fbpx

EZ MSP Blog

EZ MSP has been serving the New York area since 2008, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

The Insecurity of IoT Devices is a Serious Concern… So Why Aren’t Businesses Worried?

The Insecurity of IoT Devices is a Serious Concern… So Why Aren’t Businesses Worried?

The IoT, or Internet of Things, is everywhere. There’s a relatively good chance that a device that would be part of the IoT is within your reach right now, perhaps even on your person. Businesses of all kinds use the IoT for various purposes as well, but behind this usage lies significant risk from cyberthreats, and a shocking number of businesses seem to accept this risk without much concern… as in, the vast majority of surveyed businesses utilizing the IoT demonstrated a lack of protection, but seemed not to be bothered by it.

Continue reading

Expect to See More Folding Phones in the Future

Expect to See More Folding Phones in the Future

Foldable phones undeniably saw a very slow start when they were introduced a few years ago, high prices and horror stories about their fragility scaring away all but the earliest of early adopters. However, thanks to an enthusiastic fanbase, the concept has persisted and has become a legitimate option amongst flagship devices. 

Let’s consider some of the predictions that have been made surrounding the future of the foldable smartphone market, and why business users might be drawn to the flexible form factor. 

Continue reading

What is It About the IoT that Makes It an Appealing Target for Cybercrime?

What is It About the IoT that Makes It an Appealing Target for Cybercrime?

The IoT—the Internet of Things—is a fascinating technology, as it exemplifies just how much can be accomplished when Internet connectivity is used to augment the capabilities of otherwise “dumb” devices. Unfortunately, as fascinating as it is, the IoT is also infamous for its security issues…a reputation that attackers have been perpetuating as these devices grow more common.

Continue reading

Are Apple Devices Immune to Threats? Don’t Bet On It

Are Apple Devices Immune to Threats? Don’t Bet On It

For a very long time, Apple has been requested to share a workaround for their platform security with law enforcement, which the company has refused outright. Their argument has been that doing so would inherently undermine their lauded security. Well, the feds have given up asking, because they went ahead and developed a workaround themselves… and in doing so, have revealed that iOS isn’t quite as secure as it was purported to be.

Continue reading

Is Older Technology Really That Bad?

Is Older Technology Really That Bad?

While it may sound strange coming from a managed service provider, there is some wisdom to the adage, “if it ain’t broke, don’t fix it.” We know, we know… it sounds a little hypocritical for us to say something like this, when we spend so much time touting the values of proactive maintenance and similar strategies. However, this now-cliché statement certainly holds water, as exemplified by many modern technologies—including the Boeing 747.

Continue reading

Tip of the Week: Turn It Off and Turn It On, Again

Tip of the Week: Turn It Off and Turn It On, Again

The people that support a business’ information systems are widely renowned as a bunch of nerds sitting in a basement office waiting for someone that matters calls them upstairs. Now, we think this characterization is unfair (of course), but since our jobs are so technical, it can be hard to relate with clients all the time. Fortunately for us, the most useful tool we have in our repertoire is excruciatingly simple. To fix your computer problem, have you tried turning it off, and turning it back on? 

Continue reading

How to Make Chromecast Your Employee of the Month

How to Make Chromecast Your Employee of the Month

The Chromecast, Google’s offer to the growing streaming market, is a pretty handy device - even in the business setting. I know, I know, it is a consumer device, but some of its capabilities directly translate to professional use. Here, we’ll walk you through the process of setting up your Chromecast, four useful-for-business features, and the process of resetting your Chromecast if it ever needs it. 

Continue reading

Shadow IoT and What to Do About It

Shadow IoT and What to Do About It

For much of the last five years, we’ve been told that the Internet of Things was going to be the most important innovation since broadband Internet was introduced. This growth, while its largely happening under the proverbial radar, is happening. There are around seven billion “smart” devices in 2019 with expectations that it will be three times that by 2025. With that many Internet-connected devices, there are bound to be some that come with vulnerabilities, whether it comes from being designed poorly or not frequently updated with modern threat definitions. Today, we’ll take a look to see if the Internet of Things should be considered a threat to your business.

