631-905-9617    Get SUPPORT

Suffolk Computer Consultants, Inc. Blog

Suffolk Computer Consultants, Inc. has been serving the Speonk area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Minimizing App-Based Security Issues

Tip of the Week: Minimizing App-Based Security Issues

With smartphones being more sophisticated and feature-packed than ever, you have to wonder how many of those features are actually spying on you. Depending on the apps you install, your device could be secure, or it could be at risk, and it’s worth examining these apps every so often to ensure you’re not putting your personal or business information at risk. How do you address app-based security risks?

0 Comments
Continue reading

Why Your IT Guy is Annoyed by Your Smart Lightbulb

Why Your IT Guy is Annoyed by Your Smart Lightbulb

There’s no denying the convenience that so many of technology's essential features and functions can now be managed with a simple command, if not completely automated, thanks to the Internet of Things. With the IoT, everything is augmented by a miniature computer… but these devices are built to be convenient and (for lack of a better term) cheap.

As such, you could potentially have numerous backdoors into your business network.

0 Comments
Continue reading

Let’s Dispute the 3 Most Common Cybersecurity Myths Out There

Let’s Dispute the 3 Most Common Cybersecurity Myths Out There

Are you still depending on your business being so small that it flies “under the radar” of potential threats? The most dangerous mindset you can have is that you’re too small for a hacker to care about your data. In reality, hackers don’t care how big your business is; they care about what data they can steal, and there’s plenty of it on your infrastructure.

0 Comments
Continue reading

3 Ways to Stop the IT Whack-A-Mole

3 Ways to Stop the IT Whack-A-Mole

Is your tech strategy based on your actual business goals, or is it just a game of Whack-A-Mole with broken laptops?

Many businesses operate in break-fix mode. Something breaks, you pay to fix it, and you move on. But this reactive spending is expensive, stressful, and keeps you two steps behind your competitors. To grow, your technology needs to follow a roadmap, not a repair schedule.

0 Comments
Continue reading

7 Signs Your Business Network Has an Unwelcome Guest

7 Signs Your Business Network Has an Unwelcome Guest

If you’re counting on a big, dramatic hacking attack being the method of choice for any cybercriminal with you in their sights, I have some bad news.

In reality, cybercrime is sneaky. A threat quietly infiltrates your network, lying in wait and biding its time, gradually collecting data until the perfect moment arrives. On average, a hacker spends 180 days in this reconnaissance mode. You need to know the warning signs that something isn’t quite right.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Newsletter Sign Up