Blue Dot Technologies – Northwest Indiana’s IT Partner (219) 851-4599
Blue Dot Technologies – Northwest Indiana’s IT Partner (219) 851-4599
  • Main
  • Contact
  • About
  • Technology Services
  • CCTV/Access Control Security Systems
  • Technology Disposal
  • Blog
  • Main
  • Contact
  • About
  • Technology Services
  • CCTV/Access Control Security Systems
  • Technology Disposal
  • Blog

How I Approach a $7M IT Budget as a CIO

8/28/2025

0 Comments

 
Picture
Managing an IT budget is one of the most critical responsibilities of any IT leader. For many organizations, it’s also one of the most misunderstood. Too often, IT is treated as just another expense line in the financial plan—when in reality, the IT budget is a strategic roadmap that powers security, operations, and growth.
As a CIO, when I manage a budget in the range of $7 million, I follow a disciplined process to make sure the business gets maximum value from every dollar.

Step 1: Confirm the Budget Is Firm Budgets should start with alignment. I confirm with stakeholders—CEO, COO, CFO, and the board—that the IT budget is a firm allocation, typically based on 3–6% of sales.
The key is making sure everyone agrees on one principle: IT owns the IT budget.
If we generate savings, those funds don’t disappear into operations—they stay in IT, where they can be reinvested into new hardware, better security, or staff development. That way, IT continuously modernizes instead of falling behind.

Step 2: Break the Budget into Clear Categories divide the IT budget into specific, transparent categories that the business can easily understand:
  • Cybersecurity – Threat detection, endpoint protection, compliance, SOC services.
  • IT Staff – Salaries, training, certifications, and professional development.
  • Hardware & Assets – End-user devices, servers, networking, cloud hardware.
  • Software – Licensing, SaaS subscriptions, enterprise applications.
  • Insurance – Cyber liability and technology risk coverage.
  • Subcontractors/MSPs – Specialized vendors or consultants.
  • Communications – Mobile plans, VoIP, and unified collaboration platforms.
This clarity keeps stakeholders informed and prevents confusion about where the money is going.

Step 3: Report Monthly and Stay Transparent Budgets should never be static. Every month, I provide a budget vs. actuals report to stakeholders:
  • If we’re overspending, I explain why and connect it to business outcomes (e.g., regulatory requirements or expansion).
  • If we’re underspending, I highlight opportunities to reinvest in equipment, cybersecurity, or staffing.
This keeps executives engaged and reinforces IT’s role as a business enabler.

Step 4: Keep Leadership Aligned Whether the budget is built by a CIO, vCIO, or CTO, the Director of IT must be part of the process. Leaving out senior IT leadership creates blind spots and leads to poor budget control.
At the same time, accountability must sit with one leader—either the CIO, CTO, or Director of IT. While the CEO, COO, or CFO approve and oversee, they should not control the IT budget. IT leadership is closest to the risks, opportunities, and technical needs of the business, making us best positioned to allocate funds effectively.

My Philosophy A well-managed IT budget is not an expense—it’s an investment. It keeps the business secure, enables innovation, and drives efficiency across every department.
Handled the right way, the IT budget becomes one of the most powerful tools a company has to stay competitive in today’s digital-first world.

👉 I’d love to hear from other IT leaders: Do you treat your IT budget as cost containment—or as an engine for growth?
#CIO #ITLeadership #ITBudgeting #Cybersecurity #DigitalTransformation

Picture
0 Comments

Stop Letting Executives Bypass Cybersecurity

8/19/2025

1 Comment

 

I had a call with a client recently that made my blood pressure spike. The executives at this company wanted “free, unrestricted access” to their iPhones—no MFA, no restrictions, no controls. Just wide-open devices because, and I quote, “leadership doesn’t have time for that stuff.” Let’s be clear: this mindset is dangerous, irresponsible, and flat-out stupid.

The Ugly Truth About Executive Access

Executives think they’re too important to be slowed down by security. What they fail to realize is that they’re also the #1 target for attackers.

Hackers don’t care about middle management—they want the CEO, CFO, and anyone else with authority to approve wire transfers, sign contracts, or access confidential data. One compromised iPhone, and your entire company is on fire.


Risks You’re Begging For


When leadership gets a free pass on security, here’s what you’re inviting:

Credential Theft – No MFA? Congratulations, your CEO’s inbox is now hacker property.

