Our partner Duo MFA offers this guide on how to secure remote access for your users: The Essential Guide to Securing Remote Access The guide explains How the work-from-home explosion that started in early 2020 is driving the need to secure remote access Specific types...
News
Geek Girls IT Services Blog
The latest on cyber security, computer support and small business IT from one of New Jersey and New York’s top managed IT service providers.

When You Want to Protect and Secure your Business, the Whole is Better Than the Sum of the Parts
Keeping your business safe, secure and protected is complex and challenging, not to mention time-consuming. If you have a physical office, you’ve got to keep unwanted visitors and threats off your network and away from your data. You’ve got users who might click on...
G Suite is now Google Workspace
G Suite is rebranding as Google Workspace. According to Google's notification in the subscription and billing section of your G Suite admin account: We're also rolling out new subscription options to give you more choices to fit your needs. You don’t have to change...
From the NY Times: Lost Passwords Lock Millionaires Out of Their Bitcoin Fortunes
This article might encourage you to employ a secure, reliable way to store your passwords, even if you don't own millions of dollars in Bit Coin. Password apps such as Roboform and OnePass are very useful for protecting your passwords. They also allow you to create...
From ITProPortal: Fake Cisco switches may have infiltrated hundreds of businesses
This article demonstrates why it's important to buy your network devices from a reliable retailer, rather than looking for the lowest price on a large "marketplace" site. Fake devices present security breaches and vulnerabilities that can put your company's cyber...
From ZD Net – Home router warning: They’re riddled with known flaws and run ancient, unpatched Linux
This article helps provide an understanding of why your employees working from home may need extra security on their workstations. Ask us about our cloud VPN service and whether your employees should be using it to protect and encrypt your data. You can also use our...

We’re a Certified Women-Owned IT Service Business
We're pleased to announce that we are now certified by the State of New Jersey as a Women-Owned Business. We are one of the few certified women-owned computer support and managed IT services in New Jersey. Get to know our management and our team. ...
From Reuters: Hackers used SolarWinds’ dominance against it in sprawling spy campaign
You may have heard about the Solar Winds breach that has resulted in government systems being compromised. While Solar Winds does offer services to managed IT server providers, we don't use their services at all. We are not a customer of Solar Winds. The Solar Winds...
Happy Holidays from Geek Girls IT Services
Dear clients, We appreciate your continued confidence in us. It's been a challenging year for most of us. If there's any way we can help make 2021 more prosperous and productive for you, please let us know. Wishing you a safe, healthy and happy holiday season from all...
Would You Give Someone Your Password for Chocolate?
Social engineering occurs when someone interacts with a user to try to manipulate the user into giving physical or login access to a system. This interesting article discusses a study in which people who were offered a piece of chocolate were more likely to...