Can You Answer These Questions About Endpoint Protection?

What is Endpoint Protection? Endpoints are vulnerable access points for cyber criminals to enter your network. Once inside, hackers can take control of the device to execute a DoS attack, steal high-value information or hold it for ransom. Traditionally, antivirus has...

Florida Town Pays $500,000 To Hackers After Ransomware Attack

Over the last two weeks, Florida municipalities have paid $1.1m to ransomware hackers. Lake City officials voted to pay hackers in Bitcoin after two weeks of downed computer systems brought daily operations to a standstill. IT staff is said to have disconnected the...

“BlueKeep” Flaw Prompts Microsoft and NSA Advisory For Windows OS

US officials and Microsoft executives have released an advisory that highlights a known flaw in versions of the Windows OS. "All customers on affected operating systems [Windows 7 and earlier] should update as soon as possible," said Microsoft. A flaw known as...

This can happen at work OR at your home…

In a recent incident reported in US news, an office secretary unknowingly gave some of her law firm’s most private data to a gentleman who had bought a Comcast Cable polo shirt off eBay. He dressed in khakis with a tool belt, and told the secretary he was there to...

If you’ve ever said this, you’re ASKING to be hacked!

Want to know what every hacker hopes you believe? “We’re small…nobody wants to hack us.” This is the #1 reason why people (companies) get hacked. They dismiss the importance of IT security because they’re only a “small business.” This is a lazy, irresponsible excuse....

The #1 threat to your security is…

YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without malicious intent – but...

Is Your IT Guy Holding You Prisoner?

Here’s a question you’ve probably never thought about: If your IT guy went away, would you know where all the passwords, data, software licenses and disks, key codes, and other important information were stored? Do you know how to log into your server? Do you know the...

Shadow IT: How Your Company’s Data Is Silently Being Leaked Online

Here’s a growing trend creeping into organizations of all industries and sizes: Shadow IT. Shadow IT are unauthorized cloud applications employees are using and downloading to perform work-related activities with company data. This can be file-sharing services like...

Archives

Categories

Main Office: (914) 934-9775
Sales Department:  (914) 368-1251
Email: info@p-connect.com

Hours

Monday: 8:45am – 5:30pm
Tuesday: 8:45am – 5:30pm
Wednesday: 8:45am – 5:30pm
Thursday: 8:45am – 5:30pm
Friday: 8:45am – 5:30pm
Saturday: Closed
Sunday: Closed