Home - Featured Articles

Article Archive

July 14 EOL Deadline Looms for Windows Server 2003

By: Nik Poljak    5/15/2015

If your network is still running on the 13-year-old Windows Server 2003 operating system (OS), here's a wake-up call: You have until July 14 to migrat…

Read More

Experiencing High Customer Bounce Rates on Your Website? Your Security Certificate Could Be to Blame

By: Larry Szebeni    5/5/2015

Imagine your customer is browsing your website on Google Chrome, and is prompted to enter personal security credentials before proceeding with his or …

Read More

Would You Negotiate For Your Business's Stolen Data?

By: Nik Poljak    4/7/2015

Your business stores a trove of sensitive-and valuable-data on its legacy servers. This data includes everything from private consumer financial recor…

Read More

State of Connecticut to Open New Data Security Department

By: Larry Szebeni    3/24/2015

The State of Connecticut is taking a major step forward in helping to reduce the growing threat of Internet crime.

Read More

SMBs See Technology as Key Business Enabler

By: Justin Verrastro    3/13/2015

In the past, only large corporations with big budgets were able to invest in cutting-edge technologies due to their exorbitant costs. However, thanks …

Read More

Three Lessons IT Personnel Can Learn from Anthem's Recent Hack

By: Larry Szebeni    2/27/2015

If you thought 2014 was as bad as it could get as far as cyberattacks are concerned, think again. Anthem Health Insurance is the latest victim of a hi…

Read More

BMW Issues Security Patch to Avoid Making Hacker Headlines

By: Nik Poljak    2/20/2015

The connected car revolution is officially upon us. Drivers can now conveniently access the Internet through their cars instead of having to scroll th…

Read More

Corrupted Email Account Leads to Major Financial Real Estate Scam in Stamford

By: Justin Verrastro    2/6/2015

Bridgeport police are currently in custody of a Tennessee man who tried to swindle a woman out of $150,000 in an online real estate scam.

Read More

Winter Storm Juno Reminds Businesses to Buckle Down on Downtime

By: Larry Szebeni    1/30/2015

This past week, New England and parts of New York were pounded by winter storm Juno. Record-breaking snowfall, high winds and coastal flooding caused …

Read More

Don't Build Your Data Center on Shaky Ground

By: Nik Poljak    1/23/2015

A string of recent mild earthquakes in Eastern Connecticut is causing business owners across the state to ask when and where future quakes can be expe…

Read More

What Stamford's Traffic Czar Has to Do With Your Computer Network

By: Larry Szebeni    1/12/2015

Chances are if you've driven extensively around Stamford or in the surrounding area, you've been stuck in some pretty awful traffic from time to time.…

Read More

Stamford Economy is Thriving, Mayor Explains

By: Justin Verrastro    1/6/2015

Recently elected Stamford Mayor David Martin had strong words about his city's economy in his first State of the City Address.

Read More

Eying Stamford's Harbor Point For Your New Office?

By: Nik Poljak    12/16/2014

Stamford's Harbor Point is quickly becoming prime real estate for businesses in the tri-state area.

Read More

2014 Was a Tough Year for Digital Security

By: Larry Szebeni    12/1/2014

The number of international businesses that are struggling with digital security is increasing, as evidenced by Kaspersky's latest IT-related risks su…

Read More

What You Need to Know About the CryptoWall 2.0 Ransomware

By: Larry Szebeni    11/18/2014

Millions of end users have recently become exposed to a dangerous new form of malware that installs itself onto computers and holds files for ransom.

Read More

How Secure Are Your Company's Passwords?

By: Justin Verrastro    11/10/2014

Are you confident in the integrity of the passwords you and your employees use to access critical data and communications on daily basis?

Read More

Why Your Business Needs to Be Afraid of Its Own 'Shadow'

By: Larry Szebeni    11/3/2014

Your business is in the process of integrating several new bleeding-edge cloud applications into its core infrastructure. These applications are strea…

Read More

So Your Network Went Down. How Long Will It Take You To Restore It?

