Get Started Today!  (813) 749-0895    SEARCH SITE

The Florida & Upstate New York IT Experts


We work hard behind the scenes to eliminate IT issues before they cause expensive downtime.

Our mission is to provide enterprise-level IT practices and solutions to the small and medium-sized business sector, with small business prices. Our dedicated staff love seeing our clients succeed. Your success is our success, and as you grow, we grow.

We offer the best IT Professional Services such as Managed IT Services, Outsourced Computer Support, Business Continuity Services, and Technology Consulting.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

 

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

FREE IT Assessment ($1,599 Value)

When you just want your IT to work!

There are a lot of IT Companies that you can contact to fix an issue or install a piece of equipment. They might be able to save you from a crisis mode, but they don’t take time to see the big picture.

At Symmetric Engineering Group, we understand what business is all about. We are specialized consultants who provide solutions to everyday challenges. We just happen to fix computers as well, but our specialty is preventing issues before they become a hole in your pocket.  

Are you looking for a partner you can trust with all your IT needs.

Why wait another second?

Request your free, no-obligation IT Assessment now.

Sign Up today!

Managed IT Questions?

  • Your Name *
  • Company Name
  • Phone *
      • Who Are We?
      • Refer A Friend
      • It's A Secret!
      • Our Difference
      Florida's IT Support Experts

      It's Nice To Know Who You're Working With, We Get That

      Symmetric Engineering Group understands that making a decision means putting your trust in us. We encourage you to find out more about our IT Company and read testimonials from our many satisfied customers!

      About Symmetric Engineering Group
       

      Refer A Friend To Symmetric Engineering Group!

      Do you know someone who you think my benefit from our IT Services and IT Support? Let us know and we will get in touch with them!

      Read More
      Refer a Friend for IT Services
       
      Managed IT Company Secrets

      Shhh, don't tell anyone we told you!

      WARNING: We are about to let you in on a secret about how most IT Support companies really make their money! We will cover the three main types of Managed IT companies and what you can expect out of them.

      Discover What It Is!
       

      We are not your typical business, We are your business partners

      We live by the idea that your business needs come first, so much so that our CEO George Lakiotis has written a letter for you to read showing just how dedicated our Full Service IT team is to not only solving problems but your success!

      Read More
      Our Dedicated Full Service IT Team
       

      What Our Clients Say

      • Great Business Partner!
        " A National Coding Recruiter"
        I would like to recommend Symmetric Group as a great business partner.  Our Company started April 1st, 2013 and since the launch of our new business we have grown to new heights.  Symmetric Group has been there every step of the way.  Symmetric Group has not only helped us with ordering all the equipment, computers, software, and setup of everything in a office setting  from A to Z but they also have the best IT support team as well with Jemar and Joey.  We appreciate everything you do for us at our company and we recommend them to anyone starting up a company or a company that is established that is looking for IT solutions.  Thank you again for all your support. - Andrew 
      • Five Stars!
        "A National Commercial Cleaning Co."

        We have enjoyed our relationship with Symmetric Group.  Each person we interact with is responsive and knowledgeable.  Simple straight forward answers to our questions are given which is a great help to a "non techie" group!   We thank you again for your service.  Five Stars! - Gail 

      • Very Proactive!
        " A Local Dermatology Practice"

        Symmetric has been providing us IT support for many years.  They successfully manage all of our fast paced medical offices.  Symmetric’s response time for any issues that arise is always quick and issues are resolved in a timely manner and can usually be done remotely which is convenient for all of us.  Symmetric is very proactive in identifying inefficiencies and recommending and implementing changes that improve our systems performance, resiliency and efficiency.  We have no hesitation in warmly recommending them to any business, large or small! – Jenni

      • I Highly Recommend!
        "A Global Lighting Manufacture"

