Is Your IT Guy Holding You Prisoner?

Here’s a question you’ve probably never thought about: If your IT guy went away, would you know where all the passwords, data, software licenses and disks, key codes, and other important information were stored? Do you know how to log into your server? Do you know the...

Shadow IT: How Your Company’s Data Is Silently Being Leaked Online

Here’s a growing trend creeping into organizations of all industries and sizes: Shadow IT. Shadow IT are unauthorized cloud applications employees are using and downloading to perform work-related activities with company data. This can be file-sharing services like...

Google+ Discontinues Consumer Accounts Following 2nd Security Bug

Google discontinues support for Google + social media platform 4 months early after second security breach   Following a second security failure, Google has decided to shut down the consumer version of its social network Google + 4 months ahead of schedule....

Why “Break-Fix” Works Entirely In The Consultant’s Favor, Not Yours

A question I often get is “Why do I need to be on a managed IT plan? Can’t I just pay you to come out and fix things when they’re broken?” While that’s a legitimate question if we were talking about your washing machine or car, that’s definitely NOT the right approach...

8 Tips For Creating A Strong And Unique Password

The security of your accounts is important for several reasons. Personal, sensitive information may be associated to your account such as your emails, contacts, and photos. In addition, other services may rely on your email address to verify your identity. If someone...

5 Simple Steps To Prevent Hacking

Small and mid-sized businesses are being increasingly targeted by hackers. Their data is being exploited, held ransom, sold and corrupted. This kind of disaster can crush the public faith in your business, result in expensive fines, and even shutter your business for...

Twitter On Android Makes Private Tweets Public

On January 17th, Twitter released a statement acknowledging a security flaw impacting Android users. Users who updated the email address associated with their account from November 14, 2018  to January 2019 may have had their private messages exposed. The "Protect...

The #1 Best Strategy for Data Recovery

Effective business technology consists of hardware, software, data and connectivity. Without any one component of this “system,” the system may not function, meaning lost time, energy and dollars! To avoid this, recovery strategies should be developed to anticipate...



Main Office: (914) 934-9775
Sales Department:  (914) 368-1251


Monday: 8:45am – 5:30pm
Tuesday: 8:45am – 5:30pm
Wednesday: 8:45am – 5:30pm
Thursday: 8:45am – 5:30pm
Friday: 8:45am – 5:30pm
Saturday: Closed
Sunday: Closed

Performance Connectivity, Inc.

Performance Connectivity, Inc. is an IT Managed Service Provider in Purchase, New York. We strive to provide fast and effective computer solutions to small and mid-sized businesses.

2900 Westchester Ave., Suite 105
Purchase, New York 10577

Main Office: (914) 934-9775
Sales Department:  (914) 368-1251