In NY: (347) 351-3031 | In NJ: (201) 645-1255

How to Add 2FA to Your Geek Girls End User Portal

Here are instructions to secure your Geek Girls End User portal with 2 Factor Authentication. There are several steps, but each step is very quick and simple. You’ll only have to perform this setup once. If you need help, call us. These instructions assume you...
How to Maintain Your NAS

How to Maintain Your NAS

A network-attached storage device (or “NAS”) is a great option for fast, secure local storage for customers that don’t have server computers. However, it’s important to properly maintain your NAS and make sure it is stable and secure from...

Network Solutions | Important Security Information

If you host your domain registration, DNS or web site with Network Solutions, you should change your password immediately. Source: Network Solutions | Important Security Information This breach also illustrates why it’s important to use different passwords for...

What is My Computer’s Name or Host Name?

Often a customer asks us for assistance with a computer, but if they more than one computer, we may need to identify which one they’d like remote assistance with. In order to identify which computer we are supposed to remote into, we’ll sometimes ask the...

How to Prevent Employee Burnout

Unemployment has been on a steady downward trend for the past ten years, making keeping good employees a greater challenge than ever. Employee burnout is an important issue to address to ensure that your employees remain productive and happy. This article from our...

Email Security Basics for Your Business or NonProfit

Here’s an article that explains the basics of enterprise-class email security in plain English. Business-class email security should include: advanced phishing protection to protect against impostor email threats; spam and malware filtering; and URL screening to...

Five Reasons Why you Need to Test Your Back-Up Regularly

Trying to manage your own data backup using a “do it yourself” consumer backup service such as Carbonite or Mozy? If you have a backup, but you’re not test-restoring at least once per month, then you don’t really have a backup. Here are five reasons...

Business Email Compromise Attempts Are a Big Problem

According to this article on the Health IT Security web site, business email compromise attempts doubled in 2018. Business email compromise occurs when a hacker attempts to impersonate an employee (usually an executive) in order to request money be transferred from...

Four months to Windows 7 End-of_Life

You may have seen our article a few months ago regarding Windows Microsoft’s plans to end support for Windows 7 on January 14th, 2020. This means that security and stability updates will no longer be available for Windows 7 after this time. We’re now only...
Like What You See Here?
Sign up for our monthly newsletter to stay current on cyber-security and other IT issues effecting you.
We'll never sell or share your contact information.
Subscribe Me!