Continue reading

Taking a Look at Wearable Technology in 2019

Taking a Look at Wearable Technology in 2019

Wearables have been on the market for quite some time, though the definition of them has certainly changed over the years. Wearables have become far more capable in the past decade, bringing with them a barrage of other issues that need to be addressed. Chief among them is how these devices should be regulated, and by whom.

Continue reading

Tip of the Week: Bring Your Own Device Policy Considerations

Tip of the Week: Bring Your Own Device Policy Considerations

Bring Your Own Device is a hot trend in today’s business environment, as it creates a ton of opportunities for businesses to cut costs. However, this is only true if you implement a BYOD policy that your organization can take advantage of, as it creates considerable problems for your unprepared businesses.

Continue reading

What Will We Use When the Computer Mouse Goes Extinct?

What Will We Use When the Computer Mouse Goes Extinct?

Does anyone remember computer punch cards? Does this date us? Either way, since computing punch cards went the way of the dinosaur, there has been some version of the keyboard and mouse as we know them today. These interfacing tools have become so ingrained into our minds that it is frankly difficult to imagine a computer without them... But this begs the question, will there ever be a user interface impressionable enough to replace them?

Continue reading

Understanding Biometrics

Understanding Biometrics

It’s a familiar scene from many science fiction properties: a person approaches a locked door. They unlock it, but rather than using a key, a red beam scans their eye to confirm their identity and permit them access. The thing is, this and similar biometric authentication technologies are likely to begin appearing in real-world businesses sooner than later. Let’s discuss:

Continue reading

Need Gift Ideas? Try Out These Gadgets!

Need Gift Ideas? Try Out These Gadgets!

The holidays are getting closer, and picking the right gift for someone is only becoming a more stressful activity. To make things a little easier for you, we’ve found some gadgets that might make the perfect gift for that person on your list who has a particular interest. This blog will go over some of these interests and the gifts that might make their holiday.

Continue reading

3 New Gadgets For 2016 That You’re Gonna Want [VIDEO]

b2ap3_thumbnail_2016_gadgets_400.jpgWith technology being so important in the modern office, there are thousands of gadgets produced each year that are designed to work with existing technology to deliver marginal-to-significant increases to an individual’s productivity. Each year, many of these gadgets fail in some way or fall out of public consciousness quickly, becoming nothing but the answer to a trivia question a decade from now at your favorite watering hole.

Continue reading

Check Out These 5 Crazy Mobile Contraptions from 2004

b2ap3_thumbnail_crazy_old_mobile_400.jpgTen years ago, the world was a different place. In the technology world, Gmail was first introduced, and North Korea banned mobile phones. But while North Korea banned them, just south across the country’s border was the ITU Telecom Asia expo in Busan, South Korea, where the future of the mobile phone was bright. How did they think the cell phone of the future would pan out?

Continue reading

New Security Threat: Don’t Get Jacked While Juicing!

b2ap3_thumbnail_usb_security_tips_400.jpgHackers today are trying every approach possible to steal your device's data, including the hijacking of public USB ports. This technique is known as "juice jacking," and with this new threat, you should think twice about charging your device using a public USB charging kiosk, or even the USB port on a friend's computer.

Continue reading

Let's Talk Tablets

Tablets are definitely becoming a staple in the consumer electronics world. For the longest time, the tablet PC was an expensive, clunky device that just didn't wow consumers. Some businesses had adopted tablets back in the day, but they were difficult to use, hard to support, and they simply didn't perform for the price tag. However, like many consumer electronics, Apple reinvigorated the tablet market with the original iPad, and now it would seem tablets are here to stay. The question is, are they right for businesses?

Continue reading

Contact Us

Learn more about what EZ MSP
can do for your business.

EZ MSP
7 Odell Plaza Suite 134
Yonkers, New York 10701

Connect With Us

Facebook logo  Twitter logo  Linkedin logo  RSS feed

Latest Blog

Social media is constantly evolving, and if the big social networks had it their way, it would be the only place people go when they log onto the Internet. Whether you have strong feelings for or against social media, or perhaps you are ind...