Blog

Check out the latest IT news and updates from Healthy IT's blog

The rise of business email compromise (BEC) amid the pandemic

Even before the COVID-19 pandemic, business email compromise (BEC) has been one of the most pervasive forms of cybercrimes. In fact, from 2013 to 2019, there were more than 70,000 victims of BEC scams worldwide.

According to the FBI, some of the most recent examples of pandemic-related BEC scams capitalize on coronavirus-related situations and reasons to ask for payments and change standard payment methods.

Instant messaging apps: The indispensable productivity tool in the age of remote work

The coronavirus outbreak has driven businesses in New York and all over the world to implement remote work setups in order to keep operations afloat. And because face-to-face communication isn’t always viable in this new arrangement, employees are using technology tools to reach out to vendors and clients, exchange information with their peers, and collaborate with their team.

Beware of these COVID-19-themed phishing scams

As if a health pandemic is not causing enough chaos for small- and medium-sized businesses (SMBs) in New York to deal with, phishers are also taking advantage of weak IT security and poor cybersecurity habits to unleash different kinds of COVID-19-themed scams.

Key characteristics of a quality managed IT services provider

In today’s climate, more and more companies, especially small- and medium-sized businesses, are turning to managed IT services providers (MSPs) for solutions to their IT problems. MSPs prove cost-effective and are often quicker than by-the-hour IT services providers, which send agents physically on-site in the event of an issue.

How To Quickly Shift To A Work-From-Home Business Model To Maximize Productivity In Today’s Coronavirus Environment

As a business owner today, you are now facing unprecedented challenges to help deal with the coronavirus pandemic. You are asked to self-isolate and practice social distancing to “flatten the curve.” You are asked to allow your employees to work from home to reduce possible exposure and slow the spread of COVID-19.

These are all reasonable requests.

Setting up your small business to guard against phishing attacks

If you run a business that has any sort of reliance on computers or computer systems, you’ll have worried about your vulnerability to parties with insidious intent. More than the threat of online viruses or hackers tapping into your system remotely from a laptop like you see in the movies, phishing attacks are by far the biggest threat to small- and medium-sized businesses.

Top considerations when rolling out digital workspaces

Technology continues to revolutionize the way we work at an evermore rapid pace. On the heels of the processing capabilities offered by personal computers and the interconnectivity provided by the internet, digital workspaces have distinguished themselves as the next great leap in ways of working.

Is it time to upgrade my computer hardware?

February 8th, 2020

In the 21st century, business has become increasingly reliant on computers and computer systems. As such, enterprises have to ensure that the hardware they rely on for computer access is in good condition and fit for purpose. The complication lies in knowing when to upgrade computer hardware.