Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blog

Tekie Geek has been serving the Staten Island, Brooklyn, Queens, Bronx, New York City, Long Island and New Jersey area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Could You Identify a Social Engineering Attack?

Could You Identify a Social Engineering Attack?

Social engineering can allow a cybercriminal to access networks without being hampered by the security solutions that a business has in place. Through the manipulation of the human element of a company, its critical resources are exposed. In order to protect your business against the threat of a social engineer, there has to be an overall awareness in your company culture.

0 Comments
Continue reading

Tip of the Week: Comparing the Pros and Cons of Desktops and Laptops

Tip of the Week: Comparing the Pros and Cons of Desktops and Laptops

Should your next computer purchase be a desktop or a laptop? Let’s talk about the less obvious differences between the two so you can make the right decision when buying computers for your staff.

0 Comments
Continue reading

Remote Monitoring and Maintenance Keeps Your Business In Business

Remote Monitoring and Maintenance Keeps Your Business In Business

Depending on your business’ setup, you might have an in-house IT department that manages any of your technological assets, or you might have an outsourced vendor that you prefer to work with. Regardless, you know that as a business owner, you don’t have time to worry about managing IT--especially if you’re a small organization that has a limited budget and a limited workforce to do the work.

0 Comments
Continue reading

What Else Can Blockchain be Used For?

What Else Can Blockchain be Used For?

Cryptocurrency, most notably Bitcoin, has made the headlines in recent months with huge fluctuations in supposed value. While the topic of cryptocurrency is one that would take far more than a single blog post to discuss, we can examine the technology that allows these currencies to exist and posit what it could likely be used for in the near future.

0 Comments
Continue reading

Tip of the Week: Protecting Your Company from Invoice Impersonation

Tip of the Week: Protecting Your Company from Invoice Impersonation

While you should be sure to keep yourself apprised of threats, it could be argued that it is even more important for your employees to be aware of them. After all, they are the ones utilizing your business’ workstations, software solutions, and even Internet-based apps to facilitate their daily duties. You need to make sure that your employees are able to spot attacks and react to them properly.

0 Comments
Continue reading

Is Your Mobile Data Safe?

Is Your Mobile Data Safe?

In 2018 there are certain technologies most businesses have begun to embrace. Cloud computing, high-end network security, collaboration technologies, and some others have begun to be utilized by businesses, large and small, to build a more productive enterprise. Apart from these technologies, there are a few that every business person should know, if only to understand what is possible; and what is on the horizon for their company.

0 Comments
Continue reading

VR and AR Made a Scene at CES 2018

VR and AR Made a Scene at CES 2018

The International Consumer Electronics Show (CES) is designed to showcase new technology and products to the world, with a focus on industry professionals and companies that want to showcase their latest projects. The show, which was held in Las Vegas in January, saw the introduction of many consumer products, but the ones that showed off new virtual and augmented reality capabilities made a considerable impact on attendees.

0 Comments
Continue reading

Tip of the Week: Protecting Your Mobile Device in 2 Easy Steps

Tip of the Week: Protecting Your Mobile Device in 2 Easy Steps

Mobile devices are one of the greatest tools available for business use today. However, because society has come to rely so much on mobile devices, these devices have become a treasure trove for cybercriminals to obtain information from. For this week’s tip, we’ll go over some simple ways to protect yourself from such threats.

0 Comments
Continue reading

The Fun, the Fit, and the Weird: Our Review of CES 2018

The Fun, the Fit, and the Weird: Our Review of CES 2018

From the fun, to the fit, to the just plain weird, CES 2018 had quite a bit to show off. The Consumer Electronics Show is a chance for the technology industry to show off what they have to offer, for better or for worse. Today, we’ll go over some of the highlights that graced Las Vegas this year.

0 Comments
Continue reading

Could Your Business Be a Victim of Targeted Ransomware?

Could Your Business Be a Victim of Targeted Ransomware?

If you were a cybercriminal, what would be your preferred method of launching a ransomware attack? Would you rather create a catch-all threat that could capture as many potential victims as possible, or a calculated approach to land a big one? Despite the proven results of larger ransomware initiatives, most cybercriminals have made the shift to smaller, more targeted attacks against specific companies, and in some cases, individuals.

