Thank you for Subscribing

Because IT and cybersecurity is such an IMPORTANT issue, every business must make certain their employees are clear on how to appropriately use, handle and protect company data and devices. To help computer users like you, in addition to other useful content in our IT Services blog, we are promoting a series of IT security articles with useful tips to show you and your employees how to significantly improve your protection from being a victim of cybercrime.

Latest IT Security Tips posted:

  • Your SMB is a Target For Cyber Crime: Take These 8 Steps to Increase Your Security - When looking for a vulnerability, cybercriminals will go after SMBs and organizations that lack security. An average hacker does not want to pursue the big corporations that have layers of security in place — they want the easy targets. Many SMBs fall victims to cybercrime because they either have “It will never happen to me” mentality, […]
  • 7 Must-Haves for a Secure Remote Access in Your SMB - Now that cloud technology has made access to information more convenient, with a promise to make your business life easier, the risk of data security has increased. Cloud servers are susceptible to attacks. Insecure or insecurely used remote access technologies – mechanisms that most security teams assume pose little risk – in reality, offer an abundance […]
  • New Federal Login and Password Management Guidelines Your Business Should Follow - In June 2017, the National Institute of Standards and Technology (NIST) issued new guidelines related to passwords and management of user logins.  These new guidelines contain some surprising new recommendations and, in some cases, reversed prior guidelines or commonly accepted security practices. We have summarized the changes to the Federal logins and password management guidelines […]
  • Alert: Fake GoDaddy emails that may result in computer virus or phishing attempt [screenshots] - Sometimes phishing and other malicious emails come into your mailbox looking very legitimate. These screenshots would show you how to spot a fake GoDaddy email. We live in a fast-paced world and often scan through information without giving it a second thought. Criminals know that and use social engineering methods to trick you into trusting […]
  • Your SMB Must Have a Complete IT Security Action Plan. Here is Why and How. - The Internet as great as it is can ruin the viability of your IT, and destroy or disturb your business operations. Why? PROBLEM:  Cyber attacks and computer viruses are becoming increasingly fierce, sophisticated and destructive. Hackers and cybercriminals from inside and outside the U.S are a constant threat to an organization’s IT and communications infrastructure. […]
  • Alarming Pop-ups: how to handle a browser hijacking - When browsing various website on the Internet, you might come across pop-ups – a common occurrence, and frankly, a nuisance. Some pop-ups are the sales chat window, some are advertisements. But there are also other, malicious types: false ads and scareware – the type that announces that “your system is infected” or “missing a critical component”, proclaiming a […]
  • How to Enable Pop-up Blocker (tips for major browsers) - Wouldn’t it be great if there was just one button to click on when you need block annoying or sometimes malicious ads in your browser? In real life, we need to take several steps to do so. Don’t worry – if you use our simple step-by-step instructions for enabling pop-up blocker for major browsers the process […]
  • Is your computer safe from WannaCry Ransomware? 9 tips to apply now. - As WannaCry Ransomware – a computer virus, malicious piece of software that restricts access to user files on a computer and displays demands for ransom payments to unlock access or restore files – claimed over 200,000 victims in 150 countries over this weekend, authorities and cybersecurity professionals warn of a growing fallout in the next […]
  • How to protect your Google account from fraudulent Google Docs access - We are used to getting links in our email, and even with new cybersecurity threats coming out every day, we still fall victim to social engineering tricks used by malicious entities. Emails containing links and attachments, especially coming from someone we know still pick our interest and overwrite our sense of self-preservation. Imagine getting an […]
  • Reminder Tips to Spot Phishing Emails and Limit the Fallout - Have you ever received an email that appeared suspicious or questioned where it came from? All it takes is one person opening a suspicious email, clicking a malicious link, or downloading an attachment to cause serious damage to your computer infrastructure and affect your business. Attacks like these are called “phishing” and are typically spread […]
  • What to do when you are targeted by the “Yes” call scam - The FCC says in a March 27 alert that the scam centers on tricking victims into saying the word “yes,” which scammers record for later use in identity theft or fraud, including phony utility or credit card charges. “Can you hear me” Scam Did you ever receive a call from a perky voce that starts off with […]
  • It’s 10 PM. Do You Know Where Your Laptops Are? - This obviously isn’t an original expression. It originates from the question, “It’s 10 PM. Do you know where your children are?” This ominous question dates back to 1967 when it was presented on television just prior to the local news. At that time, new curfew laws had gone into effect in several cities across the […]
