NET Xperts Blog

Lock the Doors and Windows of Your Cybersecurity House

Your passwords are the locks on the doors of your Cybersecurity House. Passwords and Password Management is the first line of defense in keeping the bad guys out. Here are a few good tips to make sure you have a strong password. Don't forget to pair this with Multi-Factor Authentication!

Author: Joel Caskey, Cybersecurity Manager & Partner, NET Xperts LLC

Posted on October 04, 2023

Welcome to Cybersecurity Awareness Month

October kicks off Cybersecurity Awareness Month! This month will be focused on building your Cybersecurity House. Throughout the month, Joel will be sharing some tips and tricks to help you solidify that foundation, make sure the roof isn’t leaking, and keep those windows and doors nice, solid, and secure.

Author: Joel Caskey, Cybersecurity Manager & Partner, NET Xperts LLC

Posted on October 04, 2023

2022 Technology Review and Planning for 2023

Quick review of the key technology planning dates that you may have missed in 2022, as well as some planning dates for milestones in the upcoming 2023.

Author: Joel Caskey, Cybersecurity Manager & Partner, NET Xperts LLC

Posted on December 29, 2022

What Is Phishing? Types of Phishing Attacks

Phishing attacks happen all the time. For those of you that aren’t familiar, “phishing” is when a bad actor uses E-mail to coerce a victim to perform an action under false pretenses to benefit the bad actor. This can be done in multiple ways...

Author: Joel Caskey, Cybersecurity Manager & Partner, NET Xperts LLC

Posted on October 27, 2022

4 Easy Ways to Protect Your Data

Your data is your #1 asset. Whether this is your personal information or your customer’s personal information, it needs to be treated with care to prevent it from being exposed. Taking a few extra steps and using your Systems Protection Smarts will bring you one step closer to being a Cybersecurity Super Hero!

Author: Joel Caskey, Cybersecurity Manager & Partner, NET Xperts LLC

Posted on October 20, 2022

Password Management Tips

Having a good password is a major part in keeping your data secure. Check out these guidelines to ensure your password is as secure as possible.

Author: Joel Caskey, Cybersecurity Manager & Partner, NET Xperts LLC

Posted on October 13, 2022

Cybersecurity Super Hero Quiz

October is Cybersecurity Awareness Month! Our Cybersecurity Manager, Joel, designed a quiz to help test your cybersecurity knowledge. See where you rank on the Cybersecurity Super Hero scale!

Author: Joel Caskey, Cybersecurity Manager & Partner, NET Xperts LLC

Posted on October 07, 2022

Fix These SMB Security Flaws Now

Fixing these common SMB security flaws ensures you are separating your business from the others and taking the first step in network security.

Author: Mike Williams, Client Services Coordinator, NET Xperts LLC

Posted on August 17, 2022

Limiting Human Error in Cybersecurity

Mitigating human error and providing training to your users allows you to rest easier, knowing your employees are protected with a shield of knowledge.

Author: Daniel Lange, Technology Business Engineer, NET Xperts LLC

Posted on April 21, 2022

What To Do If Your Business Is Hacked?

Ever wonder what your business' first steps should be in the event of a hack? Your first step should be to not panic. After that, you'll have to figure out the what and where of the possible hack...

Author: Patrick Weber, Technology Business Engineer, NET Xperts LLC

Posted on March 07, 2022

Disaster Strikes - Is Your Business Ready?

Disaster Recovery should be a crucial piece when planning out your business' IT network. Without it, your business could face major downtime in an emergency.

Author: Joel Caskey, Cybersecurity Manager & Partner, NET Xperts LLC

Posted on January 19, 2022

What Is SIEM?

SIEM stands for Security Information and Event Management. It is a program used to provide real-time monitoring, event analysis, audit compliance, and more.

Author: Mike Williams, Technology Business Engineer, NET Xperts LLC

Posted on January 11, 2022

How to Use Focus View in Microsoft Outlook

The Focus view feature in Outlook uses machine learning to control the view of emails by analyzing emails and placing the most important emails in the “Focused” tab. Here's how to start using that feature...

