Indianapolis computer service indiana it service and network support         L5 Solutions - Blog      // We make IT easy

    indianapolis computer service

Is your computer haunted? How to be #CyberAware this Halloween

Oct 31st, 2016 | Posted by | Filed under Indianapolis IT support
Comments Off on Is your computer haunted? How to be #CyberAware this Halloween

The last day of National Cyber Awareness Month just happens to coincide with Halloween. Anyone who has experienced a hack, ransomware, spyware, or other computer attack know that it can be a scary experience. To keep your network and data safe this Halloween and moving forward, let’s look back at the highlights provided by Stay Safe Online for this year’s National Cyber Security Awareness Month.



Cyber Security is Crucial for Business Success

If it doesn’t scare you that “86% of Americans say they avoid companies that don’t protect their privacy”, it should. This means one data leak or hack and you are scaring away not only the affected customers, but potential ones as well. You’ve seen the headlines when major corporations have had their networks comprised. Not having a solid cyber protection in place just isn’t worth the risk.

The way to avoid these issues is education. Your IT department shouldn’t be the only one who is looking out for your security. All employees should be aware of privacy policies and know how to look out for and report suspicious emails and computer activity.



We’re Not Protecting Our Private Information

Only 16 percent of those surveyed by the National Cyber Security Alliance are actually reading company privacy policies. Not knowing how
your private information is being used can be dangerous. Before giving out critical information such as your social security or credit card number, make sure you know how it’s being used and who will have access to it.

Most major companies should have a policy you can view. If you can’t find one, don’t be afraid to ask – and if you aren’t satisfied with the answer, err on the side of caution and take your business elsewhere. This also applies to using log-in information anywhere that isn’t the intended website.




It’s More Common Thank You Think

If you’ve never faced a cyber-attack before, it can be easy to think it will never happen to you – maybe you think your business is too small or your information not valuable. As a part of the NCASM, Microsoft released new information revealing that 2 out of 3 of those surveyed experienced a techs support scam in some way – with 1 in 5 continuing the fraudulent process in some, and 1 in 10 users losing money to the scam.

This is of course only one type of the MANY scams and viruses currently circulating the internet. Just because it hasn’t happened to you yet doesn’t mean it never well. Save your company some time and become cyber aware before it happens.



Shared Responsibility

While this is only a fraction of the information shared this month for National Cyber Security Awareness month, there has been an ongoing theme throughout the campaign – “keeping the Internet safe and secure is our shared responsibility.” It’s not just enough for some or even most internet users to be cyber aware. If we truly are going to keep the internet a safe place for everyone’s data and finances – it has to be a group effort.

Never Miss An Update

Want to hear about upcoming offers, giveaways, and news before anyone else? Sign up for our up-coming newsletter!

Word Verification:


How Drones Will Help The Construction Industry

Oct 6th, 2016 | Posted by | Filed under Guest Post
Comments Off on How Drones Will Help The Construction Industry

Today’s guest post is brought to you by Yunhong Liu, the founder of We Talk UAV, a new drone community and news site launching later this year.  

Drones are increasing in complexity and innovation, and as a result, their uses are becoming more diverse. This year, construction companies began putting the technology to the test. As part of a trillion-dollar-per-year industry, builders are always looking for new ways to boost production. Fortunately, drone manufacturers are eager to get in on the action. Here are some ways drones will fit into the construction industry:


Lowering Costs

One of the most significant impacts drones will have on construction is lowering costs, which is good news for builders. Commercial drones are expected to replace more than 100-billion dollars’ worth of labor. Services, like surveying and inspections, that would normally require 3rd-party contractors and additional manpower can now be performed by sophisticated drones. Also, hefty sums that would have been reserved for helicopter pilots, usually thousands of dollars, can be conserved or directed into other areas of the construction project. For major jobs, cutting costs can help workers operate more efficiently by enabling companies to increase manpower.

