631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Suffolk Computer Consultants, Inc. has been serving the Speonk area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IBM Concludes Data Breaches Aren’t Getting Any Cheaper

IBM Concludes Data Breaches Aren’t Getting Any Cheaper

Working in conjunction with the Ponemon Institute, IBM Security completed a report tracking trends in 2018’s data breaches. As you might imagine, much of the data contained in this report could be seen as troubling to a business.

0 Comments
Continue reading

You Have to Think Before You Click

You Have to Think Before You Click

Phishing attacks are more commonplace than you might think. Whether it’s scamming someone into sending payments to fund who knows what or simply spreading malware or viruses, these phishing attacks are a part of doing business; therefore, it’s important that you take measures to avoid some of the most clever tricks in the book. Let’s examine some of them.

0 Comments
Continue reading

You Need More than a Firewall to Secure Your Business

You Need More than a Firewall to Secure Your Business

Whether or not you’re familiar with computers, there are a few terms that are thrown around commonly enough that chances are good that you know them. One such term is “firewall.” Unfortunately, there are often misconceptions as to what these terms refer to or what they do. Firewalls are a prime example, as many believe that a firewall is the only security they need.

0 Comments
Continue reading

A Dive Into the US/Huawei Issues

A Dive Into the US/Huawei Issues

Huawei has found itself in an... interesting spot lately. Despite being the top telecom supplier in the world and second in phone manufacturing, many countries have banned the use of the Chinese company’s networking equipment. This is primarily due to the close ties Huawei has with China’s government, and the potential spying Huawei could do.

0 Comments
Continue reading

Do Your Employees Have Any of These Six Hackable Habits?

Do Your Employees Have Any of These Six Hackable Habits?

Habits are hard to break - but there are some habits that simply have to be broken if your business is going to be secure. Many of these habits may have been developed by your employees, which means that it is important that you recognize them.

0 Comments
Continue reading

A Guide to Help You Understand All the Digital Threats You Face

A Guide to Help You Understand All the Digital Threats You Face

Malware is a commonality in today’s computing environment, though businesses do everything in their power to avoid encountering it. Some people have difficulty identifying threats, which makes for a dangerous situation whenever they actually have to handle them. We’ve put together a malware guide that will help your employees identify the most common types of threats out there, as well as how to respond to them.

0 Comments
Continue reading

This Florida City Will Pay 65 Bitcoins to Get Files Back

This Florida City Will Pay 65 Bitcoins to Get Files Back

Florida’s Atlantic coast is a destination for millions of visitors each year. One visitor is costing a coastal city a pretty penny. Riviera Beach, a small city just north of West Palm Beach, has been hit with a major ransomware attack. Today, we’ll tell you how it came to be that the small beach city would make dubious history by paying what is the largest ransomware payout in the short history of these attacks.

0 Comments
Continue reading

End of Life for SQL Server 2008 and 2008 R2 Coming Soon

End of Life for SQL Server 2008 and 2008 R2 Coming Soon

When was the last time you thought seriously about upgrading your business’s technology solutions--particularly its software? We know that administering patches and updates can be challenging for some businesses to maintain, but with the right support, it’s more manageable and certainly more secure. Unfortunately, after a certain period of time passes, Microsoft stops supporting certain outdated solutions, rendering them dangerous and obsolete.

0 Comments
Continue reading

Make Sure You Are Using Supported Software

Make Sure You Are Using Supported Software

Any organization that is running unpatched versions of older Windows operating systems is playing with fire… period. Therefore, it’s your prerogative to make sure you’re adequately protecting your business’ data, and one of the most important ways you can do this is by ensuring your infrastructure is properly maintained.

0 Comments
Continue reading

Hack Enabled by NSA-Developed Tool

Hack Enabled by NSA-Developed Tool

Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.

0 Comments
Continue reading

Ransomware Can Just Be Devastating

Ransomware Can Just Be Devastating

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 2013, over 170 government systems at the county, city, or state levels have been attacked.

0 Comments
Continue reading

Sick of Spam Calls? VoIP is Partly to Blame

Sick of Spam Calls? VoIP is Partly to Blame

If you have access to a phone, chances are you’ve received a spammy robocall. In fact, you’ve probably received a bunch… but why? And how are these robocalls able to hide behind what looks to be a local number? Unfortunately, it’s because the scammers behind these robocalls are using a helpful business tool… Voice-over-Internet-Protocol telephony, also known as VoIP.

0 Comments
Continue reading

Mobile Malware is on the Rise

Mobile Malware is on the Rise

When considering cybersecurity, it can be easy to overlook the computers that so many of us typically carry with us every day: our smartphones. However, as attacks to mobile devices have risen considerably in the recent past, it is important to recognize the severity of these attacks, as well as how to avoid them.

0 Comments
Continue reading

Understanding the Dangers of a Man-in-the-Middle Attack

Understanding the Dangers of a Man-in-the-Middle Attack

Have you ever played the telephone game? One person in a group whispers a phrase to another, who then passes it to another, and the fun is had when the group shares what they heard and how the message was garbled along the way. In many ways, this activity is similar to a Man-in-the-Middle (MitM) attack - although the attack is a lot less fun than the game.

0 Comments
Continue reading

Is Your Business Leaking Data?

Is Your Business Leaking Data?

Take a moment and consider the data that you have collected during your business’ operations. How valuable is it to you? What would it mean if it were to leak out of your business’ control?

0 Comments
Continue reading

When Is a Phone Not a Phone? When It’s a Security Key

When Is a Phone Not a Phone? When It’s a Security Key

I’d be willing to bet that your phone is within reach at the moment, assuming you aren’t actively using it to read this blog right now. The tendency that people have to always have their phones on them has contributed to these devices becoming more deeply integrated into work processes - including security, via two-factor authentication. For this week’s tip, we’ll discuss how you can leverage an Android device as an added security measure.

0 Comments
Continue reading

Microsoft Updates Windows 10’s Security

Microsoft Updates Windows 10’s Security

When Microsoft came out with their new operating system, Windows 10, they had something that other OSs weren't able to match, integrated new security software that was going to keep users safe as new threats are presented each day with an aim at corrupting computing systems and stealing critical personal information. Today, we take a take a new look at the Windows 10 security features and how to get the most out of the new OS.

0 Comments
Continue reading

Google Location Services and How They Apply to the Average User

Google Location Services and How They Apply to the Average User

In the dog days of summer, the news media started running a story about how Google’s location tracking services continue to track people even after they order their mobile device’s OS to quit it. A researcher from Princeton proved these claims by traveling through New York and into New Jersey after turning location services off on for hi Android smartphones, only to be tracked through all the Interstate travel. We’ll take an in-depth look at why Google seemingly knows exactly where you are if you want them to or not.

0 Comments
Continue reading

How to Go About Detecting Cryptomining

How to Go About Detecting Cryptomining

One of the most dangerous and upcoming threats out there is cryptojacking. This process involves a malicious entity installing cryptomining malware on a user’s device without their knowledge or consent, allowing for a steady, reliable stream of income. What are the details behind cryptomining, and how can you keep your devices from becoming complicit in the schemes of hackers? Let’s find out.

0 Comments
Continue reading

Is Your Business a Target for Internet-Based Threats?

Is Your Business a Target for Internet-Based Threats?

It feels like only yesterday when the only action you needed to take to protect a computer was to install antivirus software. Back in the year 2000, there were around 50,000 known computer viruses. Today, that number is over 185 million unique malicious threats.

0 Comments
Continue reading