The SHIELD Act – What it means for us.

Posted: August 23, 2019By: Dean Lentz

The SHIELD Act, Stop Hacks and Improve Electronic Data Security Act (S.5575B/A.5635), was signed in to New York State law by Governor Cuomo on July 25, 2019. This legislation essentially recognizes that cybersecurity needs to be regulated, and that constituents need protection from the careless use, or storage of their personal information. The law does...

Read More

How to Protect Your Business from Ransomware

Posted: July 19, 2019By: Dean Lentz

Ransomware is here. Every week there are multiple stories in the news about entire municipal governments being hit and taken out of commission. Ransomware is real. It is not a joke. Ransomware is a type of malicious software that encrypts (locks) the files on a computer, with the attacker demanding payment before the files are...

Read More

Do I Need a Firewall?

Posted: March 14, 2019By: Robert Gurnett

Ask any IT professional if you need a firewall. They will tell you yes. They’ll scream it from the rooftops, hire a skywriter, get it tattooed on their forehead. Yes, you absolutely need a firewall. There is a reason why every government agency and virtually every fortune 500 company has robust software and hardware firewalls....

Read More

Virtual Assistants – How Do They Handle Your Privacy?

Posted: March 9, 2018By: Dean Lentz

If you use computer devices, the Internet or any type of payment solution other than cash, you are sharing information about… you. Unless you don’t use the Internet, don’t have a cell phone, don’t use GPS, don’t use a credit card, don’t travel by air, don’t rent cars, don’t use EZ-Pass and only pay in...

Read More

How to Setup a Smart Office: a Pragmatic Approach

Posted: March 6, 2018By: Dean Lentz

Let’s get started… If you’re thinking about turning your office into a smart office, this article will guide you through a pragmatic approach to getting it done. Make a List Before you purchase a single item, decide what you want to do. Create a wish list. Try not to think in terms of technology but...

Read More

Welcome to Your Smart Office

Posted: February 15, 2018By: Dean Lentz

How cool would it be to walk into your vacant conference room and simply say “let’s start the meeting” and to have the blinds adjust, the lights come on dimmed at just the right level, the temperature fine-tune to accommodate for an influx of warm bodies and the flat screen TV light up ready to...

Read More

Digital Assistants – The Science Behind Them

Posted: January 29, 2018By: Emma DiQuinzio

The voice activated computer has been a Sci-Fi staple for years, a ubiquitous sign of “the future,” much like the flying car. We may not be flying to work yet, but thanks to voice assistants such as Siri, Cortana, or Alexa, we all have access to a little bit of the future on our smartphones,...

Read More

Encryption 101

Posted: December 11, 2017By: Tony Simoes

Since the early ‘80’s and the acceptance of the personal computer into everyday life, humanity has grown ever more reliant on computer networks for communication, entertainment, and commerce. It doesn’t really matter if you are talking about a small home network of one computer and a few smartphones or a huge, decentralized network like the...

Read More

Gone Phishing: the Con is Still the Con.

Posted: November 10, 2017By: Dean Lentz

The confidence trick, the swindle, the scam, the grift, the flimflam, the hustle: the con. The confidence trick probably dates as far back as to when our earliest ancestors started using tricks instead of muscles to outwit their opponents in winning the more prized portion of the kill.As a kid, three-card Monte and the shell...

Read More

Setting up a Small Business WIFI solution, find out how:

Posted: June 11, 2017By: Dean Lentz

WIFI is great! Wireless allows us to easily connect our various devices to the things we need without a wired connection. WIFI speed, stability, performance and security continues to improve. It won’t be long before WIFI effectively replaces hard wired Ethernet connections. So why this article? Can’t one just plug and play any old WIFI...

Read More

Does Your Business Have a Password Policy? Should it?

Posted: May 19, 2017By: Dean Lentz

Every business should have a password policy. Do all of your employees have keys to your office? Do you keep any valuables under lock and key? If so, how many people have keys? It is our experience that keys are issued with careful consideration and only a few individuals are entrusted with these responsibilities. Passwords...

