixed monthly cost. That cost depends on how many computers/devices/workstations your business has. The more computers you have, the more you pay. Here’s what you can expect to pay a managed IT firm with 24/7 service and on-site hours included in their monthly subscription.

Small Business: 4-9 Computers- $450.00 to $1,150.00

Medium Business: 10-19 Computers- $950.00 to $1,950.00

Medium Plus Business: 20-49 Computers- $1,550.00 to $4,650.00

Large Business: 50-199 Computers- $4,650.00 to $16,550.00

Enterprise: 200+ Computers- $16,550.00 and Up

Get Peace of Mind With Global IT

If you’re looking for a competitively priced managed IT firm in Los Angeles with proven experience, look no further than Global IT.

We’ve has been serving customers since the year 2000 and we have 100% 5-star reviews on Yelp. Also, we include on-site support in our monthly tech support containers.

managed IT, Los Angeles, cost, price, Global IT

https://info.globalit.com/wp-content/uploads/2019/01/dollar-1362244_960_720.jpg

https://info.globalit.com/wp-content/uploads/2019/01/dollar-1362244_960_720.jpg

Case Studies

In the City of Industry, CA? 7 Reasons Your Business Needs a Tech Support Container

Global IT provides tech support containers to many businesses in the City of Industry, CA. A tech support container is not a physical container. Instead, a tech support container is a monthly service package that CONTAINS all the tech support help your company needs. The City of Industry is a flourishing city that has many manufacturing and distribution companies. It’s home to over 2,500 companies that would benefit from a IT help desk in the City of Industry. Many of these companies are too large to manage their own tech support but too small to hire a full IT/tech support team. Here are 7 benefits a tech support container or managed IT packaged should offer.

  1. Unlimited Remote Support- A managed IT package (tech support container) should offer 24/7 remote support in case something goes wrong. When your internet goes down, when you get a computer virus, when you lose your data, you need immediate help. That’s the peace of mind a tech support container provides.
  2. Onsite Support- Some computer problems can only be fixed in-person. Your managed IT package should include a certain number of hours for onsite support. Also, additional hours should be offered at a discounted rate.
  3. Web Hosting- A managed IT package will include your internet access. As a rule, business internet is much faster and has more uptime than the internet for consumers.
  4. Email Hosting- Most businesses don’t use Google or Yahoo for their email. Using a domain name is more professional and reputable. However, that means your email must go a different inbox like Roundcube. A tech support container sets up and manages your webmail software so you can easily access your email anytime.
  5. Monitor Network Health- Actively monitoring your network health helps prevent downtime and disruptions on your website. A good managed IT services company monitors your key performance indicators so numbers outside normal ranges can be investigated and dealt with if necessary.
  6. 3rd Party Vendor Discounts- A managed IT service provider often has exclusive discounts with 3rd party vendors like Microsoft. They buy licenses in bulk, saving them thousands of dollars. Software like Microsoft Office is much cheaper via a managed IT company as opposed to buying it at the store or online.
  7. Long and Short Term Planning- The City of Industry is home to many B2C sellers that export consumer goods from East Asia. Shops like these often get surges of orders in December during the holiday season. A prudent managed IT company will increase your bandwidth during that time so your customers don’t experience a slowdown on your website.

Global IT, tech support containers for city of industry CA

Global IT Is a Tech Support Company Next to City of Industry With 5 Stars on Yelp

Tech support containers allow your business to focus on its core strength.  If you’re looking for tech support in the City of Industry, consider Global IT. We have 100% 5-star ratings on Yelp and we’re the largest managed IT provider in the area around the City of Industry. Enter your info for a free consultation with Global IT in Whittier. Or call us at 562-698-2500.

Need_help_Contact_us

https://info.globalit.com/wp-content/uploads/2018/07/image-e1531423648500.jpg

https://info.globalit.com/wp-content/uploads/2018/07/image-e1531423648500.jpg|https://info.globalit.com/wp-content/uploads/2018/07/rsz_img_20180612_205305897_ll_002-2.jpg

Case Studies

Why Businesses in the City of Commerce, CA Should Outsource Tech Support

Business in Commerce, California, should outsource tech support if they want to grow. Commerce, California is a very business-friendly city with huge employers like Commerce Casino, Parsec, and Smart and Final. However, it also has many smaller companies who would benefit immensely from locally managed IT. Here are five reasons why outsourcing business tech support is great for businesses in places like the City of Commerce.

