Choosing between Microsoft 365 Business Premium and Business Standard can be challenging for business owners and nonprofits. It involves weighing costs and features that, at first glance, may not seem important to your organization. Let's discuss some key features of...
Cyber Security
Geek Girls IT Services Blog
The latest on cyber security, computer support and small business IT from one of New Jersey and New York’s top managed IT service providers.
From Forbes: Debunking The Top 5 Cybersecurity Myths
This easily digestible article explains why, when it comes to cybersecurity, user behavior (the human factor) is as important as passwords, antivirus software, and firewalls. Debunking The Top 5 Cybersecurity Myths
Why Your Organization Should Have Both Cyber Security Insurance and Cyber Security Training
Cyber security threats are becoming increasingly prevalent, and organizations face unprecedented challenges in protecting their sensitive data and information. As a result, cyber security is a top priority for us in managing our customers' IT. However, cyber security...

EndPoint Detection and Response (EDR) Vs. Next Generation AntiVirus
Next-Generation Antivirus (NGAV) refers to antivirus solutions that go beyond traditional signature-based detection methods. They often incorporate advanced techniques such as behavioral analysis, machine learning, artificial intelligence, and threat intelligence to...

Ivanti Vulnerability Results in Breach at the Cybersecurity and Infrastructure Security Agency
This article from Security Affairs discusses a recent breach at the agency whose mission, ironically, is to strengthen cyber security. Threat actors breached two crucial systems of the US CISA Fortunately, the breach only affected two systems, which would seem to...
Spotting and Reporting SMS scams
Form our friends at Lakeland Bank, timely information on spotting text message scams.
Beware of fake storage space warnings
If you receive an email purportedly from Microsoft about storage space, don’t click any links in the message. Most likely, it’s a scam. If you click a link and enter your Microsoft password, you’ve almost certainly handed your password over to a hacker. If this...
Will Your Insurance Company Pay Your Breach Claim If You Didn’t Have Cyber Security Training?
As businesses and nonprofits become increasingly dependent on technology, the threat of cyber attacks is everywhere. In response, many businesses have wisely turned to cyber insurance to help protect themselves from the financial and reputational damage that a cyber...
If You’re Still Using Office 2013, You Should Upgrade
As of April 11, 2023, Microsoft will no longer support Office 2013. This means there will no longer be security updates for this version of the Office software. Continuing to use Office 2013 risks exposing your company to security risks or compliance violations. It's...
Why Training Your Employees to Recognize Cyber-Security Threats Is More Important Than Ever
Recently, every user at a customer of ours received an email like the one below. (Names have been changed.) Hi, Jane Kindly send me a mobile number I can reach you on.Regards, Susan S. Doe Executive Director at [Jane's Employer] Of course, this...