Read More

Online Privacy and How to Protect It

Posted: April 18, 2017By: Dean Lentz

With the repeal of the 2016 Online Privacy Protection rule, many are concerned that their online privacy may be compromised. To understand more on the FCC rules see our article Who Owns Your Data? – The Repeal of Online Privacy Protection. The biggest concern with the repeal of the 2016 Online Privacy Protection rule is...

Read More

Who Owns Your Data? – The Repeal of Online Privacy Protection

Posted: March 29, 2017By: Dean Lentz

Data Transmitted Over the Internet Belongs to the Internet Service Providers. With the repeal of the 2016 Online Privacy Protection, our government is ruling that the data we send over the internet is not our private information, but data that is searchable and usable by your Internet Service Provider (ISP). Data transmitted is essentially owned...

Read More

Hackproofing: How to prevent hacking for your Small Business

Posted: February 17, 2017By: Dean Lentz

Hacking threats come in all shapes and sizes. To protect yourself and your business you need to take a multi-dimensional approach. Backup First and foremost, you must have reliable backups. Even the most secured corporations and organizations in the world are hacked. When they are, backup is used to restore what is lost or damaged....

Read More

Best Practices for Your Business E-mail

Posted: January 26, 2017By: Dean Lentz

E-mail is a key component of our daily business. Like any powerful tool, it can be used and abused. Here are some tips and tricks to help you get the most from your company e-mail. Signatures The e-mail signature is the digital equivalent of company stationary. Establishing a company-wide e-mail signature is a great way...

Read More

Ransomware, Spyware, Malware, and Viruses Oh My! – Understanding the Differences

Posted: December 26, 2016By: Tony Simoes

Malicious software is an issue that as an IT Company we have to deal with on an almost daily basis. The amount of Malware out on the internet is immense and growing every day. Recent research shows that there are over 15 million different pieces of malware out there. While this may seem like an...

Read More

The Importance of Off-Site Backup

Posted: November 30, 2016By: Dean Lentz

We all know the important concept of having local or onsite backup. Files get deleted accidentally, or hardware in a workstation or server fails, and precious data critical to businesses gets damaged or vanishes along with such mishaps. The ability is restore lost data from nearby media such as a backup hard drive is a...

Read More

Company Email – Is it Personal?

Posted: October 15, 2016By: Tony Simoes

Many people who use business email every day have no idea of what their privacy rights are concerning the messages they send and receive. There is only one thing that you, as the end user, must truly understand with regard to company email – whoever owns the server, owns the email. A company’s computer network...

Read More

What is Inside Your Computer? No, It’s Not Magic.

Posted: September 30, 2016By: Tony Simoes

We regularly recommend replacement parts to our clients, and in most cases when we start describing computer components, we end up just talking to ourselves. We have chosen some of the most important components and defined them so that you can have a more complete understanding of the machines that you use daily. Common Computer...

Read More

Preventing Malware: Tips and FAQs

Posted: August 14, 2016By: Daniel Lugo

What is malware? Short for “malicious software,” malware is software that exploits your computer without your consent. The creators of malware have various intentions but none are good and include collecting private information, gaining control of your computer for nefarious activities, directing you to unsolicited purchases and interfering with your ability to properly use your...

Read More

How to Get the Best Service from Your IT Support Team

Posted: July 17, 2016By: Dean Lentz

We love our computers, but we know how frustrating it can sometimes be to work with them. They can be fussy, mysterious, temperamental, and downright maddening. And we know that when your computer crashes unexpectedly in the middle of that proposal you’re preparing for an important client you just want to scream and go back...

Read More

Surge Protectors: More than a Useful Outlet Multiplier

Posted: June 27, 2016By: Dean Lentz

Surge protectors (also known as power strips), those ubiquitous plastic blocks of electronic goodness, are great if for no other reason than that they turn one electrical outlet into 6, 12, or sometimes even 18 outlets. But what if we told you that there is another, more important purpose to the surge protector? As the...

