Blog Archive

Dawn Biondi, Office Manager

Dawn became part of the powersolution team, as our office manager, in 2019. Prior to powersolution, Dawn was employed for most of her career as a medical malpractice and personal injury litigation paralegal. Having worked for 35 years in the legal industry, Dawn has extensive experience interacting and communicating with numerous medical and legal professionals,

David Ruchman, Chief Technology Officer

David has been with since 2005, quickly moving to the Senior Systems Engineer role. In 2010, David was appointed to the CTO position. As CTO, David’s primary responsibilities are planning and implementing the strategy necessary for and its clients to successfully meet growth goals. David isn’t just our CTO. He’s our go-to guy

Peter Jacobson, Director of Business Development

Peter joined powersolution in 2014, responsible for sales in New Jersey and the surrounding region. He is a veteran of the information technology industry, with experience that encompasses developing, selling, and implementing a broad range of IT solutions for clients across virtually all business segments. As a former client solution executive and manager of customized

Peter Sierra, Vice President

Over the past sixteen years, Peter has been an integral part of the powersolution team and a key contributor to the company’s successful growth, market presence, and exceptional client satisfaction. His duties began in a sales and marketing role, expanding across all business segments, which led to his current responsibilities as Vice President of Operations.

David Dadian, Chief Executive Officer

David founded powersolution in 1996, growing the business, as it’s CEO, to one of the most respected providers of IT managed services in the industry. powersolution was recently ranked 20th in its class on MSPmentor’s Top 100 Small Business Managed Services Providers in the world. David’s overriding focus has been in exceeding client expectations by

The Importance of Cyber Resilience for your business

Did you know that 60% of businesses that suffer a cyber attack go out of business within six months? The vast majority of damage is due to the inability of the company to respond because they have not developed a cyber prevention and response strategy. If your e-commerce system, website, email, or customer data was

Cyber Security Risks of Employee Negligence

How Employees Slip Up When you look around at your digital landscape, you can probably point to any number of ways that a cyber attack might occur — but can you identify your single greatest threat? Employees, the greatest asset to most high-performing organizations, also represent one of the biggest threats. However, there are ways

In time for tax season, IRS launches “Identity Theft Central”

The Internal Revenue Service (IRS) has launched its “Identity Theft Central” webpage to provide 24/7 access to online information regarding tax-related identity theft and data security protection. Tax-related identity theft occurs when someone steals personal information to commit tax fraud. The Cybersecurity and Infrastructure Security Agency (CISA) encourages taxpayers, tax professionals, and businesses to review

What technologies are impacting cybersecurity today?

We deliver a set of services that helps keep you on track with the latest developments, both what to watch for and what to keep away from. It’s good to know what effect technology has on your business.   1. Social Media 75% of security breaches are staged by external actors. When your employees interact

Security breach confirmed by Microsoft

Microsoft disclosed a security breach today that took place last month in December 2019. In a blog post today, Microsoft announced an investigation of a misconfiguration of security rules on an internal customer support database that was storing user analytics data. In the time period of December 5 – December 31, 2019, anonymized data was

Windows 7 Has Officially Reached End Of Life

Windows 7 has officially reached End Of Life (EOL) on 14 January 2020, including Windows Server 2008 and Windows Server 2008 R2. Microsoft is offering  extended support with Windows 7 Extended Security Updates (ESU) at an annual subscription for Windows 7 users. What does End of Life mean? Every operating system and every software has

US government approved tips against ransomware

Ransomware is a form of malware that targets your critical data and systems for the purpose of extortion. Ransomware is frequently delivered through spearphishing emails. After the user has been locked out of the data or system, the cyber actor demands a ransom payment. After receiving payment, the cyber actor will purportedly provide an avenue

Dridex Malware alert issued by US-CERT

In a recent US-CERT/CISA alert on Dridex malware and its various iterations, information is confirmed that this malware has the capability to impact confidentiality of customer data and availability of data and systems for business processes. According to industry reporting, the original version of Dridex first appeared in 2012, and by 2015 had become one

New Jersey Healthcare provider Hackensack Meridian hospital paid ransom to hackers to stop a cyberattack

The targeted ransomware event at Hackensack Meridian Health brought the computer network systems down last week, resulting in interruptions across its IT network, including Carrier Clinic in Montgomery and three sub-acute facilities. The Edison-based healthcare company said it had insurance to help cover the costs associated with cyberattacks, including payment, remediation and recovery efforts. The

Key findings of 2019 state of ransomware report a growing threat

Our partner’s (Datto) Global State of the Channel Ransomware Report is comprised of statistics pulled from a survey of 1,400+ managed service providers (MSPs), it’s partners, and clients, around the world. The report provides unique visibility into the state of ransomware from the perspective of the IT Channel and their SMB clients who are dealing

15 Tips to Make Sure Your WiFi Doesn’t Let You Down

Is it time to upgrade your WiFi?  How to save time, money, and ensure a great WiFi experience. 1. Research your current WiFi conditions Gather feedback from ALL employees and customers about their WiFi and network experience. As the business owner, you likely know how the systems are working for you and the employees you

Recommendations for ensuring recovery and continuity in the face of the growing cybersecurity threats to SMBs

Businesses must prepare the front line of defense against ransomware attacks: your employees. Today’s companies must provide regular and mandatory cybersecurity training to ensure all employees are able to spot and avoid a potential phishing scam in their inbox, a leading entrance point for ransomware. Businesses must leverage multiple solutions to prepare for the worst.

You must protect your organization from DNS hijacking

DNS hijacking, DNS poisoning, or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries. This can be achieved by malware that overrides a computer’s TCP/IP configuration to point at a rogue DNS server under the control of an attacker, or through modifying the behaviour of a trusted DNS server

Latest Security Patch released by Microsoft

Microsoft has published today 80 security fixes across 15 products and services, as part of the company’s monthly batch of security updates, known as Patch Tuesday. Of the 80 vulnerabilities patched today, two are so-called zero-days — security flaws that had been exploited  before fixes are released. The two zero-days are CVE-2019-1214 and CVE-2019-1215. Both

How many of your employees don’t understand cybersecurity?

Did you know that in the U.S. 70% of employees lack a basic understanding of cybersecurity best practices? Vulnerabilities in your organization can lead to a major fallout in case of a cyberattack. Cyberattack simulation and invocation and test of incident response protocols  help businesses and regulators practice an effective coordination in the event of

SSL – what it means, how it works and where it is used.

If you want to run commercial transactions, or process your website’s data online securely, you need an SSL certificate for your website. Basically, it gives you the valid encryption for the website – and if you ever wondered what is the difference between domains that have http:// or https:// in the URL, this is it:

Our Awards:
IT Support NJ - Reputable highly rated Small Business IT services and tech support company in New Jersey - powersolution industry awards
IT support NJ - Reputable highly rated Small Business IT services and tech support company in New Jersey - powersolution IT industry awards
Scroll to Top