2014 - Hackensack, NJ | Net It On

    blog-img

    How often do you deal with your company-owned IT equipment? Some businesses keep detailed records of their equipment and use security measures and policies to prevent theft; but if your business doesn't protect its equipment, you could be digging a hole into your budget without realizing it.

    Read More
    blog-img

    This past August, we reported on a new vulnerability with USB firmware called BadUSB. This vulnerability was discovered by Karsten Nohl of SR Labs. The BadUSB vulnerability was presented at the Black Hat security conference as a theoretical risk, but now, the code has leaked and this risk has become a reality. Oops.

    Read More
    blog-img

    The Internet is a vast and wonderful plain of many fruits and resources, but there are two sides to everything. It can also be a vile and disgusting place, with content that could make even the most hardened criminal flinch (or stare in astonishment). Keep your network safe by implementing a content filtering solution for your business.

    Read More
    blog-img

    It's football season! Many NFL fans are spending their Sundays glued to their TV sets cheering on their favorite team. This season, those in the tech industry who are concerned about net neutrality have also taken an interest in football--primarily due to a recent FCC ruling.

    Read More
    blog-img

    What we expected to be Windows 9 has been gradually revealed through leaks over the past several weeks, but Microsoft has thrown a curveball into the mix with Windows 10. The latest information, revealed during a public Microsoft Windows event, has gone into much detail concerning the nature of the newest incarnation of Windows, including its focus on enterprise and cloud-centric policy.

    Read More
    blog-img

    Working with technology can get pretty complicated and technical at times. We're here to help. We've got plenty of technology tips to share with the world, and we're going to unleash them on you once a week. For more helpful tech tips, search our previous blog articles. This week's tip will help you spot a nasty APT hack on your company's network.

    Read More
    blog-img

    Technology grows more powerful and complex every day, and there have been increasing efforts to automate certain repetitive tasks. In the near future, we may be able to look at fully automated assembly lines. While most companies are concentrating on what this means for their budgets, automation could very well be a threat to jobs around the world.

    Read More
    blog-img

    For users of Unix-based operating systems, there's a new threat on the loose. The vulnerability, promptly called the Bash bug, or "shellshock," is targeting systems equipped with Linux and Mac OS X. The bug allows remote users to execute arbitrary code within the operating system.

    Read More
    blog-img

    One California restaurant owner has recently taken on an interesting marketing strategy that goes against all conventional wisdom. Co-owner David Cerretini of the Italian restaurant Botto Bistro tells his strategy to USA Today, "I want to be the worst restaurant in the San Francisco area!" Strangely enough, his approach seems to be working.

    Read More
    blog-img

    As a business owner, your email contacts list is probably chock-full of clients and customers you've met over the years. This can make it difficult to find your target without sifting through countless names. Instead of getting flustered by an unorganized list, try sorting your contacts in various ways.

    Read More