Author: Kevin Daly, Senior Technology Business Engineer, NET Xperts LLC

Posted on January 03, 2022

What Could Your Business Gain By Using Microsoft Teams?

Benefits of Utilizing Microsoft Teams

Microsoft Teams is a one-stop-shop for all your collaborative needs. With full cross device capabilities and the ability to set up channels to communicate with a group of people, collaboration has never been easier.

Author: Dan Lange, Technology Business Engineer, NET Xperts LLC

Posted on December 08, 2021

Virtual Ears Everywhere - Who's Listening?

“Man in the Middle” attacks are more common than the average user would think. There are many ways that a “Man in the Middle” attack can happen – through a phishing attempt where credentials are stolen, through using public Wi-Fi, or even just by a bad Google search. But the most dangerous part of these types of attacks – they’re virtually undetectable when they happen.

Author: Joel Caskey, Senior Technology Business Engineer, NET Xperts LLC

Posted on December 01, 2021

Current Threat: Zero-Day Vulnerabilities

What Is A Zero-Day Vulnerability?

A zero-day vulnerability is a software security flaw that is unknown to the software vendor and consequently doesn’t yet have a patch in place to fix the flaw. NET Xperts has solutions to help protect your business against these vulnerabilities.

Author: Michael Williams, Technology Business Engineer, NET Xperts LLC

Posted on November 08, 2021

Can An MSP Work With My Internal IT Team?

I want to clear up a common fallacy here – while working with a full-service MSP is great for small businesses, they are also a great supplement and partner to an internal IT team.

Author: Joel Caskey, Senior Technology Business Engineer, NET Xperts LLC

Posted on September 28, 2021

Important Features in An Endpoint Security Tool

Every endpoint protection solution is going to throw every marketing term they have at you in order to convince you to give your business to them. But which tool is the right one?

Author: Nick Lindemann, Managed Services Administrator, NET Xperts LLC

Posted on September 20, 2021

Vulnerability Scan vs Penetration Testing

Vulnerability Scanning vs Penetration Testing

Both vulnerability scans and penetration testing are necessary pieces to maximizing your company’s cybersecurity. Find out what the difference between these two vital security measures are.

Author: Kevin Daly, Senior Technology Business Engineer, NET Xperts LLC

Posted on August 24, 2021

What Are Your Security and Compliance Policies Missing?

Security audits have been a trend in the recent few months. One of the big places that I see businesses “missing the boat” on audits are with formal compliance policies. Make sure you have all of these items in your security and compliance policies. These are necessary pieces for any business.

Author: Joel Caskey, Senior Technology Business Engineer, NET Xperts LLC

Posted on July 12, 2021

The Risks of Using Personal Email Accounts for Business

Using personal email accounts for business can expose your organization to many legal risks as well as other risks that can damage a company.

Author: Jim Wagner, Technology Business Consultant, NET Xperts LLC

Posted on June 14, 2021

Tips for Protecting Your Network

Protecting your network begins with user education and training within your organization. Read this article for some tips you can start doing right now!

Author: Patrick Weber, Technology Business Engineer, NET Xperts LLC

Posted on June 09, 2021

Keeping Up With Software Renewals

Life is full of surprises- but your software renewals shouldn't be. Organizations that don't keep track of their license agreements and renewal dates could find themselves out of compliance, paying hefty fees, and more!

Author: Francene Melocchi, Technology Business Consultant, NET Xperts LLC

Posted on June 02, 2021

Fileless Malware Title Graphic

What Is a Fileless Malware Attack?

Fileless malware attacks, also known as non-malware attacks, use existing vulnerabilities to infect a system. It is a type of malicious software that does not rely on virus-laden files to infect a host.

Author: Steve Goodbread, Managed Services Administrator, NET Xperts LLC

Posted on May 10, 2021

What Is SSL?

Ever wondered what the "s" in "https" means? That "s" is known as SSL or “Secure Sockets Layer” is a security protocol that ensures data passed between a web browser and a website is private.

