212-242-2949

Uncategorized

All the posts published

A massive security flaw in the Cloudflare client has led to what may be the biggest data breach of 2017.  Cloudflare is a web infrastructure company that provides hosting and security services for hundreds of popular websites.   A security flaw in the software known as Cloudbleed was discovered and patched last week, but because of the nature of the security breach, the repercussions could be long lasting. Cloudfare got its …

Read More →

Windows 10 was sold with the promise that it would be the final operating system that users would ever own.  As we approach the two year anniversary of its launch, Microsoft is holding fast to its promise, however, many IT departments are displeased with what this final solution means for businesses. Software as a service (SaaS) is the dream solution for IT managers, at least when it works correctly.  Software …

Read More →

Last year saw an unprecedented number of complaints from businesses that were victims of tax season phishing scams and the IRS warns that a new batch of attacks has already begun.  Targeted phishing scams campaigns (Spear Phishing), use insider information to take advantage of a business’s employees.  The latest scams uses fake emails disguised as requests from a CEO or CFO to convince a business’s payroll departments to give up …

Read More →

Online advertising is a necessary evil when it comes to funding online media, unfortunately, this practice has resulted in Malvertising; the act of embedding malware within legitimate websites.  According to research from RiskIQ, a leader in digital threat management, malvertising saw a rise of 132% in 2016 over the previous year. “Malvertising is so nefarious because it’s a direct attack on the lifeblood of the internet as we know it. …

Read More →

Microsoft isn’t subtle when it talks about the security limitations of Windows 7.  In a recent blog post, Microsoft made it clear that even with regular patches; Windows 7 is no longer a secure option for users in 2017. This warning from Microsoft comes in no small part due to the end of support deadline for the ten year old operating system. Outdated operating system retention is a major problem …

Read More →

An exploit that targets the Safari internet browser has surfaced that can overload a computer’s memory and cause a system crash.  When the exploit activates, a user’s email client will activate and attempt to open hundreds of blank emails until system resources are exhausted.  MAC OS users are advised to use caution when following links or to switch away from Safari as their default browser. The Safari browser exploit is …

Read More →

A group of Russian based hackers are stealing an estimated $3 to $5 Million dollars every day as part of the most lucrative botnet ever discovered.  The White Ops security group discovered the botnet, dubbed “Methbot,” which exploits video advertising on a massive scale. YouTube receives nearly a billion unique visits every month, so it is no wonder that it has become one of the primary advertising platforms for marketers.  …

Read More →

Yahoo is in the spotlight again, this time over the security breach of more than one billion user accounts.  Most alarming is that this breach is separate from the data theft event that was disclosed back in September, which on its own consisted of 500 million accounts.  This latest breach couldn’t come at a worse time for Yahoo, as the email giant is currently looking at buyout offers from Verizon. …

Read More →

Microsoft first announced the Windows 10 Creators Update back in October with a number of features geared towards content creators. This week, Microsoft revealed that the planned update will also include an expanded array of tools to improve the user experience of enterprise class customers.  If you’ve held out this long, the Creators Update may make spring the perfect time to upgrade to Window 10. The Windows 10 Creators Update …

Read More →

Many people turn to Apple products because of the perceived notion that they are inherently more secure than PC and Android devices; unfortunately, that is not always the case.  A recent Apple security loophole has surfaced that has put thousands of users on the receiving end of numerous spam campaigns.   Here, we will look at what is going on as well as a couple things you can do prevent the …

Read More →

A Chinese company has admitted that it intentionally planted spyware on newly manufactured android smartphones.  This malware has been used to gather personal information about users, as well as to log calls and other data.  The malware was authored by a Chinese company called Shanghai Adups Technology Company, whose software is said to run on more than 700 million devices around the world. Earlier this week, researchers at Kryptowire …

Read More →

Google is often the first line of defense for users when it comes to online protection.  For years, Google has placed warnings on websites that are known malware hosts.  Unfortunately, malware distributers have learned ways to get around the Google enforcement.  Google now hopes to crack down on repeat offenders and offer longer lasting restrictions. The Google search engine is based around the use of automated web bots.  These web …

Read More →

Wix.com is a cloud-based website provider with a simple drag-and-drop interface which has made it a popular choice for small businesses and private users.  Unfortunately, a cross-site scripting (XSS) vulnerability has been discovered in the platform that can lead to compromised admin accounts and a host of other problems. The Wix vulnerability was first discovered in October by Matt Austin, a senior researcher at Contrast Security.  Despite multiple attempts by …

Read More →

The dreaded “Blue Screen of Death” has been an unfortunate part of the Windows experience since the early days of desktop computing, but now it is being used to the advantage of scam artist.  Microsoft has put out a warning over a recent batch of malware that mimics a “Blue Screen” crash and encourages users to call a fraudulent hotline. Microsoft has called this malware Hicurdismos, and warns that it …

Read More →

National Cyber Security Awareness Month (NCSAM) is an annual campaign to raise awareness about cybersecurity.  This month, organizations all around the country have been stepping up to provide helpful advice to prevent cybercrime and we would like to do our part as well. Whether we realize it or not, the internet touches almost all aspects of daily life.  Businesses and private users alike are in a constant battle with online …

Read More →

Following in the wake of the Yahoo Security breach we have yet another large scale leak, this time aimed squarely at businesses. Modern Business Solutions (MBS), a data management and monetization services provider, has been hit by a security breach that has exposed at least 58 million accounts. Information leaked in the breach includes names, IP addresses, birth dates, e-mail addresses, occupations and more. The MBS leak is the result …

Read More →

After seven years, Windows 7 is rapidly approaching its final days.  Already phased out of Standard Support cycle, Windows 7 will soon leave the authorized sales market on October 31st.   If you are in the market for a Windows 7 PC, your options are about to get a bit more limited. Microsoft support and sale cycles are something most people don’t spent a lot of time thinking about.  For each …

Read More →

IT Computer Support of New York has joined the MSPAlliance, a global organization of cloud, managed service providers and dedicated vendors. MSPAlliance Members are eligible for MSP and Cloud Certifications including, SSAE16 Audits and ultimately achieve certification through the MSPAlliance MSP/Cloud Verify System™.  The MSPAlliance works to further the advancement of Cloud Computing around the world and promotes integrity and professionalism within the industry. The MSPAlliance is the oldest Managed …

Read More →

Yahoo confirmed on Thursday that they have experienced a historic level hack that has affected at-least 500 million users.  Knowledge of the hack first hit the news back in August, when it was discovered that 200 million user credentials were being sold on the dark web.  At the time, Yahoo claimed to be investigating the incident but declined to say if it was legitimate. Now nearly a month later, Yahoo has finally come clean about …

Read More →

For all of their potential usefulness, portable USB hard drives, or Thumb Drives as they are commonly called, are already a serious security concern for businesses.  From spreading malware to leaking company data, the Thumb Drive has become synonymous with risk.  As if not wanting to leave bad enough alone, a Chinese manufacturer has taken things a step further and introduced USB Kill 2.0. USB Kill 2.0 is a small …

Read More →

A new strain of malware has been discovered that changes the rules of how most people think about botnets.  The apply named Twittoor, is a Trojan that that infects Android phones and uses the Twitter social network to coordinate the botnet.  Twitoor is believed to be the first instance of a botnet controlled through a social media service instead of traditional command-and control servers. The Twitoor malware is spread primarily …

Read More →

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Mauris sodales molestie metus, non elementum ex laoreet at. Sed at tempus elit.   Cras at sodales tortor. Ut ac nisl odio. Donec arcu purus, dictum ac justo nec, interdum scelerisque diam. Ut lacinia mi quis ipsum volutpat aliquet. Aliquam vitae varius ex, vel condimentum dui. Phasellus vulputate vestibulum faucibus. Morbi ut erat quis nisi faucibus blandit et et mauris. Phasellus in …

Read More →

If you’ve ever downloaded a piece of software, there is a good chance you have encountered pack-in or pay-per-install software.  As it turns out, pay-per-install software is a highly lucrative market that walks a thin line of legality and is often more aggressive and equally as disruptive as malware. Researchers at Google conducted a yearlong study in conjunction with New York University’s Tandon School of Engineering to crack open the …

Read More →

The HTTP/2 protocol for websites was officially launched in May of last year as a way of improving website performance.  The new protocol was quickly adopted and supported by all major browsers, but unfortunately, it looks like a few flaws exist in the system. Cybersecurity firm Imperva released research into a number of high-profile flaws in the HTTP/2 protocol at the Black Hat USA conference on Wednesday.  The vulnerabilities allow …

Read More →

Cisco researchers have discovered vulnerability in the way that Mac devices process image formats.  TIFF image files are data rich and typically used by publishers or designers, unfortunately, these images can contain more than just image data.  Because of how Apple processes image data, TIFF files can be used to run malware automatically, without being detected. While TIFF images impose the greatest risk from this vulnerability, the Cisco researcher stress …

Read More →

Proactive defenses and employee education are the best ways to protect against ransomware, however, accidents happen and sometimes malware sneaks through even the best defenses.  We’ve discussed ransomware disasters in the past but you may wonder how things would turn out with proactive solution in place.  Quite recently, our technicians remediated just such an occurrence. About two weeks ago our support team received a call from a client who had …

Read More →

Individuals and businesses alike turn to Symantec for system security but a recently discovered exploit reveals that some versions of the software may do more harm than good.  Tuesday, researchers discovered a bug that affects the majority of the Symantec product line and exposes millions of users to the threat of automatically propagating attacks. The news leaked shortly after Symantec issued its own advisory on vulnerabilities found in 17 Symantec …

Read More →

There was a time when operating system upgrades were only pursued as the result of system failure.  Dead hard drive?  Might as well install a new OS on the new one.  Need to replace your whole computer?  It’s going to come with a new OS.  The problem is that this break-fix mentality has no place in the modern internet-driven world.  Software updates and new operating systems are now pushed out regularly …

Read More →

The recent credential leak from LinkedIn revealed that a large percentage of users continue to use common or weak passwords.  While many people may not consider LinkedIn security a top priority on its own a more troubling statistic was discovered. Nearly a third of the leaked accounts on LinkedIn used the same password/username combination on another of the user’s online accounts.  These shared account credentials open up a whole new …

Read More →

Back in 2012, LinkedIn admitted that their social network had seen a breach that led to millions of compromised accounts.  At the time, it was believed that the breach was limited to around 6.5 million leaked passwords, but recent events has put that number at over 117 million.  While alarming on its own, the four year old security has some greater repercussions today.  As of this week, the credentials for …

Read More →

Microsoft has confirmed that they will be ending the Windows 10 free upgrade incentive program on July 29th, a little less than three months from now.  The incentive program is an effort by Microsoft to encourage early adopters and create a single, unified support platform for all future upgrades.  After July 29th, users will need to purchase the full version of Windows 10 for $119. Windows 10 experienced a rocky …

Read More →

The purpose of ransomware is to devastate and it becomes more popular with each successful attack.  Ransomware has evolved beyond random attacks on gullible victims and has grown into a full-fledged business of profiteering.  The modern cybercriminal who perpetrates ransomware attacks is smug, efficient and entrepreneurial. Ransomware used to be straightforward; threaten or trick a victim into paying a fee and then disappear before the user realized that they weren’t …