        Four years ago, we had seven domestic offices and warehouses located in five states that were running on independent computer networks, that is, they were without any domain structure.  Thanks to the network engineers at Symmetric Engineering, we are running a secure computer network on a true domain architecture.  We are so pleased with their services that this summer we contracted with Symmetric to host our accounting servers and SQL data servers.  I highly recommend the services of Symmetric Engineering. – Jim 

      • "Extreme Professional"
        "A Local Pain Practice"

        We are so pleased with our business relationship with Symmetric Group. Their company’s customer service is exceptional.  Our service calls and/or emails are answered quickly and to our satisfaction. George is an extreme professional and is shows in his staff. Thank you for your support – Karen 

      • Thanks Symmetric!
        "A Regional Optometry Firm"

        We have partnered with Symmetric for over 5 years in our corporate office as well as our 25 locations throughout Florida and Georgia.   Symmetric has been there from the beginning when we went through the daunting task of inputting our EMR software in all of our stores, as well as doing the complete IT setup at our new locations.   They have been fantastic.  They respond quickly and go above and beyond to help us in any way they can.   They have allowed us to focus on the important work of growing our business and not wasting time on the technical aspect of it.   We highly recommend Symmetric, you will be in good hands…Thanks Symmetric! – Marci

      • They Meet the challenges!
        " A Large Civil & Utility Construction Co."

        Symmetric Group has been able to meet the challenges of our Company's fast growth over the past several years.  They make technology recommendations and manage the all of Company’s IT services seamlessly. I would highly recommend working with them. – Penny 

      Latest Blogs

      Our Top 7 List of IT Myths and Wild Conspiracies

      Myth #1 - Macs Are Secure and Don’t Get Viruses

      To debunk this myth, we actually need to take a step back and admit that it’s based in a couple of truths. The average Mac user has probably not seen much malware on macOS, but we’ll get to that in a moment. If you look at the strict definition of a computer virus as being a type of malware that spreads on a computer from one file to another, Macs technically don’t get viruses. Viruses are quickly becoming a thing of the past on other modern operating systems like Windows 10 as well, due to built-in security and the fact that the common computer virus in the strictest sense is essentially becoming obsolete.

      Other types of threats, including malware, phishing attacks, and ransomware can infect Macs. On top of that, compared with Windows PCs, which dominate with a 91.76% market share, Macs have a lower risk of getting infected just because hackers know it’s more effective to focus on malware that either infects Windows or that doesn’t care about what type of system you are on (like online phishing attacks).

      Either way, you aren’t out of the woods by making the switch.

      Myth #2 - Blowing on Cartridges Before You Play

      This one came up a few times when we surveyed our techs, so we had to include it. It goes all the way back to the mid-1980’s. Back then, many households had the Nintendo Entertainment System, and video games came on big five-inch plastic cartridges. Sometimes, when sliding a game into the console, it wouldn’t boot the game. The common practice for kids and teenagers everywhere was to pull out the cartridge and blow on the connectors and try again.

      The thought behind this was that dust had collected on the electronic connectors, which could cause issues. Unfortunately, it was more likely that the connectors just didn’t get situated where they were supposed to when the game was inserted, and it just needed to be pulled out and put back in.

      The problem with blowing on sensitive terminals of a cartridge is that the human breath contains a lot of water vapor, and over time that moisture can cause damage to the hardware.

      Myth #3 - Google Plays Favorite to Sites that Pay

      When you do a Google search, you’ve probably noticed that a few listings in the results show up as ads. Businesses can set up a budget with Google to run ads that show up within a certain geographic area for certain searches to help drive traffic to their sites. However, as web surfers, most of us inherently know when content is an ad, even at a glance. Only about 20% of traffic ends up clicking on an ad, although that’s more than enough to make Google’s ad service highly profitable and beneficial for businesses.

      That said, all of the main 10 results that aren’t paid for are not affected at all by Google Ads. These are called organic results. When people talk about SEO, this is what they are referring to. Paying for ads doesn’t affect your ranking in the organic results, so if you don’t show up in the organic results, you’ll stop showing up entirely if you stop paying for ads.

