Expert computer support, custom programming, websites, and IT security

Your business
Our technology

About Us

12:34 provides technology services to companies that don't have their own IT department or those that require supplemental staff. Whether you need hardware/software recommendations and procurement, or custom software/web application development, we have certified professionals on staff to meet your needs. "No IT department? No problem!"

The Team

J. Alejandro Rosado Jr.

Founder & CEO

Susanne Dombrowski

Shareholder & CFO

Pam Beiler

Admin Assistant

Shelly Campbell

Senior Network Admin

Mike Chea

Technology Specialist

Blake Clemens

Technology Specialist

Alberto Flores

Technology Architect

Joe Housley

Technology Services Manager

Dave Koppel

Developer II

Bobby Lee

Developer I

Doug Mendenhall

Developer I

Steve Reed

Technology Specialist

Tina Thalheimer

Office Admin

Sean Weaver

Developer II

Our Services

IT Support

Traditional, time-based IT support can be hard on the budget since you pay for potentially unknown resolution times.

We aren't traditional when it comes to our IT support. We offer a fixed price plan that results in rapid and effective resolution.

Fixed Price Support Plan + Server Virtualization + Antivirus + Firewall & Security + Back-up and Disaster Recovery + Email/Web Filtering

IT Support


We believe the web is the future of computing. As such, it has become our go-to platform for our development projects.

From public facing informational sites and internal business apps, to eCommerce sites and mobile apps, we would love to partner with you to build a perfect solution.

Web Sites + Design + Web Apps + eCommerce + iOS/Android/Windows Apps


Cloud Services

12:34 can help you with all of your hosting needs, from email hosting and web filtering, to data backup and site hosting.

With the cutting-edge expertise needed for this new era of hosted services, we'll tailor a perfect solution to fit your business or personal needs.

Email Hosting + Web Hosting + Azure Configuration + Office 365 + OpenDNS

Cloud Services



The Latest

12:34 Time Newsletter


Microsoft Outlook's Follow Up

Are you having trouble trying to keep track of emails you need to reply to later? Here's how to add a "Flag" to your messages to follow up later.

You can achieve this in two ways:

  1. Navigate to the message you want to mark for Follow Up. In the home tab, in the "Tags" group, click Follow Up, and then click a flag. (As you can see above, you have the options of Today, Tomorrow, This Week, Next Week, No Date, Custom, or Mark as Complete.)
  2. If you frequently use the Follow Up feature, you can set up the "Quick Click" default Follow Up length, which automatically sets the follow up if you simply click the flag in the reading pane's subject line, or when your message is selected, by pressing the "Insert key."
  3. To see an accumulated list of all your Follow Ups, navigate to the "Task" section (see below), they will be defaulted to showing the earliest due first.

    Be sure to watch for next week's tip to see how to add a reminder to the Follow Up.

12:34 Time Newsletter


Disabling Microsoft Outlook's Clutter

If you haven't seen last week's tip, we gave an introduction on what Clutter is. If you have found Clutter to be more difficult than useful, then keep reading. Today we're going to talk about how to disable Clutter.

  • Sign into Outlook on the web
  • Chose the Mail Tile and after the window loads, expand your folders so that the Clutter folder is visible
  • Right click the Clutter folder, and select "Clutter settings"
  • As of now there are only two settings options:

12:34 Time Newsletter


Microsoft Outlook's Clutter

Clutter is a new mailbox management feature that was initially introduced with Office 365 and has been implemented over the past two years. It’s a feature that analyzes how you process your emails. Based on your past history, it moves the “unimportant stuff” out of your Inbox and into Clutter, freeing up space in your inbox, but saving the messages for you to view at your leisure. Some key things to remember about Outlook’s method for moving into Clutter:

Clutter looks at various aspects of messages to understand what you don’t typically read, for example:

  • The sender
  • Whether you’ve participated in the conversation
  • Whether you’re the only recipient
  • The importance
  • Whether or not it's a subscription

Messages from certain people should never be identified as Clutter:

  • You
  • Anyone in your management chain, if you're an Office 365 Business user.
  • Your direct reports, if you're an Office 365 Business user.

As your reading habits change, Clutter learns and adapts. Remember, you can always move an email out of the Clutter folder, and it will remember to never categorize it as Clutter in the future. Also Clutter differs from Junk E-mail because it only analyzes emails that are from valid sources or people that you’ve interacted with before. Therefore, Junk E-Mail can be defined as unwanted solicited messages, and Clutter as a low priority.

If you’re someone who doesn’t receive a lot of emails per day, then Clutter might not be for you. Stay tuned for next week’s tip where we’ll explain how to turn off Clutter.

12:34 Time Newsletter


IT Leaders on Cybersecurity

During Microsoft's annual Virtual Security Summit, they polled almost 400 executives, directors, and industry leaders to see how even some of the best felt about their Cybersecurity. It was found that almost 25% of companies have experienced some sort of Cyberattack in the past 12 months. Because of this, 37% of the leaders believe that the most important objective in Cybersecurity is threat identification and detection. They believe the more knowledge out there to the user, the better; if they can recognize an attack then they can prevent the attack before it's even started.

The top 5 greatest threats to private data are as follows:

  1. Phishing- Posing to trick users into sharing private information; e.g., back in 2003, someone posed as eBay and sent out mass emails to people providing them a link to update their credit card information.
  2. Social Engineering- Psychologically manipulating users to divulge information; e.g., someone walks into a lobby and posts a new help-desk hotline, and manipulates information from them over the phone.
  3. Malware- Any malicious software designed to access private data.
  4. Advanced persistent threats- Extended, undetected data theft.
  5. Worms- Malware that self-replicates and distributes itself across a network.

CryptoLocker (Malware) is a great example for 3-5 above. It most commonly replicates from being hidden inside of an attachment to an email. Unfortunately for the user, as soon as they open the attachment (The Worm), it begins to encrypt files which locks out the owner (Advanced persistent threats). It then tries to extort the organization by displaying a ransom message saying to pay XX.XX amount of dollars to get your data back.

If you have questions about your Cybersecurity, or want to upgrade to be more secure, 12:34 can help. Contact us at or 1-866-327-1234 to find out what we can do for you!

Contact Us