Tag Archive for: Go West IT

Managed Detection & Response vs. Antivirus: What’s the Difference?

Are your defenses preparing you for threats before they strike, or ready to respond effectively when they do?

For years, antivirus software was the go-to defense for business systems. It scanned files, flagged suspicious attachments, and blocked known malware. But in today’s fast-evolving cyber landscape, threats move quicker, target more broadly, and often slip through cracks that traditional antivirus (AV) can’t spot.

That’s where Managed Detection & Response (MDR) steps in as a critical layer of protection. MDR combines Endpoint Detection & Response (EDR) software with 24/7 monitoring by a Security Operations Center (SOC) team. It identifies unusual behavior that signals a breach in progress and enables rapid response to contain and mitigate the damage. While preventive tools aim to stop attacks before they happen, MDR focuses on detecting and responding during and after an incident, minimizing the fallout.

What Does “Left of Boom” Mean and Why It Matters

In cybersecurity, the terms “left of boom” and “right of boom” come from military strategy, adapted to describe the timeline of a cyber incident. “Left of boom” refers to everything that happens before a security breach occurs—proactive measures like prevention, hardening systems, and threat hunting to avoid incidents altogether. “Right of boom” covers everything after the initial compromise, including detection, containment, response, recovery, and learning from the event.

No business can stay entirely left of boom forever; breaches can and do happen despite the best prevention. That’s why a balanced approach is essential: strong left-of-boom protections to reduce risks, paired with robust right-of-boom capabilities to handle incidents when they occur. MDR excels on the right-of-boom side by providing real-time detection and expert response, helping businesses recover faster and with less damage.

“Luck is what happens when preparation meets opportunity.” – Seneca

This balanced mindset aligns with what we covered in Why EDR Is Essential for Cybersecurity in 2025, where detection and response bridge prevention and recovery. MDR elevates this by adding round-the-clock human expertise to manage those systems effectively.

Antivirus vs. EDR vs. MDR: Understanding the Evolution

Let’s break down these layers of defense and where they fit on the boom timeline:

Antivirus (AV): Primarily Left-of-Boom Protection

Traditional AV focuses on known signatures—viruses, malware, and trojans that have been identified and cataloged. It scans files, emails, and attachments against a database of threats. While it’s a solid preventive tool, it is not designed to stop new or evolving threats. AV is a left of boom prevention tool that blocks familiar dangers at the door.

Endpoint Detection & Response (EDR): Bridging Left and Right of Boom

EDR goes beyond signatures by analyzing system behavior to spot suspicious activity, like an unauthorized user escalating privileges or a process copying sensitive data. It provides visibility and alerts but often requires your team to investigate and respond. EDR supports left-of-boom efforts through ongoing monitoring and pairs with right-of-boom actions by enabling quicker detection during an attack.

Managed Detection & Response (MDR): Right-of-Boom Expertise

MDR builds on EDR by adding human intelligence from a dedicated team of cybersecurity professionals who monitor, investigate, and act in real time—24/7. If malicious behavior is detected, they can isolate devices, block threats, and contain the issue before it escalates. Unlike “set-and-forget” tools, MDR ensures your business has expert eyes on potential incidents around the clock, making it a powerhouse for right-of-boom response when attackers strike at any hour.

Why MDR Is Critical for Modern Businesses

The average breakout time for attackers—the window from initial compromise to spreading within your network—is now under 48 minutes, according to the CrowdStrike Global Threat Report. Relying only on left-of-boom tools like basic AV or periodic checks leaves small and medium-sized businesses vulnerable, especially without in-house IT teams available 24/7.

MDR addresses this by providing:

  • Detection of threats beyond known malware, including sophisticated attacks.
  • Response within minutes to contain and neutralize issues.
  • Access to seasoned analysts, bridging the skills gap for businesses without dedicated security staff.
  • Reduced downtime, data loss, and recovery costs through swift action.

MDR is an important control highlighted in frameworks like CIS Controls and NIST, which emphasize continuous monitoring, incident detection, and rapid response—key topics in our post Why Small Businesses Need the CIS Cybersecurity Framework.