Code Compliance

Site managers have to ensure that every inch of the building, above and below ground, is up to code. Obviously, structural problems will delay completion of the project, but drainage systems and soil properties are also a major concern. Helicopters have been useful, in the past but not as efficient as most builders would prefer, and the distance pilots are forced to maintain between themselves and buildings has presented complications. Using specialized imaging and software, drones have the capability to quickly produce high-quality thermal images and 3-D models that can help inspectors evaluate structures.

Land Surveys

Drones are useful for more than just making sure the job is performed properly. They are becoming an asset throughout entire construction projects. That includes evaluating the property for potential issues before a single concrete block is laid. Vasts amounts of time and labor have been, in previous years, spent analyzing soil and collecting measurements, but drones armed with smart sensors are already making noticeable improvements. Using Bluetooth or RFID sensors, information from drones can be sent directly through the cloud to users on the ground.


It’s no secret that construction jobs are considered to be among the most dangerous, especially for those who work on commercial projects. Building inspectors have to worry about getting up to heights several feet (sometimes hundreds of feet) above the ground, but they also have to investigate hard to reach places and those with potential chemical hazards. Drones are small and agile enough to fly into narrow, hazardous spaces in order to capture images and footage for use during inspections. They are already heavily involved in construction projects and are expected to become more prevalent within the coming years.


Despite regulations and critics, drones seem to be doing more good than harm, at least as far as builders are concerned. They are faster, safer, and cheaper, overall a smart investment. You can love or hate them, but drones are no longer limited to science fiction. They are rapidly becoming a reality for millions of people all over the world.



Why You Should Stop Using BitTorrent

Sep 1st, 2016 | Posted by | Filed under Indianapolis IT support
Comments Off on Why You Should Stop Using BitTorrent

BitTorrent facilitators are facing another disparaging malware attack.  Popular client Transmission was unknowingly distributing a brand of malware known as “OSX/Keydnap”. This is a backdoor program which target Macs in order to steal passwords and gain root access to the user’s computer. 

This should be concerning to users because earlier this year, another similarly coded “KeRanger” ransomware was discovered in the Transmission client. This was believed to be the FIRST TIME the Apple operating system has dealt with ransomware, as Macs have curated a brand known for “not getting viruses.”

Photo credit Paloalto Networks

Screenshot from Paloalto Networks

There are certainly legal and legitimate reasons to use torrenting. The concept, founded by Brahm Cohen , was to help small publishers with slower upload speeds share content. Sites like “The Pirate Bay” have given torrenting a bad name, by breaking copyright laws and helping people large of people obtain free media illegally. But even if you plan to use torrenting for completely legitimate reasons, the question becomes not if it’s legal, but if it is worth the potential threat to your computer and your company’s network.

Here are some dangers to using BitTorrent clients:

  • Anyone can see your IP Address: When someone downloads a torrent they can see information about the contributing peer, including your IP address. This is a useful tool for hackers to easily search for computers that might be vulnerable.
  • Dangerous advertising: Torrenting sites don’t always have your best interest at hearts, especially those that operate like Pirate Bay and do not worry about the legality of the content. These types of torrenting sites have advertisements that are annoying and have the potential to contain malware – because the site is more worried about making money than protecting it’s users.
  • Executable files: It is natural to be suspicious of a file that wants to execute a program on your computer. However, if you were going to BitTorrent to download something, you may be less suspicious and grant access to an executable file that ends up being malware searching for personal information on your computer. The malware could be secretly included with the legitimate file.
  • Compromised data: If a torrent file is located in the same folder as other critical information, it is possible a user could accidently include access to this folder when they upload and download torrents. If done on a work computer, these files could contain private company information.
  • Internet Speed: Internet service providers do not trust torrenting clients, and may throttle your internet downloading speed as a result. This could result in reduced speed for all your internet usage, and for your ISP to begin closely monitoring, and possibly even report, your usage.

By Scott Martin - Own workThis vector image includes elements that have been taken or adapted from this:  Desktop computer clipart - Yellow theme.svg.This vector image includes elements that have been taken or adapted from this:  Arrlr.svg (by Harlekin96)., CC BY-SA 3.0

By Scott Martin

BitTorrent began years ago, before Google Drive and Dropbox gained the popularity they have today. It filled a need in a time when internet speeds were slower and people needed a way to quickly distribute files. But now that safer alternatives exist – it’s time to take a step back. If your company is still using torrenting to distribute files, or allows users to do so for their own means – ask yourself this: is it worth the risk?


