CMIT Solutions’ Most Popular QuickTips of 2014 (Part 1)
Technology advice, practical solutions and real results.
Sunday, December 28, 2014
Saturday, December 27, 2014
Wednesday, December 24, 2014
'Twas the night before Crypto....
It was the night before Crypto when all through the LAN,
not a backup was stirring — they simply had a poor plan.
Oh the
tapes were stacked up and the hard drives were all there, but nothing was
working and they were not even aware.
The workers were working and inputting with care, but little did they know, CryptoWall soon would be there.
The bosses were all snug and nestled in their chairs, counting their money and combing their hair. They were smug and content to skimp on IT, that strategy would backfire, soon they would see.
A website was hacked and the damage was sudden, and then there was a message — could it be Russian?
Away, yes away to the Bitcoin website, we have to pay, because we didn't backup for at least a fortnight.
The lesson was learned and CMIT was summoned: GUARDIAN for all, and for all a good night.
The workers were working and inputting with care, but little did they know, CryptoWall soon would be there.
The bosses were all snug and nestled in their chairs, counting their money and combing their hair. They were smug and content to skimp on IT, that strategy would backfire, soon they would see.
A website was hacked and the damage was sudden, and then there was a message — could it be Russian?
Away, yes away to the Bitcoin website, we have to pay, because we didn't backup for at least a fortnight.
The lesson was learned and CMIT was summoned: GUARDIAN for all, and for all a good night.
Tuesday, December 23, 2014
Tuesday, December 16, 2014
Wednesday, November 26, 2014
Tuesday, November 18, 2014
CMIT will be exhibiting at the NCCPAP National Conference tomorrow, Nov. 19th through Nov. 21st!
CMIT will be exhibiting at the NCCPAP National Conference tomorrow, Nov. 19th through Nov. 21st. Catch Armando for a 90 minute lecture on identity theft tomorrow at 10:50AM. Looking forward to seeing our CPA clients at the event!
NCCPAP Conference Brochure
http://higherlogicdownload.s3.amazonaws.com/NCCPAP/507c5965-daa4-4d69-87d7-64ba0d6cec2a/UploadedImages/Documents/2014%20LITPS%20Brochure.pdf
NCCPAP Conference Brochure
http://higherlogicdownload.s3.amazonaws.com/NCCPAP/507c5965-daa4-4d69-87d7-64ba0d6cec2a/UploadedImages/Documents/2014%20LITPS%20Brochure.pdf
Monday, November 17, 2014
Monday, October 27, 2014
IMA Ethics Training Breakfast
CMIT Solutions is a proud sponsor of the IMA Ethics Training Breakfast on Tuesday, October 28th. For more information visit their website at http://longisland.imanet.org/events/category/ima/
Wednesday, October 22, 2014
Tuesday, October 21, 2014
Tuesday, October 14, 2014
WCBS Small Business Breakfast on October 15!
CMIT Solutions is proud to announce that we are sponsoring the WCBS Small Business Breakfast on October 15. In addition to attending as a vendor we have 60 second commercials on CBS news radio 88, and banner ads on various CBS websites. The event is always a well-attended networking event and is held three times a year in NY, NJ and CT. If you are interested in attending this year’s event click link for details and be sure to stop by and see us.
http://newyork.cbslocal.com/wcbs-small-business-breakfast/
http://newyork.cbslocal.com/wcbs-small-business-breakfast/
Monday, October 13, 2014
Wednesday, October 1, 2014
Thursday, September 25, 2014
Wednesday, September 10, 2014
Wednesday, August 27, 2014
Tuesday, August 19, 2014
Wednesday, August 13, 2014
Wednesday, August 6, 2014
Wednesday, July 30, 2014
Wednesday, July 23, 2014
Wednesday, July 16, 2014
Monday, July 14, 2014
Monday, July 7, 2014
7 TIPS TO STAY SAFE ONLINE!
1. Only Shop On Secure Websites. Before you type your credit card into a website, ensure it is secure. Look for “https://” in the address bar of your web browser when you are checking out.
2. Avoid Financial Transactions Over Public WiFi. You can’t guarantee that free or shared WiFi access is secure. Ok to connect for browsing the web, but avoid financial ...transactions on these connections.
3. Security. Protect your computer and network with a firewall, antivirus and anti-spyware software. And keep your systems up to date: get rid of XP, keep W7 and W8 – and keep your Mac up to date, if you cannot do this hire someone who can help.
4. Install Available Security Updates On Your Computer, SmartPhone and Tablets. Many cybercrimes target known security holes on your computing devices. Stay up-to-date to stay secure.
5. Setup Banking Alerts For Unusual Or Large Transactions. Ask your bank to notify you of any suspicious or large transactions. Check Your Bank Balances And Statements Regularly.
6. Pick Hard to guess Passwords. Use phrase acronyms and keyboard combinations, substitute symbols or numbers for letters. In general, mix things up and do not use kids or dogs names.
7. Never Directly Answer Or Respond To An Email From Your Bank, the IRS or your email provider. Criminals have become very adept at appearing that they are sending official emails, most of the time it is a scam. The IRS knows your social, they don’t need to ask!