Balancing Left and Right of Boom: A Comprehensive Defense

A complete cybersecurity strategy combines left-of-boom prevention (like AV and patching) with right-of-boom response (like MDR) to handle the full attack lifecycle:

  • Before (Left of Boom): Prevention through tools, policies, and awareness to stop threats from entering.
  • During and After (Right of Boom): Detection, containment, recovery, and forensics to limit damage and strengthen future defenses.

MDR doesn’t prevent every attack but ensures that when one occurs, the “blast radius” is minimized. It’s the difference between a quick recovery and a devastating breach.

Go West IT: Your Partner for Balanced Cyber Defense

At Go West IT, we help small and medium-sized businesses build layered protections that cover both left and right of boom. From preventive managed IT services to responsive MDR solutions tailored for industries like finance, law, and accounting, we scale security to fit your needs.

Ready to strengthen your defenses? Contact us for a free consultation or call 303-795-2200 (option 1).

FAQ

Does MDR replace antivirus? No—MDR complements AV by handling advanced threats and providing response capabilities that AV lacks. Together, they cover left and right of boom.

Is MDR expensive for small businesses? Not at all. Many providers, including us, offer scalable MDR options that deliver enterprise-level protection without breaking the bank.

How fast can MDR respond to a threat? Top MDR services respond within minutes of detection, isolating threats to prevent widespread damage.

What does “left of boom” mean? It refers to preventive actions before a cyber incident. “Right of boom” involves response and recovery after one starts.

How does MDR align with frameworks like CIS or NIST? MDR supports their recommendations for ongoing monitoring, threat detection, and quick incident response—core to right-of-boom effectiveness.

Sources

  • CrowdStrike Global Threat Report 2025

CISA – Managed Detection and Response

What happens when one unpatched system becomes your business’s weakest link?

In the world of cybersecurity, prevention starts long before an attack occurs. Threat actors don’t need to invent new exploits, they often take advantage of known vulnerabilities that haven’t been patched. This is where vulnerability management steps in: a continuous process of identifying, prioritizing, and remediating security weaknesses across your digital environment.

When done right, it transforms your IT operations from reactive firefighting to proactive protection.

What Is Vulnerability Management and Why It Matters More Than Ever

Vulnerability management is the ongoing process of scanning systems, assessing their exposure to threats, and applying fixes before attackers can exploit them. Unlike occasional patching, vulnerability management emphasizes continuous monitoring, criticality scoring (CVE prioritization), and structured remediation.

According to a 2025 study by IBM, 29% of breaches exploited unpatched vulnerabilities, a reminder that even well-intentioned IT teams can’t rely on manual patch cycles anymore [¹].

As we discussed in our earlier article, Software Patching Strategy for 2025: More Than Just Updates, patching is more than applying updates, it’s about staying one step ahead of evolving threats. Vulnerability management takes this further by ensuring that every component of your environment, from endpoints to edge devices, stays protected on an ongoing basis.

Three Areas You May Be Overlooking

1. Operating Systems

While Windows and macOS updates seem automatic, the reality is that failed or incomplete updates are common. Businesses should have a monitoring and remediation process to ensure patches actually apply. Missed OS patches can leave gaps for attackers to exploit within days of public disclosure.

2. Third-Party and Web Applications

Your browser extensions, PDF readers, and even accounting software can harbor vulnerabilities. As we noted in The Hidden Risks of Ignoring Firmware Updates, overlooked maintenance, whether in firmware or third-party tools, creates an open invitation for threat actors.

3. Network Edge Devices

Firewalls, routers, and switches often sit untouched after initial configuration. But these devices are prime targets for exploitation. Keeping network hardware firmware updated, combined with configuration audits, strengthens your perimeter defenses and supports compliance with frameworks like CIS and NIST, which we outlined in Why Small Businesses Need the CIS Cybersecurity Framework.

From Scheduled Patching to Continuous Management

The old way, quarterly patch windows, no longer cuts it. Today’s threat actors move faster than ever. In fact, CrowdStrike’s 2025 Global Threat Report found that the average breakout time for attackers dropped below 48 minutes [²].

