Geek Girls News
The latest on cyber security, computer support and small business IT from one of New Jersey and New York’s top managed IT service providers.What is My Computer’s Name or Host Name?
Often a customer asks us for assistance with a computer, but if they more than one computer, we may need to identify which one they'd like remote assistance with. In order to identify which computer we are supposed to remote into, we'll sometimes ask the customer to...
How to Prevent Employee Burnout
Unemployment has been on a steady downward trend for the past ten years, making keeping good employees a greater challenge than ever. Employee burnout is an important issue to address to ensure that your employees remain productive and happy. This article from our...
Email Security Basics for Your Business or NonProfit
Here's an article that explains the basics of enterprise-class email security in plain English. Business-class email security should include: advanced phishing protection to protect against impostor email threats; spam and malware filtering; and URL screening to...
Why every business needs a firewall – Phoenix Business Journal
This article spells out in plain English why every business needs a serious firewall. Here are two important takeaways from this article: 1. "60 percent of small businesses don’t survive a cyberattack." 2. "The firewall is not a 'set it and forget it' security system....
Five Reasons Why you Need to Test Your Back-Up Regularly
Trying to manage your own data backup using a "do it yourself" consumer backup service such as Carbonite or Mozy? If you have a backup, but you're not test-restoring at least once per month, then you don’t really have a backup. Here are five reasons why it's so...
Business Email Compromise Attempts Are a Big Problem
According to this article on the Health IT Security web site, business email compromise attempts doubled in 2018. Business email compromise occurs when a hacker attempts to impersonate an employee (usually an executive) in order to request money be transferred from...
Four months to Windows 7 End-of_Life
You may have seen our article a few months ago regarding Windows Microsoft's plans to end support for Windows 7 on January 14th, 2020. This means that security and stability updates will no longer be available for Windows 7 after this time. We're now only four months...
Cybersecurity in Schools: What Families Need to Know | Webroot
This is a very informative article from our partner Webroot on how to keep your kids cyber-secure at school. Source: Cybersecurity in Schools: What Families Need to Know | Webroot
Is My Cell Phone Number Secure?
Have you shared your cell phone number on any web sites? Once it's publicly available, your cell phone number is no longer secure. So you need to stop using SMS authentication for your logins. Instead, consider using an authenticator app like Google Authenticator or...
Ongoing Computer Support: Ten Reasons Why You Need Managed IT Services
The Problem Maybe you run a small business or non-profit that has survived without ongoing IT support. But as you grow, you notice that your IT needs become increasingly complex, and it becomes harder to avoid having it all descend into chaos. You may be at the point...







