Chris Power
Chris Power is the founder and CEO of Power Consulting Group, Inc., a New York IT Managed Services firm with a focus on technology for financial, legal, non-profit and education sectors. Chris is passionate about fostering customer trust through direct one-on-one communication. As CEO, he is responsible for driving Power Consulting’s “Technology is for People” vision. He believes in hiring team members with strong personal values and great communications skills. He has created a company in which engineering talent and outstanding interpersonal abilities go hand-in-hand. His training in philosophy has informed his distinctive leadership style. Twenty-five years after founding Power Consulting, his core conviction about IT services remain the same: the purpose of technology is to help people and organizations achieve their goals. A Manhattan resident for 30 years, Chris enjoys long distance running and ran his first NYC Marathon in 2013. Beyond technology, his passions are literature, photography, travel, and writing.
![Enabling Remote Workforce Security](https://powerconsulting.com/wp-content/uploads/2025/01/Enabling-Remote-Workforce-Security-300x169.webp)
How to Secure Your Remote Workforce
![Information Security Policy](https://powerconsulting.com/wp-content/uploads/2024/11/Information-Security-Policy-300x169.webp)
What is an Information Security Policy? A Comprehensive Guide for Businesses
![Why Cloud Computing is Important](https://powerconsulting.com/wp-content/uploads/2024/11/Why-Cloud-Computing-is-Important-300x169.webp)
Why Cloud Computing is Important From a CEO’s Perspective
![Network Security Plan](https://powerconsulting.com/wp-content/uploads/2024/10/Network-Security-Plan-300x169.webp)
How to Develop a Network Security Plan
![IT Infrastructure Outsourcing](https://powerconsulting.com/wp-content/uploads/2024/10/IT-Infrastructure-Outsourcing-300x169.webp)
IT Infrastructure Outsourcing: Benefits and Best Practices
![What is Cyber Vandalism](https://powerconsulting.com/wp-content/uploads/2024/10/What-is-Cyber-Vandalism-300x169.webp)
What is Cyber Vandalism?
![Legacy Data Migration](https://powerconsulting.com/wp-content/uploads/2024/07/Legacy-Data-Migration-1-300x169.webp)
How to Approach Data Migration from Legacy Systems
![Why Managed IT Services](https://powerconsulting.com/wp-content/uploads/2024/07/Why-Managed-IT-Services-300x169.webp)
Why Managed Services are the Smart Choice for SMBs
![What to Do After a Data Breach](https://powerconsulting.com/wp-content/uploads/2024/06/What-to-Do-After-a-Data-Breach-300x169.webp)
What to Do After a Data Breach?
![12 Data Protection Strategies for When an Employee Leaves](https://powerconsulting.com/wp-content/uploads/2024/06/12-Data-Protection-Strategies-for-When-an-Employee-Leaves-300x169.webp)
Security Best Practices When an Employee Leaves
![How to Check if I Have Been Hacked](https://powerconsulting.com/wp-content/uploads/2024/06/How-to-Check-if-I-Have-Been-Hacked-300x169.webp)
What are the First Signs of Being Hacked?
![What Is a Security Breach](https://powerconsulting.com/wp-content/uploads/2024/05/What-Is-a-Security-Breach-1-300x169.webp)
What is a Security Breach?
![Benefits of IT Strategy](https://powerconsulting.com/wp-content/uploads/2024/05/Benefits-of-IT-Strategy-300x169.webp)
Key Benefits of IT Strategy For Your Business
![Security Best Practices When an Employee Leaves](https://powerconsulting.com/wp-content/uploads/2024/05/Security-Best-Practices-When-an-Employee-Leaves-300x169.webp)
Security Best Practices When an Employee Leaves
![Cloud Security Threats](https://powerconsulting.com/wp-content/uploads/2024/02/Cloud-Security-Threats-300x169.webp)
8 Security Threats in Cloud Computing and How to Mitigate Them
![](https://powerconsulting.com/wp-content/uploads/2024/01/ps-300x169.jpg)
Understanding Reactive vs Proactive Managed Services
![](https://powerconsulting.com/wp-content/uploads/2024/01/power-300x169.png)
Why Network Security is Important for Your Business
![Choosing a Co-Managed IT Service Provider](https://powerconsulting.com/wp-content/uploads/2024/01/Choosing-a-Co-Managed-IT-Service-Provider-300x169.webp)
What You Should Know About Choosing a Co-Managed IT Service Provider
![Benefits of Managed IT Services](https://powerconsulting.com/wp-content/uploads/2023/12/Benefits-of-Managed-IT-Services-1-300x169.webp)
7 Managed IT Benefits You Should Know About
![What is Cloud Security](https://powerconsulting.com/wp-content/uploads/2023/11/What-is-Cloud-Security-300x169.webp)
What is Cloud Computing Security and Why is it Important?