Author: Daniel Grayson, Technology Business Engineer, NET Xperts LLC

Posted on May 03, 2021

The Benefits of Cloud Migration

Cloud – It’s one of the growing industries in the technology field that still has some confusion lingering around its concept. What are the major benefits? What is the comparison of cost, security, or availability? Let’s go over some of that…

Author: David Angotti, Cloud Services Administrator, NET Xperts LLC

Posted on April 28, 2021

Senior Living Center's Cybersecurity Threats

According to Forbes, more than 90% of all healthcare organizations reported at least one security breach in the last three years and senior living centers are among the most vulnerable of these organizations. Find out how to secure your network.

Author: Britnee Schneck, Marketing Coordinator, NET Xperts LLC

Posted on April 19, 2021

Identity Management Day 2021

Identity Management Day is a brand new annual awareness event that was created by the National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA). Find out more details about managing your business' identity security here!

Author: Britnee Schneck, Marketing Coordinator, NET Xperts LLC

Posted on April 13, 2021

Traditional Anti-Virus vs. EDR

When looking to secure your business’ endpoints, there are two main options: Traditional Anti-Virus (AV) and Endpoint Detection & Response (EDR). Find out the differences between these options!

Author: Cody Sheldon, Managed Services Lead Administrator, NET Xperts LLC

Posted on April 12, 2021

Benefits of Utilizing a Secure MSP

There are a number of benefits that come from working with a Secure Managed Service Provider (MSP) like NET Xperts LLC. These benefits include enhanced security, experience, efficiency, focus, and more!

Author: Ben Dennison, Jr. Managed Services Administrator, NET Xperts LLC

Posted on April 06, 2021

World Backup Day!

March 31st is World Backup Day! Having up-to-date and secure backups are an essential for every business. Find out what a backup is and why you need it!

Author: Britnee Schneck, Marketing Coordinator, NET Xperts LLC

Posted on March 31, 2021

Employee Spotlight: Mike Mannarino

We interviewed Mike Mannarino, one of our Technology Business Consultants! Get to know Mike better, as he talks about his experience with NET Xperts and more!

Technology Business Consultant, NET Xperts LLC

Posted on March 30, 2021

The Risks of Not Keeping Software Updated

Keeping software updated is a simple security task that is often overlooked. This can lead to data loss or costing your business money in the long run.

Author: Brett Coffman, Managed Services Administrator, NET Xperts LLC

Posted on March 15, 2021

Looking For a Comprehensive Endpoint Security Tool?

Looking for a comprehensive endpoint security tool? NET Xperts has already done the leg work on finding a solution for your security needs that has all the fancy features you’ll want.

Author: Nick Lindemann, Managed Services Administrator, NET Xperts LLC

Posted on March 09, 2021

Ways to Check if Your Email Has Been Compromised

If you're worried your email may have been compromised, or want to know what warning signs to watch out for, here are a few ways to check! If any of the listed scenarios fit your situation, NET Xperts may be able to help you resolve these issues.

Author: Mike Copen, Technology Business Engineer, NET Xperts LLC

Posted on March 01, 2021

Cybersecurity Tips for Non-Profits

Far too many Non-Profit organizations do not have or know of a policy that identifies cybersecurity risk in their organization. Here's some tips to keep your non-profit secure!

Author: Mike Green, Director of Sales, NET Xperts LLC

Posted on February 26, 2021

Nonprofits: What Are Your Cybersecurity Risks?

Did you know that more than 80% of nonprofits do not have a strategy in place to deal with cyber-attacks? Find out what cybersecurity risks nonprofits face.

Author: Matt Sabo, Technology Business Consultant, NET Xperts LLC

Posted on February 15, 2021

Most Common Types of Network Vulnerabilities

Network vulnerabilities fall into three categories: Hardware-based, Software-based, and Human-based. Learn what the differences between these vulnerabilities are and what steps you can take to mitigate them.