Read More →

Never before have computer users been subjected to a threat as disruptive and dangerous as modern ransomware.  Where older viruses and malware disrupted data, ransomware holds it prisoner.  Extortion is the new agenda and it’s carried out on a massive scale.  Ransomware has emerged as the most destructive and difficult category of malware to deal with, of our time. There are two common types of ransomware in circulation today; crypto …

Read More →

Microsoft Office is ubiquitous among businesses, so it is not surprising that it is also one of the most common attack vectors for malware.  Macro viruses are a type of malware that makes use of the macro scripts that run in many programs within the MS Office Suite.  Last week, Microsoft delivered an update that allows organization admins to control the macro settings of files. Macro based malware was almost …

Read More →

The New York Times, the BBC and MSN are the latest victims of high profile websites that have been hit by advertisement driven malware.  The malware campaign spread through a shared advertising program and propagates an increasingly popular type of Ransomware.  Ransomware is a type of malware that encrypts a user’s computer data and makes it nearly impossible to recover without paying a hefty fee. The malicious advertisements were served …

Read More →

A Los Angeles hospital paid a ransom of nearly $17,000 to recover its computer network from a malware attack earlier this month.  Hospital administrators gave into the ransom demands after the malware had crippled their network infrastructure, blocked access to medical records and left hundreds of patients without access to treatment. The Hollywood Presbyterian Medical Center started to notice problems with its computer network on February 5th.  The malware disrupted …

Read More →

Security firms Heimdal and Securi have now both reported a huge high spike in malware across a variety of legitimate WordPress websites.  The compromised websites have been taken over by a sophisticated variant of Ransomware that locks a user out of their computer and demands payment. The compromised websites are injected with fraudulent JavaScript code that’s leads visitors to a unique malware distributing website.   What makes this malware difficult to …

Read More →

Oracle has announced plans to retire the Java internet browser app on September 2016. Outdated versions of Java are one of the leading risk factors for the spread of browser based malware.  The discontinuation of Java should be a great boon for IT security but it also creates a problem; many large businesses still use Java as backbone for custom software. Java has long created a problem for IT departments …

Read More →

Spear-phishing attacks differ from normal cyber-attacks in that the attacker specifically targets an individual or organization to steal information.  The precise nature of spear-phishing makes it more difficult to defend against than traditional spam and most organizations are not prepared to deal with the threat.  A new study from security vendor Cloudmark, revealed that over 84% of polled organizations in the US and UK have encountered spear-phishing, with a third …

Read More →

Microsoft is starting off the New Year with a list of big changes and important patches.  Last month we reported that Internet Explorer 6 through 10 would be discontinued on January 12th, but this month also marks the end of support for the much maligned Windows 8.  On Tuesday, Microsoft delivered the final set of updates for Windows 8, which included nine security bulletins for various Microsoft products. Windows 8 …

Read More →

On January 12th 2016, Microsoft will no longer provide security updates or technical support for versions of Internet Explorer older than IE11.  With less than three weeks left, this could be a problem for the millions of Internet Explorer users who still use outdated software. Numbers vary, but it is estimated that at least 124 million users around the world currently use an outdated browser.  More troubling is that as …

Read More →

All of us here at IT Computer Support of New York would like to wish our clients and partners a Happy Holiday and a safe and prosperous New Year. – Richard Keene IT Computer Support of New York Webmaster and Lead Designer

Some of the businesses we speak with tell us that they chose to go with budget IT providers that have the cheapest hourly rates because they want to be budget conscious.  Budget IT providers offer incredible rates like, “$39 a month” to handle all tech support emergencies.  Those prices are hard to beat; that is, as long as you don’t actually need IT support. IT Support is not a product …

Read More →

In our previous articles, we have shown examples of typical threats and taken you through the process of choosing a penetration test vendor.  This week we will guide you through the long-term goals of penetration tests and explain some of the repercussions of not maintaining your penetration test procedures and regulatory compliance. Often in discussions with customers, questions arise about why penetration tests are necessary when they already have other …

Read More →

Data breaches occur every day and most never get reported.  Automated attack programs are constantly on the lookout for weaknesses in network security systems and inherent vulnerabilities in software. Over the course of a single day we recorded and compiled attempted attacks made against a Next Generation Firewall.  When an attempted attack takes place, the Next Generation Firewall not only blocks the intrusion, but outputs a report to let the …

Read More →

In last week’s article, we covered the basics of what a penetration test is and why they should make them part of your regular security regiment.  This week we will to cover things to look out for when choosing your penetration test vendor.   Not all penetration test vendors are created equal; many service providers are more interested in selling a false sense of security than genuine protection.  A …

Read More →

Penetration tests are one of the best ways to safeguard your business against security breaches and service interruptions. A security penetration test is an effort to evaluate the security of an IT infrastructure by attempting to exploit system vulnerabilities. These exploits may look for unpatched holes in your operation system, application flaws, improper system configurations or even exploitable behavior from your employees. When these tests are preformed proactively and with …

Read More →

Antivirus software producer, AVG, has made some big and surprisingly open changes to its Privacy Policy.  The new policy boldly admits that AVG will collect user browsing and usage data to improve their products and even sell “anonymous” user data to advertisers.  While data collection is quite common among social networks and search engines, it is a bizarre admission from a cybersecurity company. The revamped Privacy Policy, which goes into …

Read More →

The CoreBot Malware caught the eyes of researchers late last month, when they discovered that it came equipped with a modular design.  At the time, CoreBot was a relatively minor threat on the Malware scale, a basic data stealer.  However, what made CoreBot special was that it could be modified to include additional mechanisms.   IBM researchers predicted this mutability would allow the malware to become a greater threat in the …

Read More →

Operation Pawn Storm is the name given to a malware campaign that was first reported by Trend Micro back in 2014.  Despite the long running nature of the campaign, it appears that Pawn Storm is still active and targeting new websites.  The latest ploy comes in the form of the website for the Electronic Frontier Foundation. The latest phase in the Operation Pawn Storm malware campaign started about a month …

Read More →

Look around the IT marketplace and you will no doubt see a number of providers who claim to offer varying levels of support based on company size.  Almost always, these companies promote their services in such a way that with more endpoint users comes better service and value.  The reality of the matter is that these multi-level support tiers only exist to fool customers into a false sense of added …

Read More →

Windows 10 launched earlier this week, and for the most part, has been well received by critics and public alike.  Unfortunately, one new feature has left many early adopters rightfully uncomfortable. Upon upgrading to Windows 10, users are presented with the same type of Privacy Statement that 99% of all customers ignore, but what is written there is enough to make anyone uneasy.  The following is an excerpt from that …

Read More →

The Windows 10 release day is less than a week away, but there is nothing typical about this launch.  Because the majority of PC users will receive Windows 10 as a free upgrade, Microsoft has staggered the release of the operating system.  Current opt-in upgrade users will get first access, with everyone else following later in the year. Windows 10 will be officially released to the public on July 29th, …

Read More →

Flash has always been a security liability for users but this week, two major corporations drew attention to how unacceptable the web plugin has become.  Following the most recent Flash security vulnerability announcements, heads of both Facebook and Mozilla Firefox have come out against the hack prone web app. HTML5 has adopted most of the functionality once unique to Flash, so it probably shouldn’t come as a surprise that people …

Read More →

Data systems at the Office of Personal Management (OPM) were the target of a massive cyberattack which has resulted in the theft of sensitive information for over 21 million people in US.  That number is more than five larger than the number originally revealed a month ago when the news of the breach was first revealed. Members of Congress were briefed on the scope of security breach Thursday, which now …

Read More →

IT Computer Support of New York is one of only three partners in the United States certified in the Kace JumpStart program. But that begs the question, what is JumpStart and how can it benefit your business? First, consider the Kace Managed Service platform.  Kace Managed Services provide a comprehensive, easy-to-use and affordable endpoint management system that is conveniently available as a Virtual or Physical appliance.  The Kace system is …

Read More →

Last week, IT Computer Support of New York was proud to deliver a presentation on “How to Take Financial Advantage of Microsoft Audits”, to an audience of eager attendees at the Dell Solutions Center in New York City. Licensure Audits are a serious financial drain.   Attendees of the presentation were provided with free evaluation software to assess their licensure usage. The June 4th audit presentation gave insight as to …

Read More →

As yet another reminder that even small businesses can be the target of cybercrime is the latest attack discovered by researchers at Kaspersky.  The business-orientated spyware campaign, called Grabit, was discovered Thursday and has already stolen over 10,000 files from SMBs located in the United States, India and Thailand. The Grabit spyware campaign has been active since February and remains in operation with new victims added every day.  Grabit works …

Read More →

For the longest time, Firefox was the browser of choice for many security and privacy conscious users.  Unfortunately, that might soon change with the introduction of a new advertising program that will use your internet browsing history to deliver targeted advertisements. The new advertising “feature” is called Suggested Tiles and tailors content based on a user’s “recent and most frequent browsing” habits in order to deliver relevant ads.  Frequency is …

Read More →

Next Generation Firewalls protect your business through intelligent application awareness and thorough port inspection to ensure that only authorized content reaches your internal network.  Protect your business against viruses, spam, spyware, intrusions and other threats that can enter the corporate network hidden in web traffic with a Next Generation Firewall solution. – Richard Keene IT Computer Support of New York Webmaster and Lead Designer

We’ve seen a lot of complaints lately by companies that are worried about huge website traffic spikes that stay for a day or two and then vanish.  At first glance, many people jump to the worst conclusion, that their website has either been hacked, or that a hijack was attempted.  Fortunately, in most cases, these traffic spikes are easily explained and cause no long term damage. What is Referral Spam? …

Read More →

The April Patch Tuesday event happened this week, and with it, Microsoft released a number of important security fixes for users of Windows and MS Office.  As part of the April release, Microsoft has released 11 security bulletins, four of which are rated as critical fixes for remote code execution flaws. The most important patch for standard users corrects an exploit in Office that has already been seen used in …

Read More →

Microsoft releases new security updates every month, but a new report from UK security firm Avecto suggests that the majority of system threats could be prevented, or at least lessened, by the removal of employee admin rights. The security firm analyzed each security bulletin published by Microsoft in 2014 and found that 80% of the 242 security exploits were reliant on users with administrative access rights. User access rights are …

Read More →

A new type of malware has been making rounds in the last couple weeks as fraudsters hijack routers and use them to inject ads and pornography into legitimate websites.  The malware hack, discovered by Ara Labs, alters a user’s DNS router settings.  The newly hacked router then intercepts Google Analytics tags and replaces them with advertisements or other unwanted content.  Once a user has been compromised, unwanted content can be …

Read More →

On January 1st of this year, New York State enacted new laws that make it illegal to throw away most types of consumer and business grade electronics.  Despite going into effect three months ago, many people throughout New York are still oblivious to the change and have no idea how to manage their electronic waste (e-waste). The reluctance to part with, or remove electronics from the home and office, is part …

Read More →

IT Computer Support of New York offers extensive services that enable you to have qualified and knowledgeable remote eyes and hands at your sites in New York, regardless of where your business headquarters is located. Currently, businesses throughout the United States, Canada, the U.K. Europe, Australia and Asia use our local New York City based engineers for their satellite office IT needs. – Richard Keene IT Computer Support of New …

Read More →

Over the last six months, Microsoft’s Volume Licensing Division has enlarged its software audit selection from large businesses with 200 or more users to businesses in the 25-250 employee range.  As a result of this change, thousands of small and medium businesses have received letters, emails and phone calls regarding an upcoming audit.  If your business did not already receive an audit request last year, it is likely that you …

