meet the New England IT team you can rely on

Linda Weller

President

Chris Chan

Sr. Director of Solution Sales

Mitch Weller

Executive Vice President

Nick Wetherwax

Sr. Director of Technical Solutions

Mike Minch

Client Success Representative

Jacob Weller

L1 Engineer

Rikki Weller

Marketing Executive

Brian Moss

Solution Sales Representative

Chris McDonald

L2 Engineer

Matt Frosini

L2 Engineer

We love conversations with our clients but it's our work that does the real talking.

“We needed help it was only a phone call away”

We enjoyed another successful year at Hoag Library in no small part due to our relationship with Info Advantage. With the help of Johnathan and Linda we replaced many of our computers this year and have finally gotten all of our equipment onto a three year cycle for replacement. The installation of the new computers was handled in house knowing that if we needed help it was only a phone call away. Jeremiah was instrumental in helping us get all of the new equipment online and swapping out some other equipment with items that were at the end of life. Other times we have depended on Jacob to help us figure out why we were having problems. (an unknown power outage was one cause.) and he and Kris reset programs when we could not make successful updates. We were also unable to catalog new books when the dedicated computer went down. We sent the computer to IA , they performed “magic” and Jacob returned it and reinstalled it until our new computers came in.

BETTY SUE MILLER

Director Hoag Library

“Words can’t describe the difference Info Advantage has made."

I have been working with the Info Advantage team for a little over a year now as the IT Manager for VP Supply Corp. Words cannot describe the difference Info Advantage has made in my ability to do my job and protect our network and information assets. What started as a hardware vendor has now evolved into providing MSSP services to better protect our network – and we could not be happier with the quick return on investment this has given us. I would like to give a special shout-out to the members of the Info Advantage team who have not only done their job exceptionally well but have also mastered the soft skills and make me feel as though I can always reach out if we need them. Johnathan, Chris Chan, Chris McDonald, and Nick Wetherwax have been outstanding over the past year. With continued success like this VP Supply will have Info Advantage as a partner for many, many years to come!

ADAM DEKRAMER

IT Manager VP Supply Corp

“I’ve worked with Info Advantage for 12 yrs. across multiple companies.”

I have worked with Info Advantage over the past 12 years at a couple of companies. This year, Info Advantage helped me deploy a new VMWare / EMC environment for my current employer. During the selection process, they were very responsive with quote changes, responses to questions and updates explaining every aspect of the roll-out. They were very willing to take my current level of knowledge into consideration in the quoting process and their quotes were very competitive. Once awarded the project, Info Advantage proceeded very quickly to order and install the hardware in agreed time with on-hands training and system documentation for me. I would personally recommend Info Advantage for any project.

CLINT SCHWAB

Durst Imaging / Rochester, NY

iaGuardianMSP Solutions Builder

See what IT should actually cost your business. Use our calculator to estimate your monthly budget based on your team size, needs, and security requirements. Click the button to get your estimate.

Always On IT Services & Cybersecurity Protection for Rochester Businesses

We deliver managed IT services and cybersecurity solutions to Rochester Businesses that protect, ensure regulatory compliance, and minimize risk so you can operate with confidence and focus on what drives your success.

iaGuardian IT Services Suite

UC: Seamless Connectivity

iaGuardian UC

Scalable, seamless communication that boosts collaboration and keeps teams connected.

MSP: Transform IT Challenges

iaGuardian MSP Services

24/7 support, strong security, and cost-effective IT transforming your technology challenges into growth.

DR: Business Continuity

iaGuardian DR

Stay resilient. Prevent data loss and downtime with expert support and advanced recovery.

Cloud: Secure Agile. Efficient.

iaGuardian Cloud

Secure, scalable access to apps and data—anytime, anywhere—with built-in efficiency and cost savings.

Secure: Elite Cyber Protection

iaGuardian Secure

Always-on threat detection and real-time human response to stop attacks before they spread.

840+ BizRatings Reviews From Rochester Clients

Client Reviews: 840+ Score: 9.82

Industries We Empower

With decades of hands-on experience across regulated and fast-moving industries, we understand the unique risks you face. Our deep industry expertise allows us to deliver cybersecurity-first, compliance-ready IT solutions tailored to your environment and built to protect what matters most.

Financial Service Organizations

Healthcare &
Medical

Manufacturing &
Distribution

Legal Firms &
Attorneys

Nonprofit
Organizations

Professional
Services

Industries We Empower

With decades of hands-on experience across regulated and fast-moving industries, we understand the unique risks you face. Our deep industry expertise allows us to deliver cybersecurity-first, compliance-ready IT services tailored to your environment and built to protect what matters most.

More Insights

Stay connected with all of the latest IT services trends and alerts by subscribing to our blog.