Dropbox Business AdminX Update to Make Collaboration More Secure

Aug 25th, 2016 | Posted by | Filed under Indianapolis IT support
Comments Off on Dropbox Business AdminX Update to Make Collaboration More Secure

Dropbox – it’s not just for storing documents anymore. The file storage company has 500 million users with three different levels of membership – basic, pro, and business. The business level allows for collaboration with a team and has additional safety features such as permission levels and administrator tools. These tools are being refreshed with latest update Admin X.


            AdminX started as an internal movement last year. The idea is to take Dropbox’s user-first approach to design and tailor it so that IT professionals can better empower and protect company data. Admin tools have always existed, but they are now easier to use and provide more flexibility. AdminX is the name of the revitalized admin control dashboard.

Screenshot from official Dropbox blog

Screenshot from official Dropbox blog

Team Folder Updates 

            Admin X is primarily an update to team folders and security controls relevant to them. A team folder is essentially a “digital hub” for sharing documents. It a way to ensure members have access to the files most relevant to their productivity without having to search through a company’s entire database. Here is an overview of team folders:

  • Team control: Administrators can invite people to this team folder whether they are a member of your Dropbox Business account or are an outside collaborator. Before, controls only allowed for a single file or entire DropBox to be shared to an outside user, causing too little or too much data to be accessible to freelancers and contractors.
  • Syncing: Admins can decide if files sync automatically to team members, if they do so differently based on the kind of device, and the total number of devices that can be synced. If there are security concerns for certain files to be viewed on mobile, these new syncing tools will help address that.
  • Permission Controls: All the granular permission tools are now easy to view in one place. Admins can set whether a team member can simply view or download a file, or whether they can also delete and edit them. This ensures an important file is not accidently deleted.
  • Improved event logging: If something goes wrong with a document, admins can figure out who did it and when with an audit log. The new event logging shows all the edits and versions of a file along with the username and IP address of who did it. This inclusion of IP address could be vital if someone is worried their account has been compromised.

Screenshot of team folder manager in Dropbox Business Admin Console

Screenshot from official Dropbox blog

These tools will roll out over time, unless an interested user would like to sign up for early access.

Next Steps

If YOUR businesses wants to join the 200,000 companies currently using Dropbox Business, there’s no better time to do so. With the recent Dropbox Infinite update helping with storage, and new administrator tools rolling out – Dropbox is on the side of innovation and productivity for your company.

L5 Solutions is a proud Dropbox partner. We are happy to announce that for a limited time we can offer a discount to help your company share easier and safer. Sign up now through L5 Solutions to receive a FREE 1-year user license ($150 Value) with the purchase of a base business plan.

To learn more about how to get your FREE 1 year license, fill out this simple contact form. .

solutions provider


The CryptoVirus Threat: How to Prevent and Prepare for the Ransomware Attack

Aug 17th, 2016 | Posted by | Filed under Indianapolis IT support
Comments Off on The CryptoVirus Threat: How to Prevent and Prepare for the Ransomware Attack

CyptoWall, CryptoDefense, CryptoLocker…different names for the same powerful ransomware virus.  You know that you are the victim of a CryptoVirus if you see a message like this:

The moment you see this on your computer is likely to be intimidating- and for good reason. You should take a CryptoVirus seriously, as encrypted files can never be decrypted without the key. It’s important to be educated on what the virus does, how to prepare for it, and what to do if you find yourself a victim.

What is a CryptoVirus

CryptoViruses can enter your computer the way other malware does such as unpatched versions of Java or Flash and phishing emails. Once the Zip file runs on your computer, a Trojan will place itself in a location such as AppData or Local App Data and add a key to ensure it always runs as soon as you start up your computer.

The Trojan malware then encrypts files on BOTH the hard drive and accessible network drives. The CryptoVirus has now gained access to these files and hidden them behind a private key. It will inform you that you cannot get your files back unless you pay them a ransom within a certain time frame.

