News

New York and New Jersey Data Regulation

If your company does any business in New York or New Jersey, it can be difficult to know what laws pertain to your business. We’ve outline the two main laws that you need to concern yourself with: The NYS Information Security Breach and Notification Act, and the New Jersey Identity Theft Prevention Act. New York […]

Explore
Security Alert: Lack of Trust Comes with a High Price Tag for U.S. Businesses

A new study finds that “Almost half (44%) of US consumers have suffered the negative consequences of a security breach or hack…”. The research done by PCI Pal implies that consumers do factor their data safety when it comes to their shopping habits. “While security breaches are not new, US consumers’ attitudes towards them seem to […]

Explore
Preparing for an IT Disaster

IT disasters are devastating to the infrastructure of any business. In 2018, threats to your IT infrastructure are growing no matter what sector your business operates in. If disaster strikes, will you be prepared? What does an IT disaster look like? IT disasters are classified as either natural or man-made. Natural disasters are floods, tornadoes, […]

Explore
Building an Incident Response Program

In part one of our series, our overview of Building an incident response plan, we discussed what regulations organizations will need to meet in order to address incident/breach response protocols laid out in the EU’s General Data Protection Regulation (GDPR). This week, we’ll talk to you about steps to take to actually create your company’s […]

Explore
NetConnect / VISN-IT Featured in StorageCraft Press Release

New StorageCraft Partner Success Program Boosts Profit Paths Across All Channel Partner Business Models DRAPER, Utah, Sept. 27, 2018 /PRNewswire/ — StorageCraft®, whose mission is to protect all data and ensure its constant availability, today announced the launch of the StorageCraft Global Partner Success Program. The program has been completely refreshed to make it easy and highly profitable […]

Explore
Small Business Cyber Security Concerns

The truth is that Small Businesses have a lot to fear when it comes to Cyber Security. Any disruption that causes downtime or loss of data can absolutely turn your business upside-down. We’ve highlighted the biggest cyber security concerns that Small Businesses should have. Hopefully your business does not have these vulnerabilities, but if you […]

Explore
Email Compromise – How Does it Work?

Email compromises are becoming more and more dangerous every year, and it’s important to know how they work. Email Compromises involve the hacking of a company or personal email address with the intent to impersonate an individual or company. A hacker impersonating a trusted source could steal financial information, sensitive customer data, or trade secrets. […]

Explore
Cloud Computing
Cloud Computing Pros and Cons

What is the cloud?  Cloud Computing is “the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.” If you are a small to mid-sized business, Cloud Computing can significantly help your business grow at an affordable rate. A […]

Explore
Phishing Threats

Phishing threats are getting more and more sophisticated as cyber security measures become smarter. The main reason why phishing must be handled differently than other threats is because it usually tricks your users into clicking on something they shouldn’t and then giving important information to an impostor.There are a number of different ways Phishing can […]

Explore
The Dark Web and You

Why Should I Care About the Dark Web? Chances are that somewhere out on the Dark Web lies passwords, email address, and other compromising information that relates to your company. From clicking on a scam email to a data breach from a supplier, it’s quite easy for your information to be stolen. So why should […]

Explore
The New Extortion Scam you’ll want to look out for!

Email Threats constantly evolve and try to find new ways to steal your money or steal your information. A large part of Cyber Security is understanding these threats and knowing what to do when you receive an email that definitely seems suspicious. Below we have the newest scam running that claims someone has a video […]

Explore
Two Factor Authentication – Do I Really Need It?

Two Factor Authentication procedures or Multi Factor Authentication procedures are a part of many interactions in our daily life. Most credit and debit cards now have an embedded chip, and showing ID or entering a PIN number are steps in authenticating who you really are. When it comes to online security and hackers, authentication can […]

Explore
The True Cost of a Data Breach

One of the biggest headaches your company can endure is a data breach. Whether its caused by employee error or targeted cyber attacks, the long term costs a data breach has on your organization  can be staggering. Here’s a quick analysis of the true cost of a data breach, powered by IBM’s 2018 Global Cost […]

Explore
Employees and Your Data, Are You at Risk
Employees and Data – Are You At Risk?