0 Comments
Continue reading

Tip of the Week: Google Chrome Extensions for Google Drive

Tip of the Week: Google Chrome Extensions for Google Drive

Google Drive lets its users take advantage of a lot of great tools and utilities, and this is only augmented by Google Chrome’s extensions. With these tools at your disposal, you can optimize the way your company takes advantage of Google Drive. Here are some of the best extensions out there that let you utilize Google Drive’s best assets to your advantage.

0 Comments
Continue reading

According to Survey, IoT Use is Up While Trust is Down

According to Survey, IoT Use is Up While Trust is Down

While the Internet of Things has increased in use, that doesn’t mean that its users necessarily trust it just yet. Furthermore, many of these users aren’t fully aware of the actual extent that the IoT has in their lives. These results, from a recent survey by Cisco, could be pertinent to your business and how you manage it. With so many new devices connecting to your network, how can you expect them to affect operations?

0 Comments
Continue reading

This Data Privacy Day, the NCSA Wants You to STOP. THINK. CONNECT.

This Data Privacy Day, the NCSA Wants You to STOP. THINK. CONNECT.

January 28th marks Data Privacy Day, a day intended to raise awareness of the importance of data privacy and educate users and business owners of its benefits. Spearheaded by the National Cyber Security Alliance, there are plenty of lessons the NCSA has to share with businesses as this day puts their, and their clients’, privacy in the spotlight.

0 Comments
Continue reading

How the Business Software Alliance Will Come After Your Business

How the Business Software Alliance Will Come After Your Business

As a business owner, you should know that you shouldn’t abuse the software licenses that your business relies on to function, or use pirated software to fulfill that need. While there are many people do such things, the response from software companies in an attempt to stop such activities has created a system that can award those who exploit it.

0 Comments
Continue reading

Tip of the Week: Your Productivity Doesn’t Depend on the Internet

Tip of the Week: Your Productivity Doesn’t Depend on the Internet

It is an expectation for the modern business to rely on the Internet in order to complete its daily function. As a result, anytime there is an Internet outage, many employees may find themselves lacking purpose or direction. However, a lack of Internet doesn’t have to mean a lack of productivity. For this week’s tip, we’ll review some ways your staff can be productive without an Internet connection.

0 Comments
Continue reading

4 Resolutions to Keep Your Business Secure in 2018

4 Resolutions to Keep Your Business Secure in 2018

With every new year comes great new opportunities, and 2018 is no different. However, change can be a good thing, and with a new year also comes more perspective and knowledge that you can use to make considerable improvements to the way you run your organization. Here are four ways that you can use developments in cybersecurity to help your business succeed in the new year.

0 Comments
Continue reading

2018 is Expected to See $96 Billion in IT Security Investments

2018 is Expected to See $96 Billion in IT Security Investments

If you were considering increasing your investment into your information security in 2018, you certainly aren’t alone. Gartner released a report that indicated a considerable rise in plans to invest in key security considerations.

0 Comments
Continue reading

Tip of the Week: Never Pay to Print Business Cards Again

Tip of the Week: Never Pay to Print Business Cards Again

It’s just good business to hand out your business card to prospective clients, and it has been for a very long time. As far back as the Renaissance, special guests were announced with name cards that displayed who the guest was and what types of greetings were due. It wasn’t until the Industrial Revolution that business cards became primarily a means of displaying trades or professional skills. Business cards are mostly used for marketing and networking in the modern age, and your organization should be using them.