How to Prevent a CryptoVirus

Don’t wait for a virus to hit your computer to create a proper defense plan.

  • Security Training: Make sure your team is informed about the latest Crypto threats, and knows how to identify suspicious emails. Show examples and inform people to call and ask a sender before opening an email they are unsure about.
  • Routine Patching: Every program on your computer, from Java to your Antivirus system, should be patched as soon as one is released. Hackers take advantage of discovered flaws in older versions.
  • Restrictions: It is possible to put restrictions on the computer for software downloads and files executing automatically. This can limit the download of legitimate files, but is worth it to protect from virus threats.
  • Backup your data: Whether it’s on an external hard drive or on a cloud solution, restoring from a data backup is the only way to retrieve your files. Without they key, you will likely never get those files back in the current form. A backup ensures minimal data loss if you are updating it frequently.

If you Have a CryptoVirus On Your Computer

Whether it’s personal items such as family pictures or information vital to your everyday productivity such as workplace documents, it might feel tempting to pay the ransom. But if at all possible, do not pay the CryptoVirus hacker.

Yes- your files are important. But there is a chance that even if you pay- the hackers might not give the files back. They are already taking part in illegal activity, and have no reason to return the files to you.

You should also consider that paying hackers makes CryptoViruses a business model. By giving them money, you are reinforcing the idea that they can profit off innocent people accidently downloading a file. It will only encourage them to continue to improve the virus.

Instead, make sure you are working with an IT professional who is equipped to restore a backup and run scans to ensure your computer is now virus free.

The CryptoVirus has taken different forms in the past, and hackers will likely continue to modify this powerful form of ransomware. We know your files are important. Stay informed, update programs, and invest in a back-up solution and your data will be defended from the tactic these hackers try next.


When Lightning Strikes: Protecting Your Computer from a Thunderstorm

Aug 10th, 2016 | Posted by | Filed under Indianapolis IT support
Comments Off on When Lightning Strikes: Protecting Your Computer from a Thunderstorm

In July 2014, a thunderstorm hit Indiana that caused a power outage effecting thousands – both individuals and businesses. A smaller but still significant outage happened just this year in Boone County. Summer is still in full-swing, and the risk of more thunderstorms is present. This means it is a good time to take a look at what a power outage can do to your company’s technology and how to prepare for it.


Power Outage Dangers

  • Unexpected computer shutdown:Ideally you only want your computer to shut it down when you have told it to do so. This is because there are sequences your computer goes through to safely shut down programs when you’re turning it off. If this does not happen – files that were not finished writing to the disk can become corrupted.
  • Power Surges: Lightning strikes can strike at over several million volts. No device without protection can handle that amount of power. If there’s a power surge, it will hit your computer’s power first. This means a good possibility that your computer will not reboot until the power supply has been replaced. Sometimes, a power surge can do even more damage, reaching the video card or even the motherboard, leading to expensive repairs or possibly replacing the device.

How to Prepare

If you have advance notice of the storm, here are some precautions you can take.

  • Unplug your computer: Turning OFF your computer is not going to be enough. The only way to be 100% safe from a power surge is making sure there is no power to experience the surge. This might be frustrating, but is still the safest option. You are going to want to do the same with your routers, servers, and other electronic equipment.
  • Back-up your data: Ensure all your work is backed up on either your cloud or an external hard drive. If you have to work from home because of a storm, the data will be with you, and there’s no chance in losing it if a power surge happens.
  • Invest in an Uninterruptible Power Supply (UPS): A UPS has a built in battery that can help sustain your computer in the event of sudden power loss. You can also program the UPS to safely shut down your PC after a certain amount of time. A UPS is safer than surge protector – which usually stops working the first or second outage and will not protect you from a lightning strike.



How to Recover

Storms can be unexpected, and precautions can fail. If you find that your company does not have a plan for your server or technology in a storm, you are going to want to turn to a managed service provider. Here at L5 Solutions, we can put systems in place to protect your technology, or if need be, successfully restore backups and re-install operating systems.

