(914) 595-2250        

EZ MSP Blog

EZ MSP has been serving the Yonkers area since 2008, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Need to Properly Dispose of e-Waste

Why You Need to Properly Dispose of e-Waste

Technology has become more commonplace in offices and homes all around the world, and you might find yourself replacing it more often than previously thought. This leads to an awful lot of waste that can accumulate in your office, be it an extra smartphone, desktop, or something as simple as a random, non-functional hard drive. However, getting rid of your old, unnecessary tech isn’t as simple as throwing paper into a recycling bin, and it shows in the amount of e-waste that infects the world every day.

Continue reading
0 Comments

Tip of the Week: Keeping Productivity Up When the Internet is Down

Tip of the Week: Keeping Productivity Up When the Internet is Down

Modern businesses rely pretty heavily on the Internet--so much so that, should the Internet go down, many employees will find themselves at a loss as what to do. However, there’s no need to sacrifice productivity just because your Internet isn’t cooperating. There are plenty of ways to get something done on a day that the Internet calls in sick, which we’ll go over for today’s tip.

Continue reading
0 Comments

ALERT: Meltdown/Spectre Vulnerability Grants Malware Access, Patch It Today

ALERT: Meltdown/Spectre Vulnerability Grants Malware Access, Patch It Today

Mere months after the firmware in their computer chips was found to be seriously flawed, Intel’s flagship product has once again brought some unpleasant attention to the company. While the issue now has a fix, there was the possibility that a solution could depreciate the functionality of the CPU.

Continue reading
0 Comments

You Can’t Ignore the Elephant in the Server Room

You Can’t Ignore the Elephant in the Server Room

If there’s an issue that everyone is hesitant to acknowledge, it is said that there is an elephant in the room. Many companies may find that today, these elephants live in their server rooms. We’ll acknowledge these elephants and talk about a few ways that you can evict them from your company’s IT.

Continue reading
0 Comments

Tip of the Week: Mastering Page Orientation in Microsoft Word

Tip of the Week: Mastering Page Orientation in Microsoft Word

There are times when using Microsoft Word that will require the addition of an outside element, usually something like an Excel sheet, PowerPoint slide or other visual aid. A common issue faced by users is having to significantly alter the size of the external element to fit between the margins of the portrait orientation, ultimately detracting from its impact.

Continue reading
0 Comments

Is Your Cybersecurity Prepared for 2018?

Is Your Cybersecurity Prepared for 2018?

2018 could potentially be a big year for your business. However, your business needs to be around long enough to see any positives that may come its way, which means you need to be prepared for the negatives. Here are five resolutions for you to make this year to help preserve your organization’s cybersecurity.

Continue reading
0 Comments

Identifying Personality Types will Help Your Networking Efforts

Identifying Personality Types will Help Your Networking Efforts

One experience that almost everyone has been involved in is the clashing of personalities. This is only natural, as different people are born with different predispositions and are raised in differing environments. However, in the business world, one should do their best to keep personal differences from affecting the professional relationships they form.

Continue reading
0 Comments

Tip of the Week: Is OneNote, or Evernote, Right for Your Business?

Tip of the Week: Is OneNote, or Evernote, Right for Your Business?

When taking notes that relate to a business’ operations, these notes need to meet certain standards of clarity, cohesiveness, and comprehension. To accomplish this, you will need the right tools at your disposal. Today’s tip will evaluate two of the industry’s best note-taking applications to help you identify which is best for your needs. The applications: Microsoft OneNote, and EverNote.

Continue reading
0 Comments

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

Continue reading
0 Comments

5 Ways to Reduce Technology-Related Stress in the New Year

5 Ways to Reduce Technology-Related Stress in the New Year

Your business either has a sound plan to manage its IT maintenance, or it does not. There is no middle ground here. Either you have an internal team dedicated to maintaining your IT infrastructure, or it’s not being taken care of as well as it should be. Even if you do have an internal team, you might notice that they simply don’t have time on their hands to handle all of their responsibilities. We’re here to introduce you to one of the most notable ways of keeping your technology in proper working order: managed IT services.

Continue reading
0 Comments

Tip of the Week: Use Excel Like a Pro - Graphing

Tip of the Week: Use Excel Like a Pro - Graphing

Excel is the premier spreadsheet builder, and it’s extremely valuable that your organization get the most out of it. Spreadsheets are ideal for showcasing information in a compact manner, but without a couple of charts, your users will just be staring at cell after cell of boring old numbers. By using charts in Excel, you can take your spreadsheet building to the next level.

Continue reading
0 Comments

Cybersecurity Can't Stop During the Holidays

Cybersecurity Can't Stop During the Holidays

This Christmas, technology is everywhere. Traditionally, the holidays were a time when things slowed down for businesses and people spent time with their families and put their work on the back burner. Those days are over. Today’s professional is lucky to get a day off for Christmas; and, because of the way business works today, may be asked to do more than ever around the holidays.

Continue reading
0 Comments

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

Continue reading
0 Comments

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Cortana, Windows 10’s built-in personal assistant, has proven to be useful for those users who have taken advantage of her services. Sometimes, however, the Cortana interface will answer when another person in the room beckons her. For Cortana to work for one person, and to obey only one voice, the software needs to get to know that voice.

Continue reading
0 Comments

Wireless Charging Is Catching On

Wireless Charging Is Catching On

Mobile devices have become a staple in the modern workplace. You’d be hard-pressed to find a business that doesn’t utilize smartphones or tablets in some way. However, mobile devices will never be truly mobile while they need to be tethered to wires plugged into outlets or USB cables due to batteries losing their charges. An innovation called wireless charging has attempted to shake this concept up, but has it proven successful? Just what is wireless charging, anyway?

