New England IT Services

For Businesses That Have Outgrown “Good Enough.”

Our services are built for serious organizations that demand experienced engineers, consistent service, and real technical depth.

the northeast region’S MOST ELITE ENGINEERS

Kim Mello
Accounting Clerk

Michelle Branco
VP of Operations

Chris Martin
VP of Sales & Marketing

Monique Carvalho
Client Service Coordinator

Amber Menard
Client Service Manager

Brian Dias
Senior Engineer

Zach Judd
Support Analyst

Steven Allain
Support Analyst

Josh Branco
CIO / Senior Engineer

Jesse Cabral
President, CEO

Dan Lepage
Support Analyst

Kaitlyn Cabral
Client Service Coordinator

Aiden Larossa
Support Analyst

Joshua Pochon
Account Manager

Sadie Galary
Client Service Coordinator

Doug Hetu
Solutions Engineer

Aaron Blair
Solutions Engineer

Why Businesses Choose to Work with Us

Proven Technical Skill

Our engineers solve issues competitors cannot and deliver lasting, high-value outcomes.

Enterprise Certifications

We hold advanced credentials rarely offered by staff at regional IT services companies.

Serious Client Focus

We provide structured onboarding, fast response, and clear communication at every step.

No Junior Tech Roulette

You always work with experienced professionals who know your environment and systems.

Frustrated By IT Services Staffed With Undertrained Technicians?

You need a capable, consistent team—not a rotating cast of junior techs.

Jesse Cabral

CEO, Micro Technology Solutions

Every technician at MTSi is carefully vetted, thoroughly trained, and supported to perform at the highest technical level possible.

Why gamble with low standards?

At MTSi, our hiring process is deliberately difficult. We are known throughout the South Coast as one of the hardest IT services firms to get into. Our team is made up of experienced engineers with elite certifications, proven technical depth, and professional integrity. We train continuously and operate with pride in our work.

Work with an IT services team known for its intelligence, professionalism, and elite performance. Call (508) 324-9475 to harness IT solutions and IT experts capable of supporting your growing organization.

Schedule an Appointment Today

Our Services

Managed IT Services

Gain stability, uptime, and clarity with IT services built for complex, growing environments.

IT Outsourcing

Cut costs and free up resources with fully managed, enterprise-grade IT services and support.

Cloud Solutions

Virtualization services from certified Microsoft and VMware experts for cloud transitions.

Security & Compliance

Protect systems and data with IT services that meet today's evolving cybersecurity and regulatory demands.

Wi-Fi Network Surveys

Fix signal gaps and poor performance using certified wireless engineering and Ekahau precision tools.

Unified Communications

Streamline communication across voice, video, and devices with expert Cisco-certified UC design and support.

Network Integration

Build a better infrastructure with IT services that integrate systems securely and effectively for long-term performance and scalability.

Microsoft Solutions

Extend your capabilities with Microsoft 365 and Azure solutions expertly configured by certified professionals today.

Empowering Businesses Through IT Excellence

Discover how Micro Technology Solutions Inc. has transformed businesses by providing exceptional IT services. Hear firsthand from our clients about the challenges they faced and the solutions we delivered.

Reliable IT partnership supporting essential housing operations.

Secure systems powering vital healthcare services.

Trusted IT support empowering important community programs.

What Clients Say About Us

Peace of Mind at an Affordable Flat Monthly Fee

I'd like to share how much I appreciate MTSI's quick responses and ability to solve my IT issues when they respond. The staff is always friendly and knowledgeable. I am so glad we use an IT company with such high standards.

John Gracey

ROBYN SHWEDO

Massachusetts

A Trustworthy, Transparent Partner

I am truly impressed by the quick response time from MTSI. Most of the technicians are highly knowledgeable, professional, patient, and pleasant. I have poor eyesight, and I appreciate that they're always willing to seek the best way to accommodate my visual challenges.

Kevin Truan

LISA RAHN

Massachusetts

One of the Best Companies Around

I have been a customer for well over 10 years. Micro Tech always responds quickly. The support staff is knowledgeable and courteous. I highly recommend them for their expertise and professionalism.

John Gracey

CATHERINE TVEIT

Massachusetts

Expert Insight From A Team That Solves Real IT Challenges Every Day

Explore how our engineers help serious organizations navigate complex infrastructure needs, eliminate recurring issues, and upgrade their IT services experience.

How to Survive an Email Bombing Attack

How to Survive an Email Bombing Attack

June 04, 20254 min read

Recently we helped an organization who was under attack by an email bombing campaign. Imagine receiving 5,000 email messages an hour. There are so many messages, it is impossible to sift through the junk to find legitimate correspondence. If you are lucky, you can call your MSP for help. If not, we hope this brief article will help.

The first and most important message to anyone who is the target of an email bomb is this: Use caution! The email bombing may be a tactic to distract you from another threat. Such as:

  • Email notifications about purchases made on a personal credit card or account.

  • Email notification about a funds transfer on a corporate account.

  • Someone who calls offering technical help, but really wants access to your system.

  • Another attack going on elsewhere while IT is busy dealing with the email bomb.

It will be nearly impossible to delete the messages individually, so what can you do?

Spam Filters and Rules

The first thing to do is look for patterns in the messages that you can use to filter out the unwanted emails. Often attackers will use bots to sign you up for newsletters, which triggers a flood of email confirmations that look legitimate individually. In this case, you might filter for things like “Welcome to our newsletter,” “Your new account,” or “unsubscribe.” 

In other cases, attackers may use fake email addresses that mimic trusted contacts. This makes it harder to identify the source of the attack and AI generated content will make filtering more difficult.

