What is the Real Cost of Technology

  • Are you frustrated that when your IT company helps with technology decisions, they never get all the information that they need?
  • Do you feel like computer projects always cost more than planned…and you never get what was really expected?
  • Are you frustrated that whenever there is a problem, you always get a technical reason for an answer?
  • Are you annoyed when nobody takes responsibility for the technology?
  • Are you discouraged with the change and cost involved with technology?
Do you ever wonder how your technology, what you spend and what you get, compares to other companies of similar size and complexity?

We like to meet with business people who are happy with their current approach to technology. We show them how to look at things in a different way. For example we look at 4 key areas the areas:

    • Performance
    • Functionality
    • Risk
    • Cost
Do you feel like your in a fog with your Current Technology Provider

With technology always changing and cyber threats at an all time high, keeping your business safe is a challenge.

43% of cyber attacks target small businesses.

60% of small businesses that are victims of a cyber attack go out of business within six months.

Cybercrime costs small and medium businesses more than $2.2 million a year.

There was a 424% increase in new small business cyber breaches last year.

47% of small businesses they have no understanding of how to protect themselves against cyber attacks.

Human error and system failure account for 52% of data security breaches.

63% of confirmed data breaches leverage a weak, default, or stolen password.

Cyber attacks caused by compromised employee passwords cost $383,365 on average.

25% of small businesses didn’t realize cyber attacks would cost them money.

54% of small businesses think they’re too small for a cyber attack.

Small businesses spend an average of $955,429 to restore normal business in the wake of successful attacks.

40% of small businesses experienced eight or more hours of downtime due to a cyber breach.

This downtime accounts for an average of $1.56 million in losses.

Industry experts say a small business’s cyber security budget should be at least 3% of a company’s total spending.

3 out of 4 small businesses say they don’t have the personnel to address IT security.

Cyber attacks are projected to cause $6 trillion in damages by 2021.

Underdog Provides You a Peace of Mind

When you hire Underdog Computer and Network Support. You and your employees experience a sense of peace you could only imagine. Underdog Serenity Care - Managed IT Services provides peace of mind technology computer support services

We Quiet the NOISE

Underdog Brings a Truly proactive approach to technology support! We have spent almost 2 decades perfecting our business model. We want you to experience what dozens of businesses in the Stroudsburg, Poconos, Wilkes Barre / Scranton, and Lehigh Valley area are experiencing!

We don’t just fix broken things! We are your true Technology Partner. We are your Managed CIO.

A CIO helps move a business towards the future by strategically planning.

Businesses big and small can benefit from a Managed CIO. Let us Show you how!

  • Properly configured and maintained Computers

  • Longer Lasting Equipment which results in less cost of equipment, licenses and software

  • When Computers are Properly patched. Properly maintained. Have proper malware detection software. The threat of malware and ransonware is virtually eliminated

  • We are your True Technology Partner! We don’t just fix broken things. We give you analysis and real data that helps you make real business decisions.

  • We adhere your business to standards. Constantly testing those standards with Alignment Reviews. Technology is not a set once and forget it thing!

  • Save you money! By Performing our Alignments and Reviews. We help you budget 1 year, 2 years and even 5 years out. Can your current IT provider say the same thing?

Or if you prefer to chat – scroll to the Bottom and you can start either a text chat or video chat with us

Ransomware is on the rise

What does Cyber Crime have to do with Managed I.T. Services?

Cyber Crime on the Rise

City of Albany, New York! – Recovery and Mitigation $300,000 – March 30,2019

Outdated equipment and software

City of New Orleans! – Recovery and Mitigation $3 million – Dec 13th, 2019

after an employee clicked on a link in a phishing email and provided their credentials

9 School Districts in the United States

  • Wood County Schools, Parkersburg, West VA
  • Port-Neches Grove Independent School District, Port Neches, TX
  • Penn-Harris-Madison School Corporation, Mishawaka, IN
  • Livingston New Jersey School District, Livingston, NJ

Entercomm, the second largest radio group in the US, was attacked in September 2019

43 healthcare organizations across the country

National Veterinary Associates of Agoura Hills, California was struck by Ryuk in November affecting 400 veterinary Offices.

Or if you prefer to chat – scroll to the Bottom and you can start either a text chat or video chat with us

Is your Company Practicing Good Cyber Hygiene?

For privacy reasons YouTube needs your permission to be loaded.
I Accept

Recently we had the Pleasure of Presenting to the Lehigh Valley and Pocono Chambers about Cyber Security. Here is a snippet of our presentation.

Cyber Hygiene is a good practice to keeping your computer systems clean which will reduce the risk of you being hacked, getting Viruses and spreading viruses to others. So what is considered Good Cyber Hygiene?

