Preparing…
952-223-4422
234 Broadway Street South Jordan, MN 55352

READY TO ROCK?

Click the button below to start exploring our website and learn more about our awesome company
Enter

Home

DON‘T WAIT….

Until your system is down

Your Computer Systems need constant maintenance Don’t wait until the system is crashed or you are having major issues. Have one of our consultants come in and do a scheduled maintenance on your system. This will alleviate down time and keep everything working in tip top shape.

Business Suppoort

Consult with us to find the solution for your company’s technology needs.

Networking 

From advanced networking to basic, we can help with what you need.

Security

We can help assess the security needs of your business.

Virtualization

Need more performance but don’t have the space? We can help implement new victual and cloud based systems.

google phone

Your apps might be tracking you using ultrasonic frequencies

There is a chance your phone has been tossing out ultrasonic tones to be picked up by other devices. Sounds that the human ear cannot […]

google

Big business fights back !

Google is currently waging a quiet war against the United States Government. The FBI is tasking out warrants demanding that Google hands over information from […]

mar a lago

Cybersecurity extremely lax at Mar-a-lago

Propublica and Gizmodo reported that based on their most recent investigation the private club President Trump owns has extremely lax cybersecurity. He calls it the […]

macbook on table

Having a Mac doesn’t necessarily mean your safe from Malware

For some time now, many people have believed that viruses and malware on a Mac was impossible. This is not true. The most recent threat […]

HP’s Bad Driver is Key Logging your data!

An update from a security blogger ModZero has found that a HP Driver for audio has been unintentionally logging all your pressed keys and storing […]

intel logo

Intel patches security flaw that has gone unnoticed for 7 years!

For the last seven years, a large amount of Intel workstation and server chips have contained a security flaw that could be used to remotely […]

Malicious Google Apps Phishing Scheme

If someone invites you to edit a document in Google doc’s today, don’t open it — it can be spam from a phishing scheme that’s […]

Banner@re2tech

New Signs at our Office! Free Beer -See inside for Details

Just Added some new Signage to our Space in Jordan!  If you are coming down to the Cinco De Mayo Block Party in Jordan tonight […]

Storing data on an atomic scale

Someday we may not need to worry about the amount of data storage we have. Dutch scientists, at the technical university of Delft, have come […]

vine

Vine users’ email and phone numbers were exposed for a day, but weren’t misused according to Twitter

Twitter is alerting vine users that their email addresses and in some cases phone numbers were exposed due to a bug. Because of this they […]

ransomware

Watch out for Ransomware!

WannaCry 2.0 is a new form of ransomware that is affecting Windows computers around the world. Ransomware is a type of malware that encrypts all […]

IT SUPPORT

Why do companies need us!

IT Support   Why do you buy insurance?   The reason is risk management! Risk management and thought process is a core function at RE2TECH.  We […]

You may not be as secure online as you think you are

Today, you might think you’re secure online, but the chances of that being true are very slim. The problem with what we know about cyber-security […]