BEC Scams – Attackers love compromised exec accounts—they send fake wire requests and watch finance drain millions.

Data Exfiltration – That “unlocked” phone holds contracts, financial reports, and client data. Lose it, and you’re toast.

Compliance Failures – If you’re regulated (HIPAA, FINRA, GDPR, etc.), you’ve just handed auditors a career-making fine.

Shadow IT & App Risks – Execs installing random apps is like leaving the back door open during a storm.

Cybersecurity Isn’t Optional—Especially for Leadership

Here’s the part that never lands with execs drunk on convenience:

Cybersecurity doesn’t slow you down--getting breached does.

Convenience doesn’t outweigh risk. Executives are the biggest liability without controls.

If you’re in leadership and you think you should get a pass from the very rules protecting your company, you’re not just careless—you’re reckless.


The Fix (No Excuses)

Enforce MDM and remote wipe.

Require MFA on all exec accounts.

Lock down devices with conditional access policies.

Train leadership like they’re the prime target (because they are).

Plan for the inevitable: an executive device will get compromised.


Final Word


If your executives truly understand their responsibility, they’ll accept that cybersecurity applies to them first.

Giving leadership “free access” is like letting the pilot skip preflight checks because they’re in a hurry. Sure—it saves time… right up until you crash.


Picture
1 Comment

Why I Said “No” to a 90-Day Email Deletion Policy

8/13/2025

0 Comments

 
When the C-suite calls you in and says, “We want all emails deleted after 90 days,” it might sound like a quick win for storage management or “cleaning up” the system. But as an IT and compliance professional, I had to draw a hard line — and here’s why.

1. The Real Motivation Often Isn’t Storage Leadership may say it’s about saving space or reducing clutter, but in many cases, this kind of policy is pushed to reduce legal exposure. The thinking is simple:
  • No emails, no evidence in the event of lawsuits or regulatory audits.
While that might sound like risk reduction, it’s actually the opposite — it creates bigger legal and operational risks.

2. Legal and Regulatory Compliance Many industries have mandatory data retention requirements:
  • Finance: SEC and FINRA require retention for years, not months.
  • Healthcare: HIPAA can require certain communications to be preserved.
  • Utilities, critical infrastructure, and government contractors: Contractual retention requirements may be measured in years.
A blanket 90-day purge could violate multiple laws and contracts — putting the company in direct legal jeopardy.

3. Litigation Hold and Discovery If your company is ever sued, a court can issue a litigation hold — requiring you to preserve all relevant data.
  • If your policy automatically deletes those emails, it can be seen as destruction of evidence (spoliation).
  • Judges have handed down severe sanctions, including default judgments, for companies that “accidentally” deleted emails during litigation.

4. Operational Risk Emails aren’t just legal records — they’re operational memory.
  • Project details.
  • Contract negotiations.
  • Client history.
    Delete those every 90 days and you’re erasing critical institutional knowledge that no knowledge base or SharePoint site will ever fully replace.

5. The Better Approach Instead of a reckless blanket purge:
  • Implement tiered retention policies based on department and content type.
  • Use archiving solutions to move older emails into low-cost storage while keeping them searchable.
  • Train staff on when and how to manually delete emails that truly have no business or legal value.
This keeps inboxes lean without exposing the company to compliance and litigation risks.

6. Why I Said No As the IT and compliance lead, my role isn’t just to do what leadership wants — it’s to protect the company from avoidable disasters.
Saying “yes” to a 90-day deletion policy would have been:
  • Legally dangerous — violating retention laws.
  • Operationally harmful — erasing critical business history.
  • Ethically questionable — enabling a potential “out of sight, out of mind” approach to accountability.
So I told them No — and instead proposed a compliant, risk-aware retention strategy.

Final Thought Good IT leadership means knowing when to say “yes” to efficiency — and when to say “no” to something that could destroy your company’s legal standing.
Deleting all emails after 90 days might seem like “getting ahead of problems,” but in reality, it’s setting up bigger ones.
Picture
0 Comments

Why CEOs, COOs, and Controllers Shouldn’t Run or Interview for IT Departments

8/2/2025

0 Comments

 
Published by Blue Dot Technologies
In today's digital-first economy, information technology is no longer a support function — it's the operational backbone of most businesses. Yet, many small to mid-sized organizations make the mistake of having CEOs, COOs, or Controllers oversee IT operations or even lead hiring decisions for technical positions. While well-intentioned, this approach often leads to misalignment, poor hiring decisions, and increased organizational risk.

