Business Management

Home/Business Management

Microsoft Pushes Office 365 with a Price Hike on Offline Editions

Microsoft has doubled down on its attempts to convert users to its cloud based productivity suite with an unprecedented price hike on Office 2019.  The new edition of the popular productivity suite will cost roughly 10% more than it did when Office 2016 was introduced. ComputerWorld confirmed on Monday that Office Home & Business edition [...]

By |2019-02-20T06:00:19+00:00October 31st, 2018|Business Management, Cloud Computing|Comments Off on Microsoft Pushes Office 365 with a Price Hike on Offline Editions

Dell EMC Protection Suite Vulnerabilities Discovered

Researchers have discovered three vulnerabilities in the Dell EMC Data Protection family of products.  These vulnerabilities could be used by attackers to bypass security and gain complete control of a system. Dell EMC's Avamar Server, NetWorker Virtual Edition, and the Integrated Data Protection Appliance all contain a standard component – the Avamar Installation Manager which [...]

By |2019-02-04T02:35:44+00:00January 5th, 2018|Business Management|Comments Off on Dell EMC Protection Suite Vulnerabilities Discovered

WannaCry Ransomware Could Have Been Prevented

Earlier this year, the National Health Service (NHS) was hit in a wide scale attack from the WannaCry ransomware.  A recent report from the National Audit Office (NAO) shows that while devastating, this attack could have been prevented through security best practices. The WannaCry outbreak occurred back in May when over 19,000 medical appointments were [...]

By |2019-02-04T02:35:44+00:00October 27th, 2017|Business Management, System Security|Comments Off on WannaCry Ransomware Could Have Been Prevented

Password Security is about to Change for the Better

It’s no secret that most computer users have password fatigue; many people are forced to remember numerous passwords, each with their own set of requirements and often with mandated refresh cycles.  The result is that security is actually made weaker as users stumble to create easy to remember passwords or simply write down their passwords [...]

By |2017-04-24T15:11:00+00:00April 24th, 2017|Business Management, Business Support, System Security|Comments Off on Password Security is about to Change for the Better

IT Computer Computer Support of New York Gains Membership in the MSPAlliance

IT Computer Support of New York has joined the MSPAlliance, a global organization of cloud, managed service providers and dedicated vendors. MSPAlliance Members are eligible for MSP and Cloud Certifications including, SSAE16 Audits and ultimately achieve certification through the MSPAlliance MSP/Cloud Verify System™.  The MSPAlliance works to further the advancement of Cloud Computing around the [...]

By |2016-09-26T00:40:00+00:00September 26th, 2016|Business Management, Business Support, Uncategorized|Comments Off on IT Computer Computer Support of New York Gains Membership in the MSPAlliance

Oracle to Retire Java

Oracle has announced plans to retire the Java internet browser app on September 2016. Outdated versions of Java are one of the leading risk factors for the spread of browser based malware.  The discontinuation of Java should be a great boon for IT security but it also creates a problem; many large businesses still use [...]

By |2019-02-04T02:35:52+00:00February 1st, 2016|Business Management, System Security, Uncategorized|Comments Off on Oracle to Retire Java

Cheap Tech Support is More Expensive than You Can Afford

Some of the businesses we speak with tell us that they chose to go with budget IT providers that have the cheapest hourly rates because they want to be budget conscious.  Budget IT providers offer incredible rates like, “$39 a month” to handle all tech support emergencies.  Those prices are hard to beat; that is, [...]

By |2019-02-04T02:35:55+00:00December 2nd, 2015|Business Management, Uncategorized|Comments Off on Cheap Tech Support is More Expensive than You Can Afford

Penetration Testing: An Ongoing Commitment to Security

In our previous articles, we have shown examples of typical threats and taken you through the process of choosing a penetration test vendor.  This week we will guide you through the long-term goals of penetration tests and explain some of the repercussions of not maintaining your penetration test procedures and regulatory compliance. Often in discussions [...]

By |2019-02-04T02:35:55+00:00November 9th, 2015|Business Management, Business Support, System Security, Uncategorized|Comments Off on Penetration Testing: An Ongoing Commitment to Security

Penetration Testing: Threat Assessment

Data breaches occur every day and most never get reported.  Automated attack programs are constantly on the lookout for weaknesses in network security systems and inherent vulnerabilities in software. Over the course of a single day we recorded and compiled attempted attacks made against a Next Generation Firewall.  When an attempted attack takes place, the [...]

By |2019-02-04T02:35:55+00:00November 2nd, 2015|Business Management, System Security, Uncategorized|Comments Off on Penetration Testing: Threat Assessment

Penetration Testing: How to Choose the Right Vendor

In last week’s article, we covered the basics of what a penetration test is and why they should make them part of your regular security regiment.  This week we will to cover things to look out for when choosing your penetration test vendor.   Not all penetration test vendors are created equal; many service providers [...]

By |2019-02-04T02:35:55+00:00October 19th, 2015|Business Management, Business Support, System Security, Uncategorized|Comments Off on Penetration Testing: How to Choose the Right Vendor