Joe Lileikis

As Technical Account Manager for Pegasus Technologies, LLC, Joe Lileikis brings a passion for addressing the short-term and long-term technology needs of client businesses. Joe most enjoys educating customers about their immediate and long-term technology issues. He is committed to providing excellent customer service, and believes those skills have come naturally to him throughout his career.
Find me on:

Recent Posts

22 Jun

Cyber Security Should Be A Top Priority for All Law Firms

Law firms are integrating more technology in the workplace to manage legal files and client data. Legal software replaces more expensive outsourced costs and offers more streamlined benefits, such as:

01 Jun

Information Technology Terms and Definitions

We use a fair amount of industry jargon in our content about IT support & IT security, so we've defined a list of IT terms & will continue to add definitions.
11 Apr

IT Solutions Basics: Signs of Viruses & Malware

Viruses and malware are a constant threat to business technology.

There are precautions you can take to limit the risk of infection to your devices. Using spam filters, web filters, antivirus software, and network security can help protect your computer.

You can also limit the risk of...
29 Mar

How to Measure ROI for Outsourced IT Support

Regardless of the business you are in, you need to be able to measure your return on investment (ROI) of your IT support expenses.

15 Feb

Prevent Cyber Attacks with DoS Protection

In recent years, DoS attacks have been on the rise as much as 83% in a single quarter.

Additionally, the size of these attacks is also growing. Today, most attacks are big enough to take even major companies and organizations entirely offline.

Even in just one year, countless DoS...

07 Feb

Top Healthcare Information Technology Challenges

Healthcare information technology challenges are unique. Every aspect of healthcare delivery and analysis now relies increasingly on technology – both inside and outside the physician’s office. Wearable devices, Electronic Health Records (EHR), office network connectivity, and more...

31 Aug

5 Most Common Ways Hackers Steal Login Credentials

No matter the size of your company, you're still at risk of becoming a target for hackers. In fact, 80% of companies say that their systems have been hacked.

Search the Blog…