Continue reading
0 Comments

Two-Factor Authentication Frequently Asked Questions

Two-Factor Authentication Frequently Asked Questions

Data security has to be a core consideration of the modern business, so every small effort you can take to protect your business is important. One such effort is the implementation of two-factor authentication. However, your employees may not initially feel entirely comfortable with some facets of two-factor authentication.

Continue reading
0 Comments

Tip of the Week: Syncing Email Across Multiple Devices

Tip of the Week: Syncing Email Across Multiple Devices

It’s true that email is such a common solution that most people don’t think twice about how it works. However, it’s imperative that you at least understand the concept, as it can provide you with a considerable advantage when it comes time to optimize email access on your mobile devices. First, we’ll discuss the ways in which the two major message exchange protocols differ, and then dig into the specifics of why you should choose one over the other.

Continue reading
0 Comments

Credit Card Theft and Identity Theft are Not the Same Thing

Credit Card Theft and Identity Theft are Not the Same Thing

While many might see having a credit card stolen as identity theft, this is an oversimplification that can prove dangerous. While credit card theft can be an element of identity theft, equating the two means that other forms of identity theft are overlooked. In today’s blog, we’ll go over why identity theft and credit card theft aren’t exactly the same thing, and what you can do to help keep your business safe from damage.

Continue reading
0 Comments

Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

Continue reading
0 Comments

Tip of the Week: Did You Know Your Computer Can Do All This?

Tip of the Week: Did You Know Your Computer Can Do All This?

Your computer is mostly just a machine used to accomplish specific tasks. This doesn’t mean that you shouldn’t know all of the advanced tips that help you get the most out of it, though. Here are some of the best shortcuts that you can use to take full advantage of your workstation.

Continue reading
0 Comments

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Internet Business Computing Best Practices Hackers Hosted Solutions Backup Software Microsoft Productivity Business Malware IT Services IT Support Google Business Continuity Hardware Efficiency Mobile Device Management Network Security Windows Disaster Recovery Email VOIP Computer Miscellaneous User Tips Managed Service Provider Innovation Workplace Tips Server Network Mobile Devices communications Business Management Data Save Money Smartphone Mobile Computing Outsourced IT Windows 10 Holiday Virtualization Android Data Backup Chrome Managed IT Services Social Media Small Business Managed IT BYOD Microsoft Office Best Practice Upgrade Employer-Employee Relationship Firewall Data Recovery Cybercrime Information Technology The Internet of Things Collaboration Operating System Productivity Communication IT Solutions Office Browser User Error Telephone Systems Hosted Solution Alert Spam Remote Computing Computers Avoiding Downtime Budget Saving Money Hacking Health Quick Tips Going Green VPN Saving Time Application Phishing Apps Wireless Technology Recovery Remote Monitoring WiFi Cybersecurity Gadgets Smartphones Mobility Marketing Audit Gmail Data Management Phone System Content Filtering Unified Threat Management Government Proactive IT BDR Automation Apple Bandwidth Two-factor Authentication Big Data Maintenance Tablet Facebook Social Shortcut Streaming Media Outlook Business Intelligence Compliance History Unsupported Software Windows 10 Administration IT Support Cloud Computing Vulnerability Retail OneNote Social Engineering Ransomware Cost Management Password App Office 365 Disaster Managed IT Services Intranet Excel Lithium-ion battery Mobile Office Hard Drives Passwords iPhone Data Security Analytics Google Drive Printer Applications Risk Management Data Protection Internet of Things Search PowerPoint Printer Server Sports Biometrics Encryption Networking Bring Your Own Device Tech Support Law Enforcement Commerce Education Humor Meetings Value Net Neutrality Emails Antivirus Politics Network Congestion Data Storage Storage DDoS Telephony Laptop Robot Data Breach Router Google Docs Money Private Cloud Redundancy HIPAA eWaste Fax Server Travel Office Tips Solid State Drive SaaS Customer Service Cortana Charger Computer Care NFL Touchpad Hard Disk Drive Bluetooth Settings HaaS Virtual Reality Lifestyle Best Available Wireless Charging IT Management Buisness Word SharePoint IT Technicians Inbound Marketing Programming Legislation Personal Information Evernote WIndows Server 2008 Files Windows Ink Near Field Communication Teamwork Trending Twitter Instant Messaging Current Events Comparison Avoid Downtime Workers Patch Management Chromecast Upgrades Human Resources Computer Accessories Google Maps Reputation iOS Update Bloatware Point of Sale Specifications Updates Regulation Administrator Consultant Mouse Colocation IT consulting Computer Fan Running Cable Paperless Office Managed IT Service Work/Life Balance OneDrive Sales Online Currency Microsoft Word Wearable Technology Sync Access Support Touchscreen Benefits Software as a Service Hacker Reliable Computing Dark Web Wi-Fi Conferencing Document Management Adobe Transportation Entertainment Branding Data Loss Relocation Vendor Management Screen Mirroring Safety Gifts Save Time Licensing IT Consultant WannaCry Distributed Denial of Service Cast Emergency Customer Relationship Management USB Identity Theft Mobile Data storage Regulations Webinar IT service Science ISP Microsoft Excel WIndows 7 Nanotechnology Internet Exlporer Credit Cards Professional Services Cameras IT solutions Domains Busines Management File Sharing Managing Stress Root Cause Analysis Television HBO Uninterrupted Power Supply Users Virtual Desktop FAQ Tablets Presentation Windows 10s Artificial Intelligence User Augmented Reality

Mobile? Grab this Article!

QR-Code

Recent Comments

Will Takera Tip of the Week: Mirroring Your Android’s Screen, Made Easy
16 August 2017
Actually, Chromecast can also help with an Android phone mirroring. Referring to a YouTube video, I ...

Blog Archive