Read More →

Computer manufacturer Lenovo has been caught purposefully selling new computers to consumers with preinstalled adware.  The hidden adware, dubbed Superfish by researchers, embeds itself in internet browsers to deliver popup advertisements based on search terms. Users have complained about Superfish on new laptops since last fall, but the adware has only come under fire recently with the discovery of a potentially serious security threat.  In addition to serving up targeted …

Read More →

Despite constant reminders to the contrary, most mobile device users still have a difficult time accepting that their mobile phone is at risk for malware.  Hopefully, the recent study from Alcatel-Lucent will shake users into the realization that mobile device security is important.  The report compiled from their Motive Security Labs division, found that malware infections in mobile devices increased by 25 percent in 2014, compared to a 20 percent …

Read More →

Adobe Flash Player has become synonymous with constant security faults but this month the threat level has reached a sad new low.  Adobe Systems issued a warning on Monday that hackers are exploiting a new vulnerability in Flash Player, the third such vulnerability in roughly a months’ time.  The vulnerability allows for drive-by download attacks and targets users of Internet Explorer and Firefox. The Flash Player exploit makes use of …

Read More →

The Windows 10 rumor mill has been in full swing since January of last year, but up until now, there was very little concrete information about the next operating system installment.  This week, Microsoft confirmed that Windows 10 will be a major paradigm shift in the traditional operating system business model.  Not only that, but for one year, Windows 10 will be offered as a free upgrade to all users …

Read More →

Website malware is something that we have covered quite frequently on this blog, but generally, it can be avoided with careful browsing habits and awareness of the types of websites you visit.  Unfortunately, that can’t be said any longer.  On December 31st, Cyphort Labs, a cybersecurity firm, detected a malware infection on the Canadian website for the Huffington Post.  The security firm later confirmed that the malware was also present …

Read More →

Manhattan, New York City (NYC) is a small island off the east coast of the United States.  Many people think of it as a huge faceless, heartless, Gotham City.  For those of us that make our lives here, we understand that NYC is a large collection of small communities.  We have the density to support “mom & pop” stores and everybody knows everyone else; we live like people did 100 …

Read More →

All of us here at IT Computer Support of New York would like to wish our clients and partners a Happy Holiday and a safe and prosperous New Year. – Richard Keene IT Computer Support of New York Webmaster and Lead Designer

Earlier this month, Facebook rolled out a new feature that allows in stream videos to play automatically.  Officially, the roll out is still in the test phase, but a large number of people have already noticed a problem with the new “feature”.  Since many Facebook users access the site from a mobile device, they are now in danger of going over their data cap limits and receiving costly fees. Whether …

Read More →

There is an increase in the needs of businesses to maintain satellite offices in the New York City area, but many of these businesses don’t have the external  IT capabilities or manpower to manage them.  IT Computer Support of New York offers extensive services that enable you to have qualified and knowledgeable remote eyes and hands at your sites in New York, regardless of where your business headquarters is located.  …

Read More →

We would like to thank you for being an IT Computer Support of New York customer and wish you and your families a safe and happy Thanksgiving. – Richard Keene IT Computer Support of New York Webmaster and Lead Designer

Computer tech support scams have plagued users for years, but this week, the FTC managed to shut down a scam ring that has conned people out of more than 120 million dollars. The scam involved two business, Boost Software Inc. and OMG Tech Help, as well as a developer that made “PC Cleaner” software.  All parties are facing FTC scrutiny for their involvement in the scams and for continued operation …

Read More →

This week we have a guest writer with a different perspective on the IT industry. If you like this sort of content and would like to read more articles like it, let us know in the comments below. Business IT is a huge source of stress for many people in the workspace.  Who hasn’t had the urge to smash their work computer with a hammer at least once? This list …

Read More →

Software assets management is a complex subject that has real ramifications for your business. Learn what a software audit entails and how IT Computer Support of New York can assist your business before you become a target.

For the last two months, IT Computer Support of New York has conducted Software Asset Management presentations at the Dell Solutions center in New York City.  As part of the presentations, we have provided free evaluation software to all of the attending companies.  On the base level, these evaluations provide information about a business’s licensure usage, but they also have the added benefit of spotting problems that are persistent among …

Read More →

Google is seeking FCC permission to test a new form of wirelesses technology that could combine the speeds of Google Fiber with wireless service.  Google Fiber is a relative new comer to internet providers and offers vastly superior download and upload speeds at a fraction of the cost of other internet companies.  The only problem is that Google Fiber is limited to just a handful of cities around the country.  …

Read More →

There have been almost 600 reported data breaches this year, a rise of over 25% over the same time period last year.  Most analysts expect that this number will only grow higher as consumers and business leaders become more dependent on internet based transactions.  With this in mind, the question becomes, “Are security breaches just part of doing online business,” and “Have users become desensitized to their existence?” JP Morgan …

Read More →

We’ve recently had a client come to us with concerns with about his UPS (Uninterruptible Power Supply) unit that could benefit others.  The client took notice of his UPS unit after it began sounding a regular alarm.  In addition to the alarm, the device would throw up conflicting messages as to the nature of the problem.  There were a number of things that could have caused the problem, but in …

Read More →

A new threat for Linux-based machines jumped into public attention earlier this week with a threat that could end up being worse than the Heartbleed scare.  The security vulnerability, which has gained the moniker “Bash Bug”, or “Shellshock” affects the shell commands of Linux-based computers, servers and even Macs. Systems use Bash to execute “shell” commands; basically, this means that it translates user commands into something an operating system can …

Read More →

Join IT Computer Support of New York for a presentation on, “How to take financial advantage of a Licensure Audit” on September 18th at the Dell Solutions Center.  Attendants will get the opportunity to learn about cost saving ways to combat a software audit, as well as, a chance to interact with Dell solution experts. Cost-effective software licensing requires complex decisions. The result of these decisions will either greatly increase …

Read More →

A list of nearly five million Gmail login credentials was posted on a Russian forum earlier this week.  Initial reports led to the speculation that Google itself had been hacked.  The good news is that doesn’t appear to be the case, the bad news is that the list is real, and your account might be on it. The leaked list contains millions of account names that have been collected from …

Read More →

Lorem ipsum dolor sit amet, consectetur adipiscing elit.   Mauris sodales molestie metus, non elementum ex laoreet at. Sed at tempus elit. Cras at sodales tortor. Ut ac nisl odio. Donec arcu purus, dictum ac justo nec, interdum scelerisque diam. Ut lacinia mi quis ipsum volutpat aliquet. Aliquam vitae varius ex, vel condimentum dui. Phasellus vulputate vestibulum faucibus. Morbi ut erat quis nisi faucibus blandit et et mauris. Phasellus in …

Read More →

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Mauris sodales molestie metus, non elementum ex laoreet at.   Sed at tempus elit. Cras at sodales tortor. Ut ac nisl odio. Donec arcu purus, dictum ac justo nec, interdum scelerisque diam. Ut lacinia mi quis ipsum volutpat aliquet. Aliquam vitae varius ex, vel condimentum dui. Phasellus vulputate vestibulum faucibus. Morbi ut erat quis nisi faucibus blandit et et mauris. Phasellus in …

Read More →

IT Computer Support of New York recently had the opportunity to introduce clients to the benefits of the Dell Solutions Center.  The Dell Solutions Center, located in Penn Plaza, provides visitors with the ability to interact with software and hardware specialist, as well as see the newest hardware in a test environment. ITCSNY’s recent software assets management presentation gave attendees direct access to the inner sanctum of the Dell Solutions Center, …

Read More →

Last week’s software asset management presentation, “How to take financial advantage of a Licensure Audit”, was given to a full capacity crowd.  The event was held at the New York Dell Solutions Center.  Attendees were given an opportunity to learn about cost saving ways to combat a software audit, as well as, a chance to interact with Dell solution experts. The presentation took place in the “Sandbox”, an area of …

Read More →

Software audits are a serious threat and can cost your business hundreds of thousands of dollars.  A typical Microsoft audit results in a ‘settlement’ of 30,000 to 40,000 dollars per 100 computers.  The problem is that most companies don’t know what they have, and as such, cannot make an informed decision about their licensure. When you prepare for a software compliance audit there are a few things you should take …

Read More →

Over the last couple years Microsoft has shifted away from its traditional role in the software industry.  Since 2013, Microsoft has ramped up its efforts to focus on Software Compliance Audits. Microsoft is in the process of conducting up to 30,000 licensure audits on small to midsize companies throughout 2014. Microsoft conducts audits based on customers’ software usage. Many large companies have already put strict company-wide licensing policies in place, …

Read More →

Many clients find themselves frustrated when they discover that their current software licensure is not sufficient for their business needs.  This realization is normally attributed to an unexpected software audit from one of the big manufacturers, such as Microsoft.  Whether or not your business has experienced an audit in past it is important that you plan for one in the future. The best way to do this is by choosing …

Read More →

Microsoft plans to release an update for Internet Explorer that will fix a security threat which has plagued the browser for years.  Originally planned for release on August 12th, the security fix will block out-of-date ActiveX controls and reduce the threat of Java based malware intrusions.  Microsoft has revealed that while the feature and related Group Policies will still be available on August 12, no out-of-date ActiveX controls will be …

Read More →

USB has become an industry standard over the last ten years, largely in thanks to how versatile and seamless the interface is at connecting with computer hardware.  Unfortunately, a flaw has been discovered within the USB architecture that allows malware to be programed into a device’s firmware, making it nearly undetectable and impossible to patch. The versatility of USB is also the problem when it comes to the newly discovered …

Read More →

Due to business expansion, we are pleased to announce the relocation of our office to 1441 Broadway, Suite 5065, New York, NY 10018. We would like to take this opportunity to express our appreciation for your continued business, and we look forward to providing you with the same level of IT support that you have come to expect. – IT Computer Support of New York Phone: 212-242-2949Sales: sales@itcsny.com

Security researchers have discovered a phishing campaign that has run uninterrupted for five years and has allowed attackers to steal login credentials for Google, Yahoo, Facebook, Dropbox and Skype.  The malware, known as NightHunter, dates back to 2009 and has infected the oil industry, educational institutions, hospitals, charities and many other organizations.  Direct damages caused by NighHunter are still unknown; however, the malware has compiled an enormous database of stolen …

Read More →

Software licensure compliance has become a hot topic in the last couple years as manufacturers increase the frequency of surprise audits. Microsoft products in particular are ubiquitous in the workplace and most companies don’t take the time to review individual software licensing agreements prior to installation.  The penalties suffered from a failed audit are not always immediately clear and can cost a business tens-of-thousands of dollars. Any organization that has …

Read More →

Take full advantage of our business planning and computer support services. Watch our video overview and discover how IT Computer Support of New York can help bring your company or organization into the forefront of its field. – Richard Keene IT Computer Support of New York Webmaster and Lead Designer

Last week, Facebook announced that it would now use personal information and browsing history to target a user with specific ads.  While targeted ads are nothing new, the amount of information that Facebook has on the average user is staggering and most people are all too eager to share even more. Facebook’s new ad policy states that the social network will now gather information from third party websites as well …

Read More →

The same type of Ransomware that first appeared on Windows based systems has now made its way to Apple devices.  The ransom based cyber-attack first began in Australia but has now been spotted in other parts of the world, including California.  The Apple Ransomware creates an impassible splash screen on a user’s device and demands a $100 ransom before the user is able to regain access. Devices affected by the …