![IT Procurement Best Practices](https://powerconsulting.com/wp-content/uploads/2023/11/IT-Procurement-Best-Practices-300x150.png)
9 Best Practices in IT Procurement
![Benefits-of-Remote-IT-Support](https://powerconsulting.com/wp-content/uploads/2023/10/Benefits-of-Remote-IT-Support-300x232.webp)
9 Important Benefits of Getting Remote IT Support
![What is a vCIO](https://powerconsulting.com/wp-content/uploads/2023/09/What-is-a-vCIO-300x169.webp)
What is a vCIO? Understanding the Role & Its Importance
![Common IT Problems](https://powerconsulting.com/wp-content/uploads/2023/09/Common-IT-Problems-300x200.jpg)
5 Common Technology Problems and How to Solve Them
![Types of Network Security](https://powerconsulting.com/wp-content/uploads/2023/08/Types-of-Network-Security-300x169.jpg)
5 Different Types of Network Security and Their Importance
![IT Infrastructure Best Practices](https://powerconsulting.com/wp-content/uploads/2023/07/IT-Infrastructure-Best-Practices-300x195.webp)
Your Guide to IT Infrastructure Best Practices
![Components of IT Infrastructure](https://powerconsulting.com/wp-content/uploads/2023/07/Components-of-IT-Infrastructure-300x225.webp)
8 Essential IT Infrastructure Components That Can’t Be Overlooked
![Outsource Your IT Infrastructure](https://powerconsulting.com/wp-content/uploads/2023/05/Outsource-Your-IT-Infrastructure-300x200.webp)
The Key Benefits of IT Infrastructure Outsourcing
![](https://powerconsulting.com/wp-content/uploads/2023/05/image12-300x200.webp)
Power Consulting Celebrates Team Week
![Cloud Migration Process](https://powerconsulting.com/wp-content/uploads/2023/05/Cloud-Migration-Process-300x169.webp)
The 6 Cloud Migration Steps that Ensure Success
![Cloud Migration Strategy](https://powerconsulting.com/wp-content/uploads/2023/05/Cloud-Migration-Strategy-300x169.webp)
How to Develop a Cloud Migration Strategy for Your Business
![Cloud Migration Challenges](https://powerconsulting.com/wp-content/uploads/2023/05/Cloud-Migration-Challenges-300x200.webp)
Cloud Migration Challenges and How to Overcome Them | Power Consulting
![](https://powerconsulting.com/wp-content/uploads/2023/04/Staff-Augmentation-Benefits-image1-300x150.jpg)
The Top 7 IT Staff Augmentation Benefits for Businesses
![AI Enabled Security Management](https://powerconsulting.com/wp-content/uploads/2023/04/AI-Enabled-Security-Management-300x169.webp)
The 7 Biggest Benefits of AI-Enabled Security Management
![The Average Cost of IT Support](https://powerconsulting.com/wp-content/uploads/2023/03/The-Average-Cost-of-IT-Support-300x200.webp)
The Cost of IT Support: How Much is Too Much?