That’s why continuous vulnerability management—supported by automation, CVE prioritization, and strong reporting—is essential. Businesses that adopt an ongoing approach significantly reduce their mean time to remediate (MTTR) and their overall exposure to known threats.

“An ounce of prevention is worth a pound of cure.”

— Benjamin Franklin

How Vulnerability Management Reduces Risk

  1. Identifies Hidden Weaknesses – Regular scans uncover risks across endpoints, servers, and cloud platforms.
  2. Prioritizes What Matters Most – CVE scoring and contextual threat intelligence focus efforts on the most critical vulnerabilities.
  3. Improves Patch Success Rates – Automated remediation reduces human error and downtime.
  4. Enhances Compliance – Demonstrates alignment with CIS, NIST, and other security frameworks.
  5. Builds Long-Term Resilience – Reduces the window of exposure, protecting your data, uptime, and reputation.


Go West IT: Your Partner in Risk Mitigation

At Go West IT, we help small and midsized businesses build structured, framework-aligned vulnerability management programs. From automated patching to CVE prioritization dashboards and managed monitoring, our team ensures that every “door” in your IT environment stays locked.

Learn how our vulnerability management and cybersecurity services can strengthen your defenses contact us for a free consultation or call 303-795-2200 (option 1).

FAQ

1. What’s the difference between patching and vulnerability management?

Patching is one action within a broader vulnerability management program, which also includes scanning, prioritizing, and validating remediation efforts.

2. What is CVE prioritization?

CVE (Common Vulnerabilities and Exposures) scoring helps rank vulnerabilities by severity, allowing IT teams to patch the most dangerous flaws first.

3. Does vulnerability management apply to small businesses?

Absolutely. Small businesses are frequent targets because they often lack the layered defenses that continuous vulnerability management provides.

4. What frameworks recommend vulnerability management?

Frameworks like CIS, NIST, and ISO 27001 all list vulnerability management as a core control for maintaining security and compliance.

Sources

  1. IBM Cost of a Data Breach Report 2025
  2. CrowdStrike Global Threat Report 2025
  3. CISA – Vulnerability Management Best Practices

What is a cybersecurity framework, and why should small businesses care?

In today’s digital landscape, where cyber threats evolve faster than ever, small businesses are increasingly becoming prime targets for attacks. From ransomware to data breaches, the risks are real and can devastate operations, finances, and reputations.

Go West IT has seen firsthand how adopting a structured approach can make all the difference. One powerful tool in this arsenal is a cybersecurity framework, such as the Center for Internet Security (CIS) Controls.

What is a cybersecurity framework?

A cybersecurity framework is essentially a structured set of guidelines, best practices, and standards designed to help organizations manage and reduce cyber risks. Think of it as a roadmap for building a resilient security posture.

Popular frameworks include the CIS Controls, NIST Cybersecurity Framework (CSF), and ISO 27001. While they differ in approach, they share the common goal of reducing risk and strengthening defenses.

For small businesses, frameworks like CIS are particularly appealing because they’re practical and actionable. The CIS Controls, for instance, consist of 18 prioritized safeguards ranging from basic hygiene (asset inventory, secure email) to advanced measures (penetration testing).

Unlike overwhelming regulations, frameworks provide flexibility, allowing you to start small and scale as your business grows.

Related reading: How Much Should You Spend on Cybersecurity in 2026?

How do frameworks help assess risks, controls, and improvements?

1. Assessing risks: shining a light on hidden threats

Frameworks help you conduct a thorough risk assessment by mapping out weaknesses in your IT environment. CIS starts with foundational controls like knowing what’s on your network (hardware, software, and data). Without this, you’re flying blind.

By aligning with a framework, you can quantify risks using tools like scoring systems or risk matrices. This reveals real-world gaps like unpatched software or weak access controls that account for many breaches.

Related reading: The Hidden Risks of Ignoring Firmware Updates

2. Implementing controls: building defenses that work

Once risks are identified, frameworks guide you in deploying controls to mitigate them. CIS categorizes controls into Implementation Groups (IGs), starting with IG1 for essential protections that even resource-strapped businesses can adopt quickly (MFA, backups, etc.).