1. Lack of Technical Expertise = Increased Business RiskIT is a specialized domain. It requires in-depth knowledge of cybersecurity, network infrastructure, cloud platforms, data compliance, and modern endpoint security. When non-technical executives are placed in charge of IT:
  • Cyber risks are underestimated
  • Poor technology choices are made
  • Vulnerabilities go undetected
What seems like a cost-saving measure can result in expensive breaches, data loss, and legal exposure.

2. Strategy Suffers Without IT LeadershipControllers and COOs are experts in operations and finance — not in designing scalable networks or implementing zero-trust architecture. Without proper IT guidance, companies often:
  • Delay critical upgrades
  • Misallocate budget toward ineffective solutions
  • Lack a roadmap for future-proofing their infrastructure
An IT leader (internal or outsourced) ensures technology is aligned with growth, innovation, and security.

3. C-Level Executives Should Not Interview for Technical RolesHiring the wrong IT staff can cripple a business. But most C-level executives aren't qualified to evaluate:
  • Technical certifications
  • Security knowledge
  • Infrastructure experience
They may focus on cultural fit or surface-level skills without assessing core competencies. That’s why it’s crucial to partner with an IT-focused staffing agency or a Managed Service Provider (MSP) like Blue Dot Technologies to vet and place the right talent.
The result? You avoid mis-hires and build a high-performing, security-first IT team.

4. Missed Opportunities & Innovation GapsWithout seasoned IT leadership, most businesses don’t explore:
  • Cloud automation
  • Cybersecurity audits
  • Penetration testing
  • Digital process transformation
These aren’t just buzzwords — they’re competitive advantages that drive growth and resilience. An executive team lacking IT depth may never know what’s possible.

5. IT Talent Retention PlummetsSkilled IT professionals don’t want to report to leaders who don’t understand their work. When a CEO or Controller micromanages technical processes, it:
  • Causes friction
  • Slows down projects
  • Drives talent out the door
A respected IT manager or vCIO fosters trust, innovation, and efficiency.

The Smart Solution: Let the Experts Lead ITWhether it’s hiring a CIO, partnering with a Managed Service Provider, or outsourcing staffing to a technical recruiting firm, your IT success depends on having the right people in the right roles.
At Blue Dot Technologies, we help businesses:
  • Develop strategic IT roadmaps
  • Hire the right talent through expert vetting
  • Deliver full-service cybersecurity and infrastructure support

Final ThoughtJust like you wouldn’t ask your IT manager to run your accounting department, you shouldn’t expect your Controller to manage IT hiring or architecture. Let the technologists lead the technology.
Contact Blue Dot Technologies today for a free assessment and learn how proper IT leadership can transform your business.
0 Comments

The Benefits of Open Source Computing: Why it Matters for the World

4/23/2023

0 Comments

 





As we continue to progress into the digital age, it's becoming increasingly clear that open source computing is one of the most important and transformative innovations of our time. At its core, open source computing is about sharing knowledge and code, and allowing anyone to contribute to and improve upon software projects. This collaborative approach has given rise to some of the most important technologies of the past decade, and is helping to drive innovation and progress in fields ranging from healthcare to finance.

One of the key benefits of open source computing is that it enables a wider range of people to participate in the development of new technologies. In the past, proprietary software companies held a virtual monopoly on the creation of new software, meaning that only a select few had access to the tools and resources necessary to innovate. With open source computing, however, anyone with the skills and motivation to contribute can do so, making it possible for talented developers from around the world to collaborate and create truly groundbreaking new technologies.

Another benefit of open source computing is that it promotes transparency and accountability in the development process. By making source code available to anyone who wants to see it, open source projects are inherently more transparent than proprietary software projects, where the inner workings of the code are often kept secret. This transparency can help to build trust and credibility in new technologies, and can make it easier to identify and correct bugs and other issues as they arise.

Finally, open source computing is also a powerful force for innovation and progress. By making it easier for people to collaborate and share ideas, open source projects are helping to drive breakthroughs in fields ranging from artificial intelligence to renewable energy. As more and more talented developers begin to embrace open source computing, we can expect to see even more impressive advances in technology in the years to come.