Many spam filters allow you to adjust settings. Moving to a more restrictive level of security may eliminate thousands of emails.

Safe Senders List

Within Outlook, you can configure the junk option to: “Safe Lists Only.” When you do this, the only mail that will be delivered to your inbox will be from addresses on your safe senders list. To add a large number of addresses, you’ll want to navigate to Junk Email Options / Safe Senders. Here you can easily add email addresses. You can also choose to permanently delete suspected junk email rather than sending it to your Junk Email folder. If you are using an advanced spam filter, you can follow a similar process. By doing this, the unwanted messages will be prevented from reaching you.

DNS

To protect against email-based threats like phishing and spam, organizations can implement three key anti-spam measures: SPF, DKIM, and DMARC. SPF checks if an email comes from an authorized server by matching the sender’s IP address to a list in the domain’s DNS records. DKIM adds a digital signature to emails to verify they haven’t been altered during transit. DMARC builds on SPF and DKIM by setting policies on how to handle emails that fail authentication and provides reporting on suspicious activity. Together, these protocols help prevent spoofing, improve email deliverability, and increase the security and trustworthiness of email communications.

Change Your Address

In severe cases where filtering does not work, you may be tempted to change your email address. Note that when you do this, your system will start sending Non-Delivery Reports (NDRs) back to the original senders. If the sources are widely distributed, the sending email services may not notice. Unfortunately, your service provider will. You may end up blocked for the volume of mail your deleted account is generating. These blocks typically last 24 hours. The attack will eventually wane and you’ll be able to restore the account, usually in a few days.

Follow Up

As soon as possible you’ll want to check for unusual activity on personal and corporate financial accounts. You will also want to audit corporate computer systems for any unauthorized activity. We recommend reporting email bombing incidents to your email provider and, depending on the severity, to law enforcement or a cyber incident response team. Reporting can help track the attack and prevent future attacks on other users.

The best defense for any attack is to have proper tools in place to protect your accounts. While an email bomb is mostly a nuisance, real threats can be prevented and detected with the right security tools. We recommend advanced spam filters, anti-malware software, and email security solutions. Which tools fit your environment will depend on your infrastructure and the services you use.

Reach out to our sales team to learn more about a set of tools that fits your technical environment and your tolerance for risk.

We're fully dedicated to assisting local businesses in improving their technology to gain a competitive edge in their industries. Our team of dedicated professionals are focused on delivering exceptional IT services and solutions. With extensive expertise and practical experience, we ensure that our clients receive top-quality support and guidance for their IT projects.

IT Help Desk Team

We're fully dedicated to assisting local businesses in improving their technology to gain a competitive edge in their industries. Our team of dedicated professionals are focused on delivering exceptional IT services and solutions. With extensive expertise and practical experience, we ensure that our clients receive top-quality support and guidance for their IT projects.

Back to Blog

Frequently Asked Questions

Is switching MSPs difficult? Will it impact my team?

No. We have developed and refined an onboarding process to minimize disruption for your team. We recommend an overlap period with your current provider (based on the size of your organization), so we can receive documentation and access to your systems and transition your devices to our cybersecurity tools. Your users may notice new software agents installed on their computers and will have new numbers to contact for support. Otherwise, there should be minimal disruption.

How quickly can I get started?

Staff can depart quickly and leave you in a bind. We can help. The first step is to schedule a fifteen-minute call with us to determine if our service is a fit. Next, we proceed to discovery, which could be a call or an on-site network assessment. Once this is done, we will meet to discuss our findings and to make recommendations for any system or security upgrades. We will also discuss ongoing managed services and a timetable for moving forward.

Will my current MSP be upset when I tell them I’m switching?

No one likes to lose a customer, but established firms understand this is part of working with any client. They have procedures in place to make the transition from one provider to another go smoothly. If you are concerned that your current provider won’t act professionally, that is a good reason to look for a new provider.

Do you charge more for on-site support?

Our rates are the same for on-site and remote support. We charge remote support in 15-minute increments, so remote support is ideal for simple issues. We do charge travel for on-site support, but many clients prefer scheduled visitation. Some technical issues require an on-site visit.

Do you outsource your helpdesk overseas?

MTSi has been based in Massachusetts since 1998 and our support team is located in our Fairhaven office. When you speak to someone at MTSi, they are in our Fairhaven office or working remotely from home (always in the United States).

How much does the service cost?

Compared to other professional IT companies, our pricing is very competitive. We custom tailor our pricing to each customer, so we need to get to know you and your firm before giving you a price. The first step is to schedule an introductory call with us.

What happens if my network goes down in the middle of the night?

That is completely up to you. We will work with you during implementation to understand which systems need attention off hours (if any), who needs to be notified, how we can get building access, etc. We will document this protocol and follow it for any event that occurs outside normal working hours.

I don’t have a CIO (or anyone in IT). Can you help with IT planning?

Yes. We provide an IT Roadmap for our customers and help them manage their systems lifecycle. Having End-of-Life systems is a significant cybersecurity risk, so when a manufacturer announces an End-of-Life date for a product our customers use, we meet with them well in advance of the End-of-Life date to discuss alternatives and upgrades. This helps our customers budget well in advance for upcoming projects and avoid surprise expenses that can break the budget.

Outgrowing Your IT Services Provider?

If your current IT services partner cannot keep up with your needs, it is time for a change. MTSi works with organizations that have moved beyond entry-level support and are ready for expert engineers, responsive service, and a long-term technology strategy.

Call (508) 324-9475 today or click the button below to schedule your appointment. Let's take IT off your mind for good.