Chris Power
Chris Power is the founder and CEO of Power Consulting Group, Inc., a New York IT Managed Services firm with a focus on technology for financial, legal, non-profit and education sectors. Chris is passionate about fostering customer trust through direct one-on-one communication. As CEO, he is responsible for driving Power Consulting’s “Technology is for People” vision. He believes in hiring team members with strong personal values and great communications skills. He has created a company in which engineering talent and outstanding interpersonal abilities go hand-in-hand. His training in philosophy has informed his distinctive leadership style. Twenty-five years after founding Power Consulting, his core conviction about IT services remain the same: the purpose of technology is to help people and organizations achieve their goals. A Manhattan resident for 30 years, Chris enjoys long distance running and ran his first NYC Marathon in 2013. Beyond technology, his passions are literature, photography, travel, and writing.
8 IT Strategy Plan Examples That Matter to Your IT Roadmap
A Strategic Guide on Cybersecurity For Non-Profit Organizations
Why a Regular Cloud Security Risk Assessment is Necessary
Show Your Team You Care This National Non-Profit Day With The Gift of Data Security
How to Choose a Managed IT Service Provider Based on a Checklist
Our Top 10 Best Practices For Managing a Mobile Workforce
Understanding BYOD Risks and How to Protect Your Business
What to Consider While Comparing Teams Premium vs. Copilot
How to Use Technology to Improve Employee Experiences
Why Cloud Computing Governance Matters to Your Business
Session Hijacking Prevention: Everything You Should Know
What You Should Know About Creating Your Own Conditional Access Policies
Creating a Rock-Solid Remote Access Policy for Your Mobile Workforce
How to Secure Your Remote Workforce
What is an Information Security Policy? A Comprehensive Guide for Businesses
Why Cloud Computing is Important From a CEO’s Perspective
How to Develop a Network Security Plan
IT Infrastructure Outsourcing: Benefits and Best Practices
What is Cyber Vandalism?
How to Approach Data Migration from Legacy Systems
Why Managed Services are the Smart Choice for SMBs
What to Do After a Data Breach?
Security Best Practices When an Employee Leaves
What are the First Signs of Being Hacked?
What is a Security Breach?
Key Benefits of IT Strategy For Your Business
8 Security Threats in Cloud Computing and How to Mitigate Them
Understanding Reactive vs Proactive Managed Services
Why Network Security is Important for Your Business
What You Should Know About Choosing a Co-Managed IT Service Provider
7 Managed IT Benefits You Should Know About
What is Cloud Computing Security and Why is it Important?
9 Best Practices in IT Procurement
9 Important Benefits of Getting Remote IT Support
What is a vCIO? Understanding the Role & Its Importance
5 Common Technology Problems and How to Solve Them
5 Different Types of Network Security and Their Importance
Your Guide to IT Infrastructure Best Practices
8 Essential IT Infrastructure Components That Can’t Be Overlooked
The Key Benefits of IT Infrastructure Outsourcing
Power Consulting Celebrates Team Week
The 6 Cloud Migration Steps that Ensure Success
How to Develop a Cloud Migration Strategy for Your Business
Cloud Migration Challenges and How to Overcome Them | Power Consulting
The Top 7 IT Staff Augmentation Benefits for Businesses
The 7 Biggest Benefits of AI-Enabled Security Management
The Cost of IT Support: How Much is Too Much?
5 Common Enterprise IT Security Threats You Need to Know
Enterprise IT and its impact on SMBs
Pros and Cons of Cyber Security
7 Different Ways You Can Reduce IT Costs
How to Leverage Managed Services Providers to Control IT Costs
10 Email Security Best Practices for Employees You Need to Know
5 Zero-Trust Use Cases to Know About
A 3-Step Cybersecurity Planning Guide for Your Business
5 Ways You Can Reduce Your Information Technology Costs
Best Practices for Secure Remote Access
Challenges of Managing Remote Employees
How Should Your Company Handle Ransomware Attacks
A Guide to SharePoint Integration for Business
SharePoint Site Design Ideas
Keeping Your Business Secure From Russian Cyber Attacks
Is Your Managed Service Provider Secure?
5 Encryption Benefits With Security Access Control
MSP vs. MSSP: What’s the Difference
Cloud-Based Data Management
5 Tips on Email Security for Small Businesses
5 Email Security Best Practices for Employees
10 Cyber Security Threats in the Financial Sector
What is a PCI Audit: A Full Breakdown
Best Practices When Working From Home
Multi-Factor Authentication vs Two-Factor Authentication (MFA vs 2FA)
The 6 Most Common Network Vulnerabilities & Threats
9 Common Challenges with Managed Service Providers
IT Help Desk Best Practices
Benefits & Importance of Cyber Security Awareness Training
Information Security Policy for a Small Business
Developing & Planning a Business IT Strategy
How an NYC IT Support Company Can Help Secure Your Customers’ Data
IT Support Provider Shares Information about IT Support in New York City
Full Checklist for Cyber Security Assessments
Understanding Cyber Insurance Costs for Businesses
What Is Data Breach Insurance?
Power Consulting Invites You to WhyHunger’s 3rd Annual Homerun for Hunger Charity Suite Event
Intel Channel BOA Press Release
Kaseya Award Press Release
How to Answer, Categorize, Prioritize, Track & Reduce IT Support Tickets
IT Help Desk Best Practices
How Much do Managed IT Services Cost
IT Help Desk Problems and Solutions
What are Network Security Audits & Why They’re Important
The Ultimate Data Security Breach Response Plan
Benefits & Best Practices of Network Segmentation
How to Mitigate Network Security Issues
Cyber Security Threats for Small Businesses
Top 3 Cyber Security Risk Management Strategies
How to Create a Business Continuity Plan
The Complete Guide to Cyber Security Outsourcing
Top 7 SMB Cyber Security Trends in 2020
How Much do Managed IT Services Cost?