Open source computing is a game-changing innovation that is helping to drive progress and innovation in fields ranging from healthcare to finance. By enabling greater collaboration, transparency, and accountability, open source projects are making it possible for a wider range of people to participate in the development of new technologies. As such, it's essential that we continue to support and promote open source computing as a vital tool for building a better world.


#opensource #technology #collaboration #innovation #transparency #accountability #development #progress #digitalage #computing #artificialintelligence #renewableenergy #healthcare #finance

0 Comments

Intune or LogMeIn ??????

4/15/2023

0 Comments

 
​As the world continues to shift towards remote work and a more mobile workforce, the need for effective and secure management of devices and applications has become paramount. Two tools that have emerged as popular choices for managing remote devices are Microsoft Intune and LogMeIn. Both solutions provide a range of features to manage devices and applications, but there are some key differences between them. In this article, we will compare Microsoft Intune and LogMeIn to help you understand which solution might be the right fit for your organization.

What is Microsoft Intune?

Microsoft Intune is a cloud-based endpoint management solution that allows organizations to manage and secure devices, applications, and data across a range of platforms, including Windows, macOS, iOS, and Android. It provides a single console for managing devices and applications, allowing IT administrators to deploy policies, update software, and manage access to corporate resources from a central location.
Microsoft Intune provides a range of features, including device management, application management, and mobile device management. It allows IT administrators to manage devices remotely, enforce security policies, and protect data by enforcing encryption and other security measures.

What is LogMeIn?

LogMeIn is a remote access and endpoint management solution that allows IT administrators to manage and support remote devices from a central location. It provides features such as remote access, remote support, and endpoint management, allowing IT administrators to manage and support devices from anywhere.
LogMeIn provides a range of features, including remote access, file sharing, and remote support. It allows IT administrators to access and manage remote devices from anywhere, making it ideal for organizations with a geographically dispersed workforce.

Differences between Microsoft Intune and LogMeIn


  1. Platform support


Microsoft Intune supports a wide range of platforms, including Windows, macOS, iOS, and Android. LogMeIn, on the other hand, supports Windows, macOS, and some versions of Linux.


  1. Feature set


Microsoft Intune provides a range of features, including device management, application management, and mobile device management. LogMeIn, on the other hand, provides remote access, file sharing, and remote support.


  1. Security


Both Microsoft Intune and LogMeIn provide a range of security features, including encryption, multi-factor authentication, and remote wipe capabilities. However, Microsoft Intune is more focused on security, providing a range of security features, such as conditional access policies, to protect corporate data and devices.


  1. Pricing


Microsoft Intune is licensed on a per-user basis, with pricing starting at $8 per user per month. LogMeIn, on the other hand, is licensed on a per-device basis, with pricing starting at $80 per year for up to 25 devices.

Which one is right for you?

The choice between Microsoft Intune and LogMeIn depends on your organization's specific needs. If you need a solution that provides comprehensive endpoint management and security features, Microsoft Intune may be the better choice. On the other hand, if you need a solution that provides remote access and support features, LogMeIn may be a better fit.

​Both Microsoft Intune and LogMeIn provide valuable solutions for managing and securing remote devices. By understanding the differences between the two, you can choose the one that best fits your organization's needs.


Microsoft Intune:


  • #MicrosoftIntune
  • #Intune
  • #EndpointManagement
  • #DeviceManagement
  • #MobileDeviceManagement
  • #MDM
  • #MobileManagement
  • #Security
  • #CloudManagement
  • #UnifiedEndpointManagement


LogMeIn:


  • #LogMeIn
  • #RemoteAccess
  • #RemoteSupport
  • #EndpointManagement
  • #FileSharing
  • #RemoteControl
  • #RemoteManagement
  • #RemoteAssistance
  • #ITSupport
  • #VirtualSupport
  • #Collaboration


0 Comments

Are you interested in gaining a fundamental understanding of the AWS Cloud?

4/7/2023

0 Comments

 
Are you interested in gaining a fundamental understanding of the AWS Cloud? Are you new to cloud computing or looking to expand your knowledge and skillset? If so, then the AWS Certified Cloud Practitioner certification may be the perfect place for you to start.