5 Reasons Why Business in Commerce, CA Should Outsource Tech Support

  1. Reduce Anxiety- Disaster management is worrisome. Losing data has a financial and emotional toll. With a skilled and experienced IT provider, you know your information is safe. You also know it can be recovered if there’s an emergency.
  2. Stay Focused on Your Core Business- There are lots of manufacturing and distribution companies in the City of Commerce, CA. These companies specialize in supply chain management, logistics, and shipping. Yet, IT and tech support often fall outside their skillset. Outsourcing tech support allows your employees to stay focused on what their good at, what they’re paid to do.
  3. Protect Yourself From Hackers- In 2018, the Los Angeles Social Services website was hacked and 33,000 social security numbers were exposed. Disasters happen, even to large government agencies. A tech support company will safeguard your business against hackers and bad actors.
  4. Save Money– Training an in-house IT company is expensive. In fact, the most basic tech support specialists in the United States earn $46,420 annually. System analysts earn upwards of $80,000 a year. Outsourcing tech support to a company saves a lot of money. Also, it allows you to get efficient tech support quickly. A new tech support specialist would need many years of experience before he could even dream of matching the skill of a dedicated tech support team. Many businesses in the City of Commerce aren’t large enough (like Amazon or U.S Bank) where it makes sense to bring on full-time I.T. professionals.
  5. Keep an Uninterrupted Flow of Service- It’s a huge annoyance when your website goes down or when you don’t have internet access. Even small disruptions can cost business thousands of dollars worth of productivity. When you outsource your tech support, you get those problems fixed immediately. A 24/7 dependable help desk in the City of Commerce is worth its weight in gold.

global it, tech support, city of commerce

Global IT Is a Tech Support Company Near Commerce, CA With 5 Stars on Yelp

Outsourcing tech support allows your business to focus on what matters.  If you’re looking for tech support in the City of Commerce CA, consider Global IT. We have 100% 5-star ratings on Yelp and we’re located in Whittier, which is very close to Commerce, California. Also, we provide 24/7 service, and all our techs are certified. Click the button and enter your info for a free consultation. Or call us at 562-698-2500.

Need_help_Contact_us

https://info.globalit.com/wp-content/uploads/2018/07/Commerce_Casino.jpg

https://info.globalit.com/wp-content/uploads/2018/07/Commerce_Casino.jpg|https://info.globalit.com/wp-content/uploads/2018/07/map_of_City_of_Commerce_city_ca.jpg|https://info.globalit.com/wp-content/uploads/2018/07/rsz_img_20180612_205305897_ll_002.jpg|https://info.globalit.com/wp-content/uploads/2018/07/rsz_img_20180612_205305897_ll_002-1.jpg

Case Studies

What You Need to Know About Ransomware

If you have never heard of or experienced ransomware, then consider yourself lucky. But as more instances of ransomware are reported, that is not the kind of luck you want to take for granted. In this age of growing cybercrimes and online terrorism, it is important that everyone know what ransomware is and how to fight it.

What Is Ransomware?

The simple answer to defining ransomware is that it is a virus that takes hold of your computer and demands payment to a criminal organization to get the password that will release the virus. This affects personal and corporate computers, and it has become a big business for the criminal world. It is estimated that cyber-ransoms will become a billion dollar industry in 2016, and that only includes the paid ransoms. That figure does not include the costs for repairing the computers or recovering the information.

Once ransomware is downloaded, you will get a message telling you that your computer has been locked and you will be told that you need to take some kind of action to pay the ransom. The consequences of not paying include having all of your data erased, or permanently locking up your computer.

The more complicated description of ransomware is that it preys on your more vulnerable software applications and encrypts your computer. Normally, encryption is used to protect your data. But in this case, it locks you out of your computer and requires a password that only the criminal knows. When you pay the ransom, you hope to get the password that will open up your system. In some cases, the password is not provided after the ransom has been paid.

How To Combat Ransomware

In corporate settings, ransomware usually arrives in an employee’s email account as what looks like a safe and secure attachment. But when the attachment is open, the ransomware is loaded and it may start to move its way through the rest of the network.

In any setting, email is the most common way that ransomware gets loaded onto a computer. The second most common way is clicking on an infected website and having it loaded directly onto your computer. As frustrating as these can be, these delivery methods give us clues on how to combat these attacks.

