Let's Connect
  • Sales Chat
  • Remote Session
  • 877-394-4368 877-394-4368
  • Login
  • IT Consulting
  • Software Development
  • Cloud
  • About
  • Contact
  • Support
Menu
  • IT Consulting
  • Software Development
  • Cloud
  • About
  • Contact
  • Support
Search
Login

Archives

View Archives
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016

Categories

Categories
  • Announcements
  • Apple
  • Applications
  • Arctic Wolf Networks
  • Azure
  • Backup and Disaster Recovery
  • Business Continuity
  • BYOD
  • Cloud Computing
  • Compliance
  • Coronavirus
  • COVID-19
  • Cryptocurrency
  • Customer Service
  • Cybersecurity
  • DFARS
  • Dynamics NAV Hosting
  • Firewall-as-a-Service
  • HIPAA
  • iOS
  • IT Best Practices
  • IT Expenses
  • IT Outsourcing
  • IT Security
  • Legal Vertical
  • Linux
  • Managed IT Services
  • Medical, EMR, EHR
  • Microsoft Azure
    • Powershell
  • Microsoft Power Platform
  • Mobile
  • Mobile Computing
  • New Jersey
  • New York City (NYC)
  • Office 365
  • PCI
  • Rancho Cucamonga Location
  • Rant
  • Regulatory Compliance
  • SharePoint
  • SiteLink
  • Small Business
  • SOCaaS
  • Software Development
  • Sort of Technical
  • Tools/Utilities
  • Troubleshooting
  • Ubuntu
  • Uncategorized
  • Very Technical
  • Virtualization
  • Windows Surface
  • Windows Virtual Desktop (WVD)
  • Announcements
  • Apple
  • Applications
  • Arctic Wolf Networks
  • Azure
  • Backup and Disaster Recovery
  • Business Continuity
  • BYOD
  • Cloud Computing
  • Compliance
  • Coronavirus
  • COVID-19
  • Cryptocurrency
  • Customer Service
  • Cybersecurity
  • DFARS
  • Dynamics NAV Hosting
  • Firewall-as-a-Service
  • HIPAA
  • iOS
  • IT Best Practices
  • IT Expenses
  • IT Outsourcing
  • IT Security
  • Legal Vertical
  • Linux
  • Managed IT Services
  • Medical, EMR, EHR
  • Microsoft Azure
    • Powershell
  • Microsoft Power Platform
  • Mobile
  • Mobile Computing
  • New Jersey
  • New York City (NYC)
  • Office 365
  • PCI
  • Rancho Cucamonga Location
  • Rant
  • Regulatory Compliance
  • SharePoint
  • SiteLink
  • Small Business
  • SOCaaS
  • Software Development
  • Sort of Technical
  • Tools/Utilities
  • Troubleshooting
  • Ubuntu
  • Uncategorized
  • Very Technical
  • Virtualization
  • Windows Surface
  • Windows Virtual Desktop (WVD)

Microsoft
Cisco
HP
Lenovo
StorageCraft
VMware
Extreme Networks
Dell PartnerDirect
SonicWall
Home Blog IT Best Practices

IT Best Practices

Remote firewall management is often needed by techs or service partners; securing it properly is absolutely critical.



Restrict WAN access to a Sonicwall management interface

Posted on September 22nd, 2020 in Firewall-as-a-Service, IT Best Practices, IT Security, Sort of Technical, Troubleshooting

Securing administrative access to your Sonicwall from the WAN There are several reasons you may want to enable remote management on the public-facing (WAN) interface of a Sonicwall firewall: Remote assistance is needed with the initial configuration Virtual Private Networking (VPN) has not yet been configured You require temporary remote polling or administration For security reasons, you should constrain this…(read more).

Comments (0)

When Upgrading Your Laptop Hard Drive, Choose NVMe If You Can

Posted on June 15th, 2020 in IT Best Practices

Storage is one of the most important factors that laptop users take into consideration when purchasing a laptop. Although many laptop manufacturers and retailers advertise some features to entice you to buy a new laptop, most laptops have had the same operating power (CPU, GPU, etc.). What differentiates many laptops is their hard drive because it dictates storage capacity. Upgrading…(read more).

