Trending IT Blog Articles:
The Essential Checklist for Securing Company Laptops at Home
Stop Ransomware in Its Tracks: A 5-Step Proactive Defense Plan
We figured it out
so you don't have to
Hot Alerts:
Artificial Intelligence VS. Human Decision-Making
Microsoft OneDrive Change: What SMB Leaders Need to Know (and Avoid)
The 2026 Hybrid Strategy: Why “Cloud-Only” Might Be a Mistake
Beyond Chatbots: Preparing Your Small Business for “Agentic AI” in 2026
Top Cybersecurity Challenges Facing New Jersey Businesses in 2026 (And How to Stay Protected)
Cyber Retaliation From Iran? Why U.S. Businesses Are on Alert in 2026
We know you are busy
Receive important IT and Security alerts via email and get a complimentary e-book, “Cybersecurity Essentials for Business Owners”
No worries. We keep you information private. You may cancel at any time.
For more information, see our Privacy Policy.
Hackers crack 16-character passwords in less than 60 minutes
A team of hackers has managed to crack more than 14,800 supposedly random hashed (encrypted) passwords -90% from a list of 16,449. This act was part of a hacking experiment for a technology website Ars Technica. So, you think you have a strong password?
powersolution.com Earns the CompTIA Managed Services Trustmark
FOR IMMEDIATE RELEASE powersolution.com Earns CompTIA Managed Services Trustmark™ Validation that powersolution.com uses industry accepted security best practices Ho-Ho-Kus, NJ May 20, 2013 – Managed Service Provider powersolution.com has received the CompTIA Managed ServicesTrustmark™. CompTIA verified our documentation to support the above criteria, and
10 Tips to Ensure Data Security in the Cloud
Yet, it’s true—there are still some people that hesitate to use cloud-based software and one of their primary concerns about the cloud focuses on data security. In a recent survey of 4,500 high-level IT professionals in 83 countries, the Information Systems Audit and Control
Press Release: powersolution.com Earns Industry Credential for Managed IT Services Providers
LATEST UPDATE: Please, note – the information below is now obsolete: CompTIA has changed the Trustmark Policies, transforming MSP Partners Trustmark into Managed Services Trustmark. For more information on powersolution.com’s CompTIA Trustmark, please see: Managed Services Trustmark Security Trustmark For Immediate Release powersolution.com Earns
SpyEye – the Smiling Hacker – is extradited to US to face charges
The US Justice Department said Hamza Bendelladj, 24, who was known by his alias “Bx1,” an Algerian sought in connection with the computer malware designed to compromise personal identity and financial information, such as online banking credentials, credit card details, usernames, passwords and other
Monday’s IT news collection – April 22, 2013
This week’s collection of news around computer and information technology: Our Internet privacy is at risk — but not dead (yet) Congress is expected to modernize the Electronic Communications Privacy Act of 1986, increasing judicial oversight over law enforcement and treating data stored in
Do your employees steal your business Intellectual Property?
So, do you think your employees may be stealing your business IP? Do they even realize it? I came across a great resource from Symantec – a whitepaper titled “What’s Yours is Mine: How Employees are Putting Your Intellectual Property at risk”. Data listed
What is Cloud Computing? (And should you really care?)
Most of us are aware of cloud computing – and even those who are not, are using the Cloud every day. So, what is considered a Cloud Computing? Term “The Cloud” is a common shorthand for a provided cloud computing service, or an aggregation
Small Business Falls Prey to Cyber Crime – Pizza shop hacked in Ohio
Here is a perfect illustration to Mistake #5 from our previously published Are You Too Trusting? 5 Common Computer Security Mistakes every SMB owner makes blog article. For those of us who think that small business owners should not worry about becoming cyber-crime victims,
Are You Too Trusting? 5 Common Computer Security Mistakes every SMB owner makes
You are probably making them – some, if not all the mistakes on this list. When you own a small business, it is easy to become a victim of common computer threats. After all – you are in business doing something other than keeping
Cloud Computing is a popular choice for SMBs
The latest market forecasts for cloud computing are predicting big growth in the industry, reaching reaching $270 billion by the year 2020, as much as 30%. More and more people adopt the latest technology to store information in a virtual space. For a small
Facebook introduces New Graph Search engine
Facebook’s CEO Mark Zuckerberg has been vaguely hinting about developing Facebook’s own social search engine for some time now. During TechCrunch Disrupt conference back in in September of 2011, Zuckerberg admitted having a dedicated team at Facebook working on the project, so that Facebook
What to consider when calculating your IT budget
In many small businesses, IT is not a top priority. Typically, the IT staff is outsourced to another company that handles anything and everything technology based. This creates a disconnect between the organization and their IT. When annual budgets are drafted, the IT department
Hosted Exchange: Separating Myths from Truth – New Jersey businesses could benefit from
As you know, New Jersey and New York area, among others in the world, have been hit hard by Hurricane Sandy, and some of the small businesses were not able to restore power to their facilities – and some are still out of electricity.
