(914) 934-9775 info@p-connect.com
  • Customer Support
Performance Connectivity, Inc.
  • Home
  • Why Choose Us?
  • About
  • Services
    • Client Support Services
    • Cyber Security
    • Work From Home (WFH) Solutions
    • Cloud Solutions
  • Is This You?
  • Blog
  • Contact
Select Page

23 Texas Municipalities Suffer Ransomware Attack as Mass Cyber Security Breaches Continue

by Performance Connectivity | Aug 20, 2019 | Cyber Security, News

We previously wrote about targeted cyber-attacks on state and local governments in Florida. To read more click here. What Happened? Unfortunately, the rash of attacks has continued, with 23 Texas municipalities announcing they have been victimized as well. State...

What is a Domain Name System (DNS)?

by Performance Connectivity | Aug 20, 2019 | Best Practices, Cyber Security

A DNS is like a phone book for the internet. With a phone book, you can look up your friend’s name and find their phone number instead of having to remember the number yourself. Similarly, a DNS allows users to reference simple domain names like...

This can happen at work OR at your home…

by Performance Connectivity | Mar 27, 2019 | Best Practices, Cyber Security

In a recent incident reported in US news, an office secretary unknowingly gave some of her law firm’s most private data to a gentleman who had bought a Comcast Cable polo shirt off eBay. He dressed in khakis with a tool belt, and told the secretary he was there to...

The #1 threat to your security is…

by Performance Connectivity | Mar 13, 2019 | Best Practices, Cyber Security

YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without malicious intent – but...

Shadow IT: How Your Company’s Data Is Silently Being Leaked Online

by Performance Connectivity | Feb 20, 2019 | Best Practices, Compliance, Cyber Security

Here’s a growing trend creeping into organizations of all industries and sizes: Shadow IT. Shadow IT are unauthorized cloud applications employees are using and downloading to perform work-related activities with company data. This can be file-sharing services like...
« Older Entries

Archives

Categories

Tags

anti-virus applications backup disaster recovery bdr best practices browser bug business continuity business IT consulting cloud backup cloud computing cloud file sharing compliance coronavirus cyber crime Cyber Criminal Cyber Criminals cyber security cyber theft data breach data encryption DDoS disaster recovery solutions DoS email accounts google hackers hacking hardware malware microsoft mobile device Network Security news office 365 password management patches proactive monitoring protection remote access solutions scams server spam system patching and maintenance updates

Contact Us

Performance Connectivity, Inc.
2900 Westchester Avenue, Suite 105
Purchase, New York 10577

Main Office: (914) 934-9775
Sales Department:  (914) 368-1251
Email: info@p-connect.com

Hours

Monday: 8:45am – 5:30pm
Tuesday: 8:45am – 5:30pm
Wednesday: 8:45am – 5:30pm
Thursday: 8:45am – 5:30pm
Friday: 8:45am – 5:30pm
Saturday: Closed
Sunday: Closed

  • © 2021 Performance Connectivity, Inc.
  • Privacy
  • Terms of Use