Sales Inquiries: (508) 324-9475
Client Support: (508) 324-9475
Our services are built for serious organizations that demand experienced engineers, consistent service, and real technical depth.
Proven Technical Skill
Our engineers solve issues competitors cannot and deliver lasting, high-value outcomes.
Enterprise Certifications
We hold advanced credentials rarely offered by staff at regional IT services companies.
Serious Client Focus
We provide structured onboarding, fast response, and clear communication at every step.
No Junior Tech Roulette
You always work with experienced professionals who know your environment and systems.
CEO, Micro Technology Solutions
Every technician at MTSi is carefully vetted, thoroughly trained, and supported to perform at the highest technical level possible.
At MTSi, our hiring process is deliberately difficult. We are known throughout the South Coast as one of the hardest IT services firms to get into. Our team is made up of experienced engineers with elite certifications, proven technical depth, and professional integrity. We train continuously and operate with pride in our work.
Work with an IT services team known for its intelligence, professionalism, and elite performance. Call (508) 324-9475 to harness IT solutions and IT experts capable of supporting your growing organization.
Managed IT Services
Gain stability, uptime, and clarity with IT services built for complex, growing environments.
IT Outsourcing
Cut costs and free up resources with fully managed, enterprise-grade IT services and support.
Cloud Solutions
Virtualization services from certified Microsoft and VMware experts for cloud transitions.
Security & Compliance
Protect systems and data with IT services that meet today's evolving cybersecurity and regulatory demands.
Wi-Fi Network Surveys
Fix signal gaps and poor performance using certified wireless engineering and Ekahau precision tools.
Unified Communications
Streamline communication across voice, video, and devices with expert Cisco-certified UC design and support.
Network Integration
Build a better infrastructure with IT services that integrate systems securely and effectively for long-term performance and scalability.
Microsoft Solutions
Extend your capabilities with Microsoft 365 and Azure solutions expertly configured by certified professionals today.
Discover how Micro Technology Solutions Inc. has transformed businesses by providing exceptional IT services. Hear firsthand from our clients about the challenges they faced and the solutions we delivered.
Reliable IT partnership supporting essential housing operations.
Secure systems powering vital healthcare services.
Trusted IT support empowering important community programs.
Explore how our engineers help serious organizations navigate complex infrastructure needs, eliminate recurring issues, and upgrade their IT services experience.
Recently we helped an organization who was under attack by an email bombing campaign. Imagine receiving 5,000 email messages an hour. There are so many messages, it is impossible to sift through the junk to find legitimate correspondence. If you are lucky, you can call your MSP for help. If not, we hope this brief article will help.
The first and most important message to anyone who is the target of an email bomb is this: Use caution! The email bombing may be a tactic to distract you from another threat. Such as:
Email notifications about purchases made on a personal credit card or account.
Email notification about a funds transfer on a corporate account.
Someone who calls offering technical help, but really wants access to your system.
Another attack going on elsewhere while IT is busy dealing with the email bomb.
It will be nearly impossible to delete the messages individually, so what can you do?
Spam Filters and Rules
The first thing to do is look for patterns in the messages that you can use to filter out the unwanted emails. Often attackers will use bots to sign you up for newsletters, which triggers a flood of email confirmations that look legitimate individually. In this case, you might filter for things like “Welcome to our newsletter,” “Your new account,” or “unsubscribe.”
In other cases, attackers may use fake email addresses that mimic trusted contacts. This makes it harder to identify the source of the attack and AI generated content will make filtering more difficult.
Many spam filters allow you to adjust settings. Moving to a more restrictive level of security may eliminate thousands of emails.
Safe Senders List
Within Outlook, you can configure the junk option to: “Safe Lists Only.” When you do this, the only mail that will be delivered to your inbox will be from addresses on your safe senders list. To add a large number of addresses, you’ll want to navigate to Junk Email Options / Safe Senders. Here you can easily add email addresses. You can also choose to permanently delete suspected junk email rather than sending it to your Junk Email folder. If you are using an advanced spam filter, you can follow a similar process. By doing this, the unwanted messages will be prevented from reaching you.