Read More →

Internet Explorer 8 remains the most used browser version in the world, so it should come as a surprise that a vulnerability discovered back in October 2013 has remained unpatched.  The vulnerability was made public earlier this week by Hewlett-Packard’s bug bounty program when Microsoft failed to address the problem. Hewlett-Packard’s Tipping Point Zero-Day Initiative (ZDI) is a bounty program that rewards researchers who discover and report vulnerabilities so that …

Read More →

Earlier this week, Microsoft delivered the opening keynote address at TechEd, a technology conference focused on IT Professionals and Enterprise developers.  The keynote introduced the idea of “everything as a service”, or cloud computing, as the future of IT.  Microsoft has already introduced a number of cloud-based software platforms but now they plan to bring the cloud business model to the center of their business strategy. Mobile First, Cloud First …

Read More →

Late last week, Microsoft confirmed the existence of a new zero day vulnerability that affects all versions of Internet Explorer.  As of 2013, Internet Explorer accounted for as much as 26% of the global browser market, which leaves a substantial percentage of the world’s computer users at risk.  The vulnerability allows for remote code execution and can be used to force malicious code onto a targets system or gain complete …

Read More →

Within the last month, the number of Facebook, email and phone scams have risen significantly.  Since ignorance is the biggest factor in falling prey to a scammer, this article will shed some light on a few of scams currently in circulation.   “Click Bait” Social Media Scams “Click Bait” scams have become a popular method of distributing spam and malware on social media platforms such as Facebook and Twitter.  The …

Read More →

A vulnerability introduced back in 2011 has left people all over the internet in danger of password and sensitive data theft.  The recently discovered “Heartbleed” security flaw is part of OpenSSL, an open source encryption technology present in as much as two-thirds of all Web servers.  If you regularly visit any website that processes payments or maintains user accounts, there is a good chance you have been exposed to this …

Read More →

News outlets and tech support companies have warned users of the Windows XP support end date for over a year now and the final countdown has begun.  In a little more than a week, Microsoft will officially end technical support for its Windows XP operating system. Microsoft has provided support for Windows XP for the past 12 years, a very long time in software terms.  More specifically, Microsoft has provided …

Read More →

Two weeks from now, Microsoft will discontinue support for Windows XP. The end of support means big changes in the way older systems are maintained and administered. Is your business prepared for when Windows stops receiving security updates and fixes? – Richard Keene IT Computer Support of New York Webmaster and Lead Designer

Today, in cooperation with Panasonic, the Sony Corporation unveiled a new large format optical disk with a storage capacity of up to one terabyte of long term data storage.  Sony describes Archival Disc as next generation professional grade data storage. The jump from DVD to Blu-ray was sizeable, but outside of the entertainment industry, did not increase storage capabilities enough to warrant a wide adoption rate; Sony hopes that the …

Read More →

Recent reports and information leaks have shown that Microsoft may be considering a new method of operating system distribution.  A week ago, the well-known Windows leaker WZor revealed the existence of a new Windows SKU, now called Windows 8.1 with Bing.  The new version of Windows is believed to be designed as a free or low-cost upgrade for Windows users. Early reports on Windows 8.1 with Bing show that it …

Read More →

Most users are aware of the dangers that can plague a desktop or laptop computer but very few are concerned when it comes to their phones or tablets.  Recent research conducted by RiskIQ shows just how dangerous the mobile marketplace can be, as well as the importance of downloading apps with caution.  The Internet security company claims that malicious apps have grown by 388 percent from 2011 to 2013. The types …

Read More →

Earlier this week, computer security software firm Kaspersky Lab, released details about “The Mask”, a type of cyber-espionage malware.  The Mask, also known as Careto, ran undetected since 2007 and has infected more than 380 high profile targets from 31 different countries. The Mask malware campaign used techniques and code that surpassed any previously seen nation-state spyware.  The malware’s primary targets were government institutions, diplomatic offices and embassies but also …

Read More →

February will mark the start of a new era in website branding with the release of new generic top-level domains (gTLDs) .  For the first time, businesses and individuals will be able to assign new dot-specific domain names to their URLs such as .ninja, .farm, .shoes, .photography, etc.  The addition of the new gTLDs will allow for thousands of new web address combinations and broaden branding capabilities. The Internet Corporation …

Read More →

IT Computer Support of New York offers business-grade digital video surveillance systems to protect your property and staff. Professional Installation of surveillance systems and implementation of best practices, help deter theft, vandalism and employee misuse of property. For a complete security analysis call today at 1-877- 4 ITCSNY. – Richard Keene IT Computer Support of New York Webmaster and Lead Designer

One of the newest features to be brought out by Google is the speech recognition API for its Chrome web browser.  While voice recognition was added to improve the experience of users, one developer has discovered a potentially serious security flaw introduced by the feature. Chrome speech recognition requires that a user give a website permission before access to a user’s microphone can be given.  The system was built in …

Read More →

A recent information leak reports that Microsoft is on course to drop its much maligned Windows 8 operating system sooner than anyone expected.  Tech blogger Paul Thurrott reported earlier this week that Microsoft will announce a new update, codenamed “Threshold”, at its Build conference in April.  Threshold will reportedly skip Windows 8.2 in favor of re-branding the product line as Windows 9 in an effort to distance itself from the …

Read More →

Four months from now, Windows XP will no longer be supported by Microsoft.  Despite the impending cutoff date, XP had still managed to maintain the majority share of users around the world throughout 2013.  However, new numbers released on January 2nd show that that has finally started to change and Windows XP has now fallen below 29 percent. The latest NetMarketShare numbers on worldwide operating-system usage show that Windows XP’s …

Read More →

A recent study by Incapsula reports that 61.5% of all website traffic is now generated by bots. The findings from the security firm show this as a 21% rise over last year.  While some of the automated programs are malicious, Incapsula reports that the largest growth in traffic actually comes from “good” bots which are used by search engines to help index content. The website traffic report was generated …

Read More →

Wishing you every happiness this Holiday Season and prosperity in the New Year. Thank you for being our customer. We look forward to continuing our relationship in the coming year. All the best to you and your family. – Richard Keene IT Computer Support of New York Webmaster and Lead Designer

Security researchers at Trustwave’s SpiderLabs have discovered that a Netherlands-based Botnet has stolen and collected approximately two million user logins.  The exposed Pony Botnet contains user login information for online services such Facebook, Twitter and Yahoo as well as more serious credentials for things like FTP accounts and ADP payroll.  While initial reports speculated that the stolen data was limited to users in the Netherlands, new findings have shown the …

Read More →

Hard drives are the backbone of every computer and are fundamentally important to businesses and home users alike.  That being said, there has never been an in-depth study on how long the average computer hard drive works and is able to retain data.  Backblaze, an online backup company intends to shed some light on the matter and has published the results of a four year study on hard drive lifespan. …

Read More →

A new type of malware known CryptoLocker, has been popping up all over the internet and offers a diabolical new twist on an old scam. CryptoLocker encrypts all of the most important files on a victims PC — pictures, movie and music files, documents, etc. — as well as any files on attached or networked storage media.  After encryption, the malware demands a ransom before the files can be accessed …

Read More →

IT Computer Support of New York’s certified engineers provide remote or onsite technical support when and where you need it, 24 hours a day, 7 days a week. We specialize in the full spectrum of hardware, software and system platforms. Read More

IT Computer Support of New York wishes you a Happy Halloween. Enjoy our spooky Halloween video below.   – Richard Keene IT Computer Support of New York Webmaster and Lead Designer

On November 1st, Windows Server 2012 R2 will arrive with a hefty price increase, according to newly published Microsoft documentation. Windows Server 2012 R2 Datacenter edition will cost 28 percent more than the comparable edition on Windows Server 2012. It will cost $6,155* for Windows Server 2012 R2 Datacenter edition vs. $4,809* for Windows Server 2012 Datacenter edition licensing. Customers who are Microsoft Software Assurance (SA) licensees and who already have …

Read More →

Fake software downloads are nothing new when it comes to malware distribution, but the sophistication of spoofed downloads has reached an all-time high in recent months.  Where in the past, fake software downloads, were relatively easy to spot, now they have convincing visual appearances and in some cases, even authentic security certificates. Malware downloads come in many forms but the most common in recent months have taken the form of …

Read More →

Threats to your Data and Network systems increase on a daily basis. Protect your business and client information with IT Computer Support of New York’s Anti-Spam, Antivirus Service. Combined with A next generation firewall, you can greatly reduce risk to your business IT. – Richard Keene IT Computer Support of New York Webmaster and Lead Designer

This week we have a follow-up interview with the CEO and CTO of IT Computer Support, Dan Scolnick, in regards to last month’s server build-out. — What was it about the company’s expansion that required this build-out? The company had grown organically and quickly over the past 10 years, which resulted in over 400 employees spread across 20 sites worldwide.  The Wintel 2003 infrastructure was at its end of life …

Read More →

 Within minutes of the release of iOS7, users began to debate the security of the new finger print reader, but a more imminent threat was already being found.   The security vulnerability contained within the passcode lock screen allows anyone to gain access to the owner’s photos, email, Twitter, and more. The security flaw is simple to use and allows anyone with physical access to the device to quickly bypass the …

Read More →

This week I had the opportunity to sit down with Garret Conklin, one of our lead Systems Engineers, to discuss the new VaultLogix MobilePlus platform.  If you would like to see more interviews with our techs, let us know in the comments below. — What is VaultLogix MobilePlus and what does it do? VaultLogix MobilePlus is a PC backup solution.  It searches through all the files on a PC and …

Read More →

IT Computer Support of New York provides technology solutions for businesses of all sizes.  This month we have been helping a client set up a complete network infrastructure overhaul.  Here is a short chronicle to the recent build-out and a glimpse at the process involved. First a little background. The client had 20 remote sites and one “core” sight, all running MS 2003, past end of life.  They had gotten …

Read More →

Next generation firewalls provide the best defense for your business against viruses and web based security threats. Watch the first video in our YouTube series on business security.   – Richard Keene IT Computer Support of New York Webmaster and Lead Designer

The growth of online communication, data storage and digital business transactions has created a world in which businesses of all sizes are at risk for security breaches and information theft.  Earlier this week, analyst firm Canalys, released estimates backing up this fact. They showed that IT security spending will reach $30.1 billion by the year 2017. The estimates from Canalys exceed previous predictions from other analyst, such as Gartner, which …

Read More →

This year’s Black Hat security conference in Las Vegas revealed a serious security threat for iOS users.  Researchers from the Georgia Institute of Technology demonstrated a charging device which can be used to invisibly install malware on a device running the latest version of Apple’s iOS.  The charging device is small and cheap enough to manufacture that it could be installed in public places without the knowledge of management and …

Read More →

Earlier this week Google released the latest version of Gmail, which features a substantial interface overhaul.  The biggest change is that Gmail will now sort your inbox into categorized tabs such as Primary, Social and Promotions.  Many users will likely find the new interface a welcome addition but marketing firms and in-house business promotions are likely to find their effectiveness at an all-time low. The new interface, which is shared …

Read More →

Scientists at the University of Southampton in Britain have recorded and retrieved data from a slide of crystal nanostructured glass.  The crystal storage medium is capable of holding 360 Terabytes of data within a DVD-sized disc.  In addition to holding an immense amount of data, the crystal disks have a near limitless shelf life and can even function at extreme temperatures. Beyond the simple curiosity factor of using crystal as …

