Billions of accounts have been exposed due to infostealers. Infostealers are “a form of malicious software that breaches a victim’s device or systems to take sensitive information.” This is one reason why it’s critical that your employees work from company-managed...
Tech Tips for Small Business
Geek Girls IT Services Blog
The latest on cyber security, computer support and small business IT from one of New Jersey and New York’s top managed IT service providers.

Best Password Policies and Why You Need a Password Manager to Enforce Them
Strong passwords are critical for cybersecurity, but many users still rely on weak, reused, or easily guessable passwords. While a password policy helps set security standards, humans are often the weakest link. That’s where a password manager is essential. It...

Computer Prices Are Expected To Go Up Soon — Act Now to Replace Windows 10 Computers
If your business is still running Windows 10, now’s the time to plan ahead. Microsoft is officially ending support for Windows 10 in October 2025, which means there will no longer be security updates or patches. If you have older PCs that can’t be upgraded to Windows...
From Forbes: Debunking The Top 5 Cybersecurity Myths
This easily digestible article explains why, when it comes to cybersecurity, user behavior (the human factor) is as important as passwords, antivirus software, and firewalls. Debunking The Top 5 Cybersecurity Myths
Why Your Organization Should Have Both Cybersecurity Insurance and Cybersecurity Training
Cybersecurity threats are becoming increasingly prevalent, and organizations face unprecedented challenges in protecting their sensitive data and information. As a result, cybersecurity is a top priority for us in managing our customers' IT. However, cybersecurity...
From the Times: Global Chip Shortage Is Making Industries Sweat
Due to the critical chip shortage caused by the pandemic, we advise placing your new hardware orders as early as possible. Rising chip prices mean we should all expect to pay more for servers, desktops and laptops for the foreseeable future....

From Krebs on Security: Turn on MFA Before Crooks Do It For You
If your account is hacked and you have not enabled 2-factor authentication, the hacker could enable it and tie the account to a device they control, making it even more difficult for you to recover access to your account. So it's important to set up 2FA before you get...

Zoom Videoconferencing Security Issue Reported
This article from Hacker News highlights a cyber security issue with Zoom's videoconferencing software for Macs. The Zoom software installs a vulnerable web server that communicates in an unencrypted manner; and even if you remove the software or install Zoom's update...
How to Create Inbox Rules in Outlook Web Access
If your email is hosted on an Exchange server, you can use Inbox Rules to organize or filter your email before it arrives on your phone or in your desktop mail app. Here's how. (Note: Click on any of the screen shots below to see an enlargement of the picture.) Log...
Welcome to New York Geek Girls’ Newsletter
Subscribe to our monthly newsletter to get tips for keeping organized and working as productively as possible, as well as info about the latest malware threats, tech gadgets, and consumer concerns. We will keep your email address private, and you can unsubscribe any...