The AWS Certified Cloud Practitioner certification is a foundational level certification that validates your knowledge of the AWS Cloud and its core services. This certification is ideal for individuals who are new to cloud computing and are looking to establish a fundamental understanding of the AWS Cloud.
The certification exam consists of 65 multiple-choice questions that cover four key areas: cloud concepts, security, technology, and billing and pricing. The exam can be taken either at a testing center or online, and candidates have 90 minutes to complete it.

To prepare for the certification exam, Amazon Web Services (AWS) recommends taking its Cloud Practitioner Essentials course. This course is designed to provide an overview of the AWS Cloud and its core services, as well as an understanding of AWS security and compliance measures. Additionally, AWS offers a variety of other resources, including whitepapers, documentation, and practice exams, to help candidates prepare for the exam.

Earning the AWS Certified Cloud Practitioner certification demonstrates your knowledge of cloud computing and the AWS Cloud, as well as your ability to navigate the AWS Management Console and understand basic AWS architectural principles. This certification can help you advance your career in cloud computing and open up new opportunities for you.

In addition to the career benefits, obtaining the AWS Certified Cloud Practitioner certification can also lead to cost savings for your organization. By understanding the AWS Cloud and its core services, you can make informed decisions about which services to use and how to optimize your usage, resulting in cost savings for your organization.

AWS Certified Cloud Practitioner certification is an excellent starting point for individuals who are new to cloud computing or looking to expand their knowledge and skillset. By earning this certification, you will gain a fundamental understanding of the AWS Cloud and its core services, which can help you advance your career in cloud computing and lead to cost savings for your organization.


#AWSCertifiedCloudPractitioner
#AWSFundamentals
#CloudComputing
#CloudCertification
#AWSCloud
#AWSManagementConsole
#AWSArchitecturalPrinciples
#AWSecurity
#AWSCompliance
#CloudCostOptimization
#CareerAdvancement
#CloudSkills
#CloudCareer
0 Comments

Why a Server expert???

4/1/2023

0 Comments

 
Building and deploying a server for a small business can be a daunting task, especially if you lack the technical expertise to do it. That's why it's essential to have an expert who can guide you through the process and ensure that your server is secure, efficient, and reliable. Here are some reasons why having an expert is crucial for small businesses:
  1. Expertise: A server expert has the technical knowledge and experience to design, build, and deploy a server that meets your business's specific needs. They know the latest technologies, best practices, and security protocols to ensure that your server is up to date and secure.
  2. Efficiency: A well-designed server can improve the efficiency of your business operations. An expert can optimize your server's performance, ensure that it's running smoothly, and troubleshoot any issues that may arise.
  3. Cost-effectiveness: Hiring an expert to build and deploy your server can be more cost-effective than trying to do it yourself. An expert can help you avoid costly mistakes and ensure that you're investing in the right hardware and software for your business.
  4. Security: Cybersecurity threats are a significant concern for small businesses. An expert can ensure that your server is secure and protected against cyberattacks. They can implement security measures such as firewalls, antivirus software, and intrusion detection systems.
  5. Scalability: As your business grows, your server needs may change. An expert can design a server that is scalable and can accommodate your business's future growth.



​#SmallBusinessServer #ServerExpert #Efficiency #CostEffective #Cybersecurity #Scalability



Picture
0 Comments

Amazon Web Services (AWS) can help your business

3/24/2023

0 Comments

 
As businesses increasingly turn to the cloud for their IT infrastructure needs, Amazon Web Services (AWS) has emerged as a leading provider of cloud computing services. AWS offers a wide range of services that can help businesses of all sizes to operate more efficiently, securely, and cost-effectively. In this blog post, we'll explore some of the ways in which AWS can help your business.

Scalability and Flexibility

One of the key advantages of using AWS is its scalability and flexibility. AWS allows you to quickly and easily scale up or down your infrastructure based on your needs, without having to worry about the cost and complexity of managing physical hardware. This means that you can quickly adapt to changing market conditions or customer demand, and pay only for what you use.

Reliability and Security

AWS has built a reputation for being one of the most reliable and secure cloud computing providers in the market. With a global network of data centers and multiple availability zones, AWS ensures that your data and applications are available and secure at all times. AWS also provides a range of security features, such as identity and access management, encryption, and network security, to help protect your data from unauthorized access or breaches.