Read More →

Malware that was first spotted back in 2007 has made a comeback and is now propagating on Facebook.  The Zeus banking Trojan operates by infecting Web browsers, often by “drive-by download” from a corrupted website.  In this case, Zeus is spread via links posted on articles within Facebook.  Once clicked, the Trojan will download and infect a user’s computer. The Zeus Trojan has already infected millions of computers over the …

Read More →

We live is frightening times… A recent report from the Commission on the Theft of American Intellectual Property proposes the use of government-sanctioned ransomware to catch software pirates.  The IP Commission claims that packaging its own brand of ransomware within legitimate retail software would allow for better policing of online piracy and shut down the majority of cyber theft.  The problem with the proposal is that not only does it …

Read More →

Last week ago Adobe announced that they would be discontinuing the stand alone versions of their Adobe Suite software in favor of their new cloud based service.  Since then, there has been uproar among Adobe customers who feel betrayed at the thought of having to rely on a subscription based plan to access new versions of the popular software. The blowback started almost immediately when Adobe announced that they would …

Read More →

A few months ago a relatively new kind of computer virus started to infect the computers of users around the world.  So called Ransomware (MoneyPak scam) computer viruses and malware take control of a user’s computer, locking them out of even the most basic functionality.  In addition to the computer lockout the malware puts up threatening messages that claim to be from various government agencies demanding money for the release …

Read More →

Just a few days ago, Microsoft released the latest security updates for the Windows 7 operating system. However, it seems that the update can cause as many problems as it fixes.  Many users who installed the update on the release date have reported incidents of the infamous “blue screen of death” crash after installation.  Many users have also reported the inability to restart into Windows after the initial crash occurs …

Read More →

Well, it was in the news that we were under cyber-attack by China and that we were retaliating.  You might think that there would be pictures and videos and news at 11.  Instead it’s more like discovering a new galaxy. It has no impact on us, or does it? My company sits in a unique position where we support many SMB’s (small and medium businesses) client’s IT that include regulated …

Read More →

Did you miss part 1?  Read it Now.   Chapter 2 Is Your Data Leaking?  Recommendations: Your business data is and IT operations are critical to the survival of your business.  Intellectual property, financial information and client lists need to remain confidential.  Computer operations need to operate in a reliable fashion. You wouldn’t leave your company file cabinets outside in the parking lot at night.  You don’t leave your car, …

Read More →

“Success occurs when opportunity meets preparation” ― Zig Ziglar There is an old adage, what three things does every consumer want?  I want THE BEST you have.  I want it NOW.  I want it for FREE. The standard answer to this used to be, “Pick any two”. The next three blog chapters show you how to get exactly that, the best, now and free. Business Outcomes are really what a …

Read More →

“We all need a daily checkup from the neck up to avoid stinkin’ thinkin’ which ultimately leads to hardening of the attitudes.” ― Zig Ziglar I went to school at NYU and cut my teeth in IT at Bellcore, which was the successor of Bell Telephone Laboratories.  You may have heard of Bell Telephone Laboratories, they were credited with inventing the transistor, created UNIX and C – components that are …

Read More →

There is a lot happening this winter and spring at ITCSNY and the content is beginning to show on our web site.  There are massive structural changes in computer network architecture that are dramatically changing the way we think about, design and apply technology to business.  The devices we use (BYOD)¹,  the way we store and secure data (the “cloud”), and even the way we purchase, install, maintain and utilize …

Read More →

IT Computer Support of New York’s certified engineers provide remote or onsite technical support when and where you need it, 24 hours a day, 7 days a week. We specialize in the full spectrum of hardware, software and system platforms. Check out our video overview and see what IT Computer Support of New York can do for you.   – Richard Keene IT Computer Support of New York Design and Optimization …

Read More →

“If seven maids with seven mops Swept it for half a year, Do you suppose,’ the Walrus said, That they could get it clear?’ I doubt it,’ said the Carpenter, And shed a bitter tear.” – Lewis Carroll Disruptive Technology:  Part 2 The current state of IT is an expensive mess.  How do we take this expensive, difficult to manage problem with capital expenses, operational expenses, surprise expenses and downtime …

Read More →

The Walrus and the Carpenter Were walking close at hand; They wept like anything to see Such quantities of sand: If this were only cleared away,’ They said, it would be grand!’- Lewis Carroll Disruptive Technology:  Part 1 It’s been over 4 years since we ran our last article on disruptive technology.   At that time it was about a new architecture for Servers and Storage oriented technology.  The new architecture called …

Read More →

One of our clients, a data center manager, found himself in a bind at years end.  Upper management had not provided him with a budget to maintain their $50k tape library, or replace it after it failed the previous year.  This client had terabytes of business critical data that had not been backed up in months.  Additionally, the processes ran on obsolete equipment that also supported custom software.  Their system …

Read More →

“It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity, it was the season of light, it was the season of darkness, it was the spring of hope, it was the winter of despair, we had everything before us, we had nothing before us,” …

Read More →

We wish you every happiness this Holiday Season and prosperity in the New Year. Thank you to our customers and loyal blog readers. We look forward to continuing our relationship in the coming year. Click below to view a special animated holiday greeting.   – Richard Keene IT Computer Support of New York Design and Optimization Department

Google announced late Thursday that they will no longer offer the free version of their Apps for Business software suite.  Clay Bavor, Google’s Director of Product Management stated that businesses were outgrowing the free version of Google Apps too quickly, which resulted in growing pains for the businesses down the line.  As a result, Google has made the decision to focus on improving the quality of the user experience for …

Read More →

Smartphones have long since overtaken sidewalk payphones as the dominant form of mobile communication but New York City hopes to breathe new life into the dying technology.  Last week Cicso Systems and City 24/7 teamed up with New York City to begin their plan to introduce a new generation of payphone to the public. Free internet and phone touchscreen kiosks in NYC. The newest iteration of payphone has very little …

Read More →

Google launched a service on Thursday that it hopes will allow millions of people in developing nations to access the internet for free.  The new service, named Free Zone, will facilitate the use of Google Search, Gmail and Google + through a special domain entry point.  The service launched in the Philippines and allows users with a free Google account to view the content on their cellphones without experiencing the …

Read More →

IT Computer Support of New York’s Managed Services are comprehensive and cost-effective, enabling you to take advantage of both preventative and emergency services, whenever you need them.  Watch our new Managed Services overview video below. – Richard Keene IT Computer Support of New York Design and Optimization Department

We would like to take a moment to give our condolences to all the families affected by the unfortunate storm weather across the US. Our deepest sympathies are with those who are going through a very rough and difficult time. -IT Computer Support of New York . .

Mobile devices such as smartphones have spread to the point that it shouldn’t surprise anyone that they are now targeted by the types of malware once reserved for PC’s.  What should surprise is that the number of infections has increased from 41,000 infections to 175,000 since Q2 2012. Mobile malware has increased significantly in the past year. Trend Micro, a security software provider, has released its third quarter security …

Read More →

This month Verizon Wireless started its Precision Market Insights program which sells marketers a surprisingly detailed look at how subscribers use their phones and other mobile devices.  Precision Market Insights compiles normal user information such as gender and age but also goes further and can compile information on hobbies, search history and even frequent dinning locations. Verizon has moved into a stance of defensive damage control on the issue and …

Read More →

Earlier today Facebook announced that it would now offer full integration with the personal file storage company Dropbox. Dropbox, which was first introduced in 2008 has slowly grown as a personal storage and cloud share service and will now allow files to be shared within Facebook Groups. For many casual computer users this will be their first opportunity to access and use cloud storage to save and distribute their files. …

Read More →

Are you looking to outsource your IT department with qualified local engineers? IT Computer Support of New York is a full service IT support, cloud services and managed service provider. IT Computer Support of New York has been in continuous operation for over 25 years. Watch our video overview and see what IT Computer Support of New York can do for you. – Richard Keene IT Computer Support of New …

Read More →

While this month’s Patch Tuesday saw a reprieve in the typical onslaught of critical system patches, Microsoft plans to unleash a major update next month that will invalidate old security encryption. Microsoft has been planning to introduce a change to their security certificate program since June when the Flame malware became a problem. The Flame malware toolkit exploited weak encryption algorithms to create fraudulent Microsoft certificates that spoofed the Windows …

Read More →

Amazon released a new product in their web services line of data storage apps on Tuesday.  Amazon Glacier is a cloud based tape backup replacement solution aimed at enterprise level storage needs.  Glacier aims to compete with in-house storage systems on data redundancy and price. The entry level cost of Glacier is $0.01 per gigabyte per month.  Media archival, research and scientific data storage and business information, as well as …

Read More →

Google has started testing a new feature that will allow personal emails from a user’s Gmail account to show up in search engine results.  The idea behind the feature is that a user’s search query will not only contain the results from the public web, but also from their personal Gmail account. This means that recommendations from friends or information about restaurants other venues may become the best search results …

Read More →

I’ve noticed a long term trend among business owners and “C” level officers.  In the budget squeeze of the last few years, servers and other essential computer equipment that have been reliable, have been left to run on their own.  Service contracts expire, software and hardware reach and extend past end of life.  People think of their edge devices, i-things and droids as the essential computer equipment and don’t care …

Read More →

Researchers at F-Secure have uncovered a new exploit that attempts to install backdoor malware on Windows, Linux and versions of MAC OS X operating systems.   While malware in general is common, cross platform vulnerability is a relatively new concept and serves as a reminder to keep your software up to date, regardless of which operating system you use. The multi-platform malware was first discovered on a Columbian transport website and …

Read More →

Windows 8 has received negativity since it was first announced but earlier this week Microsoft released information regarding the launch price that is likely to silence many  critics. Microsoft revealed that if your PC is running Windows XP, Windows Vista, or Windows 7 you will qualify to download an upgrade to Windows 8 Pro for just $39.99.  To further sweeten the deal Microsoft is offering the option to add …

Read More →

Security professionals and web developers alike have encouraged users to keep their web browsers updated but one online retailer has taken that a step further.  Kogan, an electronics retailer based out of Australia has imposed the first tax on customers who use an outdated browser like Internet Explorer 7 for their purchases on its site. Shoppers who visit the retailers’ website with an outdated browser will be presented with a …

Read More →

Lately I’ve been paying very close attention to both customer service and marketing.  Being a business owner myself I’m very interested in what brings in prospects and keeps clients happy.  I look to my own reactions to companies I deal with to learn what works and what doesn’t. I used to deal with a company that told me about their great customer service, as a loop on an automated voice …

Read More →

Windows 8 has a tough road to follow.  The operating system is set to make the biggest interface redesign and user experience changes since the early days of Windows 95.  Microsoft CEO Steve Ballmer describes Windows 8 as the “deepest, broadest and most impactful” operating system the company has made to date. Ballmer also predicts that the OS will be in use on 500 million systems by 2013.  Despite these …

Read More →

Project Glass is Google’s newest pet project that brings a bit of science fiction into reality.  The hybrid glasses combine the functionality of cameras, microphone, Web browser, and speech recognition with a hands free miniaturized video display.  The New York Times broke the story yesterday and already message boards and various news sources have lit up with activity to show support or criticize the product. The functionality of Project Glass …

Read More →

Microsoft recommends the installation of patches as part of a regular monthly Tuesday release cycle.  IT Computer Support of New York (ITCSNY) believes that the security and reliability of a business’s computer system is mission-critical and business-essential, therefore we recommend following Microsoft’s recommendation.  Microsoft designates some patches “critical”, which means they need to be installed on your computers because of known vulnerabilities that affect reliability or security.  ITCSNY has a …