Avoiding Ransomware

Never open an email attachment from a sender you do not recognize. Many of these criminals try to disguise their emails as being from legitimate banks or communications providers, but you should never fall for it. One way to tell if an email is from your bank is to hover your mouse pointer over any link in the email and read the associated link at the bottom of the browser. If the link does not come from your bank, then the email is a phishing email that is looking for victims.

Good antivirus software can scan your received emails and warn you against websites that are infected. You should always have good antivirus operating on your computer, and you should keep your antivirus updated constantly. Corporate IT directors should keep their firewall software up to date, and have a policy in place that prohibits employees from opening email
attachments.

 

Make sure you look over the data in the email carefully. If you are not familiar with the vendor or the prospective client, call the phone number listed in the email. Here is an example of a fraudulent company that looks legitimate. If you look closely, you can see that there are (3) s’ in the email address dave@bluegrassscontracting.com. This is easy to miss.

Corporate and personal users should always have their computers backed-up to a resource that is not online. For example, personal users can get a large capacity USB drive and back their computers up to that drive every Friday. Corporate users can utilize offline back-up systems that

are constantly updated with any changes to the network in case of an attack.

 

What To Do If You Have Been Attacked

If you open an attachment in your corporate email account and you get the ransomware warning page, then contact your manager immediately. If your manager is not available, then contact the IT manager directly to alert the IT group to the problem.

If you get ransomware on your personal computer, then you should call a computer support professional immediately. Do not try to take care of the problem yourself because it could
become worse.

 

Ransomware is just one of the growing threats that honest Internet users face every day. By practicing safe computer use habits, you can reduce your chances of getting attacked and have yourself covered in case you need to have your hard drive reloaded.

 

Case Studies

How to Create Exchange Email Forward

How to Create Exchange Email Forward

Note: Before you begin please ensure you are not using Google Chrome. Chrome is not compatible with this feature.
1. Click on the “Settings icon”
a. Click’ options

2. Go to “Organize email”
a. Click’ on plus sign

01

 

 

 

 

 

 

 

b. Select “create new rule for arriving messages…”

02

 

 

 

 

 

 

 

3.Create a name for your forward i.e. (Email Forward)

a. Click drop down menu under “when the messages arrives” Select “Apply to all messages”

03

 

 

 

 

 

 

 

 

 

4. Then click “More Options”

05

 

 

 

 

 

 

 

 

 

5. Click on drop down “do the following” the click “Forward, redirect, or send” than select “Forward message to”

06

 

 

 

 

 

 

 

 

 

 

 

6. Then you will need to select the person you would like to forward your emails to. Click “add” then click “ok”

07

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

7. The name of the recipient will appear next to the red arrow, ensure it is correct then click “save”

08

 

 

 

 

 

 

 

 

 

 

8. When you receive this the following warning click “yes”

09

 

 

 

 

 

 

 

 

 

 

9. You will also receive this pop up message. Check the box and click “ok”

10

 

 

 

 

 

 

 

 

 

Once you have completed these steps the forward should take effect instantly. I would suggest testing the forward to ensure it was set up correctly. If you would like to disable the forward you will need to uncheck the box next to the forward as shown below.

disable forward

https://info.globalit.com/wp-content/uploads/2016/06/03.png|https://info.globalit.com/wp-content/uploads/2016/06/05.png|https://info.globalit.com/wp-content/uploads/2016/06/06.png|https://info.globalit.com/wp-content/uploads/2016/06/07.png|https://info.globalit.com/wp-content/uploads/2016/06/08.png|https://info.globalit.com/wp-content/uploads/2016/06/09.png|https://info.globalit.com/wp-content/uploads/2016/06/10.png|https://info.globalit.com/wp-content/uploads/2016/06/01.png|https://info.globalit.com/wp-content/uploads/2016/06/02.png|https://info.globalit.com/wp-content/uploads/2016/06/disable-forward.png

Case Studies

Cybersecurity, Encryption and Congress

cybersecurityWhat would you do if the government said that the contractor who built your home must have a spare set of keys to the home, and there must be a door built on your home that only the contractor could access? Would you feel safe? How would you feel knowing that law enforcement could secretly enter your home any time it wanted simply by serving a warrant on the contractor who built your home?

When you put security in general terms such as the ones above, it sounds silly to mandate that contractors have a key to every home they have built. But in the wake of the iPhone debacle between the F.B.I. and Apple, a new bill in being introduced in Congress is trying to force technology manufacturers to make sure that your data is available to law enforcement, and anyone else who can get a copy of the key to your smartphone’s front door.

