631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Suffolk Computer Consultants has been serving the Speonk area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: NIST Password Guidelines

Tip of the Week: NIST Password Guidelines

Passwords have always been important to businesses, but they are priorities for organizations in certain industries. Government-based organizations in particular need to be concerned about using secure passwords. Of course, not all businesses are government-based, but there’s a thing or two your own can learn about some of their password practices.

0 Comments
Continue reading

Taking a Look at Facebook’s Recent Controversies

Taking a Look at Facebook’s Recent Controversies

The past few years certainly haven’t been very good for Facebook. After going public in 2012, Facebook acquired several organizations and applications to make waves in the market. The company is now responsible for a considerable amount of data, which has led to several data breaches, exacerbating the media and creating skepticism toward the social media giant.

0 Comments
Continue reading

We are Seeing More IT Growth in Medicine

We are Seeing More IT Growth in Medicine

Technology has helped many industries push beyond their limits and embrace new operational methods that may not have been possible in the past. One of these industries is healthcare and medical IT. Thanks to these advancements, patients have more options now than ever before in how much control they have over their records, but providers must be wary of these changes in order to take advantage of them.

0 Comments
Continue reading

Tip of the Week: Improve Productivity with a Mobile Strategy

Tip of the Week: Improve Productivity with a Mobile Strategy

Communications can be difficult to manage, especially in today’s business world where workers are more mobile with more devices than ever before. How can you make sure your business’ infrastructure is prepared for the new developments in modern technology solutions? You can start by making sure your team is equipped with the applications and devices they need to stay in touch during the workday.

0 Comments
Continue reading

Breaking Down Collaboration’s Levels

Breaking Down Collaboration’s Levels

If there’s a single concept that modern businesses are being built around, that concept would have to be collaboration. Group effort and communication are increasingly central to the workflows of today - but there is more to collaboration than just these features. Here, we’ll review what the term collaboration really means, and how it can be leveraged in all its forms.

0 Comments
Continue reading

Smartwatches Haven’t Become Much Smarter

Smartwatches Haven’t Become Much Smarter

The smartwatch has quite a few benefits, but anything that one might bring to the table is offset drastically by its position as a threat magnet. Vulnerabilities in smart watches and other wearable technology makes using these devices somewhat risky behavior. Today, we will look at some of the features of the modern smartwatch, how hackers are utilizing them to be disruptive, and what you need to do to protect yourself from the risk posed by hackers.

0 Comments
Continue reading

Tip of the Week: Protect Your Word Document with a Password

Tip of the Week: Protect Your Word Document with a Password

Some documents contain more sensitive data on them than others, making them important to protect. When it won’t do to have documents containing boatloads of sensitive data available to anyone who obtains the document, you can turn to Microsoft Word to have a feature that protects them: password protection.

0 Comments
Continue reading

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

0 Comments
Continue reading

The Modern Worker’s Cybersecurity Training

The Modern Worker’s Cybersecurity Training

The modern office can be a pretty monotonous place. When people do similar tasks over and over again, their attention to detail can wane. That may be a problem for your operational efficiency, but depending on what the expectations are, it likely won’t end your company. Ransomware, on the other hand, can be a major problem for any organization it affects. Today, we will share with you how to get your staff to care about the looming threats that target businesses from over the Internet.

0 Comments
Continue reading

Tip of the Week: Improving Your Wireless Network

Tip of the Week: Improving Your Wireless Network

A company’s wireless network is a big part of what they do. Not only does it provide the freedom for people to move around, it also spurs on collaboration, enhances coordination, and provides more availability for people to be productive. Problems abound with many organizations’ Wi-Fi strategy, however. If your business doesn't take proactive measures to properly manage your wireless connections, they may not be as effective or secure as you need them to be. Today, we’ll give you a few tips to make your wireless platform strong and resilient.

0 Comments
Continue reading

What Do You Need Your Business’ Technology to Accomplish?

