Support Now


Wednesday, February 6, 2019

Sneaky Ways Cybercriminals Access Your Network and What You Can Do to Prevent It Today

Hackers prefer the little guy. The high-profile data breaches you read about in the news — your Facebooks and Equifaxes and T-Mobiles — are only the tip of the iceberg when it comes to the digital crimes being perpetrated day after day, especially against small businesses. Today, according to a report by the National Cyber Security Alliance, 70 percent of hackers specifically target small businesses. Attracted by the prospect of easy money, they search for those organizations who underspend on protection, who have employees untrained to spot security risks, and who subscribe to woefully out-of-date practices to protect their data. As a result, more than 50 percent of small businesses have been hacked, while 60 percent of companies breached are forced to close their doors within six months.

Read more . . .

Saturday, December 1, 2018

2 Places You Should Never Cut Corners with IT

Today’s technology empowers business owners in ways that would have seemed incredible even 10 years ago. With a humming network connecting your team to the rest of the world, and with just a few simple keystrokes, your organization can complete tasks that used to take days.

However, the endless possibility that accompanies technological advancement comes with a catch: to be truly effective, IT requires investment – not just of capital, but of time and attention, resources all too dear to the harried entrepreneurs of the modern age. Perhaps this is why, everywhere you look, small to midsize business owners are not only failing to realize the full potential of their technology, but are unknowingly leaving massive gaps in their systems and processes for malicious entities to exploit. And so, budding companies that would otherwise dominate the market are prematurely stamped out by competitors with more tech savvy or are hamstrung by costly data breaches.
Read more . . .

Tuesday, August 7, 2018

Employees keeping your Data Safe?

One morning late last year, an unemployed man was making his way across London, heading to the library to continue his job search. But on the way, he encountered something peculiar: a USB stick, peeking out among the fallen leaves and shining in the morning sun. Not thinking much of it – and perhaps afflicted with a morbid curiosity – he popped the device into his pocket and continued on his way.

Read more . . .

Friday, July 20, 2018

Top 4 Ways Hackers Will Attack Your Network

Most small and midsize business (SMB) owners exist in a bubble of blissful ignorance. They focus on the day-to-day operations of their organization, driving growth, facilitating hiring and guiding marketing, without a single thought given to the security of the computer networks these processes depend on. After all, they’re just the little guy – why would hackers go to the trouble of penetrating their systems for the minuscule amount of data they store?


And eventually, often after years of smooth sailing through calm seas, they get hacked, fork out thousands of dollars to malicious hackers and collapse beneath the weight of their own shortsightedness.


The facts don’t lie. According to Verizon’s annual Data Breach Investigations Report, a full 71% of cyber-attacks are aimed squarely at SMBs.
Read more . . .

Friday, September 8, 2017

Equifax Security Breach

If you haven’t heard already, Equifax, which is one of the three major credit bureaus had a data breach.  This breach has potentially exposed the personal information of 143 Million people.  So it is possible one of those victims could be you. 
According to Equifax the breach occurred some time between mid-May and July where social security numbers, credit card numbers, addresses, drivers license numbers and birth dates were stolen. 
As of this moment Equifax has not provided a way to let you know if you a victim.

Read more . . .

Tuesday, June 27, 2017

The latest ransomware threat is called Petya

Here we go again, another major ransomware attack in Europe and the United States within a couple of months.  This one is called Petya and it's been working its way here in the US by using the same exploit of SMBv1 that WannaCry used which rapidly spreads across networks.  

Petya which also has been referred to as Petwrap has been bringing computers down at corporations, banks and other companies.  How Petya works is that it will reboot the computer and encrypt the hard dive's master file table, which makes the master boot record inoperable restricting access to the system.  It will replace the master boot record with it's own code which displays a ransom note and leaves computers unable to boot.

Read more . . .

Monday, June 19, 2017

Tips to Protect Yourself from Hackers

Every day hackers find new ways to gain access to your most important data whether it be your own personal information or that of your clients.  Just like having an alarm system in your home, there are ways to deter a would be hacker from gaining access to your vital information.  Below are some tips to keep you safe.  

1)  Make sure your computer is up to day with the latest operating system and that all updates are installed. This includes updates to Java, Flash and Adobe.
Read more . . .

Thursday, May 4, 2017

World Password Day is May 4, 2017

When was the last time you changed your password?  Why not do it today in honor of World Password day.  In this day of phishing attacks, social engineering attacks, cybercrime and identity theft, changing your password is vital both professionally and personally.   

Here are some best practice tips for password policy:

  1.  Create a strong password.  This seems like a no brainer but people are still using password or 12345.  A strong password should contain at least 8 characters which include symbols,  upper and lower case letters and a number.

Read more . . .

Monday, April 10, 2017

Taking Security Seriously

Over and over recently we have seen small businesses come under attack from ransomware and viruses to phishing attempts.  Don't think that just because you have a small business that you are free from the worry of a cyberattack.  Around 40 Percent of cyberattacks specifically target small businesses according to the publication Small Business Trends.  There are ways to combat cyberattacks and protect your business, whatever the size.

Read more . . .

Thursday, December 8, 2016

Phishing scam alert targeting attorneys

The Attorney General Eric T. Schneiderman has issued a consumer alert for attorneys specifically due to recent reports of a particular phishing scam that comes in the form of an email claiming that the firm is the subject of a complaint.

The email includes a link to the complaint .Please warn your staff to NOT click on this link.

Read more . . .

Tuesday, July 12, 2016

APT Blocker-Your Best Defense in the War Against Ransomeware

The more sophisticated malware gets the more sophisticated your firewall has to be to fight it.  WatchGuard has added APT (Advanced Persistent Threats) Blocker as another layer of prevention against advance ransomeware viruses that encrypt all of your data and make it inaccessible. 

APT blocker checks file against an existing database of malware. This happens first on the firewall itself and then in the cloud.  If the file has never been seen before it is analyzed, and if found to be suspicious, blocked from ever entering your network.

Read more . . .

← Newer12 Older →

© 2024 Glasser Tech
366 S Oyster Bay Rd., Hicksville, NY 11801
| Phone: 516-762-0155
Our Services | Solutions | Testimonials