This Did Not Start In San Bernardino, California

san_bernardino_shootingThe terrorist attacks in late 2015 in San Bernardino, California brought the issue of encryption to the forefront because of the very public battle between Apple and the F.B.I. According to the New York Times, government law authorities made 4,000 requests to access information on 16,000 phones in the second half of 2015. The reason the San Bernardino case became so popular is because the government deemed the incident an act of terrorism, and fighting terrorism is a prime concern in the United States.

Under normal circumstances, federal law mandates that technology companies provide information for investigations unless the company feels that providing that information would be harmful in some way. Apple argued that being asked to bypass its own encryption would weaken the security it offers its customers, and that sparked a battle that is still raging.

The Secure Data Act Versus The Compliance With Court Orders Act Of 2016

In 2015, long before any battles over encryption in the media, Senator Ron Wyden and Representative Zoe Lofgren introduced the Secure Data Act to Congress. In a nutshell, the Secure Data Act says that manufacturers cannot be told by any government agency to weaken the security of their products to allow investigators to access encrypted data. The bill is still in draft form in both houses, but it has gained a great deal of support since the battle between Apple and the F.B.I. over San Bernardino.

After the San Bernardino encryption battle was made public, Senators Dianne Feinstein and Richard Burr introduced the Compliance With Court Orders Act of 2016. This act basically says that manufacturers must create ways to bypass their own encryption, or have a method for storing user data so that it can be turned over to investigators. This is the legal version of the contractor with a key to your house example we started with. This bill is also in draft form, and it is causing a lot of controversy, but having problems gaining real traction.

The Core Of The Debate

privacy_lawsWhat this debate boils down to is that some factions in the government want to force manufacturers to make user data accessible, and other factions want to preserve privacy. If the Compliance With Court Orders Act is passed, companies like Google would have to redesign products such as Gmail to make user data accessible. Right now, Google cannot read user emails at all unless Google has access to a user’s computer. If this bill becomes law, Google and anyone else who can get past the weakened Gmail encryption could read any user’s email.

If the new compliance bill becomes law, then user data could be exposed at levels that the lawmakers may not realize. A disgruntled Google employee could wind up selling data from millions of Gmail address, or a terrorist could access an iPhone to get all of the personal data that phone contains. As it stands right now, it is almost impossible for tech companies to access encrypted data, and that is what makes the data so safe. If things start to change, then there could be major issues with privacy that users may not realize until it is too late.

https://info.globalit.com/wp-content/uploads/2016/05/download.jpg|https://info.globalit.com/wp-content/uploads/2016/05/12.-online-threat.jpg|https://info.globalit.com/wp-content/uploads/2016/05/Cyber-Security-2.jpg|https://info.globalit.com/wp-content/uploads/2016/05/cybersecurity.jpg

Case Studies

Madison Valleywood – Taking Down ISIS with Technology

Madison Valleywood sounds like a character from the next John Waters’ film, but it is actually a nickname given to the United States government’s latest attempt to combat ISIS online. Despite what may be the popular conceptions up to this point, ISIS is not reaching out and causing havoc at high levels through cyber terrorism. In order to understand what is and can be done to defeat ISIS online, it is important to have a general understanding of ISIS and how it works.

isis_online_terrorists

What Is ISIS?

ISIS is a terrorist organization that occupies large portions of Syria and Iraq, and has declared its intentions to create an Islamic world which ISIS would rule. As of 2016, ISIS has about eight million civilian subjects and several sources of income to fuel its efforts. Some of the more lucrative recurring sources of ISIS income include:

  • Income tax on its people
  • Oil revenue of around $1 million to $3 million per day
  • Money stolen from the banks and governments ISIS defeats

The primary stated goal of ISIS is to bring down the Western World and replace it with Islamic rule, ISIS style. ISIS is smart enough to know that if it wants to defeat the Western World, it will have to become proficient in cyber terrorism. When you take an objective look at what ISIS has been able to accomplish so far online, the future does not look bright for this terrorist organization.

The ISIS Online Threat

It is important for people to remember that just because ISIS takes credit for a major online security breach does not necessarily mean that ISIS actually committed the breach. Despite the availability of money and recruits with technical backgrounds, ISIS’ Internet capabilities are extremely limited. To this point, ISIS has only been able to:

  • Use social media to recruit new members and send out threatening messages to the Western World
  • Hack websites with weak security protocols
  • Take advantage of lapses in online security for larger websites and exploit those weaknesses

Right now, the online capabilities of ISIS rival those of a group of hackers angry at the world. While ISIS has been able to hack into low level government websites and some American banks, its ability to hack credit card user databases is commonplace among other high level hacker groups.