![Enterprise IT Security](https://powerconsulting.com/wp-content/uploads/2023/03/Enterprise-IT-Security-300x200.webp)
5 Common Enterprise IT Security Threats You Need to Know
![What is Enterprise Technology](https://powerconsulting.com/wp-content/uploads/2023/02/What-is-Enterprise-Technology-300x169.jpg)
Enterprise IT and its impact on SMBs
![Pros and Cons of Cyber Security](https://powerconsulting.com/wp-content/uploads/2023/02/Pros-and-Cons-of-Cyber-Security-300x169.jpg)
Pros and Cons of Cyber Security
![Reduce IT Costs](https://powerconsulting.com/wp-content/uploads/2022/12/Reduce-IT-Costs-1-300x169.jpg)
7 Different Ways You Can Reduce IT Costs
![Co-Managed IT Services](https://powerconsulting.com/wp-content/uploads/2022/12/Co-Managed-IT-Services-300x206.jpg)
How to Leverage Managed Services Providers to Control IT Costs
![Email Security Best Practices for Employees](https://powerconsulting.com/wp-content/uploads/2022/11/Email-Security-Best-Practices-for-Employees-300x150.png)
10 Email Security Best Practices for Employees You Need to Know
![5 Zero-Trust Use Cases](https://powerconsulting.com/wp-content/uploads/2022/11/zero-trust-use-cases-image2-300x264.jpg)
5 Zero-Trust Use Cases to Know About
![A 3-Step Cyber Security Planning](https://powerconsulting.com/wp-content/uploads/2022/11/A-3-Step-Cyber-Security-Planning-image1-300x150.jpg)
A 3-Step Cybersecurity Planning Guide for Your Business
![Information Technology Costs](https://powerconsulting.com/wp-content/uploads/2022/10/Information-Technology-Costs-image1-300x150.jpg)
5 Ways You Can Reduce Your Information Technology Costs
![Remote Access vs. Cloud users](https://powerconsulting.com/wp-content/uploads/2022/10/Best-Practices-for-Secure-Remote-Access-image1-300x200.jpg)
Best Practices for Secure Remote Access
![Managing Remote Employees](https://powerconsulting.com/wp-content/uploads/2022/08/image2-300x225.jpg)
Challenges of Managing Remote Employees
![How Your Company Should Handle Ransomware Attacks](https://powerconsulting.com/wp-content/uploads/2022/08/How-Your-Company-Should-Handle-Ransomware-Attacks-image2-min-300x200.jpg)
How Should Your Company Handle Ransomware Attacks
![SharePoint Tips For Your Business](https://powerconsulting.com/wp-content/uploads/2022/08/SharePoint-Tips-For-Your-Business-image1-300x158.jpg)
A Guide to SharePoint Integration for Business
![sharepoint-site-design-ideas](https://powerconsulting.com/wp-content/uploads/2022/06/sharepoint-site-design-ideas--300x150.jpg)
SharePoint Site Design Ideas
![Russian Cyber Attacks](https://powerconsulting.com/wp-content/uploads/2022/04/Russian-Cyber-Attacks-image1-300x169.jpg)
Keeping Your Business Secure From Russian Cyber Attacks
![Secure Managed Service Provider](https://powerconsulting.com/wp-content/uploads/2022/04/Secure-Managed-Service-Provider-image1-300x225.jpg)
Is Your Managed Service Provider Secure?
![Benefits of Encryption](https://powerconsulting.com/wp-content/uploads/2022/02/Benefits-of-Encryption-300x150.jpg)
5 Encryption Benefits With Security Access Control
![MSP vs MSSP: Comparing the Two Services](https://powerconsulting.com/wp-content/uploads/2022/02/Whats-the-Difference-image1-300x200.jpg)
MSP vs. MSSP: What’s the Difference
![Cloud-Based Data Management](https://powerconsulting.com/wp-content/uploads/2022/02/Cloud-Based-Data-Management-image2-300x200.jpg)
Cloud-Based Data Management
![Small Business Email Security](https://powerconsulting.com/wp-content/uploads/2022/01/Small-Business-Email-Security-300x150.jpg)
5 Tips on Email Security for Small Businesses
![Email Security Tip for Employees](https://powerconsulting.com/wp-content/uploads/2022/01/Email-Security-Tip-for-Employees-300x150.jpg)
5 Email Security Best Practices for Employees
![Cyber Security Threats to the Financial Sector](https://powerconsulting.com/wp-content/uploads/2022/01/Cyber-Security-Threats-to-the-Financial-Sector-300x200.jpg)
10 Cyber Security Threats in the Financial Sector
![What is a PCI Audit](https://powerconsulting.com/wp-content/uploads/2021/12/What-is-a-PCI-Audit-300x218.jpg)
What is a PCI Audit: A Full Breakdown