Our client Patricia says “Prior to doing business with L5 I always worried about weather and what that would mean for our business’s connectivity (servers, computers, etc.), but I have to say, that since having L5 Solutions provide their IT services to our business has provided such piece of mind.”

Don’t let a thunderstorm be the reason you lose company data or have to buy a new device. Keep an eye on approaching storms, and put systems in place to protect your technology. It only takes a few minutes, and could save you hours or even days of headaches.


How to Get Your Company Secure for the BYOD Mobile Trend

Aug 3rd, 2016 | Posted by | Filed under Indianapolis IT support
Comments Off on How to Get Your Company Secure for the BYOD Mobile Trend

The Growing Trend

Mobile devices have changed the face of the workforce. According to Tech Pro Research – 74% percent of businesses survey allow or plan to soon allow employees to “Bring Your Own Device” (BYOD) to work.  In industries like construction where employees are often out of the office setting – this can allow for increased productivity and workflow.

Extreme Risk

But while companies embrace this technology, they have forgotten a key step – security preparedness. Mobile Security and Risk Review reports that “less 5% of enterprises are using mobile threat detection.” Additionally, 63% of companies have no policy in place regarding the kind of data employees can have on their mobile device.

These numbers should be scary because these risk have had consequences. In 2015, 6 million devices faced a malware infection. That’s 32 for every 1,000 devices. And users aren’t always aware their phone is infected (only 26% are)– leading to thousands of devices that never get cleaned.

How You Can Prepare

With so many different devices out there, it can seem overwhelming to protect them. But there are sure-fire ways to protect your data that can be done across almost any device.

  • Create a Policy: Before the question of security even comes into play, it is important for a company to have a policy for BYOD and mobile use outside of the work place. What kind of activities can an employee do? Just check email, or be able to access customer databases as well? Where can employees use their devices? Setting this up ahead of time can avoid headaches later.
  • Two-Factor Authentication: Additional to a password there are other forms of access mobile devices offer, such as a fingerprint scanner. This makes it that much harder for someone to hack your device.
  • Remote wipe capabilities: If a device is lost or stolen, remote wiping can be useful. While any data unique to that phone could be lost, it is much safer than letting that valuable information fall into the wrong hands. Some phones have settings to wipe after a certain number of failed password attempts.
  • Encryption: Sensitive files and data should be encrypted before viewed on a mobile device, especially over an unprotected wireless network. Apple has had an encryption file system in place for quite a few years on the iPhone. When the iPhone is locked, files are encrypted until the passcode is reentered. Android does not have the same protections automatically, but they can be enabled.
  • Provide training: A good employee is not going to be negligent and allow a data leak on purpose. More than likely, they simply didn’t know the correct way to access sensitive data. Providing routine security training and educating employees on the current threats can help them me more aware.

In Conclusion

Mobile devices are a sign of innovation and are unlikely to leave the workplace anytime soon. This is a good thing for productivity and moving business forward, but comes with new security risks. Coming up with a policy and putting security measures in places will assure your business is ready to embrace a BYOD policy.


Malvertising: Protecting Yourself from Malicious Ads

Jul 27th, 2016 | Posted by | Filed under Indianapolis IT support
Comments Off on Malvertising: Protecting Yourself from Malicious Ads

We’ve gotten smarter about malware. An email with a strange looking sender or a suspicious link is easy to avoid when you know how to look for it. But malware does not always make itself so obvious. Sometimes, it acts more like a chameleon and is able to slip in to legitimate websites. One form of this is known as “malvertising.”

Understanding Malvertising

Malvertising is a particularly deceptive form of malware which poses as a genuine advertisement on a website, but is actually holding malware. Some of these ads do not even require you clicking on them to do damage- simply scrolling over them can be enough. There are even forms of malvertising that do not need ANY kind of interaction. All you have to do is visit an infected page.

The scary thing is that avoiding unsecure websites is not a plan to keep you safe from malvertising. In the past, malvertising has attacked major websites such as Yahoo, AOL, and The New York Times. Hackers want to place these ads on high-traffic websites such as these to reach more people.