  • Is Your Antivirus Protection Up to Security Standards? Check these 4 Major Areas - When people think of antivirus protection, the area that comes to mind is the personal computer, being obvious. Most often, people tend to forget that they access company data not just from their desktop workstation, and that data resides in more than one location. Here are 3 major areas of antivirus protection Which areas need to have […]
  • Actionable Guide to Email Security for Small Business - Whether you like it or not, email is commonplace in the business world. With the ubiquity of emails comes a hoard of attacks to gain access to confidential information. According to the Center for Strategic and International Studies, cyber-attacks on organizations with 250 or fewer employees cost, on average, $188,000 per successful attack. The attack […]
  • How SMBs in New York and New Jersey Implement U.S. Secret Service IT Recommendations - Increasingly, small and medium business (SMBs) are becoming victims of cyber-crime.   According to the FBI, cyber intrusions are becoming more commonplace, more dangerous, and more sophisticated.  Fraudsters and identity thieves are targeting companies and their employees’ sensitive corporate and personal data.  New York and New Jersey, working with the federal government, were forerunners in ramping […]
  • Yahoo breach – forged cookies allowed access to user accounts: what should you do? - You probably remember the incidents of Yahoo data breach that span in the course of several years. To refresh your memory about one of the largest cybersecurity breaches EVER you did NOT know about [Yahoo]: at least 500 million user accounts have been stolen and sold at least three times, including once to some state-sponsored actor.  […]
  • Don’t be the hacker’s Valentine! Watch out for bad ads. - Bad ads have a higher probability of being visible to you during holidays, such as Valentine day – when people are looking for presents, bargain deals or ideas for a romantic gateway or dinner out. I am not talking about unethical advertising that pushes bad products, but about ads that may lead to cybersecurity breaches. You may […]
  • How to implement Endpoint Security for Small Business [11 Tips] - In IT, endpoint security refers to a methodology of protecting the business network when accessed through such remote devices. In the last few years, IT industry’s focus had shifted from a perimeter network security to an endpoint and data security solutions. Network security solutions are important but not flawless, and businesses need to start additionally […]
  • Why businesses urgently need better ransomware protection in 2017 - If you haven’t encountered it yet, you’ve heard about it: Ransomware is a type of malicious software designed to encrypt the data or block access to a computer system until a demanded sum of money is paid online. Traditionally, most ransomware thrived on unspoken trust between the cybercrime victim and the hacker, based on the […]
  • Business network top vulnerability exposed: Your Employees - While it is important to realize that hacking is a real, external threat, it is even more important to remember that hacker’s take advantage of existing, internal vulnerabilities. According to the latest 2016 State of SMB cybersecurity study by the Ponemon Institute, 50% of SMBs have been breached in the past 12 months, and the […]
  • 10 Safeguards to Ensure Physical security of your IT devices - One of the biggest threats to your data is the popular advance of Bring You Own Device (BYOD) policies and mobile workers. According to Gartner is expected that half of all businesses will have a strong need for a BYOD policy this coming year. Employees will be using their own personal devices as well as […]
  • You are at risk: how to spot a phishing email [5 easy tips] - A phishing e-mail is a bogus e-mail request that is designed to look like a legitimate request from a sender you trust in an effort to get you to provide your credentials such as login information to a specific website. It can also try to trick you into clicking on links so you can unintentionally […]
  • Use STRONG passwords! [3 easy rules] - Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, a hacking software can guess a five-character password in under three hours. If you only use lowercase letters, it’s 11.9 seconds. A weak 16-character password can be cracked in less than an hour. […]
  • Why you should never use PERSONAL devices to connect to BUSINESS computer - You’re a hardworking team player who likes to check e-mail and get a few things done after hours – all good! But here’s something you might not know: you should never access company data, file servers or applications through personal devices and home PCs that are not properly monitored by your Managed Services provider. Why? […]
  • Bookmark the LEGITIMATE websites you frequently visit - You probably have seen it before – or not – but there are sneaky bait and switch tricks used by hackers. It works like this: they register and set up a fraudulent website that is a very close misspelling of a legitimate one. For example, (don’t go there!) instead of If you accidentally […]