Author: Kevin Daly, Senior Technology Business Engineer, NET Xperts LLC

Posted on January 25, 2021

Employee Spotlight: Angela Desiderato

We interviewed Angela, one of our partners and our VP of Managed Services! Get to know Angela better in 16 questions, as she talks about her experience with NET Xperts, travelling, and more!

Partner / VP of Managed Services, NET Xperts LLC

Posted on January 13, 2021

What You Need In An Email Security Service

In the fast-paced world we live in, your email security needs to go beyond traditional email filtering. I am often asked if I only did one thing for protecting our systems, what would it be? I always reply “end–user training.”

Author: Mike Mannarino, Technology Business Consultant, NET Xperts LLC

Posted on January 11, 2021

How To Protect Your Privacy Online

Protecting your personal privacy online can be just as important as protecting your data and passwords. Even seemingly useless information on its own can be collected and aggregated, used to build a profile about you, and then used to gain more sensitive information.

Author: Patrick Weber, Technology Business Engineer, NET Xperts LLC

Posted on January 04, 2021

Spotting and Avoiding Tech Support Scams

These attacks happen when cyber criminals pretend to represent someone within the organization, or a partner of the organization, in order to steal information. Their goals are not genuine and, usually, have the goal of stealing your personal and business information. This information goes for top dollar on the dark web.

Author: Matt Sabo, Technology Business Consultant, NET Xperts LLC

Posted on December 28, 2020

Tech Tip Public Wifi

Best Practices for Using Public Wi-Fi

With public Wi-Fi use being an inevitable reality it is important for users to maximize their personal security. The following are some best practices recommendations...

Author: Mike Green, Director of Sales, NET Xperts LLC

Posted on December 15, 2020

CybersecurityNew

Cybersecurity Myths

One of the biggest cybersecurity myths is that breaches are caused by external actors. However, this is not always the case. It's important to ensure that your company is aware of all of the possible threats to your business' security. Learn about some of these myths and how NET Xperts can help!

Author: Jim Wagner, Technology Business Consultant, NET Xperts LLC

Posted on December 08, 2020

3d logo small

It Isn't Always a Hacker

When you work with NET Xperts, you get not only the professional experience and knowledge we offer, but the sum total of our personal experiences. Computers don’t break the same way every time. Every few weeks I run into a problem that even Google has never heard of before, but one of my colleagues may have...

Author: Nick Lindemann, Managed Services Administrator, NET Xperts LLC

Posted on November 16, 2020

Deep Web vs. Dark Web

Deep Web vs. Dark Web

The internet is a great tool for finding and sharing information. Did you know, though, that cybercriminals can also use the internet to trade your personal information for profit? You may have heard the terms “Deep Web” and “Dark Web” before… but what do these terms actually mean?

Author: Joel Caskey, Senior Technology Business Engineer, NET Xperts LLC

Posted on November 06, 2020

The Most Common Passwords

The Most Common Passwords

Every year, exposed passwords have been analyzed by different groups to determine what the most common passwords are. Having one of these passwords, or similar ones can be detrimental to your account security. Find out if your password is on this list...

Author: Britnee Schneck, Marketing Coordinator, NET Xperts LLC

Posted on November 02, 2020

cybersecurity awareness month

The Importance of Security Checkups

How secure would you say that your network is? Small and medium sized businesses are prime targets for cybercriminals, because they don't have the controls in place that a larger corporation has.

Author: Joel Caskey, Senior Technology Business Engineer, NET Xperts LLC

Posted on October 14, 2020

Covid-19 Online Scams graphic

Covid-19 Online Scams

Online scammers are taking advantage of the hysteria surrounding the ongoing COVID-19 pandemic. According to the FTC, scams have cost Americans $13.5 million already this year. Scammers are using the pandemic as a door into your secure online accounts and data. One of the most efficient and effective methods of scams is to send phony links and malicious attachments through email.

