When the devices you manufacture are cloud-managed, the last thing you want is for your customers’ login credentials to be breached. The second to last thing you want is to lie about the breach. As the article notes,” If you have Ubiquiti devices installed and haven’t...
IT for Small Business
Geek Girls IT Services Blog
The latest on cyber security, computer support and small business IT from one of New Jersey and New York’s top managed IT service providers.
Free Guide from Duo Security: How to Secure Remote Access
Our partner Duo MFA offers this guide on how to secure remote access for your users: The Essential Guide to Securing Remote Access The guide explains How the work-from-home explosion that started in early 2020 is driving the need to secure remote access Specific types...

When You Want to Protect and Secure your Business, the Whole is Better Than the Sum of the Parts
Keeping your business safe, secure and protected is complex and challenging, not to mention time-consuming. If you have a physical office, you’ve got to keep unwanted visitors and threats off your network and away from your data. You’ve got users who might click on...

G Suite is now Google Workspace
G Suite is rebranding as Google Workspace. According to Google's notification in the subscription and billing section of your G Suite admin account: We're also rolling out new subscription options to give you more choices to fit your needs. You don’t have to change...
From ITProPortal: Fake Cisco switches may have infiltrated hundreds of businesses
This article demonstrates why it's important to buy your network devices from a reliable retailer, rather than looking for the lowest price on a large "marketplace" site. Fake devices present security breaches and vulnerabilities that can put your company's cyber...
Important Video: 1 out of 3 Employees Clicked on a Phishing Email in the Last Year
This video explains the dangers of phishing and how important it is to train and educate your employees about cyber security. Watch the video.
Your Healthcare Practice in a “Work From Home” World
From our friends at RingCentral comes this valuable resource on how to run a remote-friendly healthcare practice: https://www.ringcentral.com/how-to-run-healthcare-practice/how-to-start-healthcare-business/ Cyber security is a critical component of remote healthcare...
Your Healthcare Practice in a “Work From Home” World
From our friends at RingCentral comes this valuable resource on how to run a remote-friendly healthcare practice: https://www.ringcentral.com/how-to-run-healthcare-practice/how-to-start-healthcare-business/ Cyber security is a critical component of remote healthcare...
From Nextgov: Those Facebook ‘Challenges’ Can Expose You to Hackers
The isolation and routine of WFH is starting to get to you, so you take a break to play a game or check your feed on Facebook. Be careful! Oversharing of sensitive information or giving games access to your profile can lead to security breaches. Source: Those Facebook...
Warning: Phishing Scheme Pretending to Be MS O365 Password Change Request
If you see an email from MS requesting that you change your O 365 password, please discard it. This is a phishing scam: Notice the from address which is from a random domain. Another hint is that Microsoft actually no longer recommends that users change their...