Studies show that implementing just the first five CIS Controls can block up to 85% of known threats.

3. Driving continuous improvement: elevating cyber maturity

Cybersecurity isn’t a one-time project but an ongoing journey. Frameworks provide benchmarks to measure progress and identify areas for growth, such as employee training or integrating threat intelligence.

This shift from reactive to proactive helps reduce downtime, manage compliance, and improve overall resilience.

How Go West IT supports framework alignment

At Go West IT, we specialize in helping small businesses navigate frameworks like CIS and NIST with ease. Our experts assess alignment, identify gaps, and implement solutions tailored to your needs.

We’ve even developed tools that instantly assess your Microsoft 365 environment against common frameworks—pinpointing misconfigurations and providing automated recommendations.

This combination of technology and managed services saves time, reduces risk, and makes security alignment scalable for growing businesses.

Cybersecurity frameworks as a path to resilience

Adopting a cybersecurity framework like CIS isn’t just smart – it’s essential. By providing a roadmap to assess risks, strengthen controls, and track progress, frameworks transform cybersecurity from a daunting task into a manageable process.

If this resonates with you, or if you have questions about getting started, contact Go West IT today. Our experts are here to guide you through framework assessments, Microsoft 365 alignments, and beyond. Let’s secure your business together – email us at info@gowestit.com for a free consultation.

FAQ

What is the CIS framework?

The CIS Controls are 18 prioritized safeguards designed to help businesses reduce risk from the most common cyber threats.

How is CIS different from NIST?

CIS focuses on actionable, prioritized controls, while NIST provides a broader risk management framework. Many small businesses prefer CIS for its practicality.

Do small businesses really need a framework?

Yes. With 43% of cyberattacks targeting small businesses, frameworks provide a structured, scalable way to improve defenses and reduce vulnerabilities.

Why Proactive Maintenance Matters for Network Hardware and Server Security

When it comes to cybersecurity, most businesses focus on software patching, antivirus protection, or endpoint detection—and for good reason. But there’s one often-overlooked area that can quietly leave your network exposed: firmware updates for your firewalls and servers.

In the managed IT world, ignoring firmware updates is like locking your front door while leaving the back wide open. These updates often address critical vulnerabilities that attackers actively exploit, and failing to apply them can give threat actors exactly what they’re looking for: an easy entry point into your network.

Why Firmware Updates Matter

Firmware is the base-level software embedded directly into your hardware devices—like firewalls, routers, and servers—that tells them how to function. These updates can:

• Patch newly discovered security vulnerabilities

• Improve performance and compatibility

• Add support for new features or configurations

• Prevent known exploits and bugs

But here’s the challenge: applying firmware updates isn’t always simple. Firmware updates frequently require a reboot and a pre-update backup is prudent if you need to revert to a known working state.  A botched update can take down a critical piece of infrastructure, making preparation, planning, and expertise essential.

Common Pitfalls of Neglecting Firmware Maintenance

Let’s look at some of the hidden risks of pushing firmware updates to the bottom of your IT to-do list:

Unpatched Vulnerabilities: Hackers actively scan for outdated firmware on business networks, especially firewalls and edge devices.

Downtime Risks: Incompatibilities between outdated firmware and updated software can lead to service disruptions.

Compliance Gaps: For industries like finance and legal, outdated firmware can create audit or cyber insurance liabilities.

Manual Headaches: Without a maintenance routine, updates become disruptive instead of proactive—leading to missed updates or risky ad hoc fixes.

Why You Need a Strategy, Not Just a To-Do List

At Go West IT, we help clients move from reactive to proactive. That means working with you to develop pre-approved, scheduled maintenance routines that handle firmware updates the right way—with planning, documentation, and fallbacks in place.

The struggle isn’t knowing firmware updates are important—it’s making time for them.

That’s why we schedule firmware patching in advance and have processes in place to apply urgent “out of band” patches for critical security vulnerabilities. 

For best practices and resiliency strategies, explore NIST’s official guidance on firmware protection: NIST SP 800-193.

