Blogs
Managed VoIP Phone Systems for your Business
By Mary Grlic One of the most important parts of any business is the ability to make and receive phone calls. For the most part, business owners or managers want the same: a system that works! But what happens if the system you have doesn't align with your evolving...
Not your Common Cold: CosmicStrand Rootkit Virus
By Mary Grlic Researchers recently uncovered a major security concern: a UEFI-based rootkit virus. Coined “CosmicStrand” by cybersecurity company Kaspersky, the rootkit can implant viruses on the most basic software of a computer (UEFI). This makes it extremely...
Protecting The Manufacturing Industry Against Ransomware
By Mary Grlic Did you know that the manufacturing industry has become the #1 target for cyberattacks, according to an IBM report? Manufacturing is becoming a huge target for ransomware attacks. Increasing cybersecurity is becoming a huge priority for these...
Ransomware in Healthcare: Maui and Risks
By Mary Grlic All organizations unfortunately run the risk of ransomware attacks. These threats can be detrimental, costing organizations a lot of money and digital data. With technology becoming more prevalent in our daily lives, ransomware will not be going away...
Cybersecurity and Keeping your Network Safe
By Mary Grlic Think about all of the ways you keep your home and the belongings inside of your home safe. Perhaps you have a pair of diamond earrings that you keep in a locked jewelry box. When you leave the room, you lock the door. After leaving the house, you lock...
Compliance and the New York State SHIELD Act
By Mary Grlic In a world where technology is rapidly evolving, and data is everywhere, it is more important than ever to protect the private information of the people. Countries like Brazil (LGPD), Great Britain (GDPR), and Canada (PIPEDA) are implementing stricter...
Why Every Organization Needs Managed IT Services
When your computer battery dies, how do you get it to work? If your internet connection fails, how will it get back up? If you need to access storage from a lost or damaged device, how do you find it? With so much of our organizations relying on technology, it is...
Login Security: Preventing Data Breaches
By Mary Grlic With so many accounts online, protecting your login information is critical. Without proper protection, hackers can easily access your personal information, financial documents, files and more. There are countless security concerns for any internet user,...
Google Workspace for Healthcare Organizations
The healthcare industry is significantly evolving by integrating new technologies and platforms, including cloud computing, across healthcare systems. Modern healthcare organizations have realized the cybersecurity benefits, cost savings, and mobility capabilities of...
Computero Launches New Website for 2021
New York, USA (June 25, 2021) FOR IMMEDIATE RELEASE Computero launches new website with sophisticated and intuitive new design. Computero is delighted to announce the launch of its new and improved website, redesigned for a more responsive, intuitive, and...
Ideas for Training Employees to Avoid Phishing Emails
Receiving a "phishy" email or message can be frustrating and oftentimes quite a big risk for businesses. Phishing is one of the most dangerous cybersecurity threats and can cost many companies billions of dollars annually. Phishing attacks are only increasing in...
How Having a Sonicwall Firewall Installed Can Protect Against Hackers
You've seen the headlines -- US Suffered Massive Cybersecurity Breach -- Worst-Ever US Government Cyberattack. You may have even paused long enough to read beyond the headlines. Even if you haven't, it is clear that cybersecurity is becoming a huge concern. Now is...
Navigating the Spaghetti Maze: How to Deal With Wiring Mess
Cabling chaos sneaks up on you gradually and causes a wiring mess. You may have started with a simple network that didn't need a lot of planning to connect up. As your IT staff added devices, things got more complicated, but just a little at a time. At some point, you...
Ransomware: How to Keep Your Company Safe
Imagine your company’s most valuable assets being held hostage by wrongdoers. What would you pay to get them back? How far would you go to prevent them from being taken in the first place? Most of us can’t conceive of malicious infiltrators storming our offices and...
Welcome to your new phone system
Welcome and congratulations on the purchase of an Allworx phone system. We have designed this page to help you become acquainted with the phone system's features and phone capabilities, so that the transition from the old to the new is as smooth as possible. The links...
How to Choose a Server for Your Small Business — An Updated Guide
So your business has grown and you need a server. Without a doubt, there are some questions that you may have. What type of server should you buy for your small business? What type of capabilities will you need? How much should you spend? Computero specializing in all...
IT Consultant New York – How To Find a Good One.
Finding an IT Consultant or IT company in New York can be challenging. There are a lot to pick from and surely a lot of things to think about when filling this spot. That's why Computero is here to help. We are a managed IT service provider and IT consultant located...
Virus removal NYC – Interesting facts about drive by infections
Threats like malware and viruses are only getting worse. With new tech advances, there are also significantly greater numbers of cyber-based attacks. Hackers are getting more evolved, and even though new devices have "better" antivirus protection, attackers may still...
Server Help? Fix Server? Server repair NYC!
It's 5 pm on Saturday - "Can you guys help me fix my server? I need server help!" - a voice asks hesitantly.... Luckily, Computero is here to help. We are a managed IT service provider that services small and medium sized business in the NYC metro area. And we will...
Windows Server Backup Customized for your Business
Windows server backup can be a little tricky. The software included with Windows Server 2003 was very basic and didn't offer functions which would facilitate off site data storage. With introduction of Windows Server 2008 R2, the functionality of the application has...
SSL VPN – Speed up the sales process – give your sales staff access from the road.
The president of the largest sewer and water main company in NYC, Balkan Plumbing, asked Computero to develop a solution which would allow its sales staff to remotely access its networks and provide printed estimates to its customers on location. We responded by...
Computero Launches New Website
New York, USA (July 17, 2010) FOR IMMEDIATE RELEASE Computero announces the launch of the newly redesigned computero.com, the website for Computero. The CMS based website built by Scherr Technology features an HTML email response webform, search engine optimization,...
Security rule No. 1: Assume you’re hacked
Always assume you are hacked! Below is an excerpt from an article by Roger Grimes, Security Adviser for InfoWorld Security Central: "A recent Forbes magazine article advised readers to assume that their companies have been hacked. Some readers have asked me to weigh...
Computero Rescued My Laptop
This past weekend i was having massive computer issues with the USB drives on my brand new Acer Laptop that i recently purchased only 2 months ago. Since i didn't want to spend more money and time sending it back to the manufacture, i decided to search for a computer...