Fake FBI scam
Back in September FBI officially posted a warning about a Fake FBI scam (you may remember it from our Ransomware article): “There is a new ‘drive-by’ virus on the Internet, and it often carries a fake message—and fine—purportedly from the FBI. Reveton is described
Cybersecurity for Networked Medical Devices: Computer viruses and malware on the rise
High-risk medical technology has been found to be infected by computer viruses and malware, health and security experts stated. The warnings were given as part of a panel discussion in Washington DC, as reported by Technology Review from the Massachusetts Institute of Technology. Here is
Ransomware – fake FBI Moneypak SOPA virus malware
Ransomware (also known as cryptoviruses, cryptotrojans or cryptoworms) comprises a class of malware, or a virus which restricts access to the computer system that it infects. In addition it demands a payment, which is basically a ransom in order for the restriction to be
What to Consider When Purchasing Computers for Your Business
First, let me start with a disclaimer: do not try this at home! What I mean by it – please, run your PC purchase consideration by your IT support company BEFORE you actually head to the store. Sometimes we all make an impulse buy
David Dadian, powersolution.com CEO speaks at GFI MAX Customer Conference 2012
On September 26th and 27th, New Orleans played host to MSPs and IT service providers who want to get the most from their commitment to GFI MAX (currently known as MAXfocus™ by LOGICnow™). The seven business sessions of the conference focused on practical topics
“Tag” of war between GoDaddy and Anonymous Own3r hacker?
Yes, they are “playing tag” with each other – while keeping us “updated” on what’s going on. Update on : Millions of sites hosted on GoDaddy’s platform affected by Anonymous hack and Taken Down GoDaddy Hosted Websites Are Coming Back Up It is reported
Taken Down GoDaddy Hosted Websites Are Coming Back Up after a hack
“We’re still working. Getting closer to normal. Thanks for all your patience and understanding.” “Most customer hosted sites are back online. We’re working out the last few kinks for our site & control centers. No customer data was compromised.” – these are the latest
Millions of sites hosted on GoDaddy’s platform affected by Anonymous hack
One of the Anonymous members is taking responsibility for web hosting giant GoDaddy experiencing an outage. Many, possibly millions of sites, including GoDaddy’s own are down at this time. A Facebook post from GoDaddy account said: “Status Alert: Hey, all. We’re aware of the
Microsoft Logo Change – would it fail where others have succeeded?
Walking in the hallways of the mall by the Sheraton hotel in Boston, where I am staying for the duration of the Hubspot Inbound 2012 event, I spotted something I have not seen before, yet something vaguely familiar. Four squares of popular colors, together.
Did FBI Disconnect You From Internet on Monday July 9th?
You may have noticed a news resurfacing on every media station lately: almost 70,000 of US internet users were expected to lose their internet connection on Monday July 9th, 2012. News Flashback: in November 2011 we were all warned by FBI about DNSChanger, a
Surface Tablets from Microsoft are to Enter the Tech Market Later in 2012
Microsoft has developed a Windows tablet computer of its own design – Surface. The announcement of Surface tablets comes at a time when mobile devices security is on everyone’s mind. Microsoft has not been synonymous with security for quite some time. At a conference
Google Celebrates 5 years of Safe Browsing Initiative
It’s been five years since Google officially announced malware and phishing protection through Safe Browsing initiative. 600 million users qre protected through built-in protection for Chrome, Firefox, and Safari, where we show several million warnings every day to Internet users. You may have seen
HIPAA Privacy and Security Rules Compliancy is a Must!
I recently came across an article that highlighted a five doctor, Arizona based cardiac surgery practice, that was fined $100,000 by the Division of Health and Human Services (HHS) for violating the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules. The
Computer Network Service and Support Specialists
As computer network service and support specialists, we provide help and advice to people and organizations using computer software or equipment. Technical support specialists typically support information technology (IT) employees within an organization and monitor their IT environment, providing Managed IT Services. We help
Network Administrator
A Network Administrator is an IT person that is responsible for the maintenance of computer hardware and software systems that make up a computer network. That includes the maintenance and monitoring of active data network infrastructure and related network equipment such as PCs, servers,
No Tools Required: HP Z1 Workstation is all Power without the Tower
Imagine a computer that lets you swap out parts without any tools. Easily add a hard drive, upgrade memory, or access the graphics card just by snapping it open. HP revealed Z1 workstation – and what a sleek little thing it is!!! The only









