Archives
Categories
- Announcements
- Apple
- Applications
- Arctic Wolf Networks
- Azure
- Azure Virtual Desktop (AVD)
- Backup and Disaster Recovery
- Business Continuity
- BYOD
- Cloud Computing
- Compliance
- Coronavirus
- COVID-19
- Cryptocurrency
- Customer Service
- Cybersecurity
- DFARS
- Dynamics NAV Hosting
- Ethical Hacking
- Firewall-as-a-Service
- HIPAA
- iOS
- IT Best Practices
- IT Expenses
- IT Outsourcing
- IT Security
- Legal Vertical
- Linux
- Managed IT Services
- Medical, EMR, EHR
- Microsoft Azure
- Microsoft Power Platform
- Mobile
- Mobile Computing
- New Jersey
- New York City (NYC)
- Office 365
- PCI
- Rancho Cucamonga Location
- Regulatory Compliance
- SharePoint
- SiteLink
- Small Business
- SOCaaS
- Software Development
- Sort of Technical
- Tools/Utilities
- Troubleshooting
- Ubuntu
- Uncategorized
- Very Technical
- Virtualization
- Windows Cloud PC
- Windows Surface
- Windows Virtual Desktop (WVD)
- Work from Home
- Announcements
- Apple
- Applications
- Arctic Wolf Networks
- Azure
- Azure Virtual Desktop (AVD)
- Backup and Disaster Recovery
- Business Continuity
- BYOD
- Cloud Computing
- Compliance
- Coronavirus
- COVID-19
- Cryptocurrency
- Customer Service
- Cybersecurity
- DFARS
- Dynamics NAV Hosting
- Ethical Hacking
- Firewall-as-a-Service
- HIPAA
- iOS
- IT Best Practices
- IT Expenses
- IT Outsourcing
- IT Security
- Legal Vertical
- Linux
- Managed IT Services
- Medical, EMR, EHR
- Microsoft Azure
- Microsoft Power Platform
- Mobile
- Mobile Computing
- New Jersey
- New York City (NYC)
- Office 365
- PCI
- Rancho Cucamonga Location
- Regulatory Compliance
- SharePoint
- SiteLink
- Small Business
- SOCaaS
- Software Development
- Sort of Technical
- Tools/Utilities
- Troubleshooting
- Ubuntu
- Uncategorized
- Very Technical
- Virtualization
- Windows Cloud PC
- Windows Surface
- Windows Virtual Desktop (WVD)
- Work from Home








Cybersecurity
Penetration Testing is an exercise in which an ethical computer hacker will simulate an actual cybersecurity attack against your organization
The Benefits of Penetration Testing
Posted on February 4th, 2022 in CybersecurityRisks associated with cybersecurity threats and exposures motivate organizations to implement protective controls intended to keep their digital assets safe from malicious computer hackers. Firewalls are installed at the network perimeter to keep unauthorized users from accessing the private network. Anti-Virus software is installed on computers and servers to enhance overall endpoint security. Sensitive data is encrypted, and strong password…(read more).
Comments Off on The Benefits of Penetration TestingBest Practices for SPF and DKIM by a Seasoned IT Professional
Posted on December 31st, 2021 in CybersecurityThere are several steps that an organization should take to minimize their likelihood of being email “spoofed” by a hacker. Best Practices for SPF and DKIM are highlighted. What does it mean to be spoofed? There are several methods, but the overall goal is to persuade email recipients to believe that an email received from someone else (a bad guy…(read more).
Comments Off on Best Practices for SPF and DKIM by a Seasoned IT ProfessionalAre Windows 365 Cloud PCs Secure?
Posted on April 7th, 2021 in Azure, Azure Virtual Desktop (AVD), Cybersecurity, IT Best Practices, IT Security, Microsoft Azure, Virtualization, Windows Cloud PC, Windows Virtual Desktop (WVD)Imagine that your employee’s personal computer has been hacked. They only ever used one password for personal accounts, and one of the online stores they shop at has been breached. Their password was made public on the dark web, and cybercriminals have used it to hack into their laptop. Now, imagine that your employee is using their personal computer for…(read more).
Comments (0)Should You Cover Your MacBook Camera?
Posted on November 8th, 2020 in Apple, CybersecurityCovering Your MacBook Camera Users have become wary of their personal data and devices and there has been a rise in the amount of users who cover their MacBook camera with various coverings. Apple has become aware of this phenomenon and has discovered several negative consequences that can come from using various camera covers…(read more).
Comments (0)What is Spear Phishing?
Posted on February 14th, 2020 in CybersecuritySpear phishing is becoming an increasingly prevalent means of a cyberattack. In fact, Symantec reported that 65% of all malicious groups initiate cyberattacks with spear phishing, in their 2019 Internet Security Threat Report. Unfortunately, this means that many organizations have fallen victim to this type of attack. However, we will explore some actions that can be taken in the event…(read more).
Comments (0)Seven Steps to Avoid Being New Jersey’s Next Ransomware Victim
Posted on January 19th, 2020 in CybersecurityCybersecurity in New Jersey Comes into Focus in 2019 New Jersey Hospital System Hit By Cyberattack Ransomware Attacks New Jersey’s Livingston Public Schools Shakespeare Theatre in Madison Hit By Ransomware Attack The last two months of 2019 were rough for cybersecurity in New Jersey, with high profile attacks significantly harming major businesses and causing them to cancel surgeries, delay school…(read more).
Comments (0)Stop Hacks and Improve Electronic Data Security Act (SHIELD Act)
Posted on September 13th, 2019 in Compliance, CybersecuritySigned into law by the governor of New York in July 2019, the SHIELD Act goes into effect on March 21, 2020. The law covers all employers, individuals or organizations, regardless of size or location, which collect private information on New York State residents. Failure to implement a compliant information security program is subject to…(read more).
Comments (0)Cybersecurity Checklist for Small to Mid-sized Law Firms
Posted on April 11th, 2019 in CybersecurityGiven the accepted inevitability that a cyberattack or breach will happen, law firms must: Properly secure their network perimeter. Evaluate their vendors. Craft a solid cybersecurity incident response plan and information dissemination plan. Involve all employees in the firm’s data protection plans. Educate employees on the reporting of potential problem, as well as the protocol for dealing with client directives. …(read more).
Comments (0)Exigent Technologies Recognized as Top Cybersecurity and Managed IT Services Company by Clutch
Posted on March 22nd, 2019 in Announcements, Cybersecurity, Managed IT ServicesWe are excited to announce Clutch has placed Exigent Technologies in third place on their Leader’s Matrix out of the top cybersecurity companies in New York. This recognition can be attributed to our influence in the IT industry, our focus on performing at the highest level, and our ability to deliver consistently without fail. For those who do not know,…(read more).
Comments (0)2018: A Year of Breaches. Now Everyone Needs to Pay Attention to Cybersecurity
Posted on February 2nd, 2019 in Cybersecurity2.6 billion records containing email addresses and passwords have been exposed in a new data breach.[i] Within this collection were nearly 800 million unique credential combinations (close to 3x the population of the USA). Hackers know that most people have a nasty habit of using the same credentials across many (if not all) of the sites they use. The first…(read more).
Comments (0)