Class "A" License 15040139

Why choose Sleek Communications, Inc.?

We have been in business in the same location in Brookhaven, Mississippi since 1999. With over 35 years experience in communications and technology Sleek Communications, Inc. professional staff is well equipped to provide quality professional technology services for your business. We take great pride in our work and delivering to the customer solutions that fit any size project and budget. At Sleekcom we make technology work for you; not you work for technology.

Sleekcom Items Of Interest

Janurary 31, 2020
New Services Offered

Fiber Optic Cable Fusion Splicing and Testing
Sleek Communications is excited to announce we are now fully equipped to perform fiber optic cable fusion splicing. Fusion splicing eliminates the need for mechanical terminations providing percision, reliable low-loss connections. Fusion splicing is more cost effective eliminating the need for costly mechanical connectors. Fusion splicing also allows for repair of fiber optic cable as well as economical extension and relocates compared to replacing an entire cable run.

Our precision equipment allows us to fusion splice nearly every type of fiber optic cable; SM, MM, DS and NZDS with minimal loss for each type. Our equipment also provides for a splice loss report to be delivered for each splice completed.

Once all fiber fusion splicing is complete our N.I.S.T. tracable test equipment can test and certify each fiber connection and provide a detailed report of each run. 

Image result for fiber optic fusion splicing" COYOTE PUP Closure Kit for buffer tube (loose tube) applications. Includes one 3-section, 6-port end plate, one blank end plate and storage compartment 17.0 in. L x 8.6 in. W x 7.2 in. H (43.2 cm x 21.9 cm x 18.4 cm)Image result for fiber optic fusion splicing tray" 

 

March 4, 2016
Encryption Virus

What it does:
An encryption virus is a monetary exploit. When the virus is launched it searches your hard drive for several different file types. Pictures, Office documents and database files are primary targets. The virus then uses strong legitimate file encryption to "scramble" your files to an unreadable state. The only way to unscramble the files is to have the encryption key. This key is held by the controller of the virus, and they demand you pay from $300 to $500 for the key. Of course you never speak to these people and just by the nature of what they do, even if you pay the money there is no guarantee you will receive the key or that it will even work to decrypt your files. Because the virus uses legitimate file encryption, it is very difficult or almost impossible to decrypt your files. There are a few companies that are successful with decryption, but this is an expensive process and not always successful. This virus also finds shared directories on other machines and will encrypt all files on those shared or mapped drives in addition to your local hard drive. Other than the ominous, one now even uses speech through your speakers, notice and demand for payment, the virus doesn't affect the normal operation of your machine.
Prevention:
Most antivirus programs are only about 30% to 50% effective in preventing infections. The encryption virus seems to be able to circumvent most antivirus programs. The best prevention is user awareness. Don't open emails from unknown sources. Do not open attachments unless you are positive of the sender and of the contents of the attachment.
Recommendations:
Sleekcom recommends you use a comprehensive backup method to backup your data files. We advise using a multi-layer backup including a local backup and a remote or off site backup that is isolated from your computer. We also recommend maintaining at least several days, or even weeks of backup sets. Because this virus uses legitimate encryption, most backup systems will backup the encrypted files. It possibly could be several days before you realize you have been infected. If your backup only keeps a couple of days of backup and overwrites as it backs up, you could end up with encrypted backup files as well.
If you think you might be infected or are experience problems with your computer or business network, give us a call and we can help.

Feburary 23, 2016

Phone Scam

If you receive a phone call from someone claiming to be with Windows or Microsoft stating they have recorded unusual activity from your computer, hang up. These scammers will request access to your computer by getting you to visit a website and download remote access software. Of course the prices they quote for "cleaning" your computer range anywhere from $90 to $400. Once you give them access to your computer, within seconds they have access to any personal or private information you many have stored on your computer. We had a customer come in recently that had their identity, medical records and personal information stolen in this manner. Unless you know the person or company you are dealing with NEVER, under any circumstances, download software they request you to or give them any information.

Sleek Communications services all brands and types of computers. Give us a call and let us help you get your machine back running smoothly, safely and speedy.

Sleekcom Webmail

Click below open webmail in a new window.

Web Mail.

Go to top