What Do You Need Your Business’ Technology to Accomplish?

Service offerings for business technology are kind of tricky to approach for administrators--especially if they have gotten by just fine without implementing new technology for the past few years. We want you to ask yourself if you are absolutely certain that the solutions aren’t needed by your business. You might find that you actually do need them.

0 Comments
Continue reading

SamSam Is More than a Computer Virus

SamSam Is More than a Computer Virus

I think by now most people understand just how dangerous ransomware is. Even with some of the ridiculous names they have like Gandcrab, Jigsaw, and WannaCry. Hell, two strains even have names from the James Bond canon: LeChiffre and GoldenEye. But one funny-named strain of ransomware, SamSam, has been devastating information systems for sometime, and has caught the eye of several U.S. law enforcement agencies.

0 Comments
Continue reading

Tip of the Week: How to Make Your Smartphone Work Better for You

Tip of the Week: How to Make Your Smartphone Work Better for You

The holiday season is coming to an end, which means it’s time to get back to the grind in the new year. However, if you happened to receive an Android device as a gift (or maybe treated yourself to one, I’m not judging), you can leverage it to make work a little easier. We’ll give you a few tips how.

0 Comments
Continue reading

A Letter Back from Santa’s Elves

A Letter Back from Santa’s Elves

We’ve always been a proponent of preparing for the worst and hoping for the best where a business’ solutions are concerned. That’s why we were happy to receive an email from our friends at the North Pole telling us about a situation they ran into just a few days ago...

0 Comments
Continue reading

What to Get that Techie in Your Life

What to Get that Techie in Your Life

We all know someone that has to have the latest and greatest technology. They have all of the gaming platforms, they have to get the newest smartphones every year, and they are the only person you know that owns multiple smartwatches. Clearly, some gizmo or gadget would make a great gift, but there’s still the age-old concern: what do you get for someone who seems to have everything?

0 Comments
Continue reading

Tip of the Week: Keeping It Simple

Tip of the Week: Keeping It Simple

Shortcuts are one of the key parts of using a computer these days, and when properly used, they can make your experience with the device much, much more convenient. You can be more productive throughout the workday and be more effective at completing tasks, all thanks to shortcuts. There are four in particular that can help you be a better computer user.

0 Comments
Continue reading

Five Flagships You Have to See to Believe

Five Flagships You Have to See to Believe

Smartphones are some of the most important pieces of technology on the open market. In fact, more computing is done today with just a device that can fit in your pocket than was ever done when all there was were PCs. For this reason, people are buying smartphones that are priced much like high-end PCs. Manufacturers have responded to this demand by upgrading their devices every year.

0 Comments
Continue reading

Then and Now: Move Forward with Your IT Security Initiatives

Then and Now: Move Forward with Your IT Security Initiatives

Mobile devices are great tools that allow for enhanced mobility and convenience, but this increased accessibility is also a major detriment in terms of data security. Mobile devices are notorious for being considerable security threats to businesses that utilize them. Therefore, businesses that use mobile devices on a regular basis should absolutely be aware of how they can influence security policies.

0 Comments
Continue reading

Help Your Business By Getting Microsoft Office Certified

Help Your Business By Getting Microsoft Office Certified

Certifications are extremely helpful on both a personal and professional level, and it can make all the difference in securing customers or clients. Your staff can become Microsoft Office Specialists on Microsoft Office 2016, and in doing so, will improve their own value and self-worth in the process.

0 Comments
Continue reading

The Unofficial Guide to Comprehensive Google Account Security

The Unofficial Guide to Comprehensive Google Account Security

There is no denying that a Google account is a very valuable thing to have today, and if valuable doesn’t seem like the right word to use, let’s say practical. Business and casual users alike use the wide variety of services for many purposes - but are they doing so safely?