Don’t DIY Your Network Security

Firmware updates may sound simple—but they’re anything but. One misstep can lead to downtime or a misconfigured device. That’s why it’s critical to have trained professionals handle this work. Our engineers ensure that every update is rolled out with care, and a pre-update backup is taken to preserve a path to revert to a known working state if the firmware update has unintended consequences. 

Firmware updates aren’t just IT housekeeping. They’re a critical line of defense for your network and infrastructure. If your firewall or server firmware hasn’t been updated in months (or longer), now is the time to take action.

Let’s build a secure, automated strategy that doesn’t leave your business exposed.

Frequently Asked Questions: Firmware Updates & Network Security

Why are firmware updates important for business cybersecurity?

Firmware updates address critical vulnerabilities in hardware like firewalls, routers, and servers. Without them, your network can be left exposed to known exploits that cybercriminals actively search for.

What happens if firmware updates are ignored?

Neglecting firmware updates can lead to security gaps, unexpected system outages, and even compliance issues. Outdated firmware is a known attack vector and can create serious liabilities for businesses.

How often should firmware be updated?

Ideally, firmware should be reviewed and updated on a quarterly basis, or sooner if a high-priority security patch is released. Regularly scheduled updates help avoid last-minute scrambles and reduce risk.

Can firmware updates cause downtime?

Yes, if not handled properly. Improperly executed updates can disrupt critical infrastructure. That’s why updates should be planned, tested, and deployed by trained professionals with backup and recovery options in place.

What’s the difference between software and firmware updates?

Software updates apply to operating systems and applications. Firmware updates apply to the embedded code in hardware devices, controlling how they operate. Both are essential, but firmware often goes overlooked.

Do outdated firmware versions affect compliance or cyber insurance coverage?

Yes. In industries like finance, healthcare, or legal services, outdated firmware can lead to compliance violations or cyber insurance exclusions. Regular updates support audit readiness and risk management.

How can businesses automate firmware updates safely?

The most effective approach is to create a structured update routine with a trusted IT partner. At Go West IT, firmware updates are staged, tested, and scheduled during approved maintenance windows—ensuring stability and security.

Where can I find official guidance on firmware protection?

Refer to the NIST SP 800-193 guidelines for comprehensive strategies on firmware and platform integrity protection.

What is the business cost of IT downtime? How do IT outages affect financial firms? What is a resilience-first IT approach?

These are all common questions we are asked here at Go West It. So, what is the true cost of IT downtime to a business? For financial firms, accounting professionals, and attorney practices, it’s more than just lost hours—it’s lost trust, delayed transactions, regulatory risk, and potential damage to reputation. When client data becomes inaccessible or communications go dark, even briefly, the impact can echo far beyond the outage itself. That’s why a resilience-first IT approach isn’t just a smart strategy—it’s a critical business imperative. By planning for disruption before it happens, firms can protect operations, preserve client confidence, and stay focused on growth instead of damage control.

IT Outages Don’t Just Interrupt—They Impact Everything

An IT outage isn’t just an inconvenience—it’s a chain reaction. For financial firms, accounting professionals, and attorney practices, even a short disruption can bring operations to a standstill, strain client relationships, and trigger costly compliance concerns. When systems go dark, so does visibility, responsiveness, and credibility. In a space where trust and timing are everything, consistent uptime is not optional—it’s foundational.

That’s why forward-thinking firms are shifting their focus to IT resilience: a proactive strategy that ensures business continuity, protects data, and keeps services running even when technology falters.

Case Study: When Minutes Turned Into Thousands

Let us share a quick story to bring home the level of impact an IT outage can have on your business. Last quarter, a Denver-based wealth advisory firm experienced a full-day outage during peak client reporting season. A failed firmware update on their firewall triggered a cascade of failures. Their internal IT support couldn’t recover the systems fast enough, and client communications stalled.

The fallout?

• Delayed reporting for dozens of high-net-worth clients

• $33,000 in emergency IT response and client retention costs

• A reputational hit that affected three potential client deals

• Team morale and productivity took weeks to rebound

It wasn’t just the actual outage that impacted this organization—it was the recovery, the distraction, and the business opportunities lost.