ISIS_Online

Where ISIS really shines online is its use of social media to recruit new members, arrange attacks using lone attackers, transfer funds to groups around the world, and send video messages to the world. As long as ISIS is able to reach mass audiences using social media, then it remains a threat.

What The Government Is Doing

Madison Valleywood is the nickname given to the government initiative to reach out to technology companies and social media websites to shut down the access ISIS has to the rest of the world. Companies such as Apple, Facebook, and Twitter are being asked to develop ways to combat ISIS online, and also being asked to follow government directives to remove the ability for ISIS to use the Internet in its operations.

n shows that there are still some areas where technology companies are unwilling to alter what they do to appease the government. However, Twitter has shut down hundreds of thousands of ISIS-related accounts and is constantly gathering data to shut down more accounts. If Madison Valleywood becomes a cohesive operation between the government and the companies of Silicon Valley, then that may be all of the technology the government will need to help defeat ISIS once and for all.

Find out more:

http://www.defenseone.com/technology/2016/01/americas-new-plan-fight-isis-online/125043/

https://www.flashpoint-intel.com/home/assets/Media/Flashpoint_HackingForISIS_April2016.pdf

http://blogs.berkeley.edu/2015/03/02/how-to-defeat-isis-and-why-it-probably-wont-happen/

http://www.cnn.com/2016/02/24/politics/justice-department-apple-fbi-isis-san-bernardino/

https://info.globalit.com/wp-content/uploads/2016/05/ISIS_TRAIL_OF_TERROR_16x9_992.jpg|https://info.globalit.com/wp-content/uploads/2016/05/external.jpg

Case Studies

Want Free Anti-virus Protection?

May Promo

Try our computer security software during the month of May to get free installation, free scanning one month free, and all Global IT products come with a 90-day 100% satisfaction guarantee.

Receive full internet browsing, malware, adware, spyware, firewall, and anti-virus protection at $3.50 per month,  protect all your computer systems, from the staff at the office to your kids at home.

Features include:

  • Proactive monitoring; partially or all systems, networks, resources, and devices
  • Operating 24 hours a day, 7 days a week, 365 days of the year
  • Live Grid, provides real-time proactive protection, detecting threats before they enter your system
  • High malware detection
  • Firewall
  • Browser protection
  • Light Footprint
  • Attachment or program inspection
  • Pattern signatures
  • Behavior monitoring
  • Blacklist lookup
  • High performance
  • Management administration console maintained by Global IT

Need further assistance? Talk to a computer security specialist!

Need_help_Contact_us

https://info.globalit.com/wp-content/uploads/2016/05/May-Promo.jpg

Case Studies

How to Create Exchange Email Forward

Note: Before you begin please ensure you are not using Google Chrome. Chrome is not compatible with this feature.

  1. Click on the “Settings icon”

a. Click’ options

2. Go to “Organize email”

       a. Click’ on plus sign

how1

 

 

 

 

     b. Select “create new rule for arriving messages…”

how2

 

 

 

 

  1. Create a name for your forward i.e. (Email Forward)

a. Click drop down menu under “when the messages arrives” Select “Apply to all messages”

how3

 

 

 

 

  1. Then click “More Options”

how4

https://info.globalit.com/wp-content/uploads/2016/04/settings-icon.png|https://info.globalit.com/wp-content/uploads/2016/04/how1.png|https://info.globalit.com/wp-content/uploads/2016/04/how2.png|https://info.globalit.com/wp-content/uploads/2016/04/how3.png|https://info.globalit.com/wp-content/uploads/2016/04/how4.png|https://info.globalit.com/wp-content/uploads/2016/04/how5.png|https://info.globalit.com/wp-content/uploads/2016/04/how6.png|https://info.globalit.com/wp-content/uploads/2016/04/how7.png|https://info.globalit.com/wp-content/uploads/2016/04/how8.png|https://info.globalit.com/wp-content/uploads/2016/04/how9.png|https://info.globalit.com/wp-content/uploads/2016/04/settings-icon1.png|https://info.globalit.com/wp-content/uploads/2016/04/how21.png

Case Studies