DNS
To protect against email-based threats like phishing and spam, organizations can implement three key anti-spam measures: SPF, DKIM, and DMARC. SPF checks if an email comes from an authorized server by matching the sender’s IP address to a list in the domain’s DNS records. DKIM adds a digital signature to emails to verify they haven’t been altered during transit. DMARC builds on SPF and DKIM by setting policies on how to handle emails that fail authentication and provides reporting on suspicious activity. Together, these protocols help prevent spoofing, improve email deliverability, and increase the security and trustworthiness of email communications.
Change Your Address
In severe cases where filtering does not work, you may be tempted to change your email address. Note that when you do this, your system will start sending Non-Delivery Reports (NDRs) back to the original senders. If the sources are widely distributed, the sending email services may not notice. Unfortunately, your service provider will. You may end up blocked for the volume of mail your deleted account is generating. These blocks typically last 24 hours. The attack will eventually wane and you’ll be able to restore the account, usually in a few days.
Follow Up
As soon as possible you’ll want to check for unusual activity on personal and corporate financial accounts. You will also want to audit corporate computer systems for any unauthorized activity. We recommend reporting email bombing incidents to your email provider and, depending on the severity, to law enforcement or a cyber incident response team. Reporting can help track the attack and prevent future attacks on other users.
The best defense for any attack is to have proper tools in place to protect your accounts. While an email bomb is mostly a nuisance, real threats can be prevented and detected with the right security tools. We recommend advanced spam filters, anti-malware software, and email security solutions. Which tools fit your environment will depend on your infrastructure and the services you use.
Reach out to our sales team to learn more about a set of tools that fits your technical environment and your tolerance for risk.
No. We have developed and refined an onboarding process to minimize disruption for your team. We recommend an overlap period with your current provider (based on the size of your organization), so we can receive documentation and access to your systems and transition your devices to our cybersecurity tools. Your users may notice new software agents installed on their computers and will have new numbers to contact for support. Otherwise, there should be minimal disruption.
Staff can depart quickly and leave you in a bind. We can help. The first step is to schedule a fifteen-minute call with us to determine if our service is a fit. Next, we proceed to discovery, which could be a call or an on-site network assessment. Once this is done, we will meet to discuss our findings and to make recommendations for any system or security upgrades. We will also discuss ongoing managed services and a timetable for moving forward.
No one likes to lose a customer, but established firms understand this is part of working with any client. They have procedures in place to make the transition from one provider to another go smoothly. If you are concerned that your current provider won’t act professionally, that is a good reason to look for a new provider.
Our rates are the same for on-site and remote support. We charge remote support in 15-minute increments, so remote support is ideal for simple issues. We do charge travel for on-site support, but many clients prefer scheduled visitation. Some technical issues require an on-site visit.
MTSi has been based in Massachusetts since 1998 and our support team is located in our Fairhaven office. When you speak to someone at MTSi, they are in our Fairhaven office or working remotely from home (always in the United States).
Compared to other professional IT companies, our pricing is very competitive. We custom tailor our pricing to each customer, so we need to get to know you and your firm before giving you a price. The first step is to schedule an introductory call with us.
That is completely up to you. We will work with you during implementation to understand which systems need attention off hours (if any), who needs to be notified, how we can get building access, etc. We will document this protocol and follow it for any event that occurs outside normal working hours.
Yes. We provide an IT Roadmap for our customers and help them manage their systems lifecycle. Having End-of-Life systems is a significant cybersecurity risk, so when a manufacturer announces an End-of-Life date for a product our customers use, we meet with them well in advance of the End-of-Life date to discuss alternatives and upgrades. This helps our customers budget well in advance for upcoming projects and avoid surprise expenses that can break the budget.
If your current IT services partner cannot keep up with your needs, it is time for a change. MTSi works with organizations that have moved beyond entry-level support and are ready for expert engineers, responsive service, and a long-term technology strategy.
Call (508) 324-9475 today or click the button below to schedule your appointment. Let's take IT off your mind for good.