0 Comments
Continue reading

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

0 Comments
Continue reading

20-Year-Old Exploit Finds New Life as ROBOT

20-Year-Old Exploit Finds New Life as ROBOT

There is no shortage of threats on the Internet, from situational issues to deliberate attacks meant to damage your company or steal your valuable data. While new threats pop up almost every day, some have been around for some time--so long, that many seem to not consider them as viable threats.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Employer Employee Relationship Employer-Employee Relationship Cabling eWaste Server Mouse BYOD Web Server Administrator Save Money Communication BDR Network IT support Staten Island Privacy Help Desk Scam Supercomputer Technology Work/Life Balance PDF Cost Management Data Protection Information Technology Displays Corporate Profile Accidental deletion Mobile Security Virtual Assistant ransomware attacks Miscellaneous Tracking datto Hardware Innovation Antivirus Fake News The Internet of Things Network Security Audit Wireless Congratulations Chromebook Cryptocurrency malware Hard disk Vulnerability Domains Outsourced IT Google Drive managed IT services staten island Worker Computer Malfunction Best Practice computer services Staten Island Business Computing Windows XP Staffing Robot CCTV IT consulting Staten island Disaster Recovery Budget Spyware Money Business Mangement Google Managed IT Services managed services Staten Island Cache computer support Training Advertising Managed IT Services Saving Money Office 365 Spam Streaming Media Tip of the week IT support Computer Care IT consulting firms Internet Securty Unified Threat Management VPN Software as a Service Visible Light Communication Internet of Things Business Technology end-user files Writing Telephony computer support firms Mobile Device Password VoIP Bitcoin Business Metrics Apps Holiday Social Media Tip of the Week Powerful Technology Solutions IT consulting NYC Quick Tips Rental Service Education today ’s organizations Microsoft Virus tech support Office Piracy LiFi Administration Apple Retail Maintenance Email WiFi Text Messaging managed it services Workers Public Cloud email scam Machine Learning Data Security computer support NYC Sports managed services Phishing Vendor Management Downloads IT support NYC Google Calendar Facebook Botnet Cortana Best Practices How To IT Consultant Safety Content Filtering Hosted Solution IBM Software Language Mobility Firewall News Cleaning Time Management SaaS Downtime Android Document Management IT support New York City Unified Communications Computer data loss File Sharing Music Laptops Update Distributed Denial of Service Lithium-ion battery Memory Society Scalability Data storage Access Twitter Business Management Ransomware Download Malware Monitors Laptop Alert User Tips IT consulting Computing Printer CryptoLocker Redundancy Printing Project Management Microchip Google Maps Legal Drones Remote Monitoring Physical Security IT support Staten Islans Emergency CrashOverride Digital YouTube Network Congestion Knowledge Software License Windows 10 Augmented Reality Cybercrime Notifications tech support Staten Island Business Growth Workplace Tips IT Management Tech Support Office Tips Running Cable Data Management Two-factor Authentication Black Market Patch Management Bluetooth Cloud Staten Island IT support App Operating System Deep Learning Backup it support Staten Island IT consulting Staten Island tech support Taxes Productivity Processors Social Mobile Device Management Freedom of Information Webcam Vendor Mangement Cloud Computing Cloud computing Staten Island computer support Staten Island Data computer repair Staten Island Documents Automobile Solid State Drive Gadgets Applications Motion Sickness Mobile Technology IT Services Company Culture Samsung Business Continuity staten island managed services Blockchain Health Start Menu Cybersecurity Experience Desktop Identity Theft Gmail Virtual Reality Business Cards IT services Staten Island Disaster Wi-Fi Tablets Managed Service Provider Flexibility IT services New York City Tech Terms G Suite Bandwidth Collaboration Reliable Computing Uninterrupted Power Supply Website Travel IT support firms IT consulting company Encryption data recovery Browser malware worms Hacks History Compliance Business Telephone Systems Hack Banking Google Wallet Hackers Hacking Data Backup Hiring/Firing Big Data DDoS Flash Windows Thank You Access Control Windows 10 Unified Threat Management SharePoint Government Vulnerabilities Social Engineering computer repair Remote Computing Specifications Relocation Security Lenovo Computing Infrastructure Networking IT consulting Staten Island communications Hacker data recovery Staten Island Virtual Desktop Efficiency Word Microsoft Office tech support Staten Isalnd Virtualization Hosted Solutions Law Enforcement Comparison Smartphones Proactive IT VoIP Excel Websites Productivity Search Smartphone Politics Windows 8 Upgrade Meetings 3D Printing Private Cloud IT services NYC Hardware Solutions managed IT services NYC End of Support Small Business Passwords Workstations Touchscreen Hard Drive Disposal Customer Service Settings IT Support IT consulting firm Google Docs Bring Your Own Device Recovery Mobile Devices Analytics Wireless Technology Hard Drive Artificial Intelligence Tablet Automation Managed IT Paperless Office Digital Payment Data Breach Staten Island computer support In Internet of Things Outlook computer services Microsoft Excel Television

Newsletter Sign Up