You can check out our infographic below more to learn more about the threat of malvertising, which continues to grow year after year (between 2014 and 2015, the amount of malvertising tripled). What you need to know is that the threat is growing and is all over the internet.

It’s important to note that the payload for the majority of malvertising is ransomware. Ransomware is when a hacker “holds your computer hostage”  in some way and demands something, usually money, in order to release your computer. Often there will be some kind of time element to make the threat more compelling.

Malvertising Infographic
What You Can Do

            Because malvertising can occur on websites you trust and visit daily, avoiding the risks is not so much about caution but PRECAUTION, as in putting systems in place before you ever go to a website.

  • Installing an ad blocker: This can greatly minimize the threat of malvertising, however some sites will block their content when they detect one installed for revenue reasons. Therefore, if you want to go to one of these sites you will need additional security in place.
  • Click-to-run browser settings: Browsers have settings so that Flash and Java do not take action automatically, and instead must be clicked on to run. This is a step to make sure you control what you see and not the advertisement. Flash in particular is a popular target for cyber criminals.
  • Keep your computer updated: Malware is looking for vulnerabilities in your system. Patches and updates are released for browsers, operating systems, and security programs frequently once issues are discovered. Even an old version of Java or Flash could present a risk. Don’t let malware find this weakness and make sure everything on your computer is updated frequently.

L5 Solutions believes in multi-layer systems to protect our clients from threats such as these. We have tested multiple anti-virus systems to find one we most recommend and have strong firewall systems on any computer we monitor. For laptops used on the go that are outside of the office, we have other security systems in place to ensure protection.

Cyber criminals are always going to be looking for new ways to comprise your computer. Malvertising may be a current “fad”, but as people better educate themselves it may lose popularity. This is why it is so important to ALWAYS practice safe browsing and to stay aware of current threats. Cyber criminals may be smart, but we can be smarter.


L5 Solutions 10 Year Anniversary, Part 2: The Team

Jul 21st, 2016 | Posted by | Filed under Indianapolis IT support
Comments Off on L5 Solutions 10 Year Anniversary, Part 2: The Team

When you call L5 Solutions, you are not calling an automated system, but a group of people. The L5 team is made up of people at different points in their careers who bring different experiences and knowledge sets to the table. Some come from the corporate world, others from healthcare, etc.  However, they have several things in common that make them a team – and it’s not just the fact that two of our technicians are named Nick.

smiling candid

  1. They Like Working With Customers

All the technicians say that one of their favorite things about working at L5 is the variety of the work. “We get to be a part of a lot different sectors while doing the same work” Wyatt describes it.

This means interacting with lots of people on a daily basis. Nick Grady says that it feels “great when you can help them quickly” and focuses on remote work while Wyatt enjoys going on site because of the in-person interaction and the ability to help multiple people at once. “It’s great to see them happy once their stuff is working.”

  1. They Work as a Team

Since every day is a little different, the technicians at L5 work together to solve problems, whether that’s giving advice or tackling something together. Everyone can bring their various knowledge and experience to the table.

Josh says it makes him feel confident knowing “somebody will be able to help you out” and that the end product is ultimately better as a result. He describes the technician team as a culture of being inviting and learning, so that everyone can thrive.

Delegating can also be key, especially when it’s a situation that required all hands on deck. If a server goes down, speed is key to get a company back up and running. This means everyone needs to pitch in and problem solve.

  1. They Believe L5 is different

Josh describes his IT working experiences before L5 as restricted – “You have to stay in the box”. But at L5, he feels more freedom to be conversational with clients and he is able to resolve issues more efficiently. He doesn’t feel held back by a corporate “script”, and is better able to understand and bond with the client as a result.

Nick Rabiola echoes these ideas, saying “We do things differently for different places because we do what makes sense.” He feels there’s less red tape and so things get done faster, instead of his experiences with other companies where “you only see things one way.”