Author: Dan Grayson, Technology Business Engineer, NET Xperts LLC

Posted on September 09, 2020

Joel Caskey

Employee Spotlight: Joel Caskey

We interviewed Joel, our Senior Technology Business Engineer, who has been on our team for 13 years! Get to know Joel better in 16 questions, as he talks about his experience with NET Xperts, his love for Disney, and more!

Senior Technology Business Engineer, NET Xperts LLC

Posted on September 01, 2020

Laptop

Windows 10 Tip

Microsoft is starting to roll out a new Search Console experience to Windows 10 users on version 1809 and above. The new experience offers a new "two-column" layout, which offers easy readability, as well as fast access to Quick Searches. You will also see local weather, top news, and more helpful info. To find other web results or navigate directly to a website, users can still type in the search bar like normal. To try the new...

Author: Mike Copen; Technology Business Engineer, NET Xperts LLC

Posted on August 24, 2020

cybersecurity2

Covid-19 Scammers

With all of the current events going on in the world, scammers have once again found a “hole” to take advantage of those that are unsuspecting. COVID-19 is making a very large impact in the world’s communications today, from social media to news to government. Be aware that scammers have seized this opportunity to prey on those that are letting their technology guard down.

Author: Joel Caskey; Senior Technology Business Engineer, NET Xperts LLC

Posted on April 01, 2020

Do you know all of the great offerings NET Xperts LLC has right now?

Maybe you’re a NET X Alert! Managed Services customer and you know all about how we can help you because we are currently doing so! Maybe you’re a customer that utilizes our services fairly regularly, but you could learn a little more. Or maybe, just maybe, you’re not a current NET Xperts LLC customer and you’re in need of our help! No matter your relationship...

Author: Megan Pollice; Operations Manager, NET Xperts LLC

Posted on April 01, 2017

Rate Change for 2017

We would like to thank our customers for your continued patronage over the years. With your help, we have achieved several accomplishments, including moving up the on the MSP Mentor Top 501 Managed Service Providers, attaining the Microsoft Gold Competency, as well as reaching Preferred Partner with Barracuda Networks and becoming a WatchGuard One Gold Partner. We work hard to maintain our partnerships with our vendor organizations every year to...

Posted on December 01, 2016

Defense In Depth

Cyber security is a moving target. So what can be done to proactively protect data and systems? Adopting a solid defense-in-depth strategy can help minimize the risk an organization is exposed to. Defense-in-depth involves a layered approach to security mitigation. More specifically, defense-in-depth involves all aspects of the technology infrastructure, including hardware, software, policies, procedures, training, awareness, and accountability. The primary goal is to...

Author: Eric Wolf; Managed Services Administrator, NET Xperts LLC

Posted on October 01, 2016

Security Basics 101: Battling the Silent Enemy

Data security has been a hot topic in the technology industry recently. Credit card compromising, data leakage, and other stolen confidential or proprietary information can all be very costly to a business as well as your customers. Systems administrators and IT providers can put a lot of protection strategies in place to help prevent these types of breaches, but you, as the end...

Author: Joel Caskey; Sr. Technology Business Engineer, NET Xperts LLC

Posted on April 01, 2016

Windows 10: Pros and Cons

I am sure that many of you have heard about the latest operating system released by Microsoft. It is called Windows 10 and was released to the public on July 29th. Upgrading to this new system can be both exciting and scary. The following information should provide a brief overview of Windows 10. Is it time? Now that Windows 10 has been released, the...

Author: Mike Copen; Technology Business Engineer, NET Xperts LLC

Posted on October 01, 2015

Happy Cyber Security Month!

In the spirit of cyber security month, I’m going to touch on a few things security-related. First, credit card pads – everyone uses them. When you go to the grocery store, restaurants, etc., many times you use a credit card pad to put your pin into when you run your debit card. You typically don’t think anything of it, right? Well, next time...

Author: Karen Brennfleck; Technology Business Engineer, NET Xperts LLC

Posted on October 17, 2013

Security, Availability, Integrity, Reliability, Confidentiality

With the September 23, 2013 HIPAA deadline behind us it would be nice if we could all breathe a sigh of relief as we head into the end of year activities. However, one important aspect to keep in mind for the New Year is the new inclusion of what is known as the Omnibus rule. What is Omnibus? In...

