Is Your IT Guy Holding You Prisoner?
Here’s a question you’ve probably never thought about: If your IT guy went away, would you know where all the passwords, data, software licenses and disks, key codes, and other important information were stored? Do you know how to log into your server? Do you know the...
5 Often Overlooked Security Measures All Businesses Must Have In Place When Using Mobile Devices
Implement a mobile device policy. This is particularly important if your employees are using their own personal devices to access company e-mail and data. If that employee leaves, are you allowed to erase company data from their phone? If their phone is lost or...
Shadow IT: How Your Company’s Data Is Silently Being Leaked Online
Here’s a growing trend creeping into organizations of all industries and sizes: Shadow IT. Shadow IT are unauthorized cloud applications employees are using and downloading to perform work-related activities with company data. This can be file-sharing services like...
Right Now, You’re Paying 89% Of Your Employees To Download Porn, Search For Another Job And Infect Your Network With Viruses
In a recent Wasting Time At Work Survey, Salary.com reported that 89% of employees admitted to wasting time at work every day, with some admitting they waste at least HALF of their 8-hour workday on non-work-related tasks. According to the research firm YouGov, 20% of...
Google+ Discontinues Consumer Accounts Following 2nd Security Bug
Google discontinues support for Google + social media platform 4 months early after second security breach Following a second security failure, Google has decided to shut down the consumer version of its social network Google + 4 months ahead of schedule....
Why “Break-Fix” Works Entirely In The Consultant’s Favor, Not Yours
A question I often get is “Why do I need to be on a managed IT plan? Can’t I just pay you to come out and fix things when they’re broken?” While that’s a legitimate question if we were talking about your washing machine or car, that’s definitely NOT the right approach...
8 Tips For Creating A Strong And Unique Password
The security of your accounts is important for several reasons. Personal, sensitive information may be associated to your account such as your emails, contacts, and photos. In addition, other services may rely on your email address to verify your identity. If someone...
5 Simple Steps To Prevent Hacking
Small and mid-sized businesses are being increasingly targeted by hackers. Their data is being exploited, held ransom, sold and corrupted. This kind of disaster can crush the public faith in your business, result in expensive fines, and even shutter your business for...
Twitter On Android Makes Private Tweets Public
On January 17th, Twitter released a statement acknowledging a security flaw impacting Android users. Users who updated the email address associated with their account from November 14, 2018 to January 2019 may have had their private messages exposed. The "Protect...
The #1 Best Strategy for Data Recovery
Effective business technology consists of hardware, software, data and connectivity. Without any one component of this “system,” the system may not function, meaning lost time, energy and dollars! To avoid this, recovery strategies should be developed to anticipate...
Performance Connectivity, Inc.
Performance Connectivity, Inc. is an IT Managed Service Provider in Purchase, New York. We strive to provide fast and effective computer solutions to small and mid-sized businesses.
2900 Westchester Ave., Suite 105
Purchase, New York 10577
Main Office: (914) 934-9775
Sales Department: (914) 368-1251
info@p-connect.com
Explore
Services