A Seattle company was recently broken into and a stash of old laptops was stolen. Just a typical everyday crime by typical everyday thieves. These laptops weren’t even being used by anyone in the company. The crime turned out to be anything but ordinary when those same thieves (cyber‐criminals) used data from the laptops to […]
5 Steps To Protect Your Business From Cyber Crime
Category: Blog
Watch Raj on WPIX 11!
China Hacked the US Dept Of Defense Thieves Steal from Cars wirelessly NSA/PRISM data leak
Are You Gettng “Scroogled” By Google?
If you use Google for search, Gmail for e‐mail or an Android phone as your smart phone then, according to Microsoft, you’re gettng “scroogled” daily! What exactly does that mean? Well, according to www.scroogled.com, it means that Google systematically uses your private information that it collects online through your search, your emails, your Android app […]
If I Were Buying What You Are Selling, Would I Buy It From You?
Rosser Reeves coined the phrase “unique selling point” back in the 1940s when researching why some advertising campaigns worked better than others. Since then it has been used by various marketers and has morphed into “unique selling proposition,” which is now more commonly used. Ogilvy said you need a “big idea.” Trout says you need […]
The BIGGEST, MOST EXPENSIVE mistakes
How To Avoid The Top 4 Budget Busting, Stress-Inducing Mistakes When Moving Your Office Moving is always a pain in the rump, but it doesn’t have to be a horrific, expensive experience. The number one lament from someone who’s experienced a “bad” move is, “I didn’t know I needed to…” followed closely by “I completely […]
Meet Our Client Of The Month!
Every month, I choose one very special “Client of the Month” as my way of acknowledging clients and thanking those who support me and my business with referrals and repeat business. Meet Tom, Chris, Michael Gallin and Mark Varian ‐ family members and 4th generation owners of John Gallin & Son. For over 125 years, […]
BYOD or COPE? Do You Allow Employees To Use Their Own Devices For Work?
The evolution of personal mobile devices and the rise of how necessary they are to business success these days are forcing many small business owners to make a choice. BYOD or COPE? Or “Bring Your Own Device” vs. “Corporate Owned, Personally Enabled”. The Typical Solution ‐ BYOD. According to the CDW 2012 Small Business Mobility […]
Security Alert: Hackers and Cyber Criminals Are Concentrating Their Attacks On Small Business
At a recent Security Summit experts re-emphasized: hackers and cyber criminals are now turning their efforts to small “mom and pop” businesses instead of large enterprise corporations. Why? Because small business networks offer a much easier “lock” to pick, unlike large enterprises who invest far more man power and money into high security for their […]
Services We Offer
OUR GOAL: Make all your computer problems go away without the cost of a full-time I.T. staff General Network Repair & Troubleshooting Network Design & Implementation Disaster Recovery Virus Protection & Removal Network Security Exchange Server Management Oracle Database Server Management Wired & Wireless networking CRM and Database solutions Cyber Forensics and Expert Witness Testimony […]
Interview with Raj Goel
Interview with Raj Goel Raj Goel, CISSP, is an IT and information security expert with over 20 years of experience developing security solutions for the banking, financial services, health care, and pharmaceutical industries. He is a well-known authority on regulations and compliance issues. Raj has presented at information security conferences across the USA and Canada. […]