Account Manager – Oklahoma City
Based out of our corporate office @ 3401 NW 63rd. in OKC, you’ll team up with your Manager to deliver smart, impactful solutions to businesses
Based out of our corporate office @ 3401 NW 63rd. in OKC, you’ll team up with your Manager to deliver smart, impactful solutions to businesses
R.K. Black, Inc., an Oklahoma City-based office technology company providing solutions to businesses throughout Oklahoma and Kansas, is seeking a full-time IT Account Manager to
[et_pb_section fb_built=”1″ _builder_version=”4.27.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.27.4″ _module_preset=”default” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″][et_pb_column type=”4_4″ _builder_version=”4.27.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjEwMDczNyJ9fQ==@” button_text=”RETURN TO OPEN POSITIONS” _builder_version=”4.27.4″ _dynamic_attributes=”button_url” _module_preset=”default” global_colors_info=”{}”][/et_pb_button][et_pb_text _builder_version=”4.27.4″ _module_preset=”default”

Phone systems don’t get a lot of attention until they stop working. Then they get everyone’s attention at once. For businesses still running aging phone infrastructure — or cobbling together communication tools that were never designed to work together — the cost of inaction shows up in dropped calls, missed

Cybersecurity conversations have a way of generating more jargon than clarity. Two terms that appear constantly — microsegmentation and zero trust — are frequently treated as interchangeable, occasionally treated as competitors, and almost always underexplained. They’re neither the same thing nor mutually exclusive. Understanding the actual difference between them is

— Two things to fill in before deploying: 1. datePublished / dateModified — Fill in the actual publish date (ISO 8601 format, e.g., “2025-03-15”). This is required for Article rich results and Google News eligibility. If the page has no date visible to users, consider adding one — Google expects

Every business sends mail. Invoices, statements, compliance documents, marketing pieces — the volume adds up faster than most teams expect. For organizations still processing outgoing mail by hand, that volume also adds up in labor hours, postage mistakes, and delays that could have been avoided entirely. An automated mailing system

The copier salesman promises savings. The IT director warns about hidden costs. Your CFO wants data, not opinions. Managed print services generate this confusion because the value proposition isn’t immediately obvious. Unlike software subscriptions or equipment purchases, MPS transforms an entire business function most organizations have never properly measured. You

The question comes up during nearly every initial consultation: “How complicated is this going to be?” Business leaders considering a document management system want to know what they’re getting into before committing resources. The honest answer? It depends on factors most organizations don’t consider until they’re already knee-deep in implementation.

Your business runs on data. Customer records, financial information, proprietary research, employee files—all stored on hard drives throughout your organization. But what happens when those drives reach the end of their useful life? Deleting files doesn’t actually erase them. Reformatting creates an illusion of security while leaving data vulnerable to

When technology fails, business stops. That’s especially true when your confidential documents end up in the wrong hands. The hybrid workplace has rewritten the rules of document security, scattering your sensitive information across home offices, corporate locations, cloud platforms, and mobile devices. Each access point represents another potential vulnerability waiting

Network infrastructure operates as the circulatory system of modern business operations. Every transaction, communication, and data transfer depends on networks functioning reliably and securely. Yet many organizations approach network monitoring and management reactively, addressing issues only after they disrupt operations. Understanding what are the key considerations for network monitoring and