The #1 threat to your security is…

YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without malicious intent – but...

Is Your IT Guy Holding You Prisoner?

Here’s a question you’ve probably never thought about: If your IT guy went away, would you know where all the passwords, data, software licenses and disks, key codes, and other important information were stored? Do you know how to log into your server? Do you know the...

Shadow IT: How Your Company’s Data Is Silently Being Leaked Online

Here’s a growing trend creeping into organizations of all industries and sizes: Shadow IT. Shadow IT are unauthorized cloud applications employees are using and downloading to perform work-related activities with company data. This can be file-sharing services like...

Google+ Discontinues Consumer Accounts Following 2nd Security Bug

Google discontinues support for Google + social media platform 4 months early after second security breach   Following a second security failure, Google has decided to shut down the consumer version of its social network Google + 4 months ahead of schedule....

Why “Break-Fix” Works Entirely In The Consultant’s Favor, Not Yours

A question I often get is “Why do I need to be on a managed IT plan? Can’t I just pay you to come out and fix things when they’re broken?” While that’s a legitimate question if we were talking about your washing machine or car, that’s definitely NOT the right approach...

8 Tips For Creating A Strong And Unique Password

The security of your accounts is important for several reasons. Personal, sensitive information may be associated to your account such as your emails, contacts, and photos. In addition, other services may rely on your email address to verify your identity. If someone...

5 Simple Steps To Prevent Hacking

Small and mid-sized businesses are being increasingly targeted by hackers. Their data is being exploited, held ransom, sold and corrupted. This kind of disaster can crush the public faith in your business, result in expensive fines, and even shutter your business for...

Twitter On Android Makes Private Tweets Public

On January 17th, Twitter released a statement acknowledging a security flaw impacting Android users. Users who updated the email address associated with their account from November 14, 2018  to January 2019 may have had their private messages exposed. The "Protect...

Archives

Categories

Main Office: (914) 934-9775
Sales Department:  (914) 368-1251
Email: info@p-connect.com

Hours

Monday: 8:45am – 5:30pm
Tuesday: 8:45am – 5:30pm
Wednesday: 8:45am – 5:30pm
Thursday: 8:45am – 5:30pm
Friday: 8:45am – 5:30pm
Saturday: Closed
Sunday: Closed