By: Nik Poljak    10/27/2014

Your network crashed this morning, meaning you have been searching all day for the exact cause and location of the error. Unfortunately, you still can…

Read More

Avoid the Pitfalls of Virtualization with Managed IT Services

By: Justin Verrastro    10/20/2014

You are considering virtualizing your data center's servers to reduce operational expenses and cut down on floor space. But virtualization is a comple…

Read More

So, You Think Your Network Is Safe from Hackers? Think Again

By: Nik Poljak    10/14/2014

Your company has become almost completely reliant on the Web for the majority of its critical business operations. It uses the Web to process customer…

Read More

JP Morgan Cyberattack Among Largest Data Heists to Date

By: Justin Verrastro    10/6/2014

At least 76 million households and 7 million small businesses were compromised during this summer's cyber attack on JPMorgan Chase. This makes the att…

Read More

Shellshock: The Latest Digital Security Threat You Need to Know

By: Larry Szebeni    9/29/2014

A new digital security vulnerability has been identified which some experts feel is an even bigger threat than the recent Heartbleed bug.

Read More

Beware of Do-It-Yourself Network Stress Tests

By: Larry Szebeni    9/22/2014

Recently, Facebook ran an experiment to test the resiliency of its core network. The company shut down an entire data center to see whether its emerge…

Read More

Home Depot in Hot Water Following Recent Data Breach

By: Justin Verrastro    9/16/2014

Not even the Home Depot will have the necessary tools for rebuilding its brand image following a recent data breach that may have exposed information …

Read More

Do You Have a BYOD Policy? If Not, We Can Help

By: Nik Poljak    9/8/2014

In today's economy, businesses across all verticals are forced to figure out how to be more productive with fewer resources.

Read More

Celebrity Photo Heist Serves as a Reminder of the Importance of Digital Security

By: Larry Szebeni    9/3/2014

Over Labor Day weekend, the private accounts of a variety of celebrities-including actress Jennifer Lawrence and model Kate Upton-were infiltrated by …

Read More

Are These BYOD Issues Threatening Your Enterprise?

By: Larry Szebeni    8/26/2014

Your business lets employees access its core network using a variety of mobile devices. But are you taking appropriate security measures for this priv…

Read More

Report: 4.5 Million Records Stolen in Latest Hospital Data Breach

By: Nik Poljak    8/19/2014

As a sign of the times, not even the sick are safe from the greedy hands of hackers. Recently, it was reported that cybercriminals broke into the Comm…

Read More

Report: Managed Security Services to Boast 15.4% CAGR Between 2013 and 2019

By: Justin Verrastro    8/11/2014

Most companies aren't in the business of ensuring that fortified security mechanisms are in place in their technological infrastructures. Rather, thei…

Read More
VIEW ALL ARTICLES
Apex Technology Services
Choose from comprehensive, affordable solutions for IT consulting, network services and computer help desk support in Fairfield county including Norwalk, Darien, Stamford, Greenwich, Ridgefield and Bridgeport. Also Westchester county including Rye, New Rochelle, White Plains, Yonkers and New York including Manhattan and the five boroughs.
IT SERVICES

IT SERVICES

Apex Technology Services is a cutting edge MSP offering quality IT support to financial, medical, legal, Fortune 500 and government agencies while adhering to the highest of quality...

LEARN MORE
CYBERSECURITY Services

CYBERSECURITY

Apex Technology Services has the cybersecurity expertise to help your business in a world filled with attackers looking to shut down your business hold it ransom or steal your valuable...

LEARN MORE
CLOUD SERVICES

CLOUD SERVICES

Apex Technology Services delivers a combination of traditional IT functions such as infrastructure as a service (IaaS), applications, software, security, monitoring, storage...

LEARN MORE

Ranked Top 10 Network security Solution Provider

One Stop Shop For All Your Technology Needs


Contact us Now!