fbpx

EZ MSP Blog

EZ MSP has been serving the New York area since 2008, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Employment Scams Have Recently Exploded

Employment Scams Have Recently Exploded

With COVID-19 creating an unsure situation for so many businesses, and by extension their employees, these employees are suddenly finding themselves in a vulnerable position. Regardless of whether or not your employees are able to come into the office right now, it is important that you share the following information with them, as it may help to keep them out of a tough spot.

Continue reading

What We Can Learn from Some Foreboding Security Predictions

What We Can Learn from Some Foreboding Security Predictions

With the COVID-19 crisis far from over, many businesses have had their attention pulled away from their cybersecurity needs by the concerns that the current health crisis has generated. Here, we’ll be reviewing some of the observations that a group of 273 cybersecurity professionals have made, courtesy of an annual survey.

Continue reading

Reopen Your Business with Confidence

Reopen Your Business with Confidence

As the COVID-19 pandemic rolls on, many businesses continue to operate remotely with an eye toward reopening their office soon. Today, we thought it would be a perfect time to go over a couple of things that small business owners will need to address as people begin coming back into the workplace. 

Continue reading

Why You Need to Audit Your Security

Why You Need to Audit Your Security

A security audit is designed to test the overall integrity of your business when it comes to its IT security. In today’s environment, businesses need to have strengthened fortifications in place to protect themselves from cyberthreats, and these fortifications need to be properly tested and reviewed over time. Let’s talk about some of the types of audits and their benefits, and how you can assess your security.

Continue reading

What We Can Learn from the 2020 Data Breach Investigations Report

What We Can Learn from the 2020 Data Breach Investigations Report

Starting in 2008, Verizon has produced a report outlining the cybersecurity incident trends that the previous year demonstrated. In doing so, they have provided a resource that gives businesses greater insights into where their cybersecurity efforts need to be focused. Let’s go over some of 2019’s trends and insights that were highlighted in the Verizon Business 2020 Data Breach Investigations Report (DBIR).

Continue reading

Where Is All of Your Data?

Where Is All of Your Data?

Quick question. If I were to ask you, on the spot, to tell me where all of your company data is, right this moment, could you tell me with absolute confidence? What if I could prove you wrong?

Continue reading

The Importance of Secure Conferencing

The Importance of Secure Conferencing

Conferencing has been an important tool for businesses as stay-at-home orders have moved their operations out of the office and into worker’s homes. While there are dozens of video conferencing solutions on the market, businesses should consider security just as much as they consider functionality. Today, we’ll take a look at security for your company’s conferencing solutions.

Continue reading

The Definitive Guide on Password Best Practices

The Definitive Guide on Password Best Practices

Protecting your online accounts, your data, and your customers’ information is now more important than ever. Industry and state-mandated compliances are now forcing businesses to tighten their cybersecurity, and it’s critical that every human being on the Internet take their own personal security seriously. This guide is designed to provide the best practices for strong passwords.

Continue reading

What You Need to Consider to Securely Permit Remote Work

What You Need to Consider to Securely Permit Remote Work

At any given time, a business needs to consider its security, but this need only exacerbates when its employees are working remotely. With the coronavirus pandemic still in play, the likelihood is that your employees are in this situation has risen dramatically. In order to maintain  your organizational security, you need to consider the many factors that a remote workforce can introduce.

Continue reading

Let’s Look at the Different Types of Ransomware

Let’s Look at the Different Types of Ransomware

The growing popularity of ransomware has been disconcerting to many IT professionals, particularly due to the different tactics that this malware variant has been spotted utilizing. In order to protect your business from these attacks, it helps to know how they work. We’ve put together a beginner’s field guide to ransomware types to help you identify (and hopefully avoid) it.

Continue reading

How to Talk Tech with People That Don’t Know About IT

How to Talk Tech with People That Don’t Know About IT

Businesses are looking to technology more than ever in a constant attempt to improve productivity and efficiency. One problem that some businesses face is that their staff isn’t exactly technologically savvy, making them difficult to communicate with about technical concepts. This month, we aim to help you do a better job of communicating with those workers who don’t know much about technology.