![Best Practices When Working From Home](https://powerconsulting.com/wp-content/uploads/2020/04/Best-Practices-When-Working-From-Home-300x200.jpg)
Best Practices When Working From Home
![MFA vs 2FA](https://powerconsulting.com/wp-content/uploads/2021/11/MFA-vs-2FA-300x247.jpg)
Multi-Factor Authentication vs Two-Factor Authentication (MFA vs 2FA)
![Common Network Vulnerabilities](https://powerconsulting.com/wp-content/uploads/2021/11/Common-Network-Vulnerabilities-300x211.jpg)
The 6 Most Common Network Vulnerabilities & Threats
9 Common Challenges with Managed Service Providers
![IT Help Desk Best Practices](https://powerconsulting.com/wp-content/uploads/2019/06/IT-Help-Desk-Best-Practices-300x200.jpg)
IT Help Desk Best Practices
![Cyber Security Awarenes Training benefits](https://powerconsulting.com/wp-content/uploads/2020/05/1918-300x200.jpg)
Benefits & Importance of Cyber Security Awareness Training
![The Ultimate Information Security Policy for Small Businesses](https://powerconsulting.com/wp-content/uploads/2020/02/The-Ultimate-Information-Security-Policy-for-Small-Businesses-300x139.jpg)
Information Security Policy for a Small Business
![Business IT Strategy planning](https://powerconsulting.com/wp-content/uploads/2020/02/business-it-strategy-300x200.jpg)
Developing & Planning a Business IT Strategy
![Technology Support NYC](https://powerconsulting.com/wp-content/uploads/2019/12/IT-Support-NYC-300x214.jpg)
How an NYC IT Support Company Can Help Secure Your Customers’ Data
![IT Support](https://powerconsulting.com/wp-content/uploads/2019/11/IT-Support-300x200.jpg)
IT Support Provider Shares Information about IT Support in New York City
![Cybersecurity Checklist](https://powerconsulting.com/wp-content/uploads/2019/11/Cyber-Security-Checklist-300x200.jpg)
Full Checklist for Cyber Security Assessments
![Cyber Insurance Costs for Businesses](https://powerconsulting.com/wp-content/uploads/2019/09/Cyber-Insurance-Costs-for-Businesses-300x169.png)
Understanding Cyber Insurance Costs for Businesses
![Data Breach Insurance](https://powerconsulting.com/wp-content/uploads/2019/09/Data-Breach-Insurance-300x200.png)
What Is Data Breach Insurance?
Power Consulting Invites You to WhyHunger’s 3rd Annual Homerun for Hunger Charity Suite Event
Intel Channel BOA Press Release
Kaseya Award Press Release
![How to Reduce IT Support Tickets](https://powerconsulting.com/wp-content/uploads/2019/06/How-to-Reduce-IT-Support-Tickets-300x200.jpg)
How to Answer, Categorize, Prioritize, Track & Reduce IT Support Tickets
![IT Help Desk Best Practices](https://powerconsulting.com/wp-content/uploads/2019/06/IT-Help-Desk-Best-Practices-300x200.jpg)
IT Help Desk Best Practices
![the cost of managed it services](https://powerconsulting.com/wp-content/uploads/2019/06/the-cost-of-managed-it-services-300x225.jpg)
How Much do Managed IT Services Cost
IT Help Desk Problems and Solutions
What are Network Security Audits & Why They’re Important
The Ultimate Data Security Breach Response Plan
Benefits & Best Practices of Network Segmentation
![network security issues](https://powerconsulting.com/wp-content/uploads/2019/04/network-security-issues-300x200.png)
How to Mitigate Network Security Issues
![cyber security vulnerabilities facing small businesses](https://powerconsulting.com/wp-content/uploads/2019/04/cyber-security-vulnerabilities-facing-small-businesses-300x214.png)
Cyber Security Threats for Small Businesses
Top 3 Cyber Security Risk Management Strategies
How to Create a Business Continuity Plan
![How Your Employees are Your Biggest Cyber Security Risk](https://powerconsulting.com/wp-content/uploads/2018/11/Depositphotos_218606034_l-2015-300x200.jpg)
The Complete Guide to Cyber Security Outsourcing
![](https://powerconsulting.com/wp-content/uploads/2018/11/computer-1591018_1280-300x196.jpg)
Top 7 SMB Cyber Security Trends in 2020
![](https://powerconsulting.com/wp-content/uploads/2018/11/Depositphotos_33239599_l-2015-300x200.jpg)
How Much do Managed IT Services Cost?
![Cybersecurity for ransomware attacks](https://powerconsulting.com/wp-content/uploads/2017/10/Cybersecurity-for-ransomware-attacks-300x200.jpg)