One of the main sources of data vulnerability is employees. When owners and executives think of data breaches, however, one of the last places they would expect would be their trusted workers. Whether its a terminated employee or a trusted manager, the vulnerabilities still exist. Here are a few different aspects of data vulnerability when […]

Explore
California Consumer Privacy Act and the risk to Small Business

Late last week, California passed the California Consumer Privacy Act of 2018. Effective as of January 1st, 2020, the bill is a big step up in consumer privacy. Small Businesses, however, may be affected if they meet any of the three thresholds: Has annual gross revenues in excess of twenty-five million dollars ($25,000,000) Alone or […]

Explore
Data Regulation and the Future

Every day more and more data breaches are occurring. Virtually every consumer in the United States already has had their information leaked to the dark web in one way or an other. As Europe enacts its GDPR (General Data Protection Regulation), this type of regulation could easily come to the United States within the next […]

Explore
Best Practices for Online Safety

Online safety is something everyone should care about. All of your sensitive information such as financial data, identity data, and viewing data are all over every device that you use. Being a victim of a data thief is unfortunately no longer paranoia, as most users in the US have had their information stolen via the […]

Explore
Top 5 Types of E-Mail Scams

Email Scams can cause chaos in your business environment. See what to look out for with this quick read!

Explore
Ransomware – What You Need to Know

Ransomware attacks have the power to ruin any size business. Protect yourself with a quick read!

Explore
Biggest Data Breaches of All Time

While you may see large data breaches in the news from time to time, you may not realize the sheer amount of information that has been compromised over the years. Most of these are infamous and well known, but if you are just realizing you have an account with one of these companies, it may not […]

Explore
Top Cyber Security Safety Tips from the Experts

Cyber Security is crucial for any business. Hackers, viruses, and other dangerous applications are always active threats to your company’s sensitive information and productivity...

Explore
CometML wants to do for machine learning what GitHub did for code

Comet.ml allows data scientists and developers to easily monitor, compare and optimize their machine learning models. The New York-based company is launching its product today, after completing the TechStars-powered Amazon Alexa Accelerator program and raising a $2.3 million seed round led by Trilogy Equity partners, together with Two Sigma Ventures, Founders Co-Op, Fathom Capital, TechStars Ventures […]

Explore
Study finds renters value smart home tech above traditional amenities

Never mind your pools, your hot tubs, the exercise room or a barbecue grill. A new study out by property management company Entrata shows the vast majority of the country’s estimated 40 million plus renters value new and evolving smart home amenities over traditional benefits offered to apartment dwellers. The company surveyed more than 1,000 […]

Explore
Teachers weigh in on Apple’s push for more iPads in school

This week, Apple held its education event to introduce a new iPad with stylus support aimed at teachers and students, hoping to take on the popularity of Chromebooks in classrooms over the past few years. As of 2017, Apple is third behind Google and Microsoft in terms of laptops, tablets, and other mobile devices shipped […]

Explore
Microsoft’s Windows 7 Meltdown update granted access to all data in memory

Security researcher Ulf Frisk reports that patches to address the Meltdown processor flaw on Windows 7 (64-bit) and Windows Server 2008 R2 machines created a far greater vulnerability. He claims the new flaw allows any process to read everything stored in memory “at gigabytes per second.” It also allows processes to write to arbitrary memory without “fancy […]

Explore
Cisco commits $50 million to end homelessness in Silicon Valley

Homelessness in Santa Clara County has gotten worse, with the overall homeless population increasing 13 percent to 7,394 in 2017 over the course of two years. That puts Santa Clara’s homelessness crisis in the same ballpark as San Francisco’s, which has a homeless population of 7,499, according to a 2017 homeless census and survey. Santa […]

Explore
Atari shows its non-functional ‘VCS’ console prototype at GDC 2018

Last June, venerated gaming company Atari announced that it was making a comeback. Specifically, that it would be jumping back into the console market with a retro-style entertainment system it dubbed at the time, the Ataribox. Eleven months later, we can finally see the results of the company’s IndieGoGo crowdfunding campaign: say hello to the […]

Explore
New V8 power and smart tech are helping the CT6 make Cadillac great again

 Cadillac’s first-ever twin-turbocharged V8 engine will make its debut under the hood of the CT6 V-Sport, a new addition to the brand’s lineup for the 2019 model year. We’ll see the V-Sport for the first time next week at the New York Auto Show. In the meantime, let’s peel back the shapely sheet metal and […]

Explore
IBM working on ‘world’s smallest computer’ to attach to just about everything

IBM is hard at work on the problem of ubiquitous computing, and its approach, understandably enough, is to make a computer small enough that you might mistake it for a grain of sand. Eventually these omnipresent tiny computers could help authenticate products, track medications and more. Look closely at the image above and you’ll see […]

Explore
Preparing for an IT Disaster

IT disasters are devastating to the infrastructure of any business. In 2018, threats to your IT infrastructure are growing no matter what sector your business operates in. If disaster strikes, will you be prepared? What does an IT disaster look like? IT disasters are classified as either natural or man-made. Natural disasters are floods, tornadoes, […]

Explore
FAQ This! What Is Blockchain?

