— by Margie Doyle —

Dave Johnson and Lisa Steckley at work at 376 Tech, Service and Support, On-Site or Remote, Call 376-TECH

A 2017 Christmas-New Year’s joke/complaint runs something like this: “I visited my parents and became their IT guy.”

Now there’s a solution for that — a personalized approach to solving your tech issues in the form of the business 376Tech, which also happens to be their phone number 376-Tech (8324).
A partnership of David Johnson and Lisa Steckley, 376Tech is an “all things tech business” that deals with such mysteries as ‘the spinning ball, the weird warning message that just popped up” and “why is my computer so slow or why won’t it start” to “why can’t I log into my email or user account on my phone?”

In addition to trouble shooting, 376Tech ensures safe software installations, secure downloading of apps, new computer/phone setups and configuration, preserving your data, maintenance and training. The team is also focused on providing privacy and security in the “Big Brother is Watching You” world of internet use.

Steckley comes to 376Tech after a career in corporate Information Technology with a special interest in privacy and security. She has a knack for both computers and business. Johnson, an islander since 1989, brings his experience with troubleshooting and problem-solving to both software and electronic hardware of Apple and Windows and Android products. The pair have spirited debates, bouncing ideas back and forth; all with the focus on how to give customers the best available options.

The vision of their company is “building relationships to understand what clients want to do and how to deliver the best solutions for them,” says Johnson. “We will make house calls, work on your computer off-site or work remotely with you. We then determine what solutions meet a customer’s needs and budget. With these kinds of relationships, it might just be a remote session and five minutes of time will solve your problem.”

376Tech is flexible enough to offer non-standard work hours: evenings, weekends, holidays too — and deals with mixed platforms like “smart” TVs, Windows, Macs, iPhones, Android smartphones, tablets, computers (desktop and laptop) and networks. They also work to integrate electronic devices like payment methods, cell phones and home security systems, and connecting to “the cloud.”

Both Lisa and David believe strongly in meeting customers at whatever level of expertise they might have. “We will not talk down to you and we won’t assume you know how any particular device or process works. We all started off knowing little- it’s part of our job to help people increase their understanding and ability to use the tech they own. And if you want us to do it all, that’s fine too.”

Lisa’s concerns for privacy and security come watching people accidently fall into the traps of the ‘bad actors’ in the internet world. She says, “If you experience something that looks or feels weird on your computer, don’t click — pick up the phone and call 376-8324. We all need to protect our systems and be careful, not only for ourselves, but for everyone we interact with.”

Basic security can take as little as five minutes, and can be strengthened with several simple layers of security. “It’s easy to protect you from the casual data thief,” says David. “Most experts don’t bother with you if you have basic security, because there are so many people who are unprotected. We can take you from totally insecure, to a fairly high level of confidence that the casual criminal won’t mess with you.”

Here’s a hint: the best practice for any data you wouldn’t want hijacked or stolen is to store it on an external drive that can be disconnected from your computer.

A stricter approach is to use a dedicated computer used solely for finance and banking. “Talk to 376Tech about data encryption, Virtual Private Networks and other, less known ways to protect your data.”

Though ransomware like the “Wanna Cry” malware bug that infected the health care system in England and major airlines last spring get the headlines; malware and email hacks happen every day to the unprotected user. While there is no absolute level of security, “We want to make it more difficult and lower the odds,” says David. People who own Macs are sometimes mistakenly told their computers are safe against viruses. But what they aren’t told is most of these schemes involve malware, not a virus. And malware is an equal opportunity thief on both Mac and Windows machines.

Some machines are so old that their operating systems and or their browsers cannot be updated. “You will never see 376Tech charging hundreds of dollars to “fix” an old machine when that much money spent on labor could be spent buying a newer machine. We are not going to do anything other than remove the threat and save your personal data. When we can’t secure a phone or a computer, we are going to recommend you buy a new or refurbished machine- whatever your budget will bear- and we will help you find that best deal.

“And we are not going to upsell you to a considerably more expensive device if you just use a browser and email. You don’t need a Macbook Pro to accomplish those tasks.”

A strong supporter of non-profit organizations, Johnson is willing to consider an initial, free consult for non-profits, including areas like networking, DSHS Security audits and conformance to HIPAA standards. He has done volunteer works for SAFE San Juans (formerly Domestic Violence/Sexual Assault Services (DV/SAS), the Orcas Community Resource Center, and currently provides IT, consulting and web services for recovery groups in western Washington. “We scale up nicely, providing solutions to your tech problems, needs and desires.”

Lisa echoes David, saying “Our goal is to have your digital life work for you.”

376TECH, LLC is a business entity registered at Washington Secretary of State. For more information and rates, go to www.376tech.com/