Cost-Effectiveness

Another advantage of using AWS is its cost-effectiveness. AWS offers a pay-as-you-go pricing model, which means that you only pay for the services you use, without having to invest in expensive hardware or infrastructure. AWS also provides a range of cost optimization tools, such as auto-scaling, reserved instances, and cost explorer, which can help you to reduce your overall infrastructure costs.

Wide Range of Services

AWS offers a wide range of services that can help your business to operate more efficiently and effectively. Some of the most popular services include:
  • Amazon EC2 (Elastic Compute Cloud) for scalable compute capacity
  • Amazon S3 (Simple Storage Service) for secure and durable object storage
  • Amazon RDS (Relational Database Service) for managed relational databases
  • Amazon CloudFront for content delivery and acceleration
  • Amazon SQS (Simple Queue Service) for message queuing and decoupling
  • Amazon Lambda for serverless computing

AWS can offer your business scalability, flexibility, reliability, security, cost-effectiveness, and a wide range of services that can help you to operate more efficiently and effectively. By leveraging AWS, you can focus on your core business activities while leaving the IT infrastructure management to the experts. If you're interested in learning more about how AWS can help your business, visit their website or contact an AWS representative today.

#AWS #AWScloud #AWSCloudComputing #AWSCommunity #AWSreInvent #AWSCertified #AWSLambda #AWSCLI #AWSCodePipeline #AWSCodeBuild #AWSCodeDeploy #AWSCodeStar #AWSDevOps #AWSDeveloper #AWSSolutionsArchitect #AWSManagedServices #AWSPartnerNetwork #AWSSupport
0 Comments

Cloud computing

3/21/2023

0 Comments

 
Cloud computing has transformed the way businesses operate by enabling them to store, process, and access their data and applications over the internet, rather than relying on physical servers or personal computers. In recent years, cloud-based computing has emerged as a game-changer in the tech industry, and its popularity continues to grow as more and more businesses shift towards cloud-based services.

So, what exactly is cloud computing? Cloud computing is a model of delivering technology services over the internet, such as storage, servers, databases, software, and analytics, without the need for physical hardware or software. Instead of buying and maintaining their own servers, businesses can rent access to computing resources on a pay-as-you-go basis, thereby reducing their overall IT costs.

There are three primary types of cloud computing: public, private, and hybrid.

Public cloud computing refers to services provided by third-party providers over the internet. These services are typically offered on a pay-as-you-go basis, and customers can access them from any device with an internet connection. Examples of public cloud providers include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud.

​Private cloud computing, on the other hand, refers to services that are hosted on a private network and are only accessible to authorized users. This type of cloud computing is often used by larger businesses and organizations that require more control over their data and applications.

Finally, hybrid cloud computing combines both public and private cloud services, allowing businesses to leverage the benefits of both models. Hybrid cloud computing is particularly useful for businesses that have varying demands for computing resources.

One of the main advantages of cloud computing is its scalability. Businesses can quickly and easily scale their computing resources up or down depending on their needs, without having to worry about purchasing new hardware or software. This makes it an ideal solution for businesses with fluctuating workloads or seasonal demands.

Cloud computing also offers greater flexibility and mobility, as employees can access their data and applications from any device with an internet connection. This enables businesses to adopt more flexible working arrangements, such as remote working, which has become increasingly popular in recent years.

​Finally, cloud computing is often more cost-effective than traditional on-premises computing. Rather than having to invest in expensive hardware and software upfront, businesses can pay only for the resources they use, making it easier to manage their IT costs.
​

Cloud computing is a game-changer for businesses of all sizes. It offers greater scalability, flexibility, mobility, and cost-effectiveness than traditional on-premises computing, making it an ideal solution for businesses looking to streamline their IT operations and remain competitive in today's fast-paced digital world.
0 Comments
<<Previous
    Picture

    ​Freddie Castro
    ​ is a seasoned IT professional with over 30 years of experience in the industry. 

    Archives

    August 2025
    April 2023
    March 2023

    Cyber Security 

    Networking

    IT Consulting 

    CCTV cameras 

    Access Control

    Secured Backup

    ​QuickBooks 

    VOIP 

    All

    RSS Feed

© 2025 Blue Dot Technologies. All rights reserved.

Serving Illinois Indiana Ohio Michigan

Hours

M-F: 7am - 6pm
Sat-Sun by
​appointment only

Telephone

1.219.851.4599

Email

[email protected]