Minneapolis IT Support & IT Security Company

At RYMARK IT, your team of trustworthy IT experts, we provide Minneapolis organizations with reliable, proactive IT support and cybersecurity solutions for seamless operations.

IT Support Specialists You Can Trust

Brandon Friedrichs
Engineer & Assistant Service Manager

Steven Micko
Help Desk Support Engineer

Andy Roehrs
Systems Engineer & Solutions Architect

Sam Swanson
Help Desk Support, Dispatch & Procurement Specialist

Brian Horton
Systems Engineer & Solutions Architect

Tim Forson
Help Desk Support Engineer

Mathew Faber
Help Desk Support Engineer

Ryan Chester
Managing Partner & Business Strategist

Mark Sommerfeld
Managing Partner & Business Strategist

Robert Bissonnette
System & Network Administrator

Why Organizations Choose RYMARK IT Navigation

Our core values make the difference

Customer-First Approach

Our proactive, customer-focused culture prioritizes addressing your organization needs, ensuring dependable support with prompt, meaningful responses to keep operations running smoothly.

Problem Solving

As a trusted IT support & IT security company, we use a refined six-step process to effectively tackle any IT challenges, providing solutions that align with your organization's objectives and goals.

Best-Practice Solutions

Committed to integrity, honesty, and openness, we deliver IT solutions grounded in trust, transparency, and respect, building lasting partnerships with our clients.

Peace of Mind

As a leading IT support & IT security company, our advanced security measures protect your organization from cyber threats, allowing you to focus on success while we safeguard your digital assets.

Team Players

With a collaborative spirit, we uphold high standards and bring out the best in each other, passionately striving to exceed every goal.

Protect your organization from CYBER ATTACKS

Download RYMARK’s Free Security Audit Guide to See How Your Organization's Security Stacks Up.

Security Threats Are Everywhere

With new threats developing every day, it can be impossible to stay ahead of the bad guys and keep your business assets protected.

Email, social media, websites, viruses, malware, web applications, weak passwords, unsecured networks, ex-employees—the list goes on.

Without the right security measures, your assets are susceptible to theft, destruction, or ransom which can lead to lost productivity, irreparable damage to your reputation, and even put you out of organization.

Let RYMARK IT Navigation, your trusted Minneapolis IT Support & IT Security Company help you with our cybersecurity services!

The IT Support Specialists You Can Trust

Mark Sommerfeld & Ryan Chester

Managing Partners

We Help You Navigate the Rough Waters of IT Security

As business owners for more than 25 years, we understand the commitment you’ve made and the importance of protecting the organization you’ve worked so hard to build. The experts at RYMARK IT Navigation, your trusted Minneapolis IT Support & IT Security Company, are continually evaluating the latest threats and security measures to protect, detect, and respond to them. We provide solutions that both protect your organization's assets and enable your employees to work more efficiently.

Feel like you’ve been down this road before?

Let us assure you that we place our priority on client relationships, not on turning a high profit. We’re here to maximize your current IT infrastructure, not drain your bank account. We’ll likely even lower your IT costs rather than raise them.

Call (651) 323-1775 today to schedule your appointment. We’re ready to start important IT conversations with organizations just like yours.

How Can We Help?

Our Services

Managed IT

We’ll manage all of your IT services for a flat-rate fee.

Cybersecurity

Comprehensive protection against evolving digital threats to safeguard your organization.

IT Projects

Expert planning and execution of IT solutions tailored to your needs.

Network Security

Safeguarding your network effectively from unauthorized access and cyber threats.

Endpoint Patching & Critical Update Management

Ensuring devices stay secure with timely updates and patches.

Password & Multi-Factor Authentication Management

Strengthening access controls with secure authentication solutions.

Email Security

Protecting your email communications from phishing and malware attacks.

Backup & Disaster Recovery

Never worry again about losing your data in the event of any disaster.

Security Awareness Training

Educating employees to recognize and prevent cybersecurity threats.

Endpoint Protection, Detection & Response

Proactive defense against endpoint threats with real-time monitoring.

24/7/365 SOC

Continuous monitoring and swift response to threats by a dedicated security team.

Help Desk Support

Reliable, expert assistance for all your IT issues, anytime you need it.

How Vulnerable Is Your Company to Cyber Attacks?

These 9 questions can help you evaluate how vulnerable your company is and where you can improve.

Your Security and Peace of Mind Starts Here

As an IT support & IT security company, we help you stay ahead of cyber criminals, stay ahead of your competition, reduce IT distractions, and experience the peace of mind that comes with the confidence that you’re protecting your organization.

We value you and your organization. With this in mind, we have established these promises to every client.