For Nick Grady, all of this translates to a better response time and what he feels is simply a more organized work environment. This organization looks like better, consistent documentation, with a ticketing system updated daily to ensure everyone is on the same page. It also leads to superior problem solving. “We’re in the business of doing it the right way”, says Wyatt. “We have systems that we know work every time.” When a ticket comes in, it’s not just about solving an individual issue. It’s about following best practices and “asking the right questions” to understand what a client is truly trying to accomplish and why. That way, they can be set up to avoid future issues.

 A Non-Technical Viewpoint

            As for me, Miranda Lenar, there has been something exciting about being the first full-time marketing person for L5 Solutions. For almost a decade, L5 has grown simply on word of mouth and providing quality service to their clients. There is something powerful and organic about that, and I love hearing from our customers about how pleased they are with our personable nature and fast response time.

I look forward to continuing to get stories of both clients and technicians and improve my communication with our audience.

This has been a look at the team behind the name here at L5 Solutions. We are excited to continue minimizing technology frustration and putting our best foot forward for our client’s success.


L5 Solutions’ 10 Year Anniversary (Part 1: History)

Jul 20th, 2016 | Posted by | Filed under Indianapolis IT support
Comments Off on L5 Solutions’ 10 Year Anniversary (Part 1: History)

L5 Solutions is celebrating 10 years of minimizing technology frustrations for our customers. Therefore, it is a good time to stop and take a look back. This is part one of a two-part series getting to know the people behind the computer, starting with Frank Howard and what led him to founding L5 Solutions.

Before L5

Frank was introduced to the atmosphere of small business from a young age and it was a consistent part of his development. His mother owned a beauty shop attached to their house, and as a young teen Frank worked with local farmers. In high school, he worked at a local video store. These all taught him important values he would carry into his professional career such as hard work, customer service, and how to really take care of a customer.

It makes sense then that Frank would spend 12 years at a small engineering firm, Frakes Engineering, doing roles from computer drafting to IT to ultimately General Manager. This showed him what else a small business can offer – and that’s the “awe inspiring” investment into the lives of their employees. His coworkers were able to do successful work, while still having time to raise and advance their families.

“Burning the Ship”

Despite enjoying using his technical and management skills for Frakes, Frank felt there was a missing piece to his day to day work, and that was working with customers. He wanted the opportunity to make an impact by helping people “effectively use technology to improve their situation” and thus spread their own personal impact.

But “you can’t get anywhere by yourself”, and so it was with the help of Kirk, Frank was able to “burn the ship” of a comfortable job and make the leap into starting a small business of his own. He brought with him all the lessons and ideals from the professional experiences that came before. The pair worked out of their houses for a year before moving into open office space at Frakes – in the beginning sharing a desk area.

Orginial office
Behind The Name

            In looking for a name, Frank turned to a book he had received in a peer group called “Good to Great” by Jim Collins. “Leadership has always been something I liked,” he recalls, and the Level 5 leadership described in the book was something that resonated with him – a blend of “deep personal humility” and “intense personal will.”

Focus on Service

            As L5 Solutions grew, so did the team behind it. “The tech part is the easy part, the people part is what’s hard”, was the mentality Frank used in choosing members to bring on. It was important to him that the company’s technicians understood how to work with people who were frustrated about their technology. He wanted team members who cared about the issues of their clients personally. If they didn’t know the answer right away, they would figure it out, because fixing the problem mattered.

Check out part 2 for more about the technicians at L5.

As the industry changed with the additions of new technology, L5 focused on maintaining this personal customer service versus the “bleeding edge of technology.” Frank felt it was more important to evaluate the pros and cons of new innovations and worry about what makes sense for the client than attempt to offer only the new fads and buzzwords.

The same ideals went into the problem solving mindset which L5 works. Instead of just fixing a problem to make it go away, Frank wanted to focus instead on efficiency on both ends. What was the real root of the problem to make sure another one didn’t happen in the future? Success was measured more by reducing issues that needed to be reported, not the number of ones that were solved. Staying small allowed L5 to do this on a personalized level for each company.

Group Shot 1
  Future Goals

            The goals of L5 Solutions will not change going into the next decade. No matter what kind of growth the company experiences, the focus will be on adding “the right customers, on the right plan to make us all successful.” We will continue to help our clients leverage technology to improve their business.