Verizon's 2021 Data Breach Report found that hacking activity has increased in 2021. The report indicates that social engineering attacks and password hacks continue to grow in popularity among hackers. Ask us how we can help protect your employees from these...
Cybersecurity
Geek Girls IT Services Blog
The latest on cyber security, computer support and small business IT from one of New Jersey and New York’s top managed IT service providers.
From NCSC: The Rise of Ransomware – Company is Attacked by the Same Hackers TWICE!
This blog post from Britain’s National Cyber Security Centre discusses why, when it comes to a ransomware attack, it’s critical to treat the cause, not just the symptoms. A victim of a ransomware attack paid cyber criminals millions to restore their data. They were...
From Krebs on Security – Whistleblower: Ubiquiti Breach “Catastrophic”
When the devices you manufacture are cloud-managed, the last thing you want is for your customers’ login credentials to be breached. The second to last thing you want is to lie about the breach. As the article notes,” If you have Ubiquiti devices installed and haven’t...
Free Guide from Duo Security: How to Secure Remote Access
Our partner Duo MFA offers this guide on how to secure remote access for your users: The Essential Guide to Securing Remote Access The guide explains How the work-from-home explosion that started in early 2020 is driving the need to secure remote access Specific types...

When You Want to Protect and Secure your Business, the Whole is Better Than the Sum of the Parts
Keeping your business safe, secure and protected is complex and challenging, not to mention time-consuming. If you have a physical office, you’ve got to keep unwanted visitors and threats off your network and away from your data. You’ve got users who might click on...
From the NY Times: Lost Passwords Lock Millionaires Out of Their Bitcoin Fortunes
This article might encourage you to employ a secure, reliable way to store your passwords, even if you don't own millions of dollars in Bit Coin. Password apps such as Roboform and OnePass are very useful for protecting your passwords. They also allow you to create...
From ITProPortal: Fake Cisco switches may have infiltrated hundreds of businesses
This article demonstrates why it's important to buy your network devices from a reliable retailer, rather than looking for the lowest price on a large "marketplace" site. Fake devices present security breaches and vulnerabilities that can put your company's cyber...
From ZD Net – Home router warning: They’re riddled with known flaws and run ancient, unpatched Linux
This article helps provide an understanding of why your employees working from home may need extra security on their workstations. Ask us about our cloud VPN service and whether your employees should be using it to protect and encrypt your data. You can also use our...
Would You Give Someone Your Password for Chocolate?
Social engineering occurs when someone interacts with a user to try to manipulate the user into giving physical or login access to a system. This interesting article discusses a study in which people who were offered a piece of chocolate were more likely to...
Help Your Users Avoid Phishing Attacks
Here's a PDF with clear, concise advice on avoiding phishing attacks. Please feel free to pass it on to your users. If you're working in the office, you may want to post it in a common area such as a break room or printer area. Best Practices to Avoid Being Phished