Our Service Level Agreement

Customer Satisfaction Guarantee

Monthly/Quarterly Updates & Reports

No Hidden Costs

Clear Plan & Expectations

What Clients Say About Us

Peace of Mind at an Affordable Flat Monthly Fee

"THESE GUYS SAVED MY LIFE! The QuickBooks file for my business DISAPPEARED from my office PC. We tried recovery software, to no avail. They were able to search my hard drive and find transactions on it to reconstruct the entire file. They saved me from having to completely reconstruct three months’ worth of business transactions including bill payment, invoicing and payroll. Five stars are NOT ENOUGH!!! THANKS MARK AND RYAN!"

John Gracey

CURT

Clean'n'Press

A Trustworthy, Transparent Partner

"Over the past year RYMARK has helped update and enhance our network in the quickly changing cybersecurity realm. We could have never done this without their assistance. THANKS!"

Kevin Truan

TYLER

Imricor

One of the Best Companies Around

"RYMARK has been a strong partner supporting all of our IT needs. Very easy to work with, affordable, personal. Great company to work with."

John Gracey

Seth

Midas

Business Technology Insights

Explore expert insights, trends, and expert advice on the ever-evolving landscape of information technology. Dive in to discover how we leverage cutting-edge solutions to empower organizations and drive innovation.

Graduation Season: Protecting Young Adults from Cyber Threats

Graduation Season: Protecting Young Adults from Cyber Threats

May 09, 20257 min read

The diploma isn’t even framed yet, and hackers are already rolling out the welcome mat. The moment graduates start job hunting, their personal data becomes prime real estate for cybercriminals. Fake recruiters, phishing emails posing as HR, and password-stealing scams all ramp up as young professionals step into the workforce — often unaware they’re being targeted.

 

Small and medium-sized businesses (SMBs) need to take note. A new hire with a fresh company email and little security awareness is an easy win for cybercriminals. Nearly half of employed people have fallen victim to a cyberattack or scam, and younger employees often underestimate the risks. The result? Stolen credentials, breached systems, and security incidents that could have been avoided.

 

New employees don’t need to become cybersecurity experts, but they do need to be trained. And businesses need to stop assuming “tech-savvy” means “security-savvy.”

 

The best defense is a proactive one. Let’s break down the most common cyber threats targeting young professionals and what SMBs can do to stay ahead.

Common Cybersecurity Threats Targeting Young Professionals

While young professionals entering the workforce are busy updating LinkedIn and applying for jobs, cybercriminals are busy, too. Here’s how they’re targeting this fresh wave of talent.

Phishing Scams: The Fake Job Offer Trap

That email with the subject line “Exciting Opportunity! Immediate Hire!” might seem like a dream job. But if it asks for sensitive information or directs applicants to an unfamiliar login page, it’s likely a phishing scam.

 

Fake recruiters, bogus onboarding portals, and “HR” emails requesting bank details for direct deposit are common tactics. The golden rule is if it sounds too good to be true — or asks for personal data before an interview — it’s probably a scam.

Credential Theft: The One-Password-to-Rule-Them-All Mistake 

Using the same password for every account isn’t just lazy, but an open invitation for cybercriminals. Hackers know people reuse passwords, and once they crack one, they try it everywhere.

 

For instance, if a leaked Netflix password also unlocks a work email or banking account, the damage can be severe. Password managers are the easiest way to avoid this rookie mistake.

Public Wi-Fi Risks: Coffee Shops, Co-Working Spaces, and Cyber Eavesdroppers

A laptop, an oat milk latte, and a free café Wi-Fi connection — it’s the unofficial remote work starter pack. But, unsecured public networks are a hacker’s playground. Cybercriminals use fake hotspots or intercept unprotected connections to steal credentials and sensitive data.

 

If Wi-Fi isn’t password-protected (or even if it is), a VPN (Virtual Private Network) is a must. Without one, new professionals might as well hand their login credentials to the person at the next table.

Social Engineering Attacks: When Hackers Weaponize Oversharing

That “First Day at Work!” selfie with a company badge in the background? It’s an Instagram moment, sure. But it’s also a potential security risk. Hackers mine social media for details that can be used to impersonate employees, bypass security questions, or craft convincing spear-phishing attacks.

 

A public profile full of work updates, location check-ins, and personal details makes it alarmingly easy for cybercriminals to manipulate or deceive unsuspecting targets.

Best Practices for Young Professionals to Stay Secure 

So, how do new professionals avoid becoming easy targets? Start with just a few smart habits. Here’s how to lock down digital life before cybercriminals can take advantage.

Best Practice #1: Use Strong, Unique Passwords, Your First Line of Defense 

If your password looks like “Password123”, go ahead and change it now. Right now. Weak, reused, and predictable passwords are the digital equivalent of leaving your apartment door wide open.

 

A password manager does the heavy lifting by generating and storing unique passwords for every account. That way, even if one password gets compromised, the rest of your digital life stays secure.

