malware software, deploy e-mail spam and malware/phishing filtering, deploy new hardware firewalls to six locations, and identify where the attack originated from. The following week our CEO gave a presentation to staff in a mandatory all-hands virtual meeting on: 1. What happened 2. How it happened and 3. How to identify a phishing e-mail attack. This client is now fully serviced by Resolved IT with a co-Managed IT agreement, in which we collaborate with their IT Manager to deliver reliable, secure, and fast IT infrastructure.