What an Outage Actually Looks Like

Outages are more than a few moments of screen-free frustration. In a financial services environment, they can spiral quickly:

Internal communication grinds to a halt—no email, no CRM, no internal chat

Files become inaccessible—advisors can’t pull up needed documentation

Phone systems fail—calls are missed or dropped

Scramble mode kicks in—staff shift focus from core tasks to damage control

Tension rises—leadership juggles vendors, legal concerns, and client reassurance

By the time systems are restored, the firm isn’t just catching up—it’s cleaning up.

QUOTE: When asked about best practices for staying protected from IT outages, David Lewien of Go West It commented, Essential planning focuses not only on how to resume services but how to manage communications internally and with clients when key systems are down.  Ask, how do we communicate internally or with clients if we don’t have access to email, Teams chat, or phones?  Planning for alternative communication paths, such a private messaging apps for internal communications and pre-planned methods to send client communications from hosted CRM systems or via websites, are common approaches.”

The Turnaround: Partnering with Go West IT

After the incident, the advisory firm brought in Go West IT as its managed services partner to assess and rebuild its IT strategy. Go West IT got to work and implemented a resilience-first approach designed to keep downtime from spiraling into disaster:

• Risk-based firmware update planning with approved maintenance windows

• Business continuity and disaster recovery planning tailored to preserve communication options

• Layered cybersecurity controls to minimize single points of failure

• 24/7 monitoring to catch early signs of failure

• Cloud-based backups for critical data availability

• Quarterly system health checks and testing routines

Today, their team runs confidently knowing they’re supported by proactive infrastructure and a partner that’s always thinking ahead.

Downtime Costs More Than You Think

A momentary outage can ripple into:

Loss of trust from clients expecting real-time visibility and uptime

Regulatory concerns if communications or financial data are delayed

Operational disruption as teams scramble to recover and regroup

Business development setbacks occur when attention is pulled away from growth

IT Resilience Isn’t Luck—It’s a Plan

IT security should always be in a proactive mode to reduce the need to be reactive. Here’s how financial firms, accounting professionals, and attorney practices are preparing:

1. Mapping critical vulnerabilities across systems and workflows

2. Building redundancy and cloud-based failovers

3. Automating maintenance, especially for firmware and patching

4. Defining downtime protocols so no one scrambles in a crisis

5. Partnering with experts like Go West IT to monitor and guide the entire strategy

Don’t Wait for the Next Outage

Downtime is inevitable. Disruption doesn’t have to be. Go West IT gives financial firms, accountants, and lawyers, along with other businesses, the foundation to bounce back and bounce forward. Because real resilience is proactive, not reactive.

Talk to us today and future-proof your firm.

Email remains a primary communication tool for businesses. However, with the rise of cyber threats such as phishing, spoofing, and email impersonation, ensuring the security of your email communications has never been more critical. One effective way to protect your business from these threats is by implementing a DMARC (Domain-based Message Authentication, Reporting, and Conformance) reject policy. But what exactly is a DMARC reject policy, and why is it so valuable for your business? Let’s dive in.

What is DMARC?

DMARC is an email authentication protocol that helps protect your domain from being used in email spoofing attacks. It works by aligning two existing email authentication technologies: SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail). By setting up a DMARC policy, you can instruct receiving email servers on how to handle emails that fail SPF and DKIM checks.

The Role of a DMARC Reject Policy

A DMARC policy can be set to one of three modes: none, quarantine, or reject. The reject policy is the strictest and most effective option. When you set a DMARC reject policy, you are instructing receiving email servers to outright reject any emails that fail DMARC checks. This means that fraudulent emails attempting to spoof your domain will never reach the recipient’s inbox.

Practical Value for Business Owners

  1. Enhanced Email Deliverability: By implementing a DMARC reject policy, you ensure that only legitimate emails from your domain are delivered to recipients. This reduces the chances of your emails being marked as spam or junk, thereby improving your email deliverability rates.
  2. Brand Protection: Email spoofing can severely damage your brand’s reputation. When cybercriminals send fraudulent emails pretending to be from your domain, it can lead to a loss of trust among your customers and partners. A DMARC reject policy helps protect your brand by preventing these malicious emails from reaching their targets.
  3. Customer Trust and Confidence: Customers are more likely to trust and engage with your emails when they know that your domain is protected by DMARC. This trust can lead to higher open rates, click-through rates, and overall engagement with your email campaigns.  DMARC policies are easily queried to see the status of your policy.

