• Networking
  • Data backup
  • Cyber Security
  • Project Management
  • Email and Server Support
  • Continuity & Recovery Services
  • Microsoft 365
  • Cloud-based Solutions
  • Migration Services
  • VPN and Telecommuting Account Setup
  • Business Phone and Internet Systems
  • Wiring & Cabling
  • LED Lighting
  • Security System Set up
  • Camera and Access Point Installation

How are we different?

General Technologies, the parent company of General Computer Consulting (GCC), is here to provide fast, reliable service you can count on. We don’t just think of ourselves a service provider — we’re an extension of your business.

For the past 15 years, we have served hundreds of Western Pennsylvania businesses just like yours. We specialize in managed IT services for small- to medium-sized businesses providing comprehensive end-to-end technology solutions. We offer a broad spectrum of services including networking, server management, VOIP phone, and security systems installation. We partner with the best-in-class software and hardware providers to deliver the right solutions for your business.

Most importantly, you have a business to run. Don't let technology slow you down. Let the experts at General Technologies help you today!

Contact us today to see how we can help you!

I.t. solutions

Whether you're looking to replace your existing IT service or need to start from scratch, our team is happy to assist you. Let us design a custom service option to suits your needs and budget. We offer a wide range of plans to keep you focused on your business, leaving IT issues to us.

Call 412-853-3708 or fill out our convenient contact form to get started. A member of our team is waiting to hear from you!

Memberships

What people are saying about us...

"We found that GCC is very dependable and reliable and has always answered any question or fixed any problem very quickly."

Jeff Sorick Heating & Cooling

What Is Security Posture And How Vital It Is

March 5, 2024

Security posture refers to the overall cybersecurity strength of one organization. It is determined by the ability to respond, predict, and provide an immediate response…

Learn more...

Risk Assessment: Checking Out Your Multi-Factor Authentication Security

February 29, 2024

According to a cybersecurity report, 80% of all hacking involves stolen user credentials or poor password hygiene. In total over 600 million passwords have been…

Learn more...

CYBER HYGIENE: Why You Need It?

February 27, 2024

Cyber hygiene has become a popular discussion in all types of business segments. Cyber hygiene begins with enhancing security awareness and ends with building a…

Learn more...