Ntiva Client Support

Our Service Desk is ready to help!

Find your Region below to get started.

Not sure which region to select? Call us at 888-996-8482 and select Option 2, or email us at support@ntiva.com and we will assist you!

Mid-Atlantic Region

Ntiva Clients

Email:  support@ntiva.com

Phone:  703-738-2999

Live Chat:  Click for Live Chat

Remote Screen Share

Client Portal

Download eCAP

 eCAP Password Reset

Former eGuard Clients

Email:  support@eguardtech.com

Phone:  202-465-4670

Remote Screen Share

Online Support Form



Former NetLogicDC Clients

Email:  support@netlogicdc.com

Phone:  301-961-2020

Client Portal

Northeast Region

Former DTS Clients

Email:  support@ntiva.com

Phone:  631-224-1200

Live Chat:  Click for Live Chat

Remote Screen Share

Client Portal

Ntiva Voice Support

Former Netlink Clients

Email: support@netlinksys.net

Phone: 718-747-1400

Remote Screen Share

Midwest Region

Former 3Points Clients

Email:  support3p@ntiva.com

Phone:  708-491-0300

 

Remote Screen Share

Client Portal

Former HigherGround Clients

Email:  supporthg@ntiva.com

Phone:  847-897-1640

Remote Screen Share

Payment Portal

ConnectWise Portal

Former Equilibrium Clients

Email:  SupportEQ@ntiva.com

Phone:  773-205-0200

Remote Screen Share

ConnectWise Portal

Former Forget Computers

Email:  apple-support@ntiva.com

Phone:  312-602-5345 x1

Device Portal

Forms

Payment Portal

Help Center

West Region

Ntiva Clients

Email:  support@ntiva.com

Phone:  703-738-2999

Live Chat:  Click for Live Chat

Remote Screen Share

Client Portal

Ntiva Voice Support

Learn More on Our Blog

Small Business Cybersecurity: How to Protect Yourself Against Hackers
Small Business Cybersecurity: How to Protect Yourself Against Hackers

By the time you get to the end of this sentence, a cybercriminal will have successfully attacked a business and infected it with ransomware. According to Cybercrime Magazine, ransomware attacks happen at a rate of one every 11 seconds.

If you operate a small business, the question you should be asking yourself isn’t, “Will we get hacked?” It’s, “When will we get hacked?”

The next question? “Are we prepared?”

CMMC Section 3.5: Identification and Authentication
CMMC Section 3.5: Identification and Authentication

When it comes to achieving CMMC compliance, the old business maxim holds true — it’s not what you know, it’s who you know.

One of the most vital protections you have against cyberattacks is knowing who’s in your networks, who’s using your applications, and who’s accessing your data. Who you know is all about Section 3.5: Identification and Authentication.

Read on to discover what you must understand about this vital part of CMMC.

How to Set Up Zero-Touch Deployment for Apple Devices
How to Set Up Zero-Touch Deployment for Apple Devices

Apple’s Zero-Touch Deployment feels counterintuitive at first. Once you've set it up, you naturally want to do something else. You want to click a box, or make a request, or do something else to trigger Zero-Touch.

But the beauty of Zero-Touch Deployment is that it really is zero-touch.