Read More →

Google’s Chrome internet browser has remained the high water mark for web browser security for four years but that legacy has finally been broken.  Chrome, which entered the browser marketplace back in 2008 quickly gained a name for itself for being the fastest web browser as well as functionally hacker proof.  Google has taken part in Pwn2Own—a security competition run by HP—for the last four years and matched Chrome against …

Read More →

VeriSign Inc, the company millions of businesses around the world depend on for website security has faced a security breach of its own and raised questions about security of businesses under its protection.  VeriSign’s domain-name system processes over 50 billion queries daily. This system allows internet users to confirm the legitimacy of the websites they visit and helps ensure safe online shopping transitions.  If the encryption from VeriSigns system is …

Read More →

We’ve noticed a new trend among clients.  The New Year has meant office moves.  And we’ve noticed that some ‘c’ level clients have an innate belief that since they are moving into another companies space, a space where the other company was doing business, that they can just move their business and IT in too, and do business there because the other company was. They are not taking into account …

Read More →

EHR is here to stay.  The government subsidy is not. Physicians that have not adopted EHR and achieved ‘meaningful use’ in 2011, have left $18,000 on the table.  Yup, that’s more than 1.5 years’ worth of car payments on a high end BMW or Mercedes.  Physicians that don’t achieve meaningful use’ in 2012 are leaving another $18,000 on the table.  In 2013 it will be $12,000 and by 2014 that …

Read More →

Those of you that read my blog know I’m a proponent of Physicians utilizing EHR / PM systems and reaping the benefits while the government is subsidizing it. ITCSNY specializes in what is called the EDGE. Regardless of what kind of computer technology you use, the edge is where you touch the workstations, iPads or laptops. It is the LAN (local area network) in the office from the receptionist to …

Read More →

While American households account for most of the new electronics market, they only contribute about 26% to the electronics recycling market. That means an awful lot of electronics still end up in our landfills.  Not only is this wasteful but it also presents serious security concerns for many electronics users who have not adequately cleared their devices of personal information.  The threat is made even more apparent when you take …

Read More →

We hope you all enjoy a safe, healthy and Merry Christmas holiday.

Tim Rains, a director of Microsoft’s Trustworthy Computing group, revealed earlier this week that, “Between one-third and one-half” of all attacks detected and blocked by Microsoft’s security software from the beginning of July 2010 to the end of June 2011 were Java-based.”   Microsoft’s anti-malware technologies blocked more than 27.5 million Java exploits over a 12-month period, many of which had been patched at least a year ago, Rains said. Not …

Read More →

A strange thing happened on the way to Electronic Medical Health Records and Information Technology. I have owned and operated an IT consulting company in New York City, for over 25 years. We have three practice areas: government, Fortune companies and small/medium businesses (SMB). Typically there are three types of clients: early adopters, guidance clients and commodity clients. Early adopters recognize the value of technology and are willing to spend …

Read More →

Change is good.  We hear it all the time but when it comes to software I wish someone would step up and say that just because something is new doesn’t mean better.   Now I’m all for security and functionality improvements but the trend in the software industry has been to “modernize” the look of user interfaces.  Almost without exception the reception of these changes has been negative. Perhaps the biggest …

Read More →

Happy Halloween from everyone at IT Computer Support of New York! – Richard Keene IT Computer Support of New York Design and Optimization Department

Apple released its much-anticipated MAC OS X Lion operating system back in July with over a million downloads in the first day.  Lion is an electronic download only, available for $30.00 from the online App Store.  This new operating system touts many new features and designs which Apple claims will make the user experience simpler. Now that some of the new release hype has worn off let’s see how the …

Read More →

IT Computer Support of New York recently hosted a series of Lunch and Learn presentations on Cloud Computing.  The first batch of presentations was a big success so we are now opening signups to a larger audience. The Cloud events are free “lunch and learn” presentations that are split into two demographics.  The first has a focus on medical practices and details the benefits of Cloud Computing and provides EMR …

Read More →

Solid state hard drives have been available to consumers for a few years and available to military and industrial markets since the mid 90’s but it has only been recently that they have become affordable.  Solid state drives (SSDs) are different from normal hard drives (HDD) in that instead of storing data on spinning disks with moveable read/write heads they store information in memory chips.  The added benefit here …

Read More →

Gesture recognition has long been the favored interface for Hollywood science fiction movies but recent developments have made this technology a reality.  Microsoft released the Kinect, a motion capturing interface device for its Xbox gaming system less than a year ago but already have plans to use the same technology beyond gaming. Originally, Microsoft had plans to use the Kinect with the healthcare industry.  Because the Kinect tracks body movements …

Read More →

Lately it seems like Google adds a new service to their lineup just about every week and the trend will continue with their new web host service.  Hosting user content is nothing new for Google; they already host millions of gigabytes of data for services such as Blogger, Picasa and Google Sites but now they plan to do something different and this time for a price. Google will now provide …

Read More →

Google has innovated on just about every facet of the modern internet experience so when they announced that they would tackle social networking next, a lot of people paid attention. The Google Plus Project or Google+ sets out to be a direct competitor for Facebook. Many of the features are the same and even the overall appearance shares a lot in common. After a week of hands on experience …

Read More →

If you’re like most people you’re curious to see what Google has to offer in the way of its new social networking platform.  However, there is a problem.  Facebook scammers have set up a way to use this curiosity against users and hijack their accounts. The most recent version of the scam consists of a Google+ fan page with a description that promises Google+ invites to anyone who “likes” the …

Read More →

Rumors that Google was working on its own social networking site have bounced around the net for a long time but today the search engine giant official announced Google+. Google+ is not the companies’ first foray into social media; anyone who remembers the ill received Google Buzz will attest to the fact that Google has gone down a similar road in the past. What makes Google+ stand out is that …

Read More →

Google’s first attempt at a custom designed operating system and hardware to support it has caused a lot of chatter in the computer industry. Google Chrome was designed from the ground up as a mobile device OS with the plan to compete directly with Apple and Microsoft. For the last week we have had the opportunity to experience the Google Chromebook and our first impressions are that it lives …

Read More →

A recent interview by Cnet with author Eli Pariser showed his opinions on why a hyper-personalized Web is detrimental to the user.  Parsier is the author of “The Filter Bubble: What the Internet is Hiding from You,” which argues that Google and Facebook’s attempts to make the Internet as user structured as possible will lead to some very negative outcomes. Through the interview Pariser voices his concerns about the ability …

Read More →

The hardware edition of Tech Wars will take a look at two competing products from the perspective of Ashley from our Marketing and Advertising division. This week we will take a look at Bose MEI2i Headphones and see how they compare to iBeats Headphones. Hardware Match Up Bose MEI2i Headphones Price: $116.00 Owner: Ashley (Marketing & Ad) Shared Features: In-ear High Performance Headphones 5 pairs of ear tips Carrying case …

Read More →

With the browser wars heating up again there is no better time to take a look at how this generation’s competitors fare against each other. While Internet Explorer still dominates the market for the majority of users it’s Chrome and Firefox that have thrown the most firepower into the fight. IE9 will see a review in the coming weeks but for now let’s look at the two big newcomers. …

Read More →

The current browsers wars will be on topic for this week’s Tech Wars Software feature but I wanted to preface with this weekend’s Firefox milestone.  The newest version of Firefox reached 104 million downloads over the weekend, a milestone that was achieved in just over a month.  Firefox has held onto its #2 spot in the browser wars for over 4 years but the speed with which the general populous …

Read More →

The hardware edition of Tech Wars will take a look at two competing products and the viewpoints of their defenders. This week we will take a look at the fourth generation Apple iPhone 4 and see how it stands up to the relative new comer the HTC Thunderbolt. Hardware Match Up iPhone: Defender: Ashley (Marketing & Ad) Service provider: Verizon Appraisal: The device is light weight, easy to use and …

Read More →

Amazon recently launched its Cloud Storage solution with little fanfare yet has already garnered much attention from critics and fans alike. For those who are unaware, Amazon’s Cloud Drive is an ambitious proposition and allows users to store music, documents, photos and even videos that can later be viewed from any computer with internet access. While Amazon has been marketing the service primarily as a MP3/music streaming service it …

Read More →

Earlier this week Apple released a massive update for its OS X operating system that addressed 54 security vulnerabilities. Among the most serious vulnerabilities are as follows: AppleScript: A format string issue existed in AppleScript Studio’s generic dialog commands (”display dialog” and “display alert”). Running an AppleScript Studio-based application that allows untrusted input to be passed to a dialog may lead to an unexpected application termination or arbitrary code execution. …

Read More →

My heart goes out to the people of japan with their triple whammy of disasters. One of my fears is that the rationing of power, the general destruction of infrastructure will prevent chip makers from the ability to produce commodity chip items that we require in everyday use for computers, computer equipment, smart phones, etc….. I’m wondering if there will be on-going shortages and subsequent price increases on this kind …

Read More →

Earlier this week Google encountered a service crash that affected over 150,000 people and left most of them without access to their email accounts. Google reported that the service outage only accounted for roughly .08% of their total user base but with an estimated 193 million users worldwide this still adds up to a shocking amount. Of those who were hit by the outage most discovered that all of their …

Read More →

For the last several years we’ve been dealing with a lot of Windows XP Kernel viruses.  These are viruses that infect the (normally unchangeable) Kernel of Windows XP only.  They’re devastating little viruses, and tend to require specialized tools to remove.  The problem is that once they’re in the Kernel, no standard antivirus in the world is going to get them out.  This is because the Kernel of an OS …

Read More →

As the holidays approach and festive online cards and games start to make their rounds it’s important to remember that not all email links and attachments spread cheer.  By certain standards, Conficker might well be the greatest piece of software ever created.  It’s fast and remarkably effective.  Too bad it’s also a Virus. Conficker is very likely the biggest virus to ever hit the internet.  Estimates are tough, but most …

Read More →

A new version of the Macro virus has begun propagating this month with disastrous effects for small business and home computer users.  The ability to identify this virus could save you and your business a lot of stress as we move into fall.  This version of the Macro virus typically spreads as an e-mail that claims to be from the post office and asks you to open a Microsoft Word …

Read More →

Windows XP as an operating system platform has been on its last legs for a couple years now but many of the big PC distributers have continued to enable it.  Dell, one of the top three PC manufactures in the world is about to change that with their new policy to stop selling PCs downgraded to Windows XP. While Microsoft ceased sales of Windows XP for private users some time …

Read More →

Through the utilization of the new hardware primary and secondary storage are combined into a single backup and disaster recovery device. Nimble Storage, a virtual technology hardware supplier, has launched a new product line that allows primary and secondary storage to be merged in a single iSCSI Array. The Nimble Storage CS-Series uses SATA and Flash disk drives to combine the two traditionally independent functions. The Nimble CS-Series is the …

Read More →

Most businesses in today’s internet driven world make sure they have a website without much thought to the benefits and dangers of website ownership.  Often businesses are unaware of where their website is hosted or who controls it.  This in itself can lead to disaster when it comes time to make changes but there are far greater risks for website ownership. A common mistake businesses make is to think that …

Read More →

Social media and social network website can be a great tool to promote your services or exchange contact information but there is a dark side to their services.  The growth in popularity of social media websites such as Facebook and MySpace has opened up new areas of revenue for marketers but has also opened the doors for malware distribution.   IT administrators now have to face the very real threat that …

