Geek Girls News
The latest on cyber security, computer support and small business IT from one of New Jersey and New York’s top managed IT service providers.Microsoft 365: Business Standard or Business Premium?
Choosing between Microsoft 365 Business Premium and Business Standard can be challenging for business owners and nonprofits. It involves weighing costs and features that, at first glance, may not seem important to your organization. Let's discuss some key features of...
From Forbes: Debunking The Top 5 Cybersecurity Myths
This easily digestible article explains why, when it comes to cybersecurity, user behavior (the human factor) is as important as passwords, antivirus software, and firewalls. Debunking The Top 5 Cybersecurity Myths
How Customer Notes Work in Our Ticketing System
Recently we've had some inquiries about how emails are processed when a customer sends an email to our support address. Here are some things to keep in mind. If there is no ticket number in the subject line, a new ticket will be created. If the subject line contains...
Why Your Organization Should Have Both Cyber Security Insurance and Cyber Security Training
Cyber security threats are becoming increasingly prevalent, and organizations face unprecedented challenges in protecting their sensitive data and information. As a result, cyber security is a top priority for us in managing our customers' IT. However, cyber security...
EndPoint Detection and Response (EDR) Vs. Next Generation AntiVirus
Next-Generation Antivirus (NGAV) refers to antivirus solutions that go beyond traditional signature-based detection methods. They often incorporate advanced techniques such as behavioral analysis, machine learning, artificial intelligence, and threat intelligence to...
The Importance of your UPS
A Universal Power Supply’s main job is to provide backup battery power to critical devices when the power in your space goes out unexpectedly. It should allow enough time for sensitive devices such as servers to shut down gracefully. (These devices can be configured...
Ivanti Vulnerability Results in Breach at the Cybersecurity and Infrastructure Security Agency
This article from Security Affairs discusses a recent breach at the agency whose mission, ironically, is to strengthen cyber security. Threat actors breached two crucial systems of the US CISA Fortunately, the breach only affected two systems, which would seem to...
Spotting and Reporting SMS scams
Form our friends at Lakeland Bank, timely information on spotting text message scams.
From Clark Howard: How Spammers Get Your Email Address
Here at Geek Girls IT Services, we're big fans of money expert Clark Howard. His recent article on keeping your email address out of the hands of spammers is right on the money (groan)! Read it here.
Beware of fake storage space warnings
If you receive an email purportedly from Microsoft about storage space, don’t click any links in the message. Most likely, it’s a scam. If you click a link and enter your Microsoft password, you’ve almost certainly handed your password over to a hacker. If this...