Star Wars

Your Cyber Insurance Won't Save You If This Gap Is Already Open

May 08, 20265 min read

Most business owners in Rochester, Buffalo and across upstate New York have done the responsible thing. They've purchased cyber insurance. They have a policy in place. And they feel, reasonably, like that safety net means they're covered if something goes wrong.

Here is what those policies increasingly require, and what too many businesses discover only after a breach: authentication controls have to be in place for coverage to apply.

A review of more than 67,000 cybersecurity vulnerabilities and 60 confirmed data breaches from 2025 found that 65% of those breaches traced back to authentication failures. Weak passwords. Reused credentials. Login accounts that were never disabled after an employee left.

These are exactly the gaps that modern cyber insurance underwriters are looking for. And when they find them after a claim, coverage gets complicated fast.

What Authentication Failures Look Like for Upstate New York Businesses

Authentication is how your systems determine who is allowed in. When those controls are missing or out of date, the consequences are straightforward and serious.

Here is what that looks like for a manufacturing firm in Rochester, a healthcare practice in Syracuse, or a financial services business in Buffalo:

A departing employee's credentials for the company's accounting platform, file server, and email are never fully revoked. Weeks later, those credentials are used by someone who should not have them.

A team member uses the same password for their work login and a personal account. That personal account is caught up in an unrelated breach. The business's systems are now at risk through no direct fault of anyone inside the company.

A cloud platform the team relies on daily has no multi-factor authentication requirement. A single stolen password is all that stands between an attacker and everything stored inside it.

None of these require a sophisticated attack. They require a gap that nobody closed.

Growing Businesses Are Exposed in Ways They Don't Always See

One of the things we hear consistently from business owners across upstate New York is that their security feels adequate. The software is updated. The antivirus is running. Things seem fine.

What often goes unexamined is the human side of access management: who has credentials, which systems they can reach, and whether any of that access should have been removed months ago. For businesses that have grown, added staff, changed software platforms, or navigated turnover, that picture gets complicated quickly.

Modern cyberattacks are automated. They don't require a human being to choose your business as a target. They run continuously, testing credentials and probing for access gaps across thousands of systems simultaneously. A manufacturing company in the Southern Tier and a global corporation face the same scan. The difference is how much surface area each one leaves exposed.

The Window Between Breach and Discovery Is Where Businesses Get Hurt

The most unsettling aspect of an authentication-based breach is how quietly it tends to unfold. There is no alarm. No obvious sign that anything is wrong. The average breach goes undetected for weeks, sometimes longer, while data is being accessed and copied in the background.

According to IBM's Cost of a Data Breach Report, the average global cost of a data breach now stands at $4.88 million USD. For businesses operating in financial services, healthcare, manufacturing, and nonprofit sectors, the regulatory consequences layer on top of that. Breach notification requirements, compliance exposure, and the impact on client trust can outlast the incident itself by years.

The gap between when a breach starts and when it is discovered is where the real damage accumulates. Closing that window before it opens is what proactive IT management is built to do.

What Your Business Should Have in Place Before You Need It

The controls that prevent most authentication-based breaches are consistent and well understood. They just have to be implemented deliberately and kept current as your business changes. Every New York business should have:

Multi-factor authentication (MFA) enabled across every critical system and application

Regular access reviews that account for every active credential and remove access that is no longer needed

Credential monitoring that alerts your team if your logins appear in a known breach

A consistent off-boarding process that disables accounts on an employee's last day without exception

These are not optional extras. They are the baseline that most cyber insurance underwriters now expect to see in place. For businesses that don't have a dedicated IT team maintaining them daily, a local partner with 32 years of experience doing exactly that makes the difference between being covered and being exposed.

Don't leave your business vulnerable to the dark side of cyber threats.

We invite you to an exclusive VIP movie premiere of Star Wars: The Mandalorian & Grogu on May 21st, hosted by Info Advantage and Fortinet. Qualify for two VIP tickets and a premium gift bag by scheduling a brief, 30-minute strategic consultation with our leadership team to discuss your current technology posture. Space is highly limited for this elite gathering of business leaders.

Register now to claim your VIP passes.

Your Business Deserves a Partner Who Brings You This Before You Ask

At Info Advantage, relentless perseverance is not just a value on paper. It means we are watching for the things our clients don't have time to watch for, and we bring them forward before they become problems.

If you are not certain whether your authentication controls, access management, and off-boarding practices are where they need to be, that conversation is overdue. Your business is too important to leave that question open.

Schedule a call with the Info Advantage team today and get a clear, jargon-free picture of where you stand and what it takes to protect the business you've worked hard to build.

cyber insuranceauthentication failuresMFAaccess managementcredential monitoringemployee offboarding
Back to Blog