This blog post from Britain’s National Cyber Security Centre discusses why, when it comes to a ransomware attack, it’s critical to treat the cause, not just the symptoms. A victim of a ransomware attack paid cyber criminals millions to restore their data. They were...
News
Geek Girls IT Services Blog
The latest on cyber security, computer support and small business IT from one of New Jersey and New York’s top managed IT service providers.
From Krebs on Security – Whistleblower: Ubiquiti Breach “Catastrophic”
When the devices you manufacture are cloud-managed, the last thing you want is for your customers’ login credentials to be breached. The second to last thing you want is to lie about the breach. As the article notes,” If you have Ubiquiti devices installed and haven’t...
From Ars Technica: New malware found on 30,000 Macs
As this interesting article points out, this malware "shows that macOS malware is becoming ever more pervasive and commonplace, despite Apple’s best efforts.” New malware found on 30,000 Macs It's more important than ever not to be complacent about Mac security. Ask...
Free Guide from Duo Security: How to Secure Remote Access
Our partner Duo MFA offers this guide on how to secure remote access for your users: The Essential Guide to Securing Remote Access The guide explains How the work-from-home explosion that started in early 2020 is driving the need to secure remote access Specific types...
When You Want to Protect and Secure your Business, the Whole is Better Than the Sum of the Parts
Keeping your business safe, secure and protected is complex and challenging, not to mention time-consuming. If you have a physical office, you’ve got to keep unwanted visitors and threats off your network and away from your data. You’ve got users who might click on...
G Suite is now Google Workspace
G Suite is rebranding as Google Workspace. According to Google's notification in the subscription and billing section of your G Suite admin account: We're also rolling out new subscription options to give you more choices to fit your needs. You don’t have to change...
From the NY Times: Lost Passwords Lock Millionaires Out of Their Bitcoin Fortunes
This article might encourage you to employ a secure, reliable way to store your passwords, even if you don't own millions of dollars in Bit Coin. Password apps such as Roboform and OnePass are very useful for protecting your passwords. They also allow you to create...
From ITProPortal: Fake Cisco switches may have infiltrated hundreds of businesses
This article demonstrates why it's important to buy your network devices from a reliable retailer, rather than looking for the lowest price on a large "marketplace" site. Fake devices present security breaches and vulnerabilities that can put your company's cyber...
From ZD Net – Home router warning: They’re riddled with known flaws and run ancient, unpatched Linux
This article helps provide an understanding of why your employees working from home may need extra security on their workstations. Ask us about our cloud VPN service and whether your employees should be using it to protect and encrypt your data. You can also use our...
We’re a Certified Women-Owned IT Service Business
We're pleased to announce that we are now certified by the State of New Jersey as a Women-Owned Business. We are one of the few certified women-owned computer support and managed IT services in New Jersey. Get to know our management and our team. ...