2. Avoid Financial Transactions Over Public WiFi. You can’t guarantee that free or shared WiFi access is secure. Ok to connect for browsing the web, but avoid financial ...transactions on these connections.
3. Security. Protect your computer and network with a firewall, antivirus and anti-spyware software. And keep your systems up to date: get rid of XP, keep W7 and W8 – and keep your Mac up to date, if you cannot do this hire someone who can help.
4. Install Available Security Updates On Your Computer, SmartPhone and Tablets. Many cybercrimes target known security holes on your computing devices. Stay up-to-date to stay secure.
5. Setup Banking Alerts For Unusual Or Large Transactions. Ask your bank to notify you of any suspicious or large transactions. Check Your Bank Balances And Statements Regularly.
6. Pick Hard to guess Passwords. Use phrase acronyms and keyboard combinations, substitute symbols or numbers for letters. In general, mix things up and do not use kids or dogs names.
7. Never Directly Answer Or Respond To An Email From Your Bank, the IRS or your email provider. Criminals have become very adept at appearing that they are sending official emails, most of the time it is a scam. The IRS knows your social, they don’t need to ask!
Wednesday, July 2, 2014
Friday, June 27, 2014
Wednesday, June 18, 2014
Tuesday, June 10, 2014
Wednesday, June 4, 2014
Thursday, May 29, 2014
Tuesday, May 27, 2014
Tuesday, May 13, 2014
Thursday, May 8, 2014
Tuesday, May 6, 2014
Internet Explorer update!
Microsoft has issued a patch for the internet explorer vulnerability that we reported last week. CMIT has tested and pushed the patch to all CMIT managed PCs within hours of Microsoft releasing it. If you are a CMIT client please be sure your PC is restarted ASAP so the patch can be applied. And be sure that your PC remains on each night so we can scan, patch, maintain and protect it. If you are reading this and are not protected by our service please be sure you run windows updates and restart your PC once the updates are installed. This is a critical patch and must be installed ASAP. If you have any questions, please call us at (516) 208-4161.
Friday, May 2, 2014
Armando was quoted in Newsday! For the full article go to newsday.com. Here are some highlights
“When considering your technology needs, look at productivity, security and compliance, data backup and recovery, and automation.”
“…consider whether you're being reactive or proactive, Some companies only pay attention to their technology when it breaks, or data is breached.”
“Annual review. Companies should review their needs at least annually.”
“There are lots of technologies available, but the key is prioritizing them based on your goals and budget.”
Tuesday, April 29, 2014
Tuesday, April 22, 2014
Thursday, April 17, 2014
Friday, April 11, 2014
Heartbleed May have Compromised Your Sensitive Info!!
WHAT IS IT?
Heartbleed is a bug that MAY have exposed sensitive user information via a coding error in the commonly used online security protocol OpenSSL. This has rocked the technology world to its core and generated some scary headlines... The New Yorker called it “as bad as a security flaw can be.” The New York Times described it as “a stark reminder that the Internet is still in its youth and vulnerable to all sorts of unseen dangers.” Cryptography expert Bruce Schneier said Cryptography expert Bruce Schneier said “catastrophic is the right word to describe Heartbleed… on a scale of 1 to 10, this is an 11.”
Current Status?
The good news is that CMIT has verified that our systems and websites are NOT infected and are not using the vulnerable code. Our help desk email solution have also been tested and they are clean… We also verified that the routers we sell and support (sonicwall and netgear) are not affected, although other brands have admitted vulnerabilities.
• Because the bug can be exploited at any time, by anyone on the Internet, without leaving behind a single shred of evidence.
WHAT TO DO?
On April 10th, Mashable reported that the following sites, which collectively account for nearly two billion users, may have been affected, had applied security patches, and were urging users to change passwords:
Facebook, Twitter, Instagram, Pinterest, Tumblr, Google, Yahoo, GoDaddy, Intuit, DropBox, LastPass, OKCupid (Check back for updates)
If you want to proactively check a site that is not listed above (and we think you should) go to https://lastpass.com/heartbleed/ and type in the website you want to check. If it comes up clean, change your password; if it does not, contact the vendor or your IT support person for the next steps.
Wednesday, April 9, 2014
Friday, April 4, 2014
The cryptolocker virus is still surfacing and spreading via email!!!
Two recent emails have the following titles: PCI DSS Compliance Programme & Statement of Account. As with all email it is essential that you not open emails from unknown senders, that you have excellent anti virus, a quality spam filter and most importantly: on and offsite backups. This virus encrypts all files on local and backup drives and demands a ransom to unlock them.
Wednesday, April 2, 2014
Wednesday, March 26, 2014
Wednesday, March 19, 2014
Tuesday, March 18, 2014
For our latest QuickTip please visit our Facebook Page! And Don't forget to "Like" our page while you are there!