      How do you rank in the organic results of Google? It’s pretty complex and there’s no simple answer, but it’s about building good content and making your website user-friendly. Google’s goal for the search engine is to provide the best, most relevant sites when people search for something, so there aren’t many ways to “trick” the system.

      Myth #4 - Charging Your Smartphone Overnight Ruins the Battery

      This myth was sort of true at one point, but modern smartphone batteries have come a long way over the years. Now, technically, keeping your phone plugged in while it’s full is a little more stressful for the battery, because the battery goes into a trickle charge mode that keeps it topped off at 100 percent, but it’s a far cry from ruining the battery.

      This state can cause the phone to heat up a little, in the same way that watching Netflix or playing a game can cause the phone to heat up. Excessive heat IS something to worry about, as it can slowly cause wear and tear to your device. That’s why Apple and some other phone manufacturers suggest not using restrictive cases on high-end phones. Locking in that heat can exacerbate the problem.

      Instead of worrying about overcharging, it’s better to make sure you aren’t suffocating your phone. Some experts suggest taking it out of the case while charging overnight, and avoid tucking your phone into bed with you. Surrounding it with your big comfy blankets or stashing it under your pillow can slowly wear out your phone. Instead, stick with a cool flat surface or a small dish.

      Oh yeah, and don’t buy cheap knock-off cables. Only get certified cables made or recommended by the phone’s manufacturer.

      Myth #5 - Former Microsoft CEO Bill Gates Is Trying to Depopulate the World

      Okay, this one isn’t exactly tech-related, other than the fact that we namedrop Bill Gates, but when I asked around for some of the best IT myths the techs could think up, I decided this doozy just had to make the list.

      This might be crazier than what you’d expect from the tabloids in the grocery store checkout line, so bear with me. The rumor is that Bill Gates is taking his fortune earned from selling Windows, Office, and Xboxes and putting it towards his James-Bond-villain-esque goal of taking over the world.

      There are a lot of crackpot articles to back this up, claiming that the world’s richest nerd is using the Bill and Melinda Gates Foundation to help governments develop a slew of gadgets and solutions to rapidly reduce the world population. We’re talking everything from sneaking chemicals in the water to fake vaccines to a ray gun that makes you sterile. 

      My only question is which James Bond actor should we have gone up against the villainous Bill Gates? Personally, I think I’d vote for Pierce Brosnan, but I’d love to hear your pick in the comments!

      This conspiracy theory has been debunked many times, and fortunately, Bill Gates is too busy trying to give all of his money to charity to worry about world domination. Since 1994 he’s given more than $60 billion to charity and has been focused on disease research, water sanitation technologies, and childhood mortality. 

      Honestly though, a James Bond film about a nerdy villain who announces his notorious plan to take over the world during a TED Talk presentation is exactly what we’d like to see. Make it happen, Hollywood.

      Myth #6 - IT Security Doesn’t Matter if I Don’t Have Anything Important on the Computer

      We hear this one a lot, unfortunately. You might not store sensitive information on your computer, but your computer does tend to have access to a lot of places that do store your sensitive information.

      Do you check your email on your computer? Do you log into social media sites on your computer? Do you shop online or pay bills on your computer? Do you access files and software for your business? If you can answer “yes” to any of these, then your computer is a treasure trove of valuable data that you are putting at risk.

      If cybercriminals get access to your email, they can gain access to just about everything else. They can reset passwords or take your accounts and set them up under a new email altogether. They can lock you out of your bank account, your PayPal account, and any other account before you could even know what hit you. Plus, if you have access to your work software, such as your line of business apps or your CRM software, or even just your contacts, then your customers’ data is at risk too.

      The bottom line? It’s important to secure your computer.

      Myth #7 - Nothing Gets Through the Firewall

      Hollywood likes to overemphasize just how effective firewalls can be. Is our rugged hero getting hacked? The plucky young computer nerd who came along for the ride simply needs to turn on the firewall at the last minute to save the day, or in the more dramatic scenes, pull the cables out of the back of the computer.

