Call (716) 373-4467

Olean, NY.  – (November 12, 2020). Databranch located in Olean, NY has joined with Repeat Business Systems, Inc. (RBS) as a new division bringing their 35 years of experience in the IT industry to RBS via the company’s lucky 13th acquisition.

Databranch has been serving local, regional, national, and international businesses in Western/Central New York and Northwestern Pennsylvania since 1985. Their mission is to help clients implement technology solutions in order to reduce risk, protect their critical business data, increase productivity, and enhance customer service across four key areas: managed services, networking, security, and business continuity. Organizations who work with Databranch can rely on them to always provide professional technology services, executed with a personal touch and Databranch attributes their success to a unique blend of organizational capacity, expert project management, corporate values, and technical expertise.

RBS owned and founded by Dawn and John Abbuhl in 1987 has been offering office technology solutions including copiers, printers, scanners, document imaging software and Network and IT services with a focus on IT Security.  RBS has leading software engineers, expert consultants and the highest level of service in the region. With companies putting more emphasis on workflow and efficient production, Repeat Business System Inc. offers cutting edge solutions often saving customers thousands of dollars.  Repeat Business Systems, Inc. was named one of the Top Workplaces in the Capital Region nine straight years, is a New York Certified Women Owned Business Enterprise, and has numerous local and national awards for excellence.

“We are really excited about joining the great team at Repeat Business Systems.  Databranch will continue to provide the same high level of service and support, and we will now have expanded resources and products that we can offer to our clients as well!” said David Prince, President of Databranch.

“Acquisition discussions began before the pandemic. We continued to move forward as IT performance and security are even more important than ever, especially protecting those organizations where staff are working from home,” said Dawn Abbuhl, president of Repeat Business Systems. “We are very excited to add Databranch and their years of experience in the IT industry as a new member of the RBS family. The Databranch division will allow us to further expand our geographic market and add technical abilities while giving us the opportunity to leverage additional innovative technology solutions and success as a managed services provider. Both of our companies share similar values as family-owned businesses and through this change, we will both be able to serve our clients at an even higher level moving forward.”

You can contact Databranch at 716-373-4467, [email protected], or visit their website at www.databranch.com for additional information.

 

 

Access Control Administrative Privileges AI AI algorithms AI in Cybersecurity Annual Security Training Anti-Virus Artificial Intelligence Authenticator App Automation Backup and Recovery Backup Redundancy BCDR BEC breach prevention Breach Prevention Platform Breaches business continuity Business Continuity and Disaster Recovery Business Email Compromise Business Email Compromises Business Growth Business Phone System Business Software BYOD Call Directory Channel Futures MSP 501 Cisco Cloud Accounts Cloud Data Backup Cloud Infrastructure Cloud Security Cloud Solutions Compliance Comprehensive Cybersecurity Compromised Credentials Computer Installation computer support Computer Upgrades Conditional Access Credential Theft Cyber Attacks Cyber Criminals Cyber Defenses Cyber Insurance cyber liability insurance Cyber Risk Management Cyberattacks Cyberinsurance cybersecurity Cybersecurity Awareness month Cybersecurity Breach Cybersecurity Culture Cybersecurity Strategy Cybersecurity Training Cybersecurity Webinar Dark Web Dark Web Monitoring Data Backup Data Backup and Recovery Data Backup Solution Data Breach Data Breaches Data Governance Data Loss Data Management Data Privacy Compliance Data Privacy Regulation data protection Data Recovery Data Restoration Data Security deepfake Deepfakes Defense in Depth Denial of Service Device Security Disaster Recover Disaster Recovery DNS Filtering doug wilson employee cybersecurity training Encryption Endpoint Detection and Response Endpoint Protection field technician Foundation Security Gift Card Scams Hackers Hosted VoIP Hybrid work i.t. service provider Identity Theft incident response plan Incident Response Planning Insider Threats Internet Explorer Internet of Things Intrusion Detection Intrusion Prevention IoT Devices IT Budgeting IT Compliance IT Infrastructure IT Myths IT Partner IT Policies IT Resource IT Security IT Service Provider IT Services IT Support Juice Jacking Local Admin local admin privileges Lost Devices M365 malware Managed Clients Managed Detection and Response Managed IT Managed IT Provider managed service provider managed services Manages Services MDR MFA Microsoft Microsoft 356 Microsoft 365 Copilot Microsoft End of Support Microsoft Office Mobile Devices MSP MSP 501 Winner MSP501 Multi-Factor Authentication Network Monitoring Network Security Network Testing Networking New Computer NIST Framework Offboarding Office 365 Outlook Outsourced IT password management Password Manager Password Managers Password Protection password security Passwords Patch Management Patches Patching PC Performance Penetration Testing Personal Data phishing Phishing Attacks PII Proactive Monitoring Processor productivity Professional Tune-Up Public WiFi Push-Bombing RAM Ransomware Ransomware Prevention Recovery point objective Recovery Time Calculator Recovery time objective Remote Monitoring Remote Working repeatbusinesssystems Ring Groups risk assessment Risk Management Risk Tolerance Rock-It VoIP RPO RTO RTO Costs SaaS SaaS Backup Scammers Scams security Security Assessment Security Awareness Training Security Defaults Security Key Security Scans SLAM Method Smart Tech Smishing SMS Social Engineering Social Media Security Software Integration Software-as-a-Service Solid-State Drive Sponsored Google Ads SSD stolen credentials Storage Teams technical support scam technology best practices Technology Infrastructure Technology Management Technology Policies Technology Review Threat Detection Threat Identification Threat Modeling top-performing managed service providers Updates virus VoIP Systems VPN Vulnerabilities Vulnerability Assessment Vulnerability Management Warning Signs Webinar Windows 10 Windows 11 Windows 8.1 Work Computers World Backup Day zero trust policy