Resources

Recent News from Profulgent Technology

Telephone Number and Caller-ID Spoofing

Have you recently started receiving calls from phone numbers which resemble your personal or business phone number? Have you received calls from a caller who comes up on your caller-id as one of your phone numbers?

The simplest way to prevent fraud is not to answer unknown numbers and wait to see if the caller leaves a message. If you answer such a call and you know it’s fraudulent or the caller is pressuring you for information, hang up immediately. Do not give the caller any reason to try to keep you on the line. If you answer the phone and it sounds like a recording, most likely it’s marketing or a scam. And they can all potentially be fraudulent. Crooks are using Robo-dialers to make illegal, unsolicited calls. These calls are rampant, in the U.S. If you receive them, hang up! Do not press any buttons even if it prompts you to press a button to stop getting the calls. If it’s a scam, chances are the button you press is not going to do what you think it is doing. Scammers use this trick to identify potential targets based on people going through the prompts. They want to see how far you will go. Then they use that information for the next time they attempt to call you.

These callers are spoofing your caller-ID. Use extreme caution any time you receive a call from someone you do not know, especially when they request personal identifying information.

If you get an inquiry from someone who says they represent a company or a government agency, never give out any personally identifiable information. Personal Identifiable Information is information such as Social Security numbers, account numbers, maiden names, passwords, or other identifying information. If you think the call is serious, hang up. Then, find the vendors phone number, company phone number, government agency phone number on their website or in the phone book or your contacts and call them to verify the authenticity of the call. Tell them about the phone call you received and ask them if it is legitimate or fraudulent. Always use passwords on all your accounts, including voicemail accounts. Voicemail services with certain vendors are preset to allow access if you call in from your phone number. A hacker could spoof your phone number and gain access to your voice mail if you do not set a password. Talk to your service providers about call blocking tools and look for mobile apps with blocking capabilities. The FCC allows phone companies to block robocalls. Be cautious of email messages which come through as an email and look like a voicemail message. If you do not get voicemail messages by email, do not trust these messages from unknown sources. If you have voicemail to email forwarding, make sure the email message you received is from the proper phone system and voicemail vendor. Cyber attacks and fraud are becoming more and more sophisticated every day. Always use caution, especially when you are unsure. If you do not know, do not respond. Ask a professional like Profulgent Technology. We can help.
1957 Public Telephone

Cloud Communications Provider Selection

Communicate, Collaborate, Connect

Moving or expanding communications services to the cloud can seem daunting for any company. But if you know what to look for from a provider, the task of choosing a unified communications as a service (UCaaS) solution can be made with greater confidence. Like most of today’s modern workforce, your employee base has probably become more distributed across multiple locations. And they work on the go or from home. The ability for your team to communicate whenever, wherever, and however they want is essential for performing their jobs well and optimizing agility and productivity. Currently, workers often adopt a mishmash of tools from vendors to help them communicate in easy, mobile-friendly ways. But in fact, this can silo or confuse communications rather than enabling it. So contact us today for a comprehensive guide. We go over even critical items to consider when selecting a cloud communications provider.  The guide also includes everything you need to consider, including the topics below.
  • First, how will your company benefit from unified communications and collaboration?
  • Next, the integrations options (internal and external) that make a solution agile and highly responsive
  • Cloud infrastructure, private or public cloud
  • Connectivity options
  • Is the system well-established, scalable, and geo-redundant?  Does the system offer a global presence?
  • Pricing and ways to reduce the TCO (Total Cost of Ownership)
  • Lastly, professional services and support
No doubt moving to the cloud is the right step for modern, agile, mobile business communications. Being well prepared will help you find the cloud communications provider and solution that works best for your company and your teams’ needs.

   
Windows 7 End of Life

Windows 7 Upgrade vs Replacement

Windows 7 End of Life

Microsoft Windows 7 is End of Life on January 14, 2020.

As a result, your organization will need to determine whether upgrading Windows 7 Computers is sufficient or replacement of devices is necessary before this date. End of Life is the phrase used by a vendor to stipulate when the product updates will no longer be released.  Once Microsoft declares a product End of Life, they no longer release updates to these systems leaving Windows 7 systems vulnerable to attacks and adding significant risk to your business. The first step in understanding whether to upgrade or replace your Windows 7 systems is the hardware.  You must identify devices that will meet the minimum hardware specifications necessary for a positive and efficient level of performance. The minimum hardware recommendations from Microsoft are often enough to run the Operating System.  Unfortunately, they are typically not enough to run the systems at desirable and productive levels.

The Minimum Requirements for Running Windows 10 on a PC

Processor: 1 gigahertz (GHz) or faster processor or System on a Chip (SoC) RAM (Memory): 1 gigabyte (GB) for 32-bit or 2 GB for 64-bit. (For idea, we never install a system with less than 8 GB of RAM, Microsoft's minimum is 2 GB) Hard Drive: 16 GB for 32-bit OS 32 GB for 64-bit OS (Your typical smartphone today has 16 GB or more of space.  Most of them have much more!) Graphics Card: DirectX 9 or later with WDDM 1.0 driver Display: 800 x 600 We put together a checklist to help you choose between upgrading Windows 7 vs. replacing the systems.  Request a copy of this checklist to consider when looking to migrate from Windows 7 to Windows 10 successfully. If you would like to a copy of the checklist, contact us using the link below.  Enter "Microsoft Windows 7 Upgrade vs Replacement Checklist" in Additional Information section, and we will email you the download.  Contact Us If you would like to learn more about this from Microsoft Windows 7 end of life, please visit Microsoft. Would you like to learn more about Microsoft Operating Systems?  
Good Password Security

It’s World Password Day. Generate a fresh one.

Protect your Digital Life

Password security is something that many people have problems with. Having a secure password for each of your online accounts is important. Because if a scammer gets just one password, they can begin to access your other accounts. That’s why it’s important to have a strong, unique password for your digital life. Next, weak passwords are a problem. But using the same password across multiple websites is an even bigger cybersecurity issue. So change your passwords. And change them frequently. Shield your accounts from hackers with strong, secure passwords. Make them easy to remember and hard to guess. Do not use birthdays, family member names, etc. Most importantly, never ever share your passwords. 81% of security breaches are due to weak or stolen passwords.  Change them regularly and make sure you keep them secure.  

Tips for Strong Password Security:

  • Avoid using words from the dictionary. Make up your own words instead.
  • Avoid using personal information such as your mother's maiden name or your birthday.
  • Make sure it has a minimum of 8 characters and preferably 12 or more.
  • Use symbols, both upper and lower case as well as spaces, with two words whenever possible.
  • Use a combination of words or a phrase that is easy to associate in your mind and unique to you.
  • Finally, use characters other than letters and numbers. These include _, #, &, $, etc. Password security is stronger the harder the password is to remember.
  • Add 2-step verification anywhere it is permitted. 2-step verification is an extra security layer requiring code from another location. Yes, it is annoying. But having your accounts hacked or identity stolen will be much worse. So, enable it.  There are many forms of 2-step verification, also called multi-factor authentication.  Some of the options for the second layer of protection are security questions, fingerprint readers, authentication apps like Google Authenticator or text messages.  With today's threats, you need to ensure passwords aren’t the only thing standing between your data and cyber attackers.
  • Work with a Managed Service Provider who provides Dark Web Monitoring for your business accounts and personal account for key owners and employees.
  • https://www.passwordday.org/
  • Use a Password Manager to secure your passwords.  The same password manager can be used to help generate secure passwords and integrate into web browsers to help with the authentication process logging into websites.

Protect your devices

The best passwords in the world are of no use if you don’t secure the devices they are used on.  If you have a PC, make sure that you have good a multi-layered security system in place including antivirus software and firewall with content management.  Some pieces of malware, known as “keyboard loggers”, can record all of your keystrokes and enable hackers to crack your passwords. So keep your information safe and secure by keeping your security up to date by working with a Managed IT Service Provider specializing in Cyber Security like Profulgent Technology. Give us a call today to learn more about our multi-layered approach to cybersecurity.
Tech Provider Outsourcing

Should Your Company Outsource to a Tech Provider?

A tech provider delivers the IT expertise small businesses need at a much lower cost than hiring IT staff. They can recommend, install, and manage technology according to business’ objectives and core competencies and ensure that critical data is safe.

That’s why nearly 70% of U.S. small to medium sized businesses (SMBs) work with a tech provider for some or all of their IT needs.

Offload tasks that are difficult and/or time consuming by working with a tech provider. That’s one of the reasons that managed data protection services are so popular today. Protecting company data through backup and restore is a pain point for companies of all sizes; An MSP ensures full protection for SMB company data. This reduces business risk by putting complex tasks in the hands of experts.

MSPs can also initiate new projects and implement new technologies quickly. They have the resources and flexibility to get projects off the ground which might take weeks or months in-house. Implementing new technology with your existing environment is complicated and time consuming. Because MSPs work with a wide variety of clients with different IT needs, they are uniquely equipped to take on complex IT projects. They also have vast experience troubleshooting the products they use—allowing them to resolve problems quickly.

At Profulgent Technology, our clients consider us a subsidiary of their IT department.

There are a variety of reasons that SMBs need help from third-party IT firms. IT skill and expense tops the list for smaller businesses. Very small companies stand to reduce IT costs while getting the IT expertise they need by partnering with a service provider. Larger businesses typically work with tech providers to offload a number of difficult or time-consuming tasks, allowing their internal IT staff to focus on mission-critical activities.   We have an ebook available which highlights the key factors required in deciding what's best for your company.  Contact Us today for a copy of the free ebook. 
Business Guide to Ransomware

Ransomware Is Everywhere These Days

Cyber security threats like ransomware can seem sophisticated. But protecting yourself from them is less like rocket science. Really, it's more like safe driving on the highway. But it doesn’t require expertise in the field of computer security or digital forensics. And the tools are already there at your disposal. You just need to use them responsibly. #Ransomware is everywhere these days. Protect your business with these tips: Business Guide to Ransomware

What’s New in Windows 10 Pro?

Windows 10 Pro gives you and your business the freedom to do great things. But Windows 10 Professional isn’t just for cubicle dwellers who have no choice in the matter. While users who own a “professional” PC like the Surface Book 2 will automatically be upgraded to this higher-end version of the OS, smaller businesses and PC enthusiasts may also weigh the benefits of the Pro version vs. Windows 10 Home. It works across all your devices so you can stay mobile, while allowing you to choose a device that fits your budget. The OS focuses on productivity to match your tireless pace. And it has enterprise-grade security to safeguard your business data. Above all, Windows 10 Pro provides a familiar and productive experience—so your sole focus can be on doing great things. Learn more by clicking the link and found out how Windows 10 Pro makes your devices more productive.  Read More...  

Bridgewater Technet joins forces with Profulgent Technology

Bridgewater Technet

In today’s fast paced world of technology, Profulgent Technology recognizes the need for the highest level of service. As a result, they are continuously looking for opportunities to expand and strengthen their team.

  Hazlet, NJ, May 1, 2015: Profulgent Technology and Bridgewater Technet have restructured their alliance and joined forces. By coming together, the possibilities are endless for these two technology powerhouses. And this only strengthens their position in the industry. The restructured deal comes as Profulgent is headed into its 10th year of business. Also great are trends leaning towards its strongest year ever. Mike Ruggeri was Founder and President of Bridgewater Technet. And he has assumed the role of Chief Technology Officer for Profulgent Technology. Randy Drozd is Founder of Profulgent Technology. And he continues to operate as the company’s CEO. The merger will allow their teams to be more responsive. Additionally, they'll offer new and enhanced services more efficiently as one team. Thus, they keep their clients satisfaction as their #1 goal. The new deal allows Profulgent Technology the ability to offer their customers a broader selection of technology services. So this enables continued business success. All teams will provide top notch service at superior levels. “From our initial partnership to date, I am confident that our restructured resources will share the same common values as Bridgewater Technet. Thus,  we'll maintain our position that customer satisfaction is our number one priority,” says Mike Ruggeri, CTO of Profulgent Technology.  

Office 365 for Business

Office 365 Setup and Support For Business  

Get mobile and get it done with Office 365

Whether you’re working in your office or on the go, you get a familiar, top-of-the-line set of productivity tools. Office applications —always the latest versions—let you create, edit, and share from your PC/Mac or your iOS, Android, or Windows device with anyone in real time.

We'll get you up and running quickly, securely and professionally on Office 365 today... Contact Us

Subscription based licensing of the whole entire Microsoft Office Suite. And always get the latest version of Microsoft Office with Office 365.

Higher Level of Professionalism

Also, you can brand your business-class email address with your company name to build name recognition. Then market your business with customized marketing materials. Connect better with customers and colleagues with a range of communication tools, from email and IM to social networking and video conferencing.

Enhanced Collaboration

With 1 TB of storage per user, you’ll have plenty of space for all your files. Also, because your files are stored online, you can share with people in or outside your company. And you can do this from wherever you’re working, whenever you need to! And with multi-party HD video, content sharing, and shared calendars, you’ll always be in sync with your team.
Computer Network Security Service

6 Password Tips to Protect Against Business and Identity Theft

Ah, those pesky passwords. If you work in the corporate world or in an office, you have one for your PC/Network. And, unless there is a password synchronization application that combines them, you probably have more than one for other applications. Then, add those to the ones that you have for your home Internet, your banking and other websites that require passwords? Well, before you know it you have a nightmare on your hands in trying to manage them. So how easy a target are you for business and identity theft? Part of the frustration has to do with the different requirements for password formatting. Some systems only require four characters, some require eight. And some need a combination of alpha and numeric characters. Lastly, others do the same with the addition of a few capital letters thrown in for extra security. It can be positively maddening. The worst thing you can do with your passwords is to place them in a text document which can be accessed on the hard drive of your computer. Your files are vulnerable to business and identity theft- even if you think they are not. If someone is intent on finding them, they can. Even if you place them into a password protected document, those can be cracked, too. Writing them down has its own vulnerabilities, too, and there are varying opinions on this practice. If you do write them down on a piece of paper, put the document in a locked location whether it is in your home or at work.

Here are 6 tips on how to handle your passwords to protect against business and identity theft:

1. Make them complex. People who use easy to remember or short passwords are inviting disaster. Use a little imagination and pick a password that is very difficult to attach to your life. Stay away from birth dates, phone numbers, house numbers, or any other number that is associated with your life. 2. Keep passwords unique. When you change your passwords, make them unique from each other. Do not use the same password on all of your sites. If you do, then you are open to having every site that you have a password to being vulnerable to hackers to log on and steal your identity, money or destroy your reputation. 3. Be obscure. So use a combination of letters, numbers, capital letters and special characters if possible. And the more you do this, the more secure your passwords will become. Finally, create an alphanumeric version of a term you can remember. Using this technique the word "Spaceship" becomes "Sp@ce5h!p". 4. Change regularly. This is the singular tip that can save you if you do not heed any of the other tips. How often should you change your password? How secure do you want to be? The frequency with which you change your password will determine how secure you are from becoming a victim. The more often you change it, the better you are. The longer you leave it the same, the more vulnerable you become. Three months is a good cycle for a password, but certainly if you fear for the security of your identity, then a monthly change is not out of the question. 5. Password-protect your PC. Be sure to give your PC a password on power-up. This will help protect your files unrestricted access to your PC. 6. Password-protect your wireless home network. If you have a wireless home network, be sure to password protect it as well. And use the same principles above in order to secure your wireless network. This will prevent others from accessing your connection and using it maliciously to hack the personal or business PCs and laptops you and your family use at home. Finally, there are password programs that can help with this important task, but the best advice is to start with the tips above right away. Password software can be useful as an organizational tool. But it is no match for using sound methods to manage and make your passwords difficult to crack. Click here to learn how [contentblock id=company] can help protect you against business and identity theft with our Network Security Services for your business in [contentblock id=location].

The High Cost of Recovery from a Security Breach

Computer Network Security Services Small to medium size businesses are what keep this country moving. Unfortunately, for many of these business owners, budgetary needs force them to make cuts that the mammoth corporations do not have to consider. These budget cuts can often result in reduced security and sub par IT services. And in the long run, this can end up costing the company even more money. Reacting to; and the recovering from, a security breach or attack is always pricy. And this is more after it has happened than what it would have cost to prevent it. This fact has been supported by recent surveys, and may come as a surprise to many small and mid-size companies who are under the false impression that hackers and other security threats target larger corporations. It has been discovered that companies that have less than 500 employees are actually more likely to be at risk of an attack or security breach than a larger corporation. Of course, this becomes a problem when the larger corporation has the resources to maintain higher levels of security at a time when smaller companies are dealing with restricted or; in some cases, frozen IT budgets.

The benefits of hiring a Managed IT Services Provider in preventing attacks and security breaches

Security breaches are a real concern for small business owners. Many are making the decision to bring on outside providers to address their IT needs. Managed services providers can offer an affordable solution to small business owners who are struggling to manage an internal IT staff. In some cases there isn't even an IT person on staff, which can be just as costly for the small business when they have to bring in a professional on an as needed basis. Considering the money and time spend recovering from a security attack or breech, more business owners are realizing the cost of not having this level of protection is too high to pay.

How managed services providers can help

Here we look at how managed services providers can help business owners level the playing field against those who would infiltrate their security systems.
  • Increased knowledge. Managed services providers are in the business of technology. They have trained staff who are able to prevent security breeches. They also spot any activity that could be perceived as a threat. Moreover, they have the expertise to stop threats that can lead to costly recovery measures.
  • Less expensive than in-house IT. Other IT professionals can provide the same security. But it will cost much more to the business owner. What many owners realize is paying a flat monthly fee for security and other services is more cost effective than paying an internal IT staff or outsourcing per incident.
  • Proactive is better than reactive. There's a big benefit to having a quality managed services provider in your corner.  You act in a proactive manner to ensure all of your systems are managed properly. And this is less expensive and time consuming than waiting for something bad to happen first.
Any small business can benefit from a Managed IT Services provider. They can do so at a fraction of the cost. Therefore, this eliminates the fear and unnecessary cost of trying to recover from a breech in security. Click here to learn how [contentblock id=company] can help you prevent attacks and security breaches with our Network Security Services for your business in [contentblock id=location].

Leave a Reply