Support Now
Share

Saturday, December 1, 2018

2 Places You Should Never Cut Corners with IT


Today’s technology empowers business owners in ways that would have seemed incredible even 10 years ago. With a humming network connecting your team to the rest of the world, and with just a few simple keystrokes, your organization can complete tasks that used to take days.

However, the endless possibility that accompanies technological advancement comes with a catch: to be truly effective, IT requires investment – not just of capital, but of time and attention, resources all too dear to the harried entrepreneurs of the modern age. Perhaps this is why, everywhere you look, small to midsize business owners are not only failing to realize the full potential of their technology, but are unknowingly leaving massive gaps in their systems and processes for malicious entities to exploit. And so, budding companies that would otherwise dominate the market are prematurely stamped out by competitors with more tech savvy or are hamstrung by costly data breaches.
Read more . . .


Tuesday, August 7, 2018

Employees keeping your Data Safe?

One morning late last year, an unemployed man was making his way across London, heading to the library to continue his job search. But on the way, he encountered something peculiar: a USB stick, peeking out among the fallen leaves and shining in the morning sun. Not thinking much of it – and perhaps afflicted with a morbid curiosity – he popped the device into his pocket and continued on his way.

Read more . . .


Friday, July 20, 2018

Top 4 Ways Hackers Will Attack Your Network


Most small and midsize business (SMB) owners exist in a bubble of blissful ignorance. They focus on the day-to-day operations of their organization, driving growth, facilitating hiring and guiding marketing, without a single thought given to the security of the computer networks these processes depend on. After all, they’re just the little guy – why would hackers go to the trouble of penetrating their systems for the minuscule amount of data they store?

 

And eventually, often after years of smooth sailing through calm seas, they get hacked, fork out thousands of dollars to malicious hackers and collapse beneath the weight of their own shortsightedness.

 

The facts don’t lie. According to Verizon’s annual Data Breach Investigations Report, a full 71% of cyber-attacks are aimed squarely at SMBs.
Read more . . .


Thursday, March 29, 2018

Have you ever received an email that looks like the picture below?


Were you tempted to click on the link where it says confirm account?  You probably thought, well gee, it looks like it’s from Microsoft, it can’t hurt to click on the link right?  Wrong!  These types of emails are known as "phishing emails."  They are looking to get personal information from you or perhaps ask you to change your password. 


Read more . . .


Wednesday, March 14, 2018

Glasser Tech and MataJure Working Together to Boost Efficiency Inside Law Firms


Glasser Tech a leading provider of technology consulting to the legal industry together with MetaJure, developer of an automated document management system (DMS) for the legal industry and ILLUMINATE, the enterprise search tool that works seamlessly with other DMS, today announced a working partnership aimed at helping law firms boost efficiency, improve profitability and ensure ethical compliance.   

“We are excited to offer MetaJure’s impressive tools to our clients,” said Michael Glasser.


Read more . . .


Wednesday, February 7, 2018

Can you imagine having a laptop that is thin, light AND powerful?

HP has unveiled this month that they have refreshed their EliteBook 800 Lineup to offer the premium features and Enhanced Security of their 1000 series.  

What’s new about the EliteBook 800 models?

The EliteBook 800 models are innovative with a brighter display, improved portability, collaboration keys (such as for  launching video conferencing) and advanced security capabilities.  They are so thin and light, yet powerful, which allows users to collaborate using enterprise-class performance technology increasing productivity inside and outside the office. Not only do the Elitebook 800 models come with a fully aluminum cover but it is only .70 inches thick making it the thinnest 14 inch business notebook.  It has an Intel processor and a display that reaches up to 400 units of brightness and can automatically adjust in light conditions.  It also has a privacy screen called Sure View and a webcam shutter as well as Sure Start, HP’s self-healing BIOS technology. It's a great laptop for business especially if you do a lot of traveling. 

Read more . . .


Friday, September 8, 2017

Equifax Security Breach


If you haven’t heard already, Equifax, which is one of the three major credit bureaus had a data breach.  This breach has potentially exposed the personal information of 143 Million people.  So it is possible one of those victims could be you. 
 
According to Equifax the breach occurred some time between mid-May and July where social security numbers, credit card numbers, addresses, drivers license numbers and birth dates were stolen. 
 
As of this moment Equifax has not provided a way to let you know if you a victim.

Read more . . .


Tuesday, June 27, 2017

The latest ransomware threat is called Petya


Here we go again, another major ransomware attack in Europe and the United States within a couple of months.  This one is called Petya and it's been working its way here in the US by using the same exploit of SMBv1 that WannaCry used which rapidly spreads across networks.  

Petya which also has been referred to as Petwrap has been bringing computers down at corporations, banks and other companies.  How Petya works is that it will reboot the computer and encrypt the hard dive's master file table, which makes the master boot record inoperable restricting access to the system.  It will replace the master boot record with it's own code which displays a ransom note and leaves computers unable to boot.


Read more . . .


Monday, June 19, 2017

Tips to Protect Yourself from Hackers


Every day hackers find new ways to gain access to your most important data whether it be your own personal information or that of your clients.  Just like having an alarm system in your home, there are ways to deter a would be hacker from gaining access to your vital information.  Below are some tips to keep you safe.  

1)  Make sure your computer is up to day with the latest operating system and that all updates are installed. This includes updates to Java, Flash and Adobe.
Read more . . .


Thursday, May 4, 2017

World Password Day is May 4, 2017


When was the last time you changed your password?  Why not do it today in honor of World Password day.  In this day of phishing attacks, social engineering attacks, cybercrime and identity theft, changing your password is vital both professionally and personally.   

Here are some best practice tips for password policy:

  1.  Create a strong password.  This seems like a no brainer but people are still using password or 12345.  A strong password should contain at least 8 characters which include symbols,  upper and lower case letters and a number.

Read more . . .


Monday, April 10, 2017

Taking Security Seriously

Over and over recently we have seen small businesses come under attack from ransomware and viruses to phishing attempts.  Don't think that just because you have a small business that you are free from the worry of a cyberattack.  Around 40 Percent of cyberattacks specifically target small businesses according to the publication Small Business Trends.  There are ways to combat cyberattacks and protect your business, whatever the size.


Read more . . .


← Newer12 3 Older →



© 2018 Glasser Tech
366 S Oyster Bay Rd., Hicksville, NY 11801
| Phone: 516-762-0155
About Glasser Tech LLC | Our Services | Solutions | Testimonials

Law Firm Website Design by
Amicus Creative