Read More →

Computer viruses and malware may seem like a relatively modern concern but malicious software has existed since the early days of computer hardware. In recent years the media has played a large role in public awareness of malware with more frequent reports on the latest cyber threats. An even greater element to the increased awareness is that computers now permeate every aspect of modern life. With the increased awareness we …

Read More →

Business data archival is more than just good advice; it may determine whether or not your business survives.  A business can’t run without information and losing that data could result in extended downtime.   Because of this a secure and reliable backup solution should be a priority in any business. The first step to prepare for your backup solution is to identify business critical data.  Email records, reports, financial data, …

Read More →

Office network security should be among the top priorities for all office managers.  Over the last three years there has been a steady increase in the amount reported cases of data loss caused by system breaches and negligence.  As the information technology costs of business increase its important to be aware of potential problem areas and find ways to address them.  These ten tips can help you begin your search …

Read More →

It’s no secret that Google is one of the primary leaders in the realm of social content sharing. Today Google took this one step further with Google Buzz, a Gmail integrated plug-in that allows you to post new information directly from within the email application. So why should this matter to you? Social content sharing is one of the best ways to promote your business or product organically and can …

Read More →

The greatest IT concerns for small and medium businesses (SMb) in the New Year will be security and data backup and protection.   Over 50% of the average SMb IT departments’ time is spent with menial backup and routine administrative tasks.  Through the utilization of a virtualization solution your business can reduce the time it takes to complete everyday tasks, backup critical data and boost overall network security. Most of the …

Read More →

For the last couple months Microsoft has put forth a campaign to remind users that support for Windows XP SP2 will soon end. The official support end date for Windows XP Service Pack 2 will take place in the end of July 2010, roughly seven months from now. While this might seem like plenty of time it’s important to be prepared in the shift of support policy. Microsoft reported on …

Read More →

The start of a New Year means new business opportunities and the potential for new problems. January is the perfect time to have a thorough assessment of your company’s network infrastructure. As businesses look for ways to cut costs many have found their resources lacking when it comes to crucial business components. Proper assessment of your computer hardware and software will prepare your financial department for the expenses your business …

Read More →

Enjoy a festive short as you enjoy your winter festivities. Wishing you a fun and safe holiday. – Richard Keene IT Computer Support of New York Design and Optimization Department

The holiday season is a popular time for cybercriminals to host attacks again business computer systems.  With employees distracted with more important things and holiday media circulated freely cybercriminals are often given free reign to cause disruption and damage.  Patching system vulnerabilities is a low cost solution that can save a business thousands of dollars in damages in the long term. The number of reported vulnerabilities has been on the …

Read More →

Data Leaks have become one of the greatest threats to confront today’s businesses. With an increased demand for offsite work and the growth of digital media businesses are forced to combat outside attack attempts as well as negligence. In order to secure your companies private information consider these five steps. 1. Monitor Mobile Content. Businesses that store and enable access to private information over a virtual network need to keep …

Read More →

Wishing you a week filled with family, friends and laughter. Happy Thanksgiving from all of us here at IT Computer Support of New York – Richard Keene IT Computer Support of New York Design and Optimization Department

With the uncertain economy it’s no surprise that many businesses have decided to cut back on new hardware expenses. Cost reduction in an economic crisis is prudent but if a business cuts hardware upgrades entirely the result will be catastrophic. Hardware is the backbone of your business. Without it, your workers will be unable to complete their jobs and work will come to a standstill. Remember, these five critical upgrade …

Read More →

IT Computer Support of New York has experienced a high level of growth in recent months and we have recently moved to a new space to accommodate. We have taken advantage of the economic times, and have moved to a space that is triple the size with a beautiful view of the High Line and the Hudson River in the lovely Meat Packing District. With an efficient new air conditioning …

Read More →

When witches go riding, and black cats are seen, the moon laughs and whispers, ‘tis near Halloween. Happy Halloween from all of us here at IT Computer Support of New York – Richard Keene IT Computer Support of New York Design and Optimization Department

As we take a look at office health this month it’s important to remember that viruses are not limited to employees. Patching system vulnerabilities is a low cost solution that can save a business thousands of dollars in damages in the long term. The number of reported vulnerabilities has been on the rise for the last few years and reached over 3000 reported cases in 2008. With the high dependence …

Read More →

As summer comes to a close and we move into the fall and winter months it’s important to take precautions to ensure a healthy work environment. The eight hours you spend every day at the office is time that your immune system is bombarded with hundreds of contagions that can cause illness. In most cases the workplace is a closed environment with little care taken to ensure sanitation so it …

Read More →

2008 saw a huge global trend in Green business awareness. Ecological and social responsibilities are two of the major trends that will be important to your customers and investors this year. More than ever people want to do business with Green companies so take the opportunity to better yourself, your business, and the environment at large. 10. Encourage employee environmentally friendly behavior. Small concessions in employee behavior can make large …

Read More →

Overshadowed by Google for many years Microsoft invested $80 million dollars to develop a search engine that would rival the current search king. With roughly 60% of all searches in the U.S. carried out on its platform, Google is no easy target. Surprisingly, Bing stands out from the pack as a real contender. I have been a supporter of Google since the search engine made its start many years ago …

Read More →

After all the other areas that the Search Engine giant has branched out into, it should not come as a surprise that Google will now focus on the development of its own operating system. Google, which has already changed the way many people think about computer applications hopes to accomplish the same at a much larger scale. The new OS named Chrome, just like the companies web browser, is planned …

Read More →

Microsoft announced May 28th that it is aware of a possibly dangerous vulnerability present in many of its operating systems. The threat advisory revealed that the source of the problem comes from hackers who have released compromised QuickTime media files. If you use Windows 2000, Windows XP or Windows Server 2003 your computer may be at risk. The Direct X vulnerability targets an unprotected sector in DirectShow programming interface used …

Read More →

AOLs instant messenger client AIM has been part of business networking for years but like all services with a large user base it can run into problems. For the last few months many users have reported problems with the AIM service and the inability to log into their accounts. The amount of data that runs through AOLs servers is enormous so it is often possible for one group of users …

Read More →

In an interesting development Google has taken the concept of Green Technology and moved it to a whole new level; or to be quite accurate, out to sea. The novel idea has awarded Google with a patent for the production of offshore datacenters to be used to help with the massive amount of information that goes through their search engine every day. The idea of the floating data centers is …

Read More →

Last week Microsoft officially canceled support for the Windows XP operating system. This announcement goes hand in hand with the soon to launch Windows 7 and is an obvious attempt to encourage an upgrade. There is still the option for businesses to request support but now the request will come at a price. Tuesday April 14th closed the door on mainstream support for the most popular operating system in circulation …

Read More →

After the relative flop of Windows Vista, Microsoft has decided to take a much more proactive approach to the launch of Windows 7. In an effort to encourage trial and upgrade Microsoft has decided to allow purchases of the new OS to downgrade to Windows XP if the new operating system doesn’t suit their needs. Windows XP is still the default operating system for the majority of businesses and home …

Read More →

The Conficker worm may not have created a large scale disaster but the danger is still very real.

Read More →

The first version of the Conficker computer worm was released in late 2008 but experts expect that the infection will spread on April 1st. It is believed that the worm has already infected over 5 million machines. The infected computers act as a carrier for the worm, remaining dormant but capable of reactivation if the original author switches them on. According to the director of CA, a New York threat …

Read More →

Yesterday Microsoft released the final build of Internet Explorer 8 for public download. Since part of my job is to ensure that our websites are compatible against all I decided to be the company guinea. Let’s see how IE8 stacks up against the other top browsers today. After installing the new browser IE8 complied in true Microsoft fashion and crashed immediately. An auspicious start but I reopened the program and …

Read More →

For years Google has used its search engine and custom applications to match products and services to keyword content. Up until now this has consisted largely of simple keyword advertisements. Type “shoes” in Google, for example, and you will get advertisements from shoe company partners. Last week Google proposed to change all this with their plan to make ads “more interesting.” The idea behind the content shift is that keyword …

Read More →

With the uncertain economy it’s no surprise that many businesses have decided to cut back on new hardware expenses. Cost reduction in an economic crisis is prudent but if a business cuts hardware upgrades entirely the result will be catastrophic. Hardware is the backbone of your business; without it your workers will be unable to complete their jobs and work will come to a standstill. Remember, that just because the …

Read More →

I am often amazed by the number of people who use social networking sites such as Facebook and Myspace. If you broaden your search to include more business oriented locations such as Linkedin you will even spot many of the people who work here. With the high traffic high profile user base you have to ask the question, how secure are social networking sites? Recently, Facebook has received a lot …

Read More →

Earlier this month IT Computer Support of New York ran an article in our newsletter about the benefits of a green business. While it might seem like a contradiction to devote resources into Green Technology to save money it really isn’t. Innovations in hardware technology have made it not only efficient but impractical not to take advantage of Green Technology. Most people associate a Green Business plan with radical ideas …

Read More →

Video sharing sites like Youtube and Google Video have become second nature and trusted by all web 2.0 users. The last two weeks has broken this trust, however, as Google Video have been targeted by blackhat SEO campaign operators. The site has been put to use to spread malware using Google’s own search engine rank algorithms against themselves. Because this method of infiltration is a new development in malware distribution …

Read More →

In the last two weeks there have been outbreaks of two Mac Trojans. That might seem fairly common place in the Windows world but Mac has a long history of being relatively immune to virus threats. This actually brings up an interesting issue as well. Apple has been trying to position themselves as a direct competitor to Microsoft for years and the tools they have marketed themselves on are ease …

Read More →

ITCSNY started construction on their new iSCSI SAN Virtual Storage Solutions Website some time ago and we have been working to build up the programs to support it. The final step for us has been to issue a formal press release, which went out earlier this week. “New York, NY (PRWEB) January 14, 2009 — IT Computer Support of New York is proud to announce the launch of their iSCSI …

Read More →

Earlier this week Microsoft revealed that in preparation for the release of Internet Explorer 8 they have taken steps to make the transition as easy as possible. Internet Explorer 8 has a planned release as part of the auto update functionally of all Windows Operating Systems. “We believe IE8 helps make browsing the web faster, easier, safer and more reliable. To help our users be more secure and up-to-date, we …

Read More →

With Windows 7 planned for launch later this year it’s a good time to take a look at some of the changes you can expect from the new operating system. The first thing most people are interested in is whether or not Windows 7 is faster than the resource wasteful Vista. From early test the results are very positive with Windows 7 10%-15% faster than Windows Vista on similar hardware …

Read More →

Email correspondence is used in place of direct and phone communication hundreds of times every day by businesses all around the world. In spite of this the messages that get sent out rarely imbue the qualities that businesses would want to be associated with. All too often email messages are written in shorthand which is both difficult to comprehend and damages the credibility of the business. In a world of …

Read More →

Happy Holidays from all of us at IT Computer Support of New York. Some Holiday Cheer – Richard Keene IT Computer Support of New York Design and Optimization Department

When Google released the beta version of Google Chrome earlier this year it was received with a mixed reception. The browser that had been announced as faster and more secure then either Firefox or Internet Explorer proved instead to be little more than a cosmetic alternative. Now however, Google is ramping up its Chrome promotion campaign by cutting default stature from Firefox. Until recently Firefox had been the default browser …