Comments (0)

The Small Business Owner’s Guide to Preventing Data Loss and Theft in 2018

Posted on December 8th, 2017 in Cybersecurity, IT Best Practices, IT Security, Small Business

Did you know that 50% of all cyber attacks carried out today target small businesses? In fact, CNBC reported in April 2017 that 14 million businesses had been attacked in the last year alone. Your business could be next. But it doesn’t have to be! The truth is that there are steps every small business owner can take to protect…(read more).

Comments (0)

Email Security: A Growing Cybersecurity Concern

Posted on December 6th, 2017 in IT Best Practices

Today’s businesses need to worry about cybersecurity more than ever before. With threats at all angles, it’s essential that your business has Ban updated IT setup and the latest security software. Of all the points of entry, email might be one of the most vulnerable. The simple nature of email has made it a trusted communication method, but it is…(read more).

Comments (0)

Relocating Your Office? What To Consider For IT

Posted on December 5th, 2017 in IT Best Practices

Moving your business to a new space can be exciting, as it likely means you are growing or upgrading. But this move also means that you have plenty of organizing to do. In addition to moving desks, chairs, computers, and other equipment, your business will also have to maintain IT systems. Once you move, it’s essential that you get your…(read more).

Comments (0)

Your Older Firewall Makes You Vulnerable to Ransomware

Posted on April 9th, 2016 in IT Best Practices, IT Security

Many businesses have built digital fortresses around themselves in the form of firewalls, a reassuring name that suggests a high level of protection. So it’s alarming that ransomware attacks seem to be skirting this important security layer with ease, stopping businesses in their tracks and incurring hundreds or thousands in damages. One recent attack infiltrated users via Adobe Flash. In…(read more).

Comments (0)

How People Suffer From Data Loss, Despite Having a Backup Strategy

Posted on February 21st, 2016 in Backup and Disaster Recovery, IT Best Practices

Your data is one of your most important assets.  And you probably have a backup strategy in place to protect it.  Such strategies can be as simple as a nightly backup of your network server(s) or a much more elaborate replication and business continuity system.  Often, however, we hear of stories of people or companies that encounter irrecoverable data loss,…(read more).

Comments (0)

Cryptolocker or Cryptovirus Attacks

Posted on February 18th, 2016 in Backup and Disaster Recovery, IT Best Practices, IT Security

The bad-guys are getting smarter, taking advantage of tactics used by criminals for centuries.  Ransom and extortion have long been used due to the way they invoke very personal feelings of dread and loss.  We all know it’s bad to give money to bad people who’ve done bad things, but nonetheless it’s a very effective means of getting what you…(read more).

Comments (0)

Don’t Forget To Gather This Information Before Firing Your IT Service Company.

Posted on June 28th, 2015 in IT Best Practices

They say that change is inevitable.  For whatever reason, you may one day wish to change IT service companies.  It’s a change that, in our experience, can make many business owners and managers pretty anxious.  Information gathering is a key part of this process.  Whether your IT service company knows you intend to fire them or not, here is a…(read more).

Comments (0)
Our Core Values:
  • We are always 100% committed to our customers' needs.
  • We value charity and goodwill.
  • We realize there are no shortcuts to true excellence.
  • We believe in the power of teamwork and collaboration.
  • We honor the golden rule.
  • We are humble.
  • We value transparency.
  • We are honest and value integrity.
  • We lead by example.
  • We value continuous education.
  • We value innovation and forward-thinking.
  • We foster a passion for life, work and everything in between.
  • We discourage negativity.

More About Us

Exigent Technologies LLC is a full-service information technology consulting firm that implements and maintains high-performance IT systems for small and medium-sized organizations in a wide range of industries. Regardless of their size, today’s companies rely on anytime, anywhere access to information—and Exigent delivers.
read more

Want To Find Out More?









    • IT Support & Consulting Services
    • Software Development
    • Cloud
    • About
    • Contact
    • Client Support
    • Areas Served
    • Make a Payment

    Sign Up For Updates

    IT Services, IT Consultants and Cloud Computing | New Jersey | New York City
    55 Madison Avenue, STE 400, Morristown, NJ 07960 | 845 3rd Ave FL 6, New York, NY 10022

    Copyright 2021. Exigent. All rights reserved. Sitemap Privacy Policy|WordPress Website Produced by: Inverse Paradox

    Facebook Twitter LinkedIn YouTube Glassdoor Instagram