(914) 934-9775 info@p-connect.com
  • Customer Support
Performance Connectivity, Inc.
  • Home
  • Why Choose Us?
  • About
  • Services
    • Remote Access Solutions
    • Cloud Solutions
    • Client Support Services
    • Cyber Security
  • Is This You?
  • Blog
  • Contact
Select Page

Can You Answer These Questions About Endpoint Protection?

by Stephanie Rosenzweig | Jul 1, 2019 | Compliance, Cyber Security

What is Endpoint Protection? Endpoints are vulnerable access points for cyber criminals to enter your network. Once inside, hackers can take control of the device to execute a DoS attack, steal high-value information or hold it for ransom. Traditionally, antivirus has...

“BlueKeep” Flaw Prompts Microsoft and NSA Advisory For Windows OS

by Stephanie Rosenzweig | Jun 17, 2019 | Compliance, Cyber Security, News, System Patching & Maintenance

US officials and Microsoft executives have released an advisory that highlights a known flaw in versions of the Windows OS. “All customers on affected operating systems [Windows 7 and earlier] should update as soon as possible,” said Microsoft. A flaw...

5 Often Overlooked Security Measures All Businesses Must Have In Place When Using Mobile Devices

by Stephanie Rosenzweig | Feb 27, 2019 | Best Practices, Compliance, Cyber Security, Mobilization

Implement a mobile device policy. This is particularly important if your employees are using their own personal devices to access company e-mail and data. If that employee leaves, are you allowed to erase company data from their phone? If their phone is lost or...

Shadow IT: How Your Company’s Data Is Silently Being Leaked Online

by Stephanie Rosenzweig | Feb 20, 2019 | Best Practices, Compliance, Cyber Security

Here’s a growing trend creeping into organizations of all industries and sizes: Shadow IT. Shadow IT are unauthorized cloud applications employees are using and downloading to perform work-related activities with company data. This can be file-sharing services like...

5 Simple Steps To Prevent Hacking

by Stephanie Rosenzweig | Jan 22, 2019 | Best Practices, Compliance, Cyber Security

Small and mid-sized businesses are being increasingly targeted by hackers. Their data is being exploited, held ransom, sold and corrupted. This kind of disaster can crush the public faith in your business, result in expensive fines, and even shutter your business for...

The #1 Best Strategy for Data Recovery

by Stephanie Rosenzweig | Jan 15, 2019 | Backup Disaster Recovery BDR Services, Best Practices, Compliance, Disaster Recovery Solutions

Effective business technology consists of hardware, software, data and connectivity. Without any one component of this “system,” the system may not function, meaning lost time, energy and dollars! To avoid this, recovery strategies should be developed to anticipate...
« Older Entries

Archives

Categories

Tags

anti-virus applications backup disaster recovery bdr best practices browser bug business continuity business IT consulting cloud backup cloud computing cloud file sharing compliance coronavirus cyber crime Cyber Criminal Cyber Criminals cyber security cyber theft data breach data encryption DDoS disaster recovery solutions DoS email accounts google hackers hacking hardware malware microsoft mobile device Network Security news office 365 password management patches proactive monitoring protection remote access solutions scams server spam system patching and maintenance updates

Contact Us

Performance Connectivity, Inc.
2900 Westchester Avenue, Suite 105
Purchase, New York 10577

Main Office: (914) 934-9775
Sales Department:  (914) 368-1251
Email: info@p-connect.com

Hours

Monday: 8:45am – 5:30pm
Tuesday: 8:45am – 5:30pm
Wednesday: 8:45am – 5:30pm
Thursday: 8:45am – 5:30pm
Friday: 8:45am – 5:30pm
Saturday: Closed
Sunday: Closed

  • © 2021 Performance Connectivity, Inc.
  • Privacy
  • Terms of Use