COVID-19 Cybersecurity Alert

Even a worldwide pandemic can’t put a stop to cybercriminals who take advantage of vulnerable people and businesses. As if the world needs another problem, there has been an increase in COVID-19 related cybercrimes. Please read the following so that you are aware of the situation and can prevent it from happening to you. The…

Read More »

COVID-19 Update

The health and well being of our employees and our client’s employees is our first priority. Providing prompt, expert support is a close second. We are closely monitoring the recommendations and restrictions by our local, state and federal government on a daily basis. Starting today, March 23, 2020, Saint Louis County (where we are based)…

Read More »

IT Security Guidelines for Remote Work

Many business continuity plans have been challenged in the wake of the 2020 COVID-19 outbreak. Companies across the globe are trying to figure out how to work remotely while also staying productive and maintain IT security. Whether your company has 5 or 5,000 employees, it’s important that everyone takes the correct preventative security measures in…

Read More »

Is your business prepared?

With the right systems in place, your entire business can still operate remotely. In preparation for possible office closings, we are proactively reaching out to our clients to make sure they are prepared. In the event, your employees may need to work from home for a sustained period of time and we want to ensure…

Read More »

West County EMS and Fire Protection District

“We needed a company that actually understood our business, cared about the outcome and wanted to virtually become a partner with us. We have that in The Miller Group.” West County EMS and Fire Protection District Overview: West County EMS and Fire Protection District were in the market for an IT firm that they could…

Read More »

Is your Netflix account safe?

With more than 148 million subscribers globally, Netflix is one of the most popular streaming services. Like anything else, where people and money are, criminals are as well.

Read More »

5 Ways to Protect Your Data in the Cloud

Cloud computing is now the norm — 95 percent of businesses worldwide are using at least one cloud service, according to a 2016 study. While there are many services that fall under cloud computing, businesses often use the cloud to store data. Although security experts note that storing data in the cloud is a relatively safe practice, businesses…

Read More »

How to Change the Default Font in Microsoft Word

When you create a new blank document in Microsoft Word, the application automatically sets the typeface to Calibri. This is convenient only if Calibri is the font you want to use. If it is not your preferred default font, you can change it. Changing the default typeface in Word 2010 and later versions is easy:…

Read More »

Office 365 & Ransomware: The Lurking Threat

For small to midsized businesses, Microsoft Windows-based systems remain dominant. Windows continues to be the operating system most widely used on desktops and laptops. And Microsoft Office remains the most widely used work office suite. So it’s no surprise that Windows systems remain the top target for ransomware, too. A stunning 100% of IT professionals…

Read More »

Heitkamp Masonry

“The Miller Group came in organized and explained things to my level which made the process much easier than it had ever been.” Overview: Heitkamp Masonry had been experiencing slow response and extremely poor communication from their previous IT provider. They recognized that the lack of support was affecting their business and knew it needed…

Read More »

All Volleyball

“Our downtime has become non-existent with the Miller Group… I would recommend The Miller Group to others in retail because simply put, they will fix your IT problems so you don’t have to worry about them anymore.” Overview: All Volleyball contacted The Miller Group right in the middle of a technology crisis… A crashed server…

Read More »

The Differences between Hubs, Switches, and Routers

In discussions about networking, you might find that the terms “hub”, “switch”, and “router” are being used interchangeably when they should not be. The reason for the confusion is understandable. Besides looking similar, all three devices pass along data traffic through connectors called ports. Plus, as these devices become more sophisticated, the functional differences between…

Read More »

L.E. Sauer

  “With TMG we get a team and a range of expertise. They are right in our sweet spot…” Overview: L.E. Sauer has been a client of The Miller Group since 1999. We started with hosting their domain and email then, when their long-time IT manager retired, we were fortunate enough to onboard them as…

Read More »

Logos School Client Success Story

“Mike Miller truly appreciated our mission of helping struggling students find hope, acceptance and a promising future. Over the years, he became part of the LOGOS community and his kindness and generosity helped us create some amazing opportunities for our school and our students. The entire staff at The Miller Group has served as trusted…

Read More »

Scoops with Danny Mac

“My favorite thing about The Miller Group’s service is the people. They’re the most helpful people I’ve ever worked with. In my business, time is of the essence… They do whatever it takes to get my stories up as soon as possible because sometimes information can’t wait.”

Read More »