Read More

The Anatomy of a Website

Posted: May 14, 2016By: Dean Lentz

According to over 50,000 new .com domains are added to the internet every 24 hours. The web is now an essential tool for nearly everything we do in our daily lives. Still, for all of the websites that we visit every day, most of us have little idea of exactly what it takes to create...

Read More

Email – The Practical Magic

Posted: April 26, 2016By: Daniel Lugo

Email is an essential part of our daily communications. How did we ever do business without it? Today we are integrated. Email feels… well… natural. Our devices connect. We connect. We can talk to our devices and they can talk to us. They even have names. Siri can’t quite read our emails yet, but does...

Read More

What Is Phishing and Why Should I Be Concerned?

Posted: March 28, 2016By: Dean Lentz

DING! You’ve Got Mail! You just received an email from your bank informing you of some change to the privacy policy and a link to sign in and confirm the changes. You click on the provided link and fill in the username and password to log in. The moment you click submit, your very private...

Read More

Why Backup Power? Protecting Your Data From Disaster.

Posted: February 17, 2016By: Dean Lentz

Imagine this scenario… You’re hard at work when your office goes completely dark. Your computer shuts off suddenly, and even though your machine comes back up with no problem, when you try to turn your server back on, it beeps and tells you “no drive detected.” Suddenly, it looks as if you might have lost...

Read More

Wireless Networking: Office Boon?

Posted: January 18, 2016By: Dean Lentz

IEEE 802.11 IEEE 802.11 technology, the basis for the wireless network communication that we currently use, has remained pretty much unchanged for over a decade. There are multiple subcategories of the 802.11 standard identified by letter (g, n, ad, ay, etc…). Wireless networks have made huge gains in the past 10 years. Here some basic...

Read More

Email, Acronyms, and You: The Different Ways that Email Gets Delivered

Posted: December 12, 2015By: Tony Simoes

Email – it’s already starting to feel dated… it’s easy to send and receive emails every day without giving any thought to what’s going on behind the scenes. While it’s convenient to assume technology just works, there are in fact three standard methods used to deliver email. Furthermore, the method you use for sending and receiving...

Read More

Microsoft Office: 12 Great Tips

Posted: November 27, 2015By: Dean Lentz

The Standard Microsoft’s Office remains the most popular and powerful software suites available, and many of us spend a good part of each day using its applications such as Word, Excel, and Outlook. Here are some helpful ways to get the most out of your Office experience. Outlook 1. Set a reminder to reply to...

Read More

Bulk email or Spam? How to Send Email Blasts and Newsletters and Avoid Blacklisting

Posted: October 23, 2015By: Daniel Lugo

Hey Everybody! So you need to send out a newsletter, and you have an email list containing hundreds or thousands of addresses. Before you hit send, there are several things you should consider that could save you a lot of headaches down the line. While your email isn’t technically “spam”, it is bulk mail, and...

Read More

10 Common Time Saving Keyboard Commands

Posted: August 21, 2015By: Dean Lentz

It’s all about the keys… It’s all about the keys… The Windows operating system and the programs designed for it can be a complex web of menus and lists that can be time consuming to navigate. Here are some keyboard shortcuts that can increase your computing efficiency. Let’s start off by defining some of the...

Read More

Wolves in Sheep's Clothing: How to Detect and Avoid and Malware

Posted: July 13, 2015By: Dean Lentz

What is Malware We’ve all heard of malware, but beyond knowing that it’s bad for your computer, we generally don’t know much about it. Fortunately, with a little bit of effort, malware is easy to recognize and avoid. Malware is the general term given to any unwanted software which makes unnecessary or malicious changes to...

Read More

Mailbox Maintenance – Keeping Your Mail Application Running Quickly

Posted: June 7, 2015By: Dean Lentz

The Count Counts Did you know that when it comes to slowness with your email program, it is usually not because of the size of your mailbox but because of the number of emails you have? It’s true; it isn’t the size of the mailbox that impacts performance, it is the number of items in...

Read More