Author: Nicholas Lindemann; Managed Services Administrator, Exa Level Support Group, NET Xperts LLC

Posted on October 04, 2013

Windows XP End of Support: Are YOU Ready?

October 25, 2001 marked a historic date in the history of the PC world. It was the official release date for the Microsoft Windows XP Operating System. Since then, many changes have evolved from this operating system, but Microsoft Windows XP has always met the challenges and needs of both business and consumers, no matter what was thrown at it. Think about how...

Author: Joel Caskey; Technology Business Engineer, NET Xperts LLC

Posted on July 10, 2013

4 Common Questions You May Have About Replacing Your Windows XP Computer

4 Common Questions You May Have About Replacing Your Windows XP Computer · “Can’t I just keep my computer and upgrade Windows?” NET Xperts answer: There is no direct upgrade form Windows XP to the newer Windows 7 or 8. You would need to first upgrade to Vista and then to Windows 7 or 8. This can be costly and cause issues with...

Author: Brent Besonson; Technology Business Engineer, NET Xperts LLC

Posted on April 01, 2013

Top 3 IT Questions Answered

1. How important is IT to my company? Is IT only important when something is not working? Or, is it recognized as the leading function that operates your entire business? Whether it’s running software that operates your business or backing up your financial data; if IT only gets attention when something is NOT working, you may want to think about this. 2. Why...

Author: Jake Rubenstein;Technology Business Consultant, NET Xperts LLC

Posted on March 20, 2013

What's BYOD?

An acronym that’s been popping up in businesses recently, BYOD stands for Bring Your Own Device. It’s becoming a hot topic lately because more and more businesses are allowing employees to bring in their own smartphones, notebooks, tablets, etc. This trend can be attributed to the development of cloud technology and smartphones, due to their ability to view and share documents anywhere. Benefits of BYODThe most obvious benefit of adopting BYOD practices is the money...

Posted on February 26, 2013

Valentine's Day: To Tech or Not To Tech

At NET Xperts, we’re all (for the most part) very “plugged-in” people. Smartphones, tablets, PCs – any new toy we can get our hands on. Recently, I’ve been reading several articles related to Valentine’s Day and how we should all stay away from technology during our dates and time with our loved ones. Can you go for an hour or even 5 minutes without texting,...

Author: Maria Macaluso; Marketing Manager, NET Xperts LLC

Posted on February 14, 2013

Ring in the New Year with Virtualization

What is virtualization and can your organization benefit from it? Nowadays, organizations are always looking for ways to cut their IT costs wherever possible. Over the last few years, hardware virtualization has become more prominent in helping organizations do just that, and it looks like this trend will continue to grow in 2013. Virtualization is typically defined as “virtual machines” running on...

Author: Mike Sammel; Sr. Technology Business Engineer, NET Xperts LLC

Posted on January 31, 2013

NET Xperts LLC: A Year in Review

Wow, 2013 was very exciting for NET Xperts! We were named in the Top 501 Managed Service Providers in February and were among the Pittsburgh Business Times Largest Pittsburgh-Area Technology Consulting Firms in May. A very prestigious award we received towards the end of 2013 was the Western Pennsylvania Better Business Bureau Torch Award for Marketplace Ethics 2013 Runner-Up. President Marc Sachs said, “We...

Author: Megan Pinkosky; Marketing Coordinator, NET Xperts LLC

Posted on January 07, 2013

Compliant with Your Microsoft Licenses?

Top 4 Reasons You Should Be. Many times organizations add new employees and purchase new computers, then forget to order extra Windows CAL’s. The ability to demonstrate Proof of License (POL) is in your company’s best interest on several levels. 1. Viruses. To begin with, POL ensures that your company is using only genuine Microsoft software. Unauthorized software can contain viruses that may potentially...

Author: Kevin Hilson; Technology Business Consultant, NET Xperts LLC

Posted on July 01, 2012