Superior Computer Services

Superior Computer Services Providers of managed IT services, cloud based solutions, Helpdesk and end-user support, hardware & software sales, and business IP/PBX phone systems.

Technology consultants and provider of managed IT services, cloud solutions & hosting, and phone systems for small businesses up to 75 users.

Operating as usual

There's a lot going on under the hood...h/t @manekinekko
09/01/2020

There's a lot going on under the hood...

h/t @manekinekko

As we all learn how to cope with COVID-19, many in business are turning to online video conferencing solutions like Zoom...
04/01/2020
Beware of ‘ZoomBombing’: screensharing filth to video calls – TechCrunch

As we all learn how to cope with COVID-19, many in business are turning to online video conferencing solutions like Zoom. But as popularity with a certain technology grows, so does the security concerns. Many Zoom meetings are held without Passwords to make joining very easy for invited participants. Protect yourself by setting a Password on each Zoom meeting you have. And if you're using another screensharing/video conferencing app, learn how to secure the meeting with a passcode of some kind.

The world is vulnerable to a new type of trolling as people turn to Zoom video calls to feel connected amidst quarantines. Jerks are using Zoom’s screensharing feature to blast other viewers with the most awful videos from across the internet, from violence to shocking pornography. That’…

Yesterday was another successful day upgrading a client's IT infrastructure. Not only did we upgrade & simplify network ...
09/09/2018

Yesterday was another successful day upgrading a client's IT infrastructure. Not only did we upgrade & simplify network hardware, all new CAT6 cabling was run to each workstation for computers, printers, & telephones. New #UniFi network switches and In-Wall AC wireless access points from Ubiquiti Networks, Inc., and a new Untangle NGFW for security & protection of the network. We also cleaned up a very message IT closet by removing old unused equipment and remounting for easy access and visual identity. Special thanks to Alan Rudnick and his awesome team at ADR Security for wiring & terminating all the network drops!

07/19/2017

Verizon techs arrived and have confirmed a communications line outside our building was struck by something, probably a passing truck, and is the cause for our phone service and internet going down on one of our two Fiber connections (the other connection was unaffected) which carry telephone and high-speed internet into the building. The other fiber connection has kept us online with internet service and hasn't skipped a beat. Awaiting two other linemen to arrive to assist with the 400ft cabling run. #howboutdat #dangitshot

Ironic how Verizon was the company hired to conduct extensive security auditing & analyses into the MASSIVE Target breac...
07/13/2017
Millions of Verizon customer records exposed in security lapse

Ironic how Verizon was the company hired to conduct extensive security auditing & analyses into the MASSIVE Target breach several years ago which found the breach came from shared VPN credentials with a Target HVAC contractor... not that Target's actual IT infrastructure had been "hacked" or "breached". Now Verizon is the victim in a similar situation with a one of their vendors.

#irony #ClosingTheDoorHelps #2FASecurityForTheWin

Customer records for at least 14 million subscribers, including phone numbers and account PINs, were exposed.

A global cyber attack is sweeping across Europe right now. DO NOT open strange emails with strange attachments or click ...
06/27/2017
BBC Money

A global cyber attack is sweeping across Europe right now. DO NOT open strange emails with strange attachments or click strange links!

Screens around the world are reportedly getting this message, indicating a ransomware attack is to blame.

More #perspective
06/23/2017

More #perspective

05/15/2017

You may have seen the news this weekend about the WannaCry/WannaCrypt ransomware attacks. Criminal hackers have released a new strain of ransomware that spreads itself automatically across all workstations in a network, causing a global epidemic. If you or a co-worker are not paying attention and accidentally open one of these phishing email attachments, you might infect not only your own workstation, but immediately everyone else's computer too.

Be very careful when you get an email with an attachment you did not ask for. If there is a .zip file in the attachment, do not click on it but delete the whole email.

Remember: "When in doubt, throw it out"!

Set your DVR for April 26th (tomorrow) and May 24th for HGTV!Congratulations to our long-time client Wright Building Com...
04/25/2017

Set your DVR for April 26th (tomorrow) and May 24th for HGTV!

Congratulations to our long-time client Wright Building Company who will be appearing in 2 episodes of HGTV's "Buying & Selling" starring the Property Brothers Jonathan Silver Scott & Drew Scott! Way to go Chris Wright and Judy Doyle and their entire team!

Wright Building Company to Appear on 2 Episodes of HGTV’s Property Brothers

When HGTV experts Jonathan & Drew Scott needed help in Westchester County for their Property Brothers show, "Buying & Selling”, they called upon local custom home builders Chris Wright & Judy Doyle of Wright Building Company to help transform two dated homes in ‪Westchester County‬‬‬‬‬‬ to two amazing properties with smart, stylish living spaces. You can watch these spectacular transformations take place ‪April 26th‬‬‬‬‬‬‬ and ‪May 24th‬‬‬‬‬‬‬ on HGTV. ‬

EMBROIDERY SAMPLES ARRIVED! Proudly featuring our new branding designed by Jamie and her team at Spruce Rd. #stayclassy
04/06/2017

EMBROIDERY SAMPLES ARRIVED! Proudly featuring our new branding designed by Jamie and her team at Spruce Rd. #stayclassy

NEW to Superior's Security Stack: Multi-Factor Authentication (MFA) is coming soon! Learn how MFA strengthens access sec...
03/27/2017
Why You Need Two-Factor Authentication (2FA)

NEW to Superior's Security Stack: Multi-Factor Authentication (MFA) is coming soon! Learn how MFA strengthens access security by requiring two methods to verify your identity: something you know, plus something you have.