Best Practice #2: Enable Multi-Factor Authentication (MFA), The Digital Deadbolt

Think of MFA as the two-factor ID check for your online accounts. Even if a hacker gets a password, they still need a second form of verification — like a text message code, an authentication app, or a fingerprint scan — to break in.

 

It’s a simple step that stops most cyberattacks in their tracks. If an account offers MFA, turn it on. No exceptions.

Best Practice #3: Be Cautious of Emails and Links, Pause Before You Click

That urgent email from “IT Support” saying your account has been compromised? It’s likely a phishing attempt. Cybercriminals love to impersonate trusted sources, tricking people into clicking malicious links or handing over login credentials.

 

Before clicking, hover over links to check their actual destination, verify the sender’s email address, and when in doubt, go directly to the company’s website instead of following email instructions.

Best Practice #4: Secure Personal Devices, Keep Everything Up to Date 

That “remind me later” button on software updates? Stop clicking it. Updates bring new features and patch security vulnerabilities hackers love to exploit.

 

Keep operating systems, browsers, and apps updated, and install reputable antivirus software. For extra security, turn on automatic updates so you’re always one step ahead. 

Best Practice #5: Limit Social Media Exposure, Think Before You Post

Cybercriminals love oversharers. Posting about your new job, your office, or even your birthday can give hackers just enough information to impersonate you or crack security questions.

 

Keep LinkedIn professional, tighten privacy settings, and resist the urge to post sensitive work details. If you wouldn’t say it to a stranger on the street, don’t post it online.

How SMBs Can Safeguard Against New Employee Cyber Risks 

New graduates aren’t the only ones who need to level up their cybersecurity game — small and medium-sized businesses (SMBs) have just as much at stake. A single employee clicking on the wrong link or using a weak password can be the crack in the foundation that cybercriminals exploit. Here’s how SMBs can stay ahead of the threats that come with onboarding fresh talent.

Implement Security Awareness Training: Make Cyber Smarts Part of Onboarding

Most cyberattacks don’t rely on hacking some ultra-secure firewall. They focus on tricking employees. Phishing emails, fake job portals, and social engineering scams are designed to exploit human error. That’s why cybersecurity training should be a Day One priority for new hires.

 

SMBs should provide training on identifying phishing attempts, safe password practices, and the importance of multi-factor authentication (MFA). A little education upfront can prevent costly mistakes down the road.

Enforce Strong Access Controls: Not Everyone Needs the Keys to the Castle 

Not every employee needs access to every system. Role-based access control (RBAC) ensures that employees only have access to the tools and data necessary for their job. This minimizes risk — if one account is compromised, hackers don’t get free rein over everything. Pair this with MFA for all critical accounts, and suddenly, breaking into the system becomes much harder for cybercriminals.

Secure BYOD (Bring Your Own Device) Policies: Don’t Let Unsecured Laptops Be the Weak Link 

Many new hires prefer to use their personal devices for work, but unprotected personal laptops and phones are a security risk waiting to happen. SMBs should enforce VPN use for remote work, endpoint protection software, and device encryption.

 

If an employee loses their laptop, sensitive business data shouldn’t be up for grabs. A clear BYOD security policy keeps business and personal data from becoming a hacker’s playground.

Regular Security Audits: Find the Holes Before Hackers Do

Cyber threats evolve fast. The best way to stay ahead is routine security audits. These check for vulnerabilities like outdated software, weak passwords, and unsecured access points.

 

Even small businesses should have a cybersecurity checklist so systems are regularly patched, and employees follow best practices. Waiting for a breach to happen is a disaster waiting to unfold.

Partner with an MSP for Ongoing Protection: Why SMBs Shouldn’t Go It Alone

Managing cybersecurity in-house is overwhelming, especially for small businesses without dedicated IT teams. That’s where Managed Service Providers (MSPs) come in.

 

MSPs offer proactive monitoring, threat detection, and incident response, which means businesses stay protected 24/7. Instead of reacting to cyber threats, SMBs can take a proactive approach because, in cybersecurity, prevention is always cheaper than recovery. 

Building a Cyber-Resilient Workforce

A company is only as secure as its least cautious employee. That’s the reality of today’s digital landscape. New hires bring fresh energy, new ideas, and — whether they realize it or not — an open invitation for cybercriminals looking for an easy mark.

 

The strongest organizations don’t hand out laptops and hope for the best. They build cultures where security is second nature, where a phishing email raises red flags instead of clicks, and where passwords aren’t just memorized but managed properly.

 

For SMBs, the choice is simple: invest in security now or pay for the fallout later. That doesn’t mean becoming cybersecurity experts overnight. It means putting the right safeguards in place, training employees to think before they click, and enlisting professionals when needed.

