• MacOS 10.12 is being deployed by TechTonic. Learn more.

  • IT Consulting and Advanced Infrastructure Support for your Business. Learn more.

Expertise to define.design.deploy

TechTonic focuses on the technology to support our clients mission. We give our clients a competitive edge through a process of understanding, enhancing, and extending their message.

By guiding our clients through the latest emerging trends and tools, we develop innovative solutions in order to empower their core practice.

iOS App Development
-Marketing Tools for iPad-
-Content Delivery for iPad-

it services

design & support

• servers and virtualization
• network infrastructure
• wireless solutions
• firewalls and security

Read more

apple solutions

OS X & iOS

• iPad management
• large scale deployment
• enterprise support
• ACSA certified

Read more

product design

custom solutions

• cms & e-commerce
• iOS app development
• filemaker databases
• ux/ui expertise

Read more

Latest Article: Mac Malware is Real 7/18/2017

by Scott Morabito: For as long as I’ve been working in IT and Apple, customers have always asked me whether they need to worry about viruses and malware on the Mac. Whenever I was asked that question I would recall the days of MacOS 9 when there existed a worm that traveled between floppy and ZIP drives infecting random files. Back then, antivirus products were barely available for Windows, and completley non-existent for Mac. My reply to customers all of these years has been relayed with a combiation of confidence and pride: “Macs are not a target”.

When the iPhone gained traction, I had concerns that the prevalence of the device would make it a target - and it was. The good news is that iOS is very secure due in large part to the required curation of apps that can be installed. Although the iPhone is a big target, the security and features sets keep them protected.

Macs, however, are another story. Unlike iOS which was developed from scratch by Apple in the 200o’s, macOS 10 was build from UNIX. The whole point of UNIX was for research and development purposes a.k.a “power users”. A creator of malware of viruses can be referred to as a nefarious power user. In other words, the ability to do powerful things is at the core of the OS.
Read the rest...

Other Posts

  • The best way to update your iOS device, iPhone or iPad.
    Having access to many iPhones and iPads as a consultant means every millisecond of delay is an expense for clients. No true IT Director or Manager hasn’t been asked a million times, “Should I upgrade?” The truthful answer is yes, but with many caveats. The best way […]...
    Read more
  • Redirector: A tried and true way to use network home folders
    What’s wrong with Network Home Folders? “True” network home folders means that when a user logs into a Mac, ALL the data associated with that user resides on the server. From documents to photos, to temporary internet caches, everything is being read and written across a network […]...
    Read more
  • “The bad guys are at Starbucks!”
    Bad Guys? Drive-bys, Phishing, Identity Theft! The internet seems dangerous, but protecting yourself starts with protecting your own computer and network. One exploit that so-called “hackers” (actually it should be “attackers”) is something you may never have expected. It’s that ubiquitous resource that we can’t live without, […]...
    Read more