Passwords are increasingly easy to compromise. They can often be stolen, guessed, or hacked — you might not even know someone is accessing your account. 2FA adds a second layer of security, keeping your account secure even if your password is compromised.

#perspective
03/09/2017

#perspective

Password security is one of the single-most important tools you have to securing your online (and offline) identity. Wea...
09/16/2016

Password security is one of the single-most important tools you have to securing your online (and offline) identity. Weak passwords are the most common ways hackers crack your accounts and access your sensitive data. Is your password on this list? If so, you should change it... NOW!

Passwords don't have to be your kid's birthday or your childhood pet's name. Passwords can be creative, but they must also be memorable - otherwise, what good is a password that you can't remember?

DO mix upper & lower case letters
DO use special characters
DO use numbers
DO use phrases (with spaces ifpossible!)
DO change frequently
DO use 2-Factor Authentication

http://buff.ly/2cR4XXJ

VERY important for users who get their office voicemails emailed to them - be aware of fake voicemail attachments that c...
08/26/2016
Ransomware & Voicemail Notifications, Redux

VERY important for users who get their office voicemails emailed to them - be aware of fake voicemail attachments that carry ransomware payloads.

Ransomware & Voicemail Notifications, Redux

There is a new Scam Of The Week where bad guys have taken an actual past scam that the Federal Trade Commission has reso...
08/25/2016

There is a new Scam Of The Week where bad guys have taken an actual past scam that the Federal Trade Commission has resolved and is now refunding money on. Bad guys take these FTC cases and create a phishing attack out of them.

Here is the rule: If you receive any emails from an official-sounding organization that promises you a refund for any amount, be very careful and never click on any links or open any attachment you did not ask for.

Safe ATM usage: avoid using freestanding ATM machines; it's just not worth the risk of having your bank account emptied....
08/22/2016
Would You Use This ATM? — Krebs on Security

Safe ATM usage: avoid using freestanding ATM machines; it's just not worth the risk of having your bank account emptied. Instead: use ATM's that are mounted into a building or wall, like the ones at the bank, when possible. Here's an example of what could happen...

http://buff.ly/2b41GIB

One basic tenet of computer security is this: If you can’t vouch for a networked thing’s physical security, you cannot also vouch for its cybersecurity. That’s because in most cases, networked things…

If it seems to good to be true - IT IS! If you're a Stranger Things or Orange Is The New Black fan, don't be fooled by t...
08/22/2016
Scam Of The Week - Netflix For Free

If it seems to good to be true - IT IS! If you're a Stranger Things or Orange Is The New Black fan, don't be fooled by this tempting scam! A classic Social Engineering tactic: preying on dedicated fans of pop culture mega-hits. Don't be fooled, you Know better! ;D

Scam Of The Week. There are active scams that try used social engineering to trick Netflix users into downloading malware or give our credentials

Great news! Superior is now a Certified Reseller for Adobe desktop apps including Acrobat, Photoshop, Illustrator, InDes...
08/19/2016

Great news! Superior is now a Certified Reseller for Adobe desktop apps including Acrobat, Photoshop, Illustrator, InDesign, AfterEffects, and cloud services & bundles such as Creative Cloud!

This article is from February, but its a good read for anyone who gets Word documents as email attachments - um, hello.....
08/19/2016
It's Here. New Locky Ransomware Hidden In Infected Word Files

This article is from February, but its a good read for anyone who gets Word documents as email attachments - um, hello... don't we all?!?

The Locky strain of ransomware comes in the form of a seemingly benign Microsoft Word file attachment. When opened, you're prompted to enable the macros in order to read the "unreadable" text. Enabling the macros actually is what deploys the payload from a remote server, then executes. The program now starts encrypting files on your computer and also across the network. There is no way to unencrypt the files. You will then be notified that in order to get your files back, you'll have to pay a ransom fee of some unknown amount, usually in Bitcoin currency, and before an "expiration" date. As the expiration date gets closer, the ransom fee increases. In a split second, you can not only destroy your computer, but the entire network as well. Don't let this happen. Treat every attachment as a suspect, even if its from someone you "know" - there's a good chance they didn't send you anything!

A new ransomware strain called Locky hides in Microsoft Word files and encrypts all documents including unmapped network drives.

July saw some fresh strains of ransomware released into the wild, targeting business websites powered by the popular Wor...
08/18/2016
CyberheistNews Vol 6 #33 Ransomware Roundup: Fresh Strains And New Nasty Features

July saw some fresh strains of ransomware released into the wild, targeting business websites powered by the popular WordPress platform. A botnet called SoakSoak delivers its ransomware payload to anyone who visits the infected site by redirecting unsuspecting visitors to a compromised site where the payload is is deployed. This payload carries one of the newest strains of the Crypt### ransomware strain.

This month's Ransomware Roundup talks about more of these nasty new strains that have been released PLUS an interesting discussion on Social Engineering and the "human firewall".

CyberheistNews Vol 6 #33 Ransomware Roundup: Fresh Strains And New Nasty Features

Superior Computer Services's cover photo
08/12/2016

Superior Computer Services's cover photo

Address

740 S Fulton Avenue
Mount Vernon, NY
10550-5014

Opening Hours

Monday 8am - 5pm
Tuesday 8am - 5pm
Wednesday 8am - 5pm
Thursday 8am - 5pm
Friday 8am - 5pm

Telephone

(914) 668-6000

Alerts

Be the first to know and let us send you an email when Superior Computer Services posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Superior Computer Services:

Nearby media companies


Other Cable & satellite services in Mount Vernon

Show All