Having a reliable and enthusiastic partner in the IT Support and Services sector is crucial for achieving sustained growth through effective technological strategies. Mark Sommerfeld, a partner at RYMARK, is fully committed to helping clients optimize their technology to gain a competitive edge in their respective industries. Within RYMARK, Mark collaborates with a dedicated team of professionals who are wholeheartedly committed to delivering exceptional IT Security & Services. Leveraging his extensive expertise and practical experience, Mark ensures that clients receive unparalleled support and guidance for their IT security projects. When you have RYMARK as your partner, you can depend on us to enhance your business systems and stay ahead in today's fiercely competitive business environment.

Mark Sommerfeld

Having a reliable and enthusiastic partner in the IT Support and Services sector is crucial for achieving sustained growth through effective technological strategies. Mark Sommerfeld, a partner at RYMARK, is fully committed to helping clients optimize their technology to gain a competitive edge in their respective industries. Within RYMARK, Mark collaborates with a dedicated team of professionals who are wholeheartedly committed to delivering exceptional IT Security & Services. Leveraging his extensive expertise and practical experience, Mark ensures that clients receive unparalleled support and guidance for their IT security projects. When you have RYMARK as your partner, you can depend on us to enhance your business systems and stay ahead in today's fiercely competitive business environment.

Back to Blog

Frequently Asked Questions

What are IT security services?

IT security services encompass measures and practices to protect your systems, networks, and data from potential threats. These services include but are not limited to network security, data encryption, access controls, vulnerability assessments, penetration testing, and incident response.

What are managed IT service providers?

Managed IT service providers (MSPs) are companies that remotely manage a organization's IT infrastructure and services, such as network management, cybersecurity, and data backup, on a subscription basis. They help organizations streamline operations, reduce costs, and ensure IT systems run efficiently.

What are the benefits of cybersecurity services?

IT security services encompass measures and practices to protect your systems, networks, and data from potential threats. These services include but are not limited to network security, data encryption, access controls, vulnerability assessments, penetration testing, and incident response.

What services does RYMARK IT offer to organizations in Minneapolis?

We provide a range of services, including Managed IT Services, IT Projects, Cybersecurity Services, Network Monitoring and Management, Backup and Disaster Recovery Services, Vendor Management, CTO and Strategic IT Consulting, Work-from-Home Support, IT Relocation Services, and more.

How can Managed IT Services benefit my business?

Managed IT Services offer proactive management of your IT infrastructure, ensuring optimal performance, minimizing downtime, and allowing you to focus on core business activities.

What industries does RYMARK IT specialize in serving?

We cater to various industries, including Non-Profit Organizations, Religious Organizations, Schools and Education, Financial Service Organizations, Manufacturers, Legal Industry, Construction, and Professional and Government Services.

FAQ image

How does RYMARK IT ensure the security of our IT infrastructure?

We conduct comprehensive IT security assessments to identify vulnerabilities and implement robust security measures, including employee training, to safeguard your IT infrastructure.

What is an IT security assessment, and why is it important?

An IT security assessment evaluates your IT infrastructure to identify vulnerabilities and potential threats, providing a roadmap to enhance your organization's security posture.

How can we protect our organization from phishing attacks?

Implementing multi-factor authentication, using strong passwords, and conducting regular employee training on recognizing phishing attempts are effective strategies to protect against such attacks.

 What steps can we take to improve our network security?

Regular network assessments, implementing firewalls, ensuring up-to-date antivirus software, and conducting employee training are crucial steps to enhance network security.

How does RYMARK IT support remote work solutions?

We offer Work-from-Home Support services, ensuring secure and efficient remote work setups for your employees.

What should we do if we experience a data breach?

Contact our IT support team immediately. We provide Backup and Disaster Recovery Services to help you respond effectively to data breaches and minimize potential damage.

How can we ensure compliance with industry regulations?

Our IT Security and Support services include assessments and employee training to help your organization comply with relevant industry regulations and standards.

At RYMARK, we believe in using our expertise to strengthen not only businesses, but also the communities they serve. That’s why we’re a proud member of Get Support, Give Support, a nationwide initiative that brings together IT providers to offer free technology services to nonprofits making a difference locally.

For every new client that signs up for our managed IT services, we donate remote monitoring agents to a nonprofit organization in our community. These tools help charities secure, manage, and optimize their IT environments, without adding to their overhead, so they can focus fully on their missions.

Whether it’s helping a shelter stay connected or enabling an education nonprofit to operate more efficiently, this initiative allows us to turn everyday business into tangible, lasting impact.

Because when nonprofits have the right tech support, they can do what they do best: change lives.

Let RYMARK eliminate your IT security & IT support obstacles

Spend less time on IT problems and more time growing your organization. Let’s get to know each other and determine how our partnership could grow. With us on your side, develop customized security plans, stronger communication strategies, and a better plan for the future.

Call (651) 323-1775 today or fill out the form below to schedule your appointment. We’re ready to jumpstart your IT journey.