Read More →

IT Computer Support of New York is proud to announce the launch of our iSCSI SAN Virtual Storage Solutions website. ITCSNY has partnered with Dell and EqualLogic to become a certified provider of iSAN ™ Virtual Storage Technology. All of us here at IT Computer Support of New York have been working hard to supply our clients with the opportunity to benefit from this technology so this launch marks the …

Read More →

Microsoft announced Tuesday that a critical vulnerability has been found in Microsoft Internet Explorer 7. The flaw in the browser can allow cybercriminals to gain access to your computer and steal your passwords. Security experts are advising users to switch to an alternate internet browser until an emergency patch can be issued. It is highly recommended that all Internet Explorer 7 users cease using the browser until Wednesday night. (Update) …

Read More →

Earlier this week Microsoft released a number of critical patches for vulnerabilities contained in Microsoft applications. Microsoft releases Tuesday updates regularly but with 28 vulnerabilities, 23 of which are listed as critical, this is the largest Patch Tuesday release in five years. The number of vulnerabilities, while alarming, should be taken as a warning more than a threat and proves the importance of keeping up to date on system patching. …

Read More →

Using major holidays as a means to infect consumer computers is nothing new but in recent years the practice has become more elaborate and invasive. With greater access to content creating applications such as Flash and Photoshop the malware created by cybercriminals often rivals legitimate content in visual quality. The first batch of this year’s holiday malware has already been unleashed, and with it, nine possible exploits for your systems. …

Read More →

Back before the onset of Windows 95 Boot Viruses were all the rave for malware distributing hackers. Back then Microsoft saw the problem managed to solve the issue of the auto installing viruses. Now more then ten years later the same problem has again risen and it’s more dangerous than ever. Portable USB storage devices are now as common as floppy diskettes were ten years. USB devices offer fast reusable …

Read More →

For those that support the holiday I wish you and your families a happy and safe Thanksgiving. – Richard Keene IT Computer Support of New York Design and Optimization Department

On Wednesday Microsoft announced that the previously expected end of year release of Internet Explorer 8 would be pushed back into 2009. IE8, which entered public beta in March has undergone scrutiny for compatibility issues but was still expected to be ready for a winter 2008 release. The news that this will no longer happen has unleashed further hostility in the community from those who have adopted Firefox. Microsoft has …

Read More →

Microsoft Office has been the gold standard for business productivity software for more then a decade but Google is once against taking strides to stand out against convention. As most people know Google has become more than just a search engine. One of their many branches has been developing web based productivity tools. Not wanting to lose ground in an online marketplace, Microsoft has recently released new versions of SharePoint …

Read More →

With all the news in recent weeks about computer exploits and network vulnerabilities IT Computer Support of New York has started a program to assist businesses. Earlier this week we sent out a notice to our current clients offering our patching service. Patching may not seem like that big of deal, but the truth is that most businesses are running outdated servers and are in danger. Often the problem companies …

Read More →

When Windows Vista was released three years ago it was heralded as the second coming of operating systems but instead it was met almost universally with scorn. Since then, however, many people have begun to adapt and even accept Vista as a viable upgrade from windows XP. It’s not surprising that Microsoft was eager to be done with bad publicity but what IS surprising is that now instead of trying …

Read More →

Chrome Beta 3 arrived recently to the fanfare of Google aficionados but few others. What is Chrome you might ask? Well for the uninitiated its Google’s news web foray; a proprietary internet browser that they had hoped would surpass IE and Firefox in user base. The promise behind Chrome stems primarily from its pedigree. The Google search engine took the world by storm and has grown to become an everyday …

Read More →

Earlier this year in August IT Computer Support of New York ran an article in our newsletter on the pros and cons of Disruptive Technology. The overall consensus was that while it is important to research a new technology before jumping into a major change it is vital to adapt when the time is right. For the last couple months ITCSNY has been building a greater working partnership with Dell …

Read More →

Today Microsoft released a Critical patch for its Server Service Applications. The Microsoft Security Bulletin MS08-067 update resolves a vulnerability in the MS server service. The vulnerability makes it possible for a worm or Trojan to freely gain access to your systems. Microsoft has released this patch today “out of band” (not on the regular Patch Tuesday) which speaks volumes of the threat this vulnerability poses. It is absolutely crucial …

Read More →

The last month has been an interesting time here at IT Computer Support of New York. As many of you have probably noticed last month we started revitalizing our web presence with a new look and new functionality. As part of this we have been working to bring all of aspects of our company in line with our new Blue 2.0 Design. The goal of all of this has always …

Read More →

Not so many years ago the bulk of cybercriminal activity was conducted through email. Would be hackers could target huge percentages of the population with little effort and cause mayhem with very little effort. But as businesses and private users became aware of the danger of email exploits these Cybercriminals were forced to relocate their activity elsewhere. Sadly, a world of possibilities was still available to them in the form …

Read More →

The growth of technology and widespread availability of broadband connectivity has allowed for an emergent new sector in the American workforce. Web Commuters. The relatively recent development has grown greatly over the last few years and recent studies now reveal that they make up as much as 23% of the American workforce. Web Commuters are defined as employees who regularly conduct at least a few hours of work a week …

Read More →

Google marked its 10th anniversary earlier this month and what a decade it has been for them. Google was launched on September 7th 1998 to little fanfare. At the time most people didn’t see the benefit of a new search engine. Everyone had Yahoo and as far as anyone was concerned that was enough. But it didn’t take long for the world to warm to the young search engine. The …

Read More →

A recent study conducted from GFI Software has revealed that more than half of the small and medium sized businesses in the U.S. have not yet implemented a system of archiving emails. With the majority of business correspondence now taking place via the internet this is a huge disaster waiting to happen. The reasons behind the shortcomings are as varied as the businesses reporting them. Many businesses claim to be …

Read More →

People within the IT world are still reeling from the introduction of Window Vista but already Microsoft is moving ahead with designs for a new “better” operating system. Although the actual specs are long from finalized it is believed that the 7th version of Windows will also be the last to use 32bit architecture. As many know 64 bit operating systems are nothing new, with both Vista and previous versions …

Read More →

The internet is the backbone of modern business and yet the internet browsers that companies use are often the most neglected pieces of software. The complications that can arise from this are both detrimental to production cycles and hazardous to the security of any information sent by the internet. Internet Explorer 6 was released on August 27 2001; seven years later it still holds 24% of the online browser market. …

Read More →

The advertising has evolved steadily over the last decade with new advances leading to changes in the way that common business is done. Last year nearly 22 billion dollars was spent globally on internet based advertising. 81% of shoppers now claim to research a product or service prior to making a purchase. This change has led to a greater demand in the functionality of websites. 52% of shoppers find new …

Read More →

During the 2007 TED(Technology Entertainment Design) conference a piece of photosynth software called SeaDragon was announced. The program, which uses images in much the same way as a search engine uses text, was impressive but at the time seemed like a far off pipedream. Focus back on today and that pipedream has been fully realized and the program has launched with a demo. What makes photosynth so intriguing is that …

Read More →

The month of July stood out this year as having some of the most malicious Viruses in quite some time. Google, in association with virus and spam filtration program Postini reported that Virus Spam peaked on July 24th with nearly 10 million suspicious emails. Google, which has long kept a watchful eye on the online world, has taken a special interest in the prevention of Spam and Virus attacks for …

Read More →

Most web proficient businesses have turned to the allure of paid click advertising at some point during their run of online advertising. When done correctly this can lead to a boost in sales as the prominent search engines; namely Yahoo and Google, go out of their way to promote these techniques. Despite its popularity recent congressional mediation has raised concern over this form of advertising and the two search engines …

Read More →

Among the younger generations of web viewers the Firefox browser developed by Mozilla has already overtaken the market. In an effort to continue this trend Mozilla has announced that it will be looking towards the community of the release of its next generation. Firefox already has a high degree of open source functionality but by putting a call out to the community directly they plan to extend their service even …

Read More →

Well not quite but it’s looking to shake things up a bit. Recently, Esquire Magazine announced that it would be doing something different to celebrate its 75th year. This October when the celebratory issue hits newsstands it will be the first magazine in history to have a moving digital image on the cover. While this might appear gimmicky it does offer up a number of interesting possibilities in the future. …

Read More →

Most people are familiar with the traditional forms of media advertising; the billboards, the TV advertisements and all forms of web based marketing. Quite recently a new trend has been emerging among advertisers who focus on the 18-34 demographic. Online gaming. This might seem a strange outlet for advertising dollars but recent trends have shown this to be anything but. In recent years the American games industry has grown to …

Read More →

IT Computer support of New York is proud to sponsor the 2008 Optimist National Regatta. The event, which hosts close to 450 competitors from around the country is being held in Shorefront Park part on Long Island’s Great South Bay and allows competitors ranging in age from 8-15 to race for the title. This may seem like a departure for a technical support company but rest assured that this couldn’t …

Read More →

As many people already know Google is the king of online search tools; what people may not know is how high above the competition their crown sits. Recent findings based on a sample of 10 million U.S. Internet users states that Google holds a massive 70% hold on all searches in America. Google’s supremacy has been on the rise for quite a few years leaving previous giants like Yahoo and …

Read More →

People have been told for years the importance of backing up the information and critical data from their computer systems. In my experience of working with different businesses and common people most lack even the most basic backup system. Most people make the assumption that if nothing has happened yet then nothing ever will; this is a terribly arrogant position to take and one that can have disastrous repercussions. Another …

Read More →

Anyone who read my previous entry regarding Windows Vista will already know my opinions of Vista in the work place but that isn’t to say that I am a hater of the OS. Quite the contrary in fact; it might surprise people to learn that on my person home computer I do in fact have Windows Vista Home Premium installed. So now you may be thinking the writer of this …

Read More →

With the economic downturn of the American economy many businesses are faced with the problem of cutting cost but keeping quality high. Until recently the tech support branches of American businesses had been largely impervious to the problems faced by the economy. Recent studies, however, have shown that that this might have led many to a false sense of security. With no guaranty that the economy will be picking up …

Read More →

In this day and age a high percentage of the words business is carried out over the web. With the rising cost of fuel and the growing ease of digital distribution this doesn’t look to be going in any direction except for up. With this in mind Search Engine Optimization is going to grow even further in importance and as a business owner, or even a web hobbyist its crucial …

Read More →

Viral marketing in business has gone from a curiously to the norm in the matter of just a few short years. Currently bachelorette students in college majoring in everything from pure Business to Graphic Design and multimedia studies are required to take entire courses dedicated to viral marketing. What is viral marketing you might ask? Well that gets a little hazy because viral marketing can be as diverse as the …

Read More →

Are you a CEO, CIO or CFO utilizing the same computer support model you did in 1989? 1979?The Internal IT department ‘model’ has become an expensive and ineffective dinosaur. Outsourcing IT functions to managed services specialists cut IT costs by 30%-60% while providing superior service and support. Outsourcing IT support provides you with technological advantages without the usual costs associated with retaining in-house IT staff. Think of the costs and …

Read More →

This morning, I opened my web browser and one of the articles posted was about Customer Service. Here is the list of the worst according to MSN Money’s second annual Customer Service Hall of Shame. AOLComcastSprintAbercrombie & FitchQwestCapitol OneBank of AmericaTime WarnerHSBC FinanceCox Communication. This is a subject I know a bit about since my personal career has involved various forms of customer service whether on the phone or face …

Read More →
Uncategorized | IT Computer Support of New York