Connecticut Office CALL US AT (203)-295-5050 | New York Office (646)-693-1950
Home - Featured Articles

Article Archive

3 Ways to Protect Your Data While Traveling

By: Rich Tehrani    2/24/2017

Spring is around the corner, and that means you're probably busy making travel plans for conferences, vacations, college visits for your kids and more…

Read More

Cybersecurity Requirements for Financial Services Companies (FFIEC): What You Need to Know

By: Rich Tehrani    2/23/2017

New York State's new Cybersecurity Requirements for Financial Services Companies take effect on March 1, 2017 and the requirements are not for the fai…

Read More

5 Areas Where WiFi is Vulnerable

By: Rich Tehrani    2/23/2017

One of the easiest way to break into a company is certainly WiFi. My good friend George Ou broke the news of TJ Maxx being hacked due to unsecured WiF…

Read More

73% Are Worried about Cybercrime or a Victim

By: Rich Tehrani    2/23/2017

LinuxInsider ran a survery on its site which shows how concerned people are about the threat of cyberscurity. A full 73% are worried or have been hit …

Read More

5 Habits That Could Cause a Data Breach at Your Company

By: Justin Verrastro    2/22/2017

These days, it can seem like a constant battle trying to keep the "bad guys" out of your network. From malicious insiders to anonymous third party hac…

Read More

10 Reasons Your Company Will Get Hit with a Cyberattack

By: Larry Szebeni    2/17/2017

Back when the Internet was still in its infancy and there was less malware in circulation, we all approached cybersecurity in a much different way. Fo…

Read More

Cybersecurity Lapse Costs Yahoo $250 Million!

By: Rich Tehrani    2/16/2017

We often discuss here the extremely high costs of cybersecurity breaches - we broke the news of ransomware being a billion dollar industry and we expe…

Read More

Why You Shouldn't Pay a Ransomware Ransom

By: Rich Tehrani    2/15/2017

Awhile back, we explained that paying a ransom after getting infected with ransomware like Cryptolocker or something similar is a bad idea because you…

Read More

Microsoft's Digital Geneva Convention Idea Shows How Vulnerable We Are

By: Rich Tehrani    2/14/2017

Microsoft recently penned a piece about the need for a Digital Geneva Convention which eliminates targeting of tech companies, assists the private sec…

Read More

5 Ways to Fight Back Against Cybercrime

By: Rich Tehrani    2/13/2017

It's time to face the facts: We are at war against cybercrime. And this war is not going to end any time soon. The enemy we are fighting is a mas…

Read More

Mozilla Claims Half of the Internet is Now Encrypted

By: Justin Verrastro    2/6/2017

It's not easy to find a positive cybersecurity statistic these days. As we pointed out last week, for instance, one third of small businesses still ha…

Read More

Six Chilling Cybersecurity Stats You Need to Know

By: Larry Szebeni    2/1/2017

February has officially arrived, and here in New England that means plummeting temperatures and messy commutes. As cold as the weather is right now, t…

Read More

How Many Unsecured Phones Are Being Used In Your Company?

By: Larry Szebeni    1/30/2017

Last week, a report broke that President Trump is still using a personal Android phone to post on Twitter. According to the New York Times, Trump is n…

Read More

Top Things To Know About Cybersecurity This Week

By: Rich Tehrani    1/23/2017

With so much happening in cybersecurity right now, keeping up with the news can be a bit overwhelming. To make things easier, here's a look at wha…

Read More

Is Your Business Its Own Worst Cyberenemy?

By: Larry Szebeni    1/17/2017

To say your IT environment is complex would be a massive understatement. You have a large team of onsite and distributed employees using a variety of …

Read More

Don't Get Hooked! Phishing Is Still a Huge Problem

By: Rich Tehrani    1/13/2017

Chances are likely that if you're reading this blog, you're already at your wit's end about cybersecurity and are looking for help from a managed serv…

Read More

Critical Security Flaw Discovered at Box.com

By: Justin Verrastro    1/10/2017

Using the cloud for file sharing and collaboration seems like a no-brainer. Cloud storage services are extremely cost-effective (and in some cases fre…

Read More

Think Before You Submit A Ransomware Payment

By: Larry Szebeni    1/9/2017

Recently we asked a customer what he would do if he opened his computer and found it was infected with ransomware, a type of malware that will encrypt…

Read More

Be On Full Alert For Intellectual Property Theft

By: Rich Tehrani    1/5/2017

You and your team members couldn't be more confident about the year ahead. Yesterday morning, you had a closed-door meeting to discuss your grand stra…

Read More
VIEW ALL ARTICLES
Apex Technology Services
Choose from comprehensive, affordable solutions for IT consulting, network services and computer help desk support in Fairfield county including Norwalk, Darien, Stamford, Greenwich, Ridgefield and Bridgeport. Also Westchester county including Rye, New Rochelle, White Plains, Yonkers and New York including Manhattan and the five boroughs.
IT SERVICES

IT SERVICES

Apex Technology Services is a cutting edge MSP offering quality IT support to financial, medical, legal, Fortune 500 and government agencies while adhering to the highest of quality...

LEARN MORE
CYBERSECURITY Services

CYBERSECURITY

Apex Technology Services has the cybersecurity expertise to help your business in a world filled with attackers looking to shut down your business hold it ransom or steal your valuable...

LEARN MORE
CLOUD SERVICES

CLOUD SERVICES

Apex Technology Services delivers a combination of traditional IT functions such as infrastructure as a service (IaaS), applications, software, security, monitoring, storage...

LEARN MORE

Ranked Top 10 Network security Solution Provider

One Stop Shop For All Your Technology Needs


Contact us Now!