      Firewalls are an important part of your IT security, but they aren’t going to stop everything. In fact, from a strict technical definition, a firewall only really prevents a single type of malware that spreads from computer to computer.

      More robust IT security solutions that include firewalls will stop a lot more threats than a firewall will on its own. Businesses need to equip spam-prevention, content filtering, and centralized antivirus/antimalware solutions to run in tandem with the firewall.

      Are there any myths or misconceptions in your industry? Share them with us in the comments!

      Learn More

      65 Bitcoin Ransom Paid by Florida City

      A few weeks ago, an unwitting employee of the city of Riviera Beach, a small city just up the coast from West Palm Beach, clicked on a file that wasn’t supposed to be clicked on and it ended up locking large portions of their municipal computing infrastructure. When the initial report came to the City Council, they decided it was high time that they updated their computers and approved to spend nearly $1 million to update all municipal computers. Only then were they told that new hardware is all well and good, but paying to upgrade their computers isn’t going to get their access to data back. 

      The only way that was going to happen is by giving over to the hackers demands. They were simple: produce 65 Bitcoin, and the files will be decrypted. Since after the ransomware was deployed, the city email system was unavailable and its 911 dispatchers didn’t have access to computing systems that are necessary for prompt emergency response, the city council acted quickly as to avoid a long, drawn-out situation that could potentially cost the city millions. 

      Ransomware victims: Atlanta, GA; Newark, NJ; and Sarasota, FL, had been examples of cities that refused to pay ransoms only to see costs of recovery soar. Currently, the FBI, the Department of Homeland Security, and the U.S. Secret Service are all working on the case.

      Typically, we’ve advised ransomware victims not to pay the ransom, since it provides the hackers the resources they need to continue conducting acts of cybercrime. It’s been mentioned repeatedly by IT professionals and cybercrime experts that there is no guarantee that hackers will stay true to their word and decrypt the files once the ransom has been paid. 

      Ransomware is a major and continuously-developing problem for municipalities and businesses, alike. For more information about ransomware, subscribe to our blog, or give us a call at (813) 749-0895.

      Learn More

      Tip of the Week: Working Around Windows’ Restore Point Issue

      Error Code 0xc000021a

      It doesn’t take much to activate the issue. Essentially, if you create a restore point before attempting to update Windows and then try to revert back to those restore points, error code 0xc000021a kicks in, and - even after repeated reboots - you will not be able to access the desktop. This is because the system restoration process creates a catalogue of files, with driver files waiting to be restored upon restart. However, when a restart takes place, the existing versions are loaded up first. Because the versions of the catalogue files don’t match, the restart process is halted.

      Avoiding the Problem

      Microsoft’s official stance is that a user shouldn’t use the System Restore utility at all, but should instead utilize the Windows Recovery Environment, or WinRE.

      The following steps should help you:

      • Restart your computer, holding down the shift key to boot up the Windows Recovery Environment.
      • Once there, select Troubleshoot, then Advanced Options, More Recovery Options, and finally, Startup Settings.
      • Select Restart Now.
      • Your computer will reboot to a menu. Select Disable Driver Signature Reinforcement. This may require you to use the F7 key.

      Before you do all this, and get yourself stuck in a complicated situation, we recommend reaching out to the professionals here at Symmetric Engineering Group to help you with your work computer or laptop.

      Plus, we test new Windows updates out before deploying them across our clients’ networks, to reduce issues that would require a sudden restore. Need help? Give us a call at (813) 749-0895.

      Learn More

      Know someone who would benefit from Symmetric Engineering Group? Let us know!

      Latest Blog Entry

      Being in IT, we’ve seen and heard it all. Between the campfire horror stories of technicians to the outlandish IT conspiracies and ‘home remedies’ that get passed around, we’ve decided to compile a list of some of our favorite IT and technology myths.

      Latest News

      SEG Awarded Small Business of the Year Award!

      Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

      Read more ...

      Account Login