Discover the convenience of having all your IT services under one dependable roof.


Time is a precious resource, and we’re here to help you save it. StratIS becomes your single, familiar point of contact, streamlining your IT concerns. We understand your company, your culture, and your needs.


Harness the power of collaboration! Our team brings together diverse industry knowledge, ensuring your issues are fixed correctly—the first time around.


Whether your tech challenges are up in the cloud or right at your doorstep, our professional team has got you covered!”

Quick question?

Click the button below and chat with one of our IT professionals

(778) 761-2255

1 (844) 464-3466

Get Support

Click the button below to open a new ticket with the helpdesk or give them a call

(778) 761-2255

1 (844) 464-3466

Managed Services

We are your IT team, providing one point of contact for everything IT that your organization needs

Camera Systems

Be covered from every angle with smart security systems. Motion detection, alerting, and 24-hours reviewed in a minute.

Backup & Continuity

Simple as 3-2-1. We keep your organization and its data safe with monitored backups and ransomware tested protection


We design, build, and maintain small networks with just a couple users, up to hundreds of users


In the cloud or in the closet

We plan, install, and maintain fast servers that keep up with your needs

Business Phones

StratIS cloud voice provides cost effective solutions to keep your team in touch with your clients and each other with unrivaled clarity

Our Clients

“Highly Recommend Strat Is, Josh and his team go above and beyond to make sure your very well taken care of, and have peace of mind for your computer needs, they have helped me multiple times when my computer crashes or a problem arises, I call or message and with in minutes there on it, I defiantly couldn’t run my business with out you Guys, thanks Strat Is 😀

Highly recommend StratIS as a very great computer company, Joshua is great to deal with and very fast and proficient, had issues with my quick books and he got us back up and running within a few hours, would definitely recommend StratIS for any company wanting great service.

“… They go the extra mile to understand your business and streamline anything and everything they can so you can spend more time doing what you love and less time confused about tech problems. I have been working with Josh and his team for about year now and they are incredible! Whenever we have a tech or machinery issue they are onsite in 15 minutes to fix it and get us back up and working. They are reliable, fast and friendly.”

“Completely dedicated to their business and always looking forward”

We have had Joshua do several set up for us , the quality of the work , the value & the professionalism is 2nd to none – I wouldn’t look anyplace else to have computer work done in the Cranbrook area – I use this companies services with confidence – You are in excellent hands with Joshua”

“…Really really impressed with your services and company.”


Mastering File Search: Tips on Using Advanced Filter Keywords

In the digital age, effective file management is crucial for productivity and efficiency. With the sheer volume of files we interact with daily, locating a specific document or resource can be like finding a needle in a haystack. But fret not - advanced file search techniques can help. In this guide, we'll unravel the mysteries of advanced filter keywords and how they can supercharge your file search process.To filter files by their extension, use the "filetype:" or "ext:" keyword. For instance, if you need to locate PDF files, your search would look like this: "filetype:pdf". This filter can speed up your search significantly by narrowing down the results to a specific file format. Locate...

In today's fast-paced world, productivity is more important than ever. With mounting workloads, never-ending to-do lists, and the constant demand for peak performance, it's essential to find ways to optimize your efficiency and accomplish more in less time. In this blog post, we'll explore proven strategies and tips for increasing productivity and transforming the way you work.Effective time management is the cornerstone of productivity. By mastering your schedule and utilizing the following techniques, you can drastically improve your efficiency: Prioritize tasks using the Eisenhower Matrix: This method helps you differentiate between urgent and important tasks, allowing you to focus on...

Find your Google MyBusiness Review Link

First you want to make sure that you're logged into the Google account that manages your Google My Business profile. Then, follow this link to your Google Business Profile Manager. Google Business Profile Manager Click on the "See your profile" button, Google should take you to your search results page for your business listing. Click on the drop down arrow where you will find a "Ask for reviews" button. Google will show your direct review link that you can send to your customers.    

Mitigating Consent Phishing in Microsoft 365

Push Security recently published an article on July 6, 2021 [read here] discussing a novel way for a malicious actor to bypass Multi Factor Authentication (MFA) and Passwordless sign-on for Microsoft 365 users.Consent phishing is an emerging technique attackers are using to compromise user accounts, even if they have Multi-factor Authentication (MFA or 2FA) enabled. Consent phishing is particularly effective because it doesn’t exhibit many of the indicators that traditionally expose phishing attacks... In a blog post Microsoft warns that these attacks are on the rise. One notable example of this comes from the SANS Institute. They reported in August of 2020 that they had fallen victim to...


Security is always excessive until it's not enoughTwo Factor Authentication (2FA) Two Factor Authentication is an extra layer of security that makes sure a person trying to access an account is who they say they are. A password is 'something that you know', but also something that other people may know or be leaked on the dark web. Without 2FA enabled, anyone with your email and password would be able to access and misuse your mailbox or impersonate as you. Accessing a 2FA enabled resource requires both the password and a second piece of identity provided through 'something you have' (a code or device) or 'something you are' (iris, fingerprint, or voice). To leverage the better security...

Get the IT Support You & Your Team Need