For our latest QuickTip please visit our Facebook Page! And Don't forget to "Like" our page while you are there! :-)
https://www.facebook.com/CMITSouthNassau
https://www.facebook.com/CMITSouthNassau
Wednesday, March 12, 2014
Why Data Breaches Keep Happening - And What You Can Do to Avoid Them
With the end of 2014’s first quarter upon us, we decided to interrupt our longing gaze at the warm, sunny weather in the near future and take a look at top trends affecting the technology world since January 1st.
Unfortunately, the one story that continues to dominate tech news is data breaches, data breaches, and more data breaches. Although its massive breach affecting over 100 million customersoccurred last year, Target reported in January that its Q4 profits fell by nearly 50%, while 2013 profits declined by more than 33%. In a sign of how significantly the breach has shaken the company, last week, Target’s Chief Information Officer Beth Jacob even resigned, while CEO Gregg Steinhafel announced an overhaul of information security practices.
Plenty of new breaches have occurred in 2014, as well. Sally Beauty Supply revealed an attempted breach in February, Sears launched an investigation into one in March, and everyone fromKickstarter to the University of Maryland to Smucker’s has announced their own vulnerabilities. And that’s not even digging into the many small health care-related breaches coming to light daily thanks to the recently enhanced HIPAA Breach Notification Rule, which requires public reporting of any incident affecting more than 500 individuals.
As John Pirc of security organization NSS Labs told SC magazine last week, “The trend in breaches in 2014 will be like the movie ‘Groundhog Day’ — we will be reliving the same scenario day after day.” The worst part? Symantec and the Ponemon Institute estimated in an analysis last May that the average total cost of a data breach is nearly $200 per record affected.
So what can you do to avoid such a devastating occurrence?
• Implement a trusted remote backup and disaster recovery service. CMIT Guardian, for instance, employs top-flight encryption levels for data both at rest and in transit, while also providing a failsafe backup in the event a data breach does affect your business. At this point, unfortunately, it’s more a matter of when than if — so preparing for that possibility is the smartest way to survive it.
• Understand that even the most stringent security measures may still not be enough. We’ve said it before, and it bears repeating: every employee, workstation, and mobile device represents a possible vulnerability. Most high-profile data breaches are the result of coordinated cyberattacks, but many smaller ones stem from a single stolen thumb drive or employee that inadvertently opens an infected email attachment.
• Strengthen your passwords. The rash of recent data breaches makes this common-sense practice even more important. The Adobe breach in October that affected over 38 million users revealed a wealth of information. For instance, “123456” was the service’s most popular password, followed by “qwerty,” “abc123,” and “123456789.”
Worried about how data breaches can negatively affect your business? Afraid your information isn’t properly protected? CMIT Solutions can and will help. We understand the critical nature of data security and the impact a breach can have on your business. Contact us today to put our encryption, backup, and disaster recovery solutions to work for you.
Friday, March 7, 2014
Welcome to Merrick!
As a board member for the Merrick Chamber of Commerce, I attended this morning's ribbon cutting ceremony for a new business, and my newest client, Dessert City. Best of luck to you and your wife, Boris!
Dessert City is located at 1848 Merrick Road Merrick NY
Dessert City is located at 1848 Merrick Road Merrick NY
Tuesday, March 4, 2014
Friday, February 28, 2014
Helping you transition away from Windows XP! Time is running out!
In 40 days, Microsoft will end all support for the outdated operating system. If you don’t act now, your computers and critical data will be vulnerable to increased cyberattacks, system insecurity, and severely decreased performance. But shaking off Windows XP won’t just boost productivity and efficiency — it’ll also help you save money in the long run. Microsoft estimates that a move to Windows 7 or 8 can deliver a return on investment (ROI) of nearly $1,400 in three years.
How can CMIT Solutions help you avoid getting dragged down by XP’s demise?
• We’ll determine whether an upgrade to Windows 7 or 8 is possible with your existing equipment — or whether it’s best to start fresh with new machines.
• We’ll provide financing options to make any decision you make more affordable.
• We’ll fast-track a post-XP transition to get your systems protected before XP’s April 8th expiration date.
• We’ll deliver world-class support to help your business benefit from a more modernized computing environment.
How can CMIT Solutions help you avoid getting dragged down by XP’s demise?
• We’ll determine whether an upgrade to Windows 7 or 8 is possible with your existing equipment — or whether it’s best to start fresh with new machines.
• We’ll provide financing options to make any decision you make more affordable.
• We’ll fast-track a post-XP transition to get your systems protected before XP’s April 8th expiration date.
• We’ll deliver world-class support to help your business benefit from a more modernized computing environment.
Tuesday, February 25, 2014
Very Important Information about Windows XP!!
"Microsoft will discontinue extended support for XP effective April 8, 2014. After this date, Microsoft will no longer provide regular security patches, technical assistance, or support for XP. "
YOUR PRIVATE INFORMATION WILL NO LONGER BE PROTECTED! Read more..
Friday, February 21, 2014
Tuesday, February 11, 2014
Tuesday, February 4, 2014
Thursday, January 30, 2014
Tuesday, January 21, 2014
Wednesday, January 15, 2014
Tuesday, January 7, 2014
Subscribe to:
Posts (Atom)