News & Inspiration
We share tips and ideas for improving your IT, articles to inform you on new trends, and occasional cool stuff about technology and ideas that make us put down our coffee and stare. Join us for a better world!
Your Top CMMC Assessment Questions Answered
NATHAN SCOTT Queen Consulting & Technologies CMMC Registered Practitioner, and Certified Project Management Professional (PMP) with over 15 years’ experience in the IT industry, Nathan has a proven track record in both the private and public sector. STEVEN SENZ...
Company Profile – Manassas Baptist Church
Queen was the first company that was clear and honest to deal with. I brought Queen Consulting and Technologies into our multi-building operation after a referral from our local residential IT guy suggested them. Let’s just say our network wasn’t exactly put together....
Questions to Ask Before Letting an IT “Expert” Touch Your Computer
There are countless IT service providers to choose from. And, though each has its own unique logo and tagline, it is still difficult to tell them apart - especially if you're not versed in tech-talk. That being said, not all IT service providers are the same. There...
These Are The 4 Most Important Cybersecurity Protections Your Business Needs
Businesses are at risk for harmful cyberattacks every day. Here are four things you can do right now to ensure that your business is kept out of harm’s reach.
Company Profile – Empower Solutions
' We trusted Queen Consulting because of their attentiveness and consistency. Empower Solutions LLC is a group of government contractors that work remotely throughout the country. Very cloud-based and travel oriented. However, we handle a great deal of orders and...
Company Profile – SCS ISS
Before Queen We Were Talking To Spock. "Before Queen, we were fed up with the IT world and our previous vendors. They only reacted to problems, costing me thousands of dollars in unplanned expenses and downtime. Worst of all they couldn’t communicate well and it...
Proactive vs. Reactive IT Support
Don’t fix what isn’t broken. That sounds logical enough, right? This may be the case with something such as your washing machine or car, but the best approach when it comes to your business’ network security. In fact, using this method could be the mistake that forces...
How the Break-Fix Model Hurts Your Company
Each day brings its own set of challenges. From traffic jams to something, and, yes, even cold coffee. But one of the most frustrating challenges we face is the ever-present IT problems. You may be asking, “Can’t I just pay you to come to fix the systems when they...
Are Employees Your Biggest Cybersecurity Threat?
October is Cybersecurity Awareness Month which means now is the perfect time to do an examination of your company’s cyber health starting with one of the most overlooked threats to your security – Employee Error. Did you know that no matter how much you spend on...