With every tech event I cover, there seems to be a central emerging trend that people just can’t stop talking about. Something like 5G. Or AI. Or VR. Or blockchain. If you’ve come across talks and headlines on blockchain lately but just can’t seem to wrap your mind around it — you’re not alone. According […]

Explore
Apple confirms investigation of creepy Chinese iCloud incident

Apple’s recent handover of China’s iCloud accounts to a government-run company seemed to have gone smoothly, but a deeply unsettling report related to the transition has gripped Chinese media, leading Apple to announce an investigation. According to sister publications The Paper and Sixth Tone, an Apple customer identified as “Qin” attempted to close his iCloud account ahead […]

Explore
New Patent Hints That Apple Could Get Rid of Physical Keyboards Entirely

This is rudimentary drawing of what Apple’s dual-screen device might look like. If you’re a holdout who refuses to upgrade to a post-2015 MacBook because of Apple’s revamped keyboard and its shallow butterfly switches, it seems like your prospects for a better experience in the future just got a little bleaker. A patent filing recently […]

Explore
The world’s largest DDoS attack took GitHub offline for less than ten minutes

In a growing sign of the increased sophistication of both cyber attacks and defenses, GitHub has revealed that it weathered the largest-known DDoS attack in history this week. DDoS — or distributed denial of service in full — is a cyber attack that aims to bring websites and web-based services down by bombarding them with so […]

Explore
Financial Cyberthreats in 2017

In 2017, we saw a number of changes to the world of financial threats and new actors emerging. As we have previously noted, fraud attacks in financial services have become increasingly account-centric. User data is a key enabler for large-scale fraud attacks, and frequent data breaches – among other successful attack types – have provided […]

Explore
Credit Cards With Chips Are Reducing In-Store Fraud—But Online Breaches Are Picking Up the Slack

Chip-based credit card readers, first introduced around 2011, have led to a 70 percent drop in counterfeit fraud in the United States, according to Visa. Visa says more 481 million chip cards are now in circulation, representing roughly 67 percent of all Visa debit and credit cards. The company also says that nearly two-thirds of […]

Explore
1Password will alert you if your password has been leaked

1Password, the password managing app, has introduced a new proof-of-concept feature that alerts you when you use a compromised password. The feature integrates a new service that was released earlier this week by web security expert Troy Hunt called Pwned Passwords, which lets users check to see if a password they’re using has already been […]

Explore
Early 5G phones will make LTE voice calls, add VR and spherical calls later

As the first 5G phones are less than a year away, a new report from FierceWireless explores how 5G networks and devices will handle — and evolve — traditional voice calls. In short, U.S. carriers expect to continue using 4G Voice over LTE (VoLTE) for the near future, but exciting new 5G voice services are […]

Explore
Intel ships (hopefully stable) microcode for Skylake, Kaby Lake, Coffee Lake

Intel reports that it has developed a stable microcode update to address the Spectre flaw for its Skylake, Kaby Lake, and Coffee Lake processors in all their various variants. The microcode updates help address Spectre variant 2 attacks. Spectre variant 2 attacks work by persuading a processor’s branch predictor to make a specific bad prediction […]

Explore
Crypto-mining malware nets hacker group $3.4 million worth of Monero coins

Israeli security firm Check Point uncovered a large-scale cryptocurrency mining operation which installed malware on servers running Jenkins, an automation software designed for web development. The mining operation has, to date, mined around $3.4 million worth of Monero using malware installed on internet-connected Jenkins servers. Unlike other illicit cryptocurrency mining operations, this one targeted servers […]

Explore
IRS Scam Leverages Hacked Tax Preparers, Client Bank Accounts

Identity thieves who specialize in tax refund fraud have been busy of late hacking online accounts at multiple tax preparation firms, using them to file phony refund requests. Once the Internal Revenue Service processes the return and deposits money into bank accounts of the hacked firms’ clients, the crooks contact those clients posing as a […]

Explore
A phishing attack scored credentials for more than 50,000 Snapchat users

In late July, Snap’s director of engineering emailed the company’s team in response to an unfolding privacy threat. A government official from Dorset in the United Kingdom had provided Snap with information about a recent attack on the company’s users: a publicly available list, embedded in a phishing website named klkviral.org, that listed 55,851 Snapchat […]

Explore
Spam and phishing in 2017

Figures of the year The share of spam in mail traffic came to 56.63%, down 1.68% against 2016. The biggest source of spam remains the US (13.21%). 40% of spam emails were less than 2 KB in size. The most common malware family found in mail traffic was Trojan-Downloader.JS.Sload The Anti-Phishing system was triggered 246,231,645 […]