  • Patched Systems, a system that has all their security updates, software holes patched, drivers up to date. Make it much harder for hackers to find a way into your system
  • Computer Monitoring and event monitoring – a consistent watching of logs and behaviors of your computer can help you predict when something is not normal
  • Next Gen Business Class Antivirus. Antivirus is good but it’s your fathers antivirus and most are signature based antivirus which is an old and ineffective way of staying secure. Next Gen Antivirus uses machine learning to predict when something is a virus
  • Next Gen Business Class firewalls. All firewalls are not made equally, there are consumer grade firewalls that are not built to handle sensitive business traffic. Next Gen firewalls like the antivirus uses machine learning and go hand in hand with the antivirus to predict unwanted traffic and thus turning it away

Or if you prefer to chat – scroll to the Bottom and you can start either a text chat or video chat with us

We Get it Change is Hard. Let Underdog do the heavy lifting

We Get it! Change is hard! Your current I.T. people know everything about your business. They hold the key’s to the kingdom. Follow Our 3 simple steps below and we’ll have you moved over and feeling confident in no time!

Let’s Build a Secure and Tailored I.T. Solution Together!

Relax! We Got This! We have transitioned many businesses like yours

Feeling Relaxed! Underdog Computer and Network Support Has Your Business Safe and Secure

Feel Confident you made the right choice! Underdog Computer and Network Support Isn’t just another I.T. vendor. We are apart of your team from Day 1. Your Success is our Success!

Or if you prefer to chat – scroll to the Bottom and you can start either a text chat or video chat with us

Underdog Computer and Network Support
Years Experience in the I.T. Industry
‘s of Networks Managed
End-Users Supported

Call Underdog Today


Want to Know More

Client Testomonials

We found it very easy to work with Underdog. He gave a very clear and professional quote, he has been promptly responsive in all communications, and the network is working great. I feel very good about using his company for any future IT needs for our business.
Pam Watkins, Forks Bistro
Barton Heights had a very successful computer upgrade due to Underdog.  I met with him 2-3 months before the project and he gave us an estimate of the entire upgrade process involving 31 computers and a server.  He advised us and placed the order.  He also worked with us and ended up revising the estimate twice to completely satisfy our computer upgrade needs.  He added true value to his service as he was willing to perform the upgrade in the evening when we were closed to minimize our down time as we are a paperless business and rely 100% on our computers.  Carmine stepped up and took care of those problems as well, even though that was not his responsibility.  He always responds quickly to any issue that occurs.  I would highly recommend him to anyone!
Dr. Jeremy Wentz., Barton Heights Veterinary Hospital


Tim Stump, Shawnee Mountain Ski Area
Underdog makes you feel that you are his first concern if you have a Server down or you have a small printing question.  We have been with Carmine for 16 years and have only received quality service.
Dee McConnel, Straub Metal International
Thank you Underdog.  Will recommend you from the rooftops.
Law Office of Maria T. Candelaria, Maria Candelaria

12 years in business and I have been there and done that with other IT / Computer biz, and finally found one that listens, asks questions, and comes up with a plan.

If you are having issues or just want to see if there are options for and avenues of improvement for your computer / networking needs, checkout Underdog Computer and Network Support LLC.

There are some others that are good, but I cannot express the difference enough - they actually get it! Every business IS different with different needs and processes, and they take the time to find what is best for you instead of what they think is best for you!

Thank you, Carmine J. Corridore, for allowing me to have a stress free vacation this year! I look forward to working with you in the near future for some serious upgrades!

Carollee Streeter Kidd, CLK Transcription

"Underdog Computer and Network Support are amazing. They go over and above to help the small business owner Thank you Carmine for all you do"

Jennifer Narkavich, My Girl Managed Services - Marketing Consultant

Underdog Came out to install our Phone System. They made a complicated process easy. Brian Davis, Full Circle Removal.

Brian Davis, Full Circle Removal

We have used Underdog Computer and Networking for business and personal use.  We have found them easy to schedule an appointment, very responsive, professional, and quick to isolate the problem and/or identify our real need.  We highly recommend Underdog.

Denise Flietman, Spread Eagle Realty

For More Information Fill out form below

Still Not Convinced?

Don’t See the Benefits of Tailored I.T. Solutions?

Think your business is fine using I.T. company that just comes when things are broken?

You are OK with Doing Your Own I.T. or having internal staff doing your I.T.

Check out the resources Below

8 Ways a Managed Service Provider Can Solve Problems


Send download link to:

Do it yourself I.T. can cost you money and security


Send download link to:

Learn the Difference between Break/Fix and Managed I.T. Services


Send download link to: