Peter Jacobson

SMB Remote Worker Prevalence – Is Your Business Secure?

Remote work is the norm now for SMBs as well as larger businesses.  There are many benefits to establishing a remote and/or hybrid workforce. However, it brings new security risks. Proliferation of Remote Workers Industry studies from last year indicate that about 20% of Americans were working remotely, while an additional 28–30% work in hybrid […]

SMB Remote Worker Prevalence – Is Your Business Secure? read more »

Cyber Scams – An Ongoing Challenge for Small Businesses

Cyber scams have become a year-round, ongoing challenge for businesses of all sizes. But the threats have become particularly notable for small companies, as they often falsely consider themselves less vulnerable than larger organizations. Threats occur constantly throughout the year – not just during seasonal periods such as tax season, back-to-school, and holidays. Also, email

Cyber Scams – An Ongoing Challenge for Small Businesses read more »

What is Password Spraying and How is it a Threat to Small Businesses?

What is Password Spraying? Password spraying is one of the most underrated cyber threats today.  It is a type of brute-force cyberattack where an attacker attempts to gain unauthorized access to a large number of accounts using a few commonly used passwords, rather than trying many passwords on a single account (which would likely trigger

What is Password Spraying and How is it a Threat to Small Businesses? read more »

Uptick in New Jersey Employment Scams

A recent NJCCIC (New Jersey New Jersey Cybersecurity and Communications Integration Cell) Weekly Bulletin cited an uptick in New Jersey employment scams that target and exploit individuals seeking employment. The NJCCIC is the Division of Cybersecurity under the New Jersey Office of Homeland Security and Preparedness. It exchanges cyber threat intelligence and conducts incident response

Uptick in New Jersey Employment Scams read more »

Top Email / Gmail Threats in 2025

Email Remains a Top Risk in 2025 Email threats remain one of the most significant cybersecurity risks for small businesses, and for good reason. Here’s a breakdown of why they pose such a challenge—especially for businesses using platforms like Gmail—and what specific threats to watch out for:   Why Email Threats Are a Major Risk

Top Email / Gmail Threats in 2025 read more »

Where Do Deleted Files Really Go?

Ever wondered what happens when you delete a file? Deleted files don’t disappear—they move to a temporary storage area and can often be recovered unless overwritten. Here’s what you can do to ensure sensitive files are truly gone: •          Empty Your Recycle Bin: Regularly clear it out. •          Use File Shredding Tools: Permanently erase files beyond recovery. •          Encrypt Before

Where Do Deleted Files Really Go? read more »

Encryption Considerations for your SMB

Encryption is a critical consideration for Small and Medium-sized Businesses (SMBs) because it helps protect sensitive data, ensuring that it remains confidential, secure, and tamper-proof. As SMBs often handle sensitive information such as customer data, financial records, intellectual property, and employee details, encryption safeguards against cyber threats, data breaches, and unauthorized access.  It transforms readable data into an

Encryption Considerations for your SMB read more »

How to Organize Your Computer Devices for Peak Productivity

Organizing your computer devices for peak productivity is essential for maintaining focus, reducing distractions, and working more efficiently. Here are suggested items on how to organize your workspace and digital environment.   1. Physical Workspace Setup ➡️Declutter Your Desk: Keep only the essentials on your desk (keyboard, mouse, monitor, and perhaps a notebook or pen).

How to Organize Your Computer Devices for Peak Productivity read more »

Why Small Businesses are Moving Data to the Cloud … and is it Secure?

Small businesses are increasingly moving their IT infrastructure to the Cloud.  Cloud adoption among small businesses in the U.S. is accelerating, with a significant portion of businesses already embracing Cloud technologies.  According to recent studies, over 80% of U.S. small businesses are either partially or fully using the Cloud for some aspect of their operations. 

Why Small Businesses are Moving Data to the Cloud … and is it Secure? read more »

Minimize Ransomware Damage with Effective Incident Response

Prevention is Ideal The best approach to minimizing ransomware damage is to have appropriate protection in place, along with an Incident Response Plan A ransomware Incident Response Plan (IRP) is vital for small businesses because it prepares them to respond quickly and effectively if they fall victim to a ransomware attack. These attacks can be

Minimize Ransomware Damage with Effective Incident Response read more »

Benefits of Password Managers for Small Businesses

Password managers are crucial for securing online accounts.   What are Password Managers? A password manager is a software application designed to store and manage passwords. It securely stores passwords in an encrypted format and can automatically fill in login information for websites, applications, and other services. Most password managers also offer features like password

Benefits of Password Managers for Small Businesses read more »

Watch Out for Google Searches -“Malvertising” Is on the Rise!

There are many types of malware. One of the most common is called “malvertising.” It crops up everywhere. Including social media sites and websites. You can also see these malicious ads on Google searches. Two things are making malvertising even more dangerous. One is that hackers use AI to make it very believable. The other

Watch Out for Google Searches -“Malvertising” Is on the Rise! read more »

Beware of Black Friday Infostealing

As we approach the last week of November 2024, the New Jersey Cybersecurity & Communications Integration Cell (NJCCIC) issued a warning in its Weekly Bulletin titled ‘Tis the Season for Infostealing.     The New Jersey Cybersecurity and Communications Integration Cell is the state’s one-stop shop for cybersecurity information sharing, threat intelligence, and incident reporting. What is

Beware of Black Friday Infostealing read more »

How to Manage Your SMBs Valuable Data

Data is One of Your Business’s Most Valuable Assets There are many ways your valuable data can get stolen, corrupted, or exposed.  As a result, effective Data Lifecycle Management (DLM) is necessary.  Data Lifecycle Management refers to the comprehensive process of managing data from its creation and initial storage to its archiving and eventual deletion.

How to Manage Your SMBs Valuable Data read more »

Cyber Insurance Claims are Rising – What Does the Mean for SMBs?

Rising Claims Over Last Five Years Over the last five years, the landscape of cyber insurance claims has evolved significantly due to increasing cyber threats and changing business practices.   According to IT security provider, Delinea, 62% of businesses filed a cyber Insurance claim in the last 12 months.  Further, over 27% filed more than one

Cyber Insurance Claims are Rising – What Does the Mean for SMBs? read more »

QR Codes Explained

Did you know QR (Quick Response) codes are two-dimensional barcodes that can contain various information? Using a QR code generator online, data can be easily converted into a smartphone-scannable code for instant access. These codes facilitate various transactions such as website access, online payments, and advertising. About half of U.S. industry survey respondents indicated they

QR Codes Explained read more »

How Can You Show an SMB the Tangible Value of Cybersecurity?

Tangible Value Challenging to Demonstrate Ahead of a Breach It is often hard to demonstrate to an owner or management team of an SMB (small-medium business) the tangible value of cybersecurity preventative measures ahead of a cybersecurity incident. Inspiration for this article came from numerous actual SMB cyberattacks where Powersolution (an IT Managed Services Provider)

How Can You Show an SMB the Tangible Value of Cybersecurity? read more »

Leave the World Behind Movie – Plausible or Unrealistic? A Message for SMBs.

Leave the World Behind is a recently released Netflix movie, starring Julia Roberts, which is getting considerable media and viewer attention. It is a fictional story of Amanda Sanford, who arranges a weekend vacation with her family – filmed in Old Westbury, Long Island. The family experiences a major power blackout, leading to a series

Leave the World Behind Movie – Plausible or Unrealistic? A Message for SMBs. read more »

U.S. Senators Recognize Small Business Cyber Vulnerabilities

A bipartisan group of U.S. Senators introduced a bill named “The Small Business Cyber Resiliency Act.” The senators are seeking new ways to help small businesses protect against cyberattacks and other digital threats. The U.S. government’s recognition of small business cyber risks begs the question … as a small business owner or executive, have you fully

U.S. Senators Recognize Small Business Cyber Vulnerabilities read more »

Watch Out for Pre-Black Friday Scams!

A recent Weekly Bulletin from the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) highlighted scammers targeting New Jersey consumers related to retailers offering Pre-Black Friday deals. NJCCIC and National Retail Federation Warnings The NJCCIC (also known as the New Jersey Office of Homeland Security and Preparedness Division of Cybersecurity), is a state-level information sharing and analysis

Watch Out for Pre-Black Friday Scams! read more »

Is Your Car Vulnerable to Computer Hackers?

The use of computers in personal automobiles has come a long way, transforming vehicles from purely mechanical machines to complex, software-driven systems. As technology advances, we can expect further innovations in the automotive industry, including the continued development of autonomous cars and more advanced safety and infotainment features. Along with the benefits of computerization of

Is Your Car Vulnerable to Computer Hackers? read more »

5 Signs Your Business Needs Managed IT Services

1. Reoccurring IT Issues  If you often find your business struggling with the same issues on repeat, it may indicate underlying issues with your current infrastructure and maintenance. Using a managed IT service provider would eliminate your recurring issue. Using our services we would constantly be monitoring your systems, target issues before they escalate, and quick

5 Signs Your Business Needs Managed IT Services read more »

The Power of Predictive Analytics

  What is Predictive Analytics? Professionals and businesses are continuously seeking fresh ways to get a competitive edge in today’s data-driven environment. Predictive analytics is one of these approaches that has altered decision-making for professionals. Predictive analytics enables experts from various industries to foresee future occurrences and make informed decisions using advanced statistical approaches and

The Power of Predictive Analytics read more »

Best Ways To Mitigate Cyberattacks For Small Businesses

  Small businesses are particularly susceptible to cyber attacks, which aren’t just a concern for big companies and governments. There is evidence to support the theory that small businesses are more at risk of cyberattacks, in part because they occasionally lack the physical resources necessary to adequately defend themselves. It’s crucial to defend your company

Best Ways To Mitigate Cyberattacks For Small Businesses read more »

What Is Extended Reality?

So What Is XR?  Have you ever wondered what the year 2030 is going to look like? No need to wonder when using Extended Reality (XR) technology. Extended reality technology combines the physical and digital worlds to produce immersive and interactive experiences. The technology is intended to mirror our world and represent a “digital twin

What Is Extended Reality? read more »

How To Prevent Social Media Accounts From Being Hacked!

Many of us have witnessed the unfortunate incident of a friend’s social media account being hacked, leading to unexpected promotions of various companies, such as Bitcoin. This occurrence becomes even more peculiar if you’re used to enjoying your friend’s cat videos. Disturbingly, this trend seems to be on the rise. Cybercriminals skulk in the shadows,

How To Prevent Social Media Accounts From Being Hacked! read more »

Why Managed IT Services Are Better Than In-House IT Management

Gone are the days when companies could rely solely on manual processes and outdated systems. Today, harnessing the power of Information Technology (IT) is crucial for streamlining operations, enhancing productivity, and achieving sustainable growth. In this blog post, we will delve into a formal IT managed services value proposition – exploring the reasons why managed

Why Managed IT Services Are Better Than In-House IT Management read more »

What Are The Different Tiers of IT Support? Your Complete Guide

Like most, your business relies heavily on robust IT infrastructure to stay competitive. However, ensuring the smooth operation of complex systems and resolving technical issues is no easy task. This is where technical IT support teams come to the rescue, providing a lifeline for organizations when technology hiccups occur. But did you know that IT

What Are The Different Tiers of IT Support? Your Complete Guide read more »

Press Release: David Ruchman Nominated for NJBIZ Forty Under 40 Honor

June 29, 2023, Midland Park, NJ David Ruchman, Powersolution CEO, has been nominated for a NJBIZ Forty Under 40 Honor in the Technology industry category.  The NJBIZ program recognizes 40 business people under the age of 40 for their notable successes and demonstrations of strong leadership in the state of New Jersey. The nomination was

Press Release: David Ruchman Nominated for NJBIZ Forty Under 40 Honor read more »

Buying a New Laptop?  Some Things to Consider for the Non-Technical Buyer  

There are many options to consider when buying a new laptop computer.   The following are a few of the key considerations for the non-technical buyer. Additional options, features, and accessories can be evaluated separately through a manufacturer’s website, further research, and/or through a qualified technical advisor. Personal Use and/or Business Work A first consideration is

Buying a New Laptop?  Some Things to Consider for the Non-Technical Buyer   read more »

How to Add Authentication Security and Maintain User Convenience

Multi-Factor Authentication (MFA) is one of the most powerful data breach prevention tools. MFA is extremely effective at eliminating fake sign-in attempts to resources such as applications, online accounts, and Virtual Private Networks (remote access VPNs). Despite this, almost half of companies are not using it. Why are so many companies not using multi-factor authentication?

How to Add Authentication Security and Maintain User Convenience read more »

HIPAA-required risk analysis demands repetition

Various healthcare industry studies have shown that an alarming number of medical practices are not prepared to be HIPAA compliant.   For example, certain surveys indicated roughly 1/3 of respondents had not conducted a HIPAA-required risk analysis. HIPAA ruling 164.308(a)(1)(ii)(A) requires a medical practice (covered entity) to periodically perform a thorough risk analysis. Meanwhile, The U.S.

HIPAA-required risk analysis demands repetition read more »

What is MFA? Best Methods for Multi-Factor Authentication

With cybersecurity on the rise, Multi-factor Authentication is a go-to for an additional security measure for your devices and data points. Question: What is Multi-factor Authentication … and Which Method is Best? Answer: Multi-factor authentication is a method of securing data and applications after a user presents two or more credentials to verify the user’s

What is MFA? Best Methods for Multi-Factor Authentication read more »

Watch out for Follina – a new zero-day Microsoft Office Suite vulnerability

A new vulnerability has been discovered for the Microsoft Office Suite named “Follina”.  It is triggered by opening malicious MS Office documents. Follina is a zero-day discovery. It does not appear that there are any exploits just yet, but due to the nature of this exploit, attackers will start to utilize it.   “Zero-day” is

Watch out for Follina – a new zero-day Microsoft Office Suite vulnerability read more »

Human Resources Issues You Never Considered with BYOD

There is a great deal of discussion about the advantages and disadvantages of the policy of allowing employees to use their own mobile devices, primarily smartphones, instead of employer-issued devices that are to be used solely for work purposes. This policy, known as “bring your own device” (BYOD) can make employees happy, but it also

Human Resources Issues You Never Considered with BYOD read more »

How COVID-19 pandemic will affect remote workforce after it passes

A consequence of the COVID-19 pandemic will be an accelerated ramp-up of partial and/or full remote workforces after the pandemic has passed There are advantages and disadvantages to utilizing a remote workforce in lieu of the in-office work experience.  Much of traditional management thinking has been that having employees in the office on a daily

How COVID-19 pandemic will affect remote workforce after it passes read more »

Benefits and facilitation of a productive remote workforce

As previously indicated, it is not necessarily intuitive for many organization leaders to appreciate the benefits of a remote workforce.  An immediate perceived loss is the lack of ability to see workers at their desks putting in their scheduled hours.  Also, not having the opportunity for in-office face-to-face collaboration, creativity, and socializing can be an

Benefits and facilitation of a productive remote workforce read more »

Remote Workforce: Technology Considerations

Many home offices do not maintain the same technology standards, including IT security, that are provided at the employee’s office building.   The remote equipment and network should be evaluated and documented for functionality and security. A prevalent technology for securing remote connections is the use of virtual private networks (VPNs). VPNs create an encrypted tunnel

Remote Workforce: Technology Considerations read more »

Zoom Meetings – Video Communications Cyber Vulnerabilities and Remediation

On Tuesday, 4/28/20, the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) published an advisory that cited certain cyber vulnerabilities associated with the Zoom platform.  This follows a more detailed publication of those vulnerabilities by the U.S. Department of Homeland Security released on 4/27/20, which was referenced by the NJCCIC. The DHS publication recommends that

Zoom Meetings – Video Communications Cyber Vulnerabilities and Remediation read more »

IT Security & Support Quiz

IT Security & Support Quiz

October Is Cybersecurity Awareness Month

Cyber threats evolve fast.

The question is—has your protection kept up? 

Take our short quiz to see where your business stands.