Explore
February Patch Tuesday Is a Bouquet of Fixes for Privilege Escalation Vulnerabilities

Microsoft’s Patch Tuesday for February has a bevy of fixes addressing 50 security issues in Windows, Office (including Office Services and Web Apps), SharePoint, Internet Explorer, Edge, and ChakraCore JavaScript engine, as well as additional patches for the notorious Meltdown and Spectre vulnerabilities. Of these, 14 were rated critical. Eight of these security flaws were […]

Explore
Kotlin-based malicious apps penetrate Google market

An open-source programming language, Kotlin is a fully-supported official programming language for Android. Google boasts that Kotlin contains safety features in order to make apps “healthy by default.” Many apps are already built with Kotlin, from the hottest startups to Fortune 500 companies. (Twitter, Uber, Pinterest) Concise while being expressive, Kotlin reduces the amount of boilerplate […]

Explore
Domain Theft Strands Thousands of Web Sites

Newtek Business Services Corp., a Web services conglomerate that operates more than 100,000 business Web sites and some 40,000 managed technology accounts, had several of its core domain names stolen over the weekend. The theft shut off email and stranded Web sites for many of Newtek’s customers. An email blast Newtek sent to customers late […]

Explore
Defend Your Business – Don’t Get the Ransom Letter

  Ransomware is a serious threat to small businesses, taking information, devices, and networks hostage. It is the most common form of malware and falls into two categories of malicious programs: encryptors and lockers. Encryption ransomware programs convert your files into a cypher or code, preventing you from accessing them. The hacker demands payment to […]

Explore
ReelPhish: A Real-Time Two-Factor Phishing Tool

Social Engineering and Two-Factor Authentication Social engineering campaigns are a constant threat to businesses because they target the weakest chain in security: people. A typical attack would capture a victim’s username and password and store it for an attacker to reuse later. Two-Factor Authentication (2FA) or Multi-Factor Authentication (MFA) is commonly seen as a solution […]

Explore
BSides NYC, a volunteer organized event put on by and for the community

Another edition of BSides NYC has passed, and as first time attendee and presenter, I was genuinely impressed with the impeccable organization, the content shared, and the interesting conversations that took place among enthusiasts and professionals from all over the world. I’ve been a long time follower and supporter of BSides events in Latin America, […]

Explore
HP aims to impress VR developers with its new Z4 workstation options

HP might not be the first name you think of when you hear about virtual reality, but it’s looking to change that with the new configurations it has added to its long-standing Z4 desktop workstation. Trying to wrangle in the professional virtual reality creators, such as game developers and simulation artists, this HP Z4 refresh […]

Explore
Attackers Exploiting Unpatched Flaw in Flash

Adobe warned on Thursday that attackers are exploiting a previously unknown security hole in its Flash Player software to break into Microsoft Windows computers. Adobe said it plans to issue a fix for the flaw in the next few days, but now might be a good time to check your exposure to this still-ubiquitous program […]

Explore
First ‘Jackpotting’ Attacks Hit U.S. ATMs

ATM “jackpotting” — a sophisticated crime in which thieves install malicious software and/or hardware at ATMs that forces the machines to spit out huge volumes of cash on demand — has long been a threat for banks in Europe and Asia, yet these attacks somehow have eluded U.S. ATM operators. But all that changed this […]

Explore
As an Engineer, is it time to change my IT Firm?

Nobody wants to go through the process of finding a new IT firm all over again. With all of the responsibilities that an engineering firm faces daily, many firms ignore one of the biggest aspects of their company. While CAD software may be getting more user friendly, the processing power for these programs and large […]

Explore
As an Architect, is it time to change my IT Firm?

Nobody wants to go through the process of finding a new IT firm all over again. With all of the responsibilities that an architectural firm faces daily, many firms ignore one of the biggest aspects of their company. While CAD software may be getting more user friendly, the processing power for these programs and large […]

Explore
As a Building Consultant, is it time to change my IT Firm?

Nobody wants to go through the process of finding a new IT firm all over again. With all of the responsibilities that a consulting firm faces daily, many firms ignore one of the biggest aspects of their company. While CAD software may be getting more user friendly, the processing power for these programs and large […]

Explore
VISN IT, Provider to SMB Companies, Joins the MSPmentor 100

VISN IT, Provider to SMB Companies, Joins the MSPmentor 100 Thursday, February 21st, 2008 STATEN ISLAND, N.Y., Feb. 21 /PRNewswire/ — VISN IT, an innovative new managed services provider focused on business IT solutions for small and medium-sized businesses in the New York Tri-State area, has been named one of the MSPmentor 100. This distinctive […]

Explore