Broadcasting your password on national television may be the easiest way to invite hackers, but common password mistakes make it almost as easy for your data security to be compromised. Password safety may not be one of the most interesting topics in the realm of cybersecurity, but having a strong password is one of the […]
A look at two-factor security and why it should be used for all web-based email. If you’re looking to compromise your system/network as soon as possible, the best way to do so would be retrieving your credentials via your web-based email system. For example: Most hackers will have no problem studying their prey before sending […]
SimpliVity made a name for themselves as a leading provider of software-defined hyper-converged infrastructure, and as of February 17th, 2017, they are now part of HPE. This acquisition will allow HPE and their partners to help simplify customers’ IT operations. There are a lot of exciting things happening behind the curtain for partners like PNJ Technology Partners that […]
We’re In Search Of A Desktop Support Specialist! A quick bit of background on us: PNJ Technology Partners is a growing Albany-based IT solutions company. We’ve been helping area businesses achieve success and growth through technology for more than 30 years. More than simply stepping in to fix problems, our team is dedicated to becoming a […]
After being postponed a week due to a major blizzard, the Albany Damien Center’s 7th annual Bowling For PAWS event was held on February 19th. More than 90 bowlers came out to participate, and –along with an amazing group of donors, sponsors, and honorary committee members — raised just under $17,000 for the Pets Are […]
There are viruses that can be implanted on a computer in 2017, and lie in wait until a network becomes vulnerable before attacking. Unfortunately, viruses have come a long way from 20 years ago. The term virus was coined early on in computer history, but it’s every bit as relevant today as it was then. […]
The easy-to-use messaging service WhatsApp offers many convenient features for small businesses and their employees, but a recently-discovered vulnerability within the app could leave your business at risk. For many small businesses, communication between employees is facilitated through a variety of means, including phone calls, e-mail messages and texting applications such as WhatsApp. Especially for […]
Criminals want your company’s financial data, customer lists including credit card information, intellectual property, and anything else they can sell. Cyber crime is a huge endeavor with severe consequences for organizations that are victimized. Criminals want your company’s financial data, customer lists including credit card information, intellectual property, and anything else they can sell. Besides […]
Outlook Quick Steps are excellent for busy professionals who find themselves doing the same things day in and day out. See why you should use them, and how they’re built to integrate into your routine. Every office has its own routines, and some are more common than others. Quick Steps came out 7 years ago […]
Broadcasting your password on national television may be the easiest way to invite hackers, but common password mistakes make it almost as easy for your data security to be compromised. Password safety may not be one of the most interesting topics in the realm of cybersecurity, but having a strong password is one of the […]
To make the best use of contracted workers, communications have to be easy for all team members. Team members, both internal and external, need to have the tools needed to get the work done. The way America works is undergoing major changes. In 2015, there were about 3.2million people working as freelancers and that number […]
Because FLSA is federal legislation, it is logical that think that it would apply across the board to all employees. However, the reality is more complicated than that with numerous factors coming into play. FLSA — or the Fair Labor Standards Act — is designed to provide certain protections to workers. The federally-mandated legislation governs […]