Cybersecurity Value

  1. Protection Against Phishing and Spoofing: Phishing attacks often rely on email spoofing to trick recipients into believing that the email is from a trusted source. By implementing a DMARC reject policy, you can significantly reduce the risk of phishing attacks targeting your domain.
  2. Compliance with Security Standards: Many industry regulations and security standards now recommend or require the use of DMARC to protect email communications. By setting a DMARC reject policy, you demonstrate your commitment to cybersecurity best practices and regulatory compliance.
  3. Actionable Insights: DMARC provides detailed reports on email authentication results, allowing you to monitor and analyze email traffic. These insights can help you identify potential security issues and proactively address them.

Conclusion

Setting a DMARC reject policy is a crucial step in safeguarding your business’s email communications. It not only enhances your email deliverability and protects your brand but also provides robust cybersecurity benefits. By taking this proactive approach, you can build customer trust, comply with industry standards, and stay ahead of cyber threats. Don’t wait until it’s too late—implement a DMARC reject policy today and secure your business’s digital future.

Go West IT now offers a service to implement a DMARC Reject Policy and monitor DMARC for new sending sources and potential spoofing attacks. Contact us to discuss protecting your business email communications.

August 1, 2022 – Go West IT is pleased to announce the promotion of Tom Hynek to the role of President. In this new role, Tom will oversee daily operations, service and product development, as well as facilitate continued collaboration and growth of the Go West IT team.

Since joining Go West IT in 2017, Tom has quickly advanced through positions with progressively more responsibility. He has demonstrated strong leadership skills, excellent character and is poised to guide Go West IT into this next phase.

I’ve thoroughly enjoyed my first 5 years at Go West IT and I’m thankful for the opportunity to continue to watch our talented team evolve and seek out challenges in an ever-changing cybersecurity landscape,” said Hynek. “I’m proud to work with a team that truly lives and breathes our core values, while supporting and protecting our customers.

Tom succeeds David Lewien, Go West IT’s founding President, who will shift into a new role as CEO, focusing on strategy and business development. David will remain deeply involved in stewarding Go West IT into the future.

I am appreciative of what Tom has already done for Go West IT and excited for what he will bring as our President,”  said Lewien. “I look forward to continuing work as our CEO, shoulder to shoulder, with our leadership team to make Go West IT the very best MSP, period. This is an incredible group of people focused on empowering people, solving problems, and protecting livelihoods.

At Go West IT, our mission is to guide customers through secure digital transformation by providing access to industry leading platforms and highly skilled technical resources. We succeed at this mission by embracing constant improvement, a willingness to tackle tough challenges, and caring about our people and customers.

With that, please join in congratulating Tom on this new role.

Go West IT started business ten years ago today. 

I remember the day very well. The similarities between then and now are striking. We were faced with many unknowns. We watched cashflow very closely. We innovated and adapted quickly. Most importantly, we focused on taking care of customers and employees. We knew there would be challenges and we knew we would rise to the occasion and thrive. We have and we will.

Ten years is an important benchmark. In late 2019 we began talking about how to celebrate. We are moving into new office space this July and decided to combine our anniversary celebration with an open house in our space. That was pre-COVID-19. I am embarrassed to say that we have not talked much about our anniversary internally since then and to be honest, the date caught me by surprise this week.  

We are, once again, intensely focused on our core purpose to empower people, solve problems, and protect livelihoods. Despite the worry that accompanies uncertainty, I believe we are doing some of our best work ever to improve our solutions and systems with the objective of helping our customers through secure digital transformation. It is truly energizing in the same way it was when Go West IT started ten years ago today. 

I want to express my sincere thanks to our customers, many of whom started with us on May 15, 2010. I want to thank the many friends, vendors, and trusted advisors who have helped Go West IT. I want also to express my sincere thanks to our people at Go West IT, past and present. This is simply the best team I have ever worked with, period.