Continue reading

The Security Questions Surrounding Cloud Solutions

The Security Questions Surrounding Cloud Solutions

All types of businesses use cloud resources as a part of their IT infrastructure. It allows them to turn what was once a major capital expenditure into a controllable operating cost; and, it does it while offering solutions to almost any business problem. The one drawback that most IT professionals agree on is how to gain enough control over a cloud platform to ensure that the platform is secure. 

Continue reading

How to Get Rid of an Old Computer Without Sacrificing Security

How to Get Rid of an Old Computer Without Sacrificing Security

Time passes, and things get old. This is especially true of technology, as new and better options are developed and released all the time. Sooner or later, you’re likely to find yourself in need of a new system… The only question left is how to get rid of the old one.

Continue reading

Do Inherent Security Risks Make Smart Devices Dumb?

Do Inherent Security Risks Make Smart Devices Dumb?

Over the past few years, there has been a general fascination with smart devices in the home, and to a certain extent, the office. These Internet of Things-powered appliances and gadgets can help add to the convenience of rote tasks and other everyday activities, but is it actually a good idea to use them? As it turns out, unless you’ve taken the proper precautions, maybe not.

Continue reading

Tip of the Week: 3 Considerations When Securing Personal Information

Tip of the Week: 3 Considerations When Securing Personal Information

Personal information is precious, especially in this increasingly digital day and age. This makes it incredibly important that you are doing everything you can to protect it in your business - whether it is your own or belongs to somebody else. Here, we’ll go over a few tips to help you better protect the data you’re responsible for.

Continue reading

Best Practices for Your Access Management

Best Practices for Your Access Management

As you oversee your business, there is a lot that you’re going to have to manage - including how much access your employees have to the data you have collected and generated throughout your operations. An access management policy can help you to accomplish this. Here, we’ll review a few key features you need to include in your strategy.

Continue reading

What Are the Biggest Cybersecurity Concerns Going into 2020?

What Are the Biggest Cybersecurity Concerns Going into 2020?

Cybersecurity should always be a priority for a business, and cyber criminals are always evolving their tactics. As a result, it pays to keep an eye on the horizon for the next looming threats. Here, we’re reviewing a few threats that cybersecurity professionals say that businesses should be concerned about in the near future.

Continue reading

Google Knows a Lot About You. Here’s How to Control It

Google Knows a Lot About You. Here’s How to Control It

Nearly everyone uses Google in some way or another. The search engine is, by far, the most common way people get answers and find content online. The margins aren’t even close, either. Currently, Google handles about 90% of search queries, while the second and third place goes to Yahoo and Bing, who share just below 5% of the search market share.

Google curates the search results on the fly based on a lot of variables including where you are located, what kind of device you are on, and your online surfing habits. This means Google is collecting a lot of information about how we use the web to give us a better experience. Let’s look at how you can control what Google knows about you to better protect your privacy.

Continue reading

Some of the Worst Data Breaches Since September

Some of the Worst Data Breaches Since September

Cybersecurity is becoming a massive issue for every organization due to the immense amount of data breaches that take place regularly. Businesses of all types are looking at strategies to protect their sensitive customer and employee data from hackers, malware, and any other potential danger. The problem is it’s not always as simple as just implementing cybersecurity software.

Continue reading

Automation Plays a Critical Role in Cybersecurity

Automation Plays a Critical Role in Cybersecurity

Automation is sometimes misconceived as a troublesome or unreliable addition to business. It’s not about replacing people with machines, it’s about getting more done with the people you have. Having an attitude that doubts technology and believes nothing can replace human processing can quickly put you at a disadvantage compared to your competitors.

Continue reading

Contact Us

Learn more about what EZ MSP
can do for your business.

EZ MSP
7 Odell Plaza Suite 134
Yonkers, New York 10701

Connect With Us

Facebook logo  Twitter logo  Linkedin logo  RSS feed

Latest Blog

With COVID-19 creating an unsure situation for so many businesses, and by extension their employees, these employees are suddenly finding themselves in a vulnerable position. Regardless of whether or not your employees are able to come into...