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Network Security Cybersecurity Productivity User Tips Malware Tech Term Managed IT Services Microsoft Communications Backup Smartphones Passwords Communication Hackers Efficiency Hardware Internet Email Small Business Business Management Google Software Android Browser Outsourced IT Hosted Solutions Business Ransomware Data Backup Data Recovery Mobile Device VoIP Wi-Fi Network Data Holiday Windows 10 Cloud Computing Alert Microsoft Office Applications Innovation Collaboration Save Money Social Media IT Support Internet of Things Smartphone IT Services Computer Employer-Employee Relationship Apps Bandwidth Business Intelligence Router Managed IT Services Users Password Miscellaneous Saving Money Twitter Wireless Access Control Mobile Devices Workplace Tips Word Data Management Blockchain Automation Phishing Analytics VoIP Virtualization Marketing Gadgets Patch Management Settings Business Continuity Vulnerability Data Breach Networking Information Excel Government Office BDR Cost Management BYOD IT Support Virtual Assistant Remote Monitoring Company Culture Compliance Politics How To Law Enforcement Productivity Computers WiFi Cybercrime Wireless Charging Data Protection Scam Physical Security Managed IT Service Windows Artificial Intelligence Gmail Website Office 365 Remote Monitoring and Management Battery Facebook Cortana Dark Web Retail Medical IT App Spam Chrome Hacking Mobile Device Management Tip of the week Remote Computing Workers Mobility Tech Terms Connectivity VPN Virus Paperless Office Managed Service Copy Apple Work/Life Balance Data loss Unified Communications Telecommuting Authorization Spyware Phone System Managed IT Training Network Attached Storage Streaming Media Multi-Factor Security Conferencing Education Smart Technology Storage Operating System News Botnet Eliminating Downtime Tech Support Paper Email Management Sales Office Tips Automobile Technology Tips Hybrid Cloud Licensing Online Shopping Database Paste iPhone Plug-In Safety Staff RAM Millennials SaaS HP Telephone System Cables Security Cameras Server Management Downloads Content Filtering Error WannaCry Environment Staffing Hard Drives Wireless Internet Ink Tablet Backup and Disaster Recovery Travel Document Management Tactics Proactive IT Websites Microsoft Teams Troubleshooting Gadget Server Voice over Internet Protocol Wearables Trends Information Technology Touchscreen Big Data HIPAA e-waste Help Desk IT budget PowerPoint Knowledge Google Maps Reporting SSD Live Streaming Digital Internet Explorer Telephone Systems File Sharing Managing Stress Files Telephony Printer Server Update Remote Support Shortcut Healthcare Machine Learning A.I. User Tip Entertainment Biometrics Microsoft Office 365 Upgrade Hard Drive disposal Recovery Certification IT Management Sports Google Drive Comparison Disaster Recovery Inventory WhatsApp Outlook Edge Threat Remote Control User Security Maintenance Spotify Analysis Dongle G Suite Voice over IP Cleaning Printers Hosted Solution CrashOverride Amazon Data Security Telecommute Movies Access Authentication Processors Value Hiring/Firing Specifications GDPR Lead Generation Mobile Security Profitability Two-factor Authentication Laptop Printing Spam Blocking Business Technology Antivirus Bring Your Own Device eCommerce Net Neutrality Lithium-ion battery Personal Information Fun Freedom of Information Augmented Reality Wireless Technology 5G Gaming Console Quick Tips IBM Scalability Encryption Hacker Yahoo The Internet of Things Budget Synergy Regulation Video Games Worker Competition IaaS Search Customer Relationship Management Credit Cards Vendor Management IP Address Television Autocorrect Emoji Customer Service Printer Avoiding Downtime HaaS Scheduling Mobile Office Dark Data Unified Threat Management Samsung Domains Managed Service Provider Current Events Instagram Leadership DDoS Windows 10 Money Public Speaking Employer Employee Relationship Presentation Emergency Computer Care

Newsletter Sign Up