For Sales: 888-800-4644  For Support: 973-777-7227                     “YOUR TECHNOLOGY MANAGED”
Logo Logo Logo Logo Logo Logo
MENUMENU
  • Home
  • Services
    • Managed IT Services
      • IT Solutions
      • VoIP Phone Systems
      • Cloud Apps
      • Cloud Infrastructure
      • Microsoft Teams
      • Microsoft 365
      • Office 365
      • SharePoint Online Services
      • Data Backup & Continuity Solutions
      • IT Project Management & Strategic Planning
      • IT Hardware & Software Procurement
      • Structured Cabling Installation Services
    • Managed Security Services
      • Dark Web Monitoring
      • Cyber Awareness Training
      • Risk Intelligence Solutions
      • Advanced Threat Intelligence
      • Network Penetration Testing Services
      • Business Continuity & Disaster Recovery
      • Security Solutions
    • Managed Business Services
      • Employee Activity Monitoring
      • Business Intelligence Services
      • Microsoft Dynamics 365 Finance & Operations
      • SAP Crystal Reports Services
      • Database Management Services
      • Software Services
    • Cybersecurity Compliance Services
      • CMMC 2.0 Compliance Services
      • Cyber Insurance Readiness
      • PCI DSS Standard Compliance
    • Staff Augmentation Services
    • Cloud Technology Information Services
  • Industries
        • Manufacturing and Warehousing
        • Education
        • Government
          • Virtual Police Training
          • Virtual Fire Training
        • Non-Profit
  • Store
  • About Us
  • News & Events
  • Contact Us
MENUMENU
  • Home
  • Services
        • Managed IT Services
          • Managed IT Solutions
          • VoIP Phone Systems
          • Managed Cloud Apps
          • Managed Cloud Infrastructure
          • Microsoft 365
          • Microsoft Office 365
          • Microsoft SharePoint Online Services
          • Microsoft Teams
          • Data Backup & Continuity Solutions
          • IT Project Management & Strategic Planning
          • IT Hardware & Software Procurement
          • Project Management & Strategic Planning
        • Managed Security Services Overview
          • Business Continuity & Disaster Recovery
          • Network Penetration Testing Services
          • Advanced Threat Intelligence Services
          • Dark Web Monitoring
          • Managed Security Services
          • Risk Intelligence Solutions
        • Managed Business Services
          • Business Intelligence Services
          • Employee Activity Monitoring
          • Database Management Services
          • Microsoft Dynamics 365 Finance & Operations
          • SAP Crystal Reports
          • Software Services
          • Staff Augmentation Services
        • Cybersecurity Regulatory Compliance Services
          • CMMC 2.0 Compliance Services
          • Cyber Insurance Readiness
          • PCI DSS Standard Compliance
  • Industries
        • Government IT Services
          • Virtual Police Training
        • Manufacturing and Warehousing
        • Education
        • Non-Profit
  • About Us
  • News & Events
  • Contact Us
PODCast Episode 2

21 Apr Episode 2 of the On-Site Technology PODCast is now LIVE!

Posted at 20:06h in Compliance Regulations, Cybersecurity, Ransomware, Security, SMB Small and Medium Business Technology
Share

    PODCast Episode 2  Episode 2 of the On-Site Technology PODCast is now live on our Youtube channel. The topic centers around Cybersecurity and the importance of Penetration Testing for good network security hygiene.[vc_video link="https://youtu.be/7agtasW-z3Q" css=""]...

    Read More

    26 Jun How to avoid falling victim to ransomware

    Posted at 15:02h in Cybersecurity, Ransomware, Security, SMB Small and Medium Business Technology
    Share

      We hear routinely in the news that a major corporation or government agency has had its data integrity compromised, with millions of pieces of personal data accessed. In these cases the criminals behind the attack hope to get money by selling that data to other...

      Read More

      19 Jun Ransomware attacks just keep increasing: Vet practices aren’t immune

      Posted at 13:03h in Cybersecurity, Ransomware, Security, SMB Small and Medium Business Technology
      Share

        This cyberattack scheme isn't new, but it has become increasingly common over the past several years. Many of the viruses lurking out there steal data to be used for nefarious purposes. The goal has long been to access important financial and personal data that can...

        Read More

        12 Jun Three responses after a Ransomware attack

        Posted at 14:14h in Business Continuity, Cybersecurity, Ransomware, Security, SMB Small and Medium Business Technology
        Share

          If you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options open to you. Ransomware is a type of computer virus that kidnaps your data and holds it hostage for money. It has become increasingly common attacking...

          Read More

          30 May Four easy ways to thwart cyber criminals

          Posted at 14:31h in Cybersecurity, Security, SMB Small and Medium Business Technology
          Share

            With all the talk about cybercrime and the recent spate of headlines about ransomware, concerns for your data security and the safety of your business keep growing. Avoiding a data breach is critical to your business, so it is vital that you focus resources and...

            Read More

            15 May Password Management Tools: An overview

            Posted at 19:30h in Cybersecurity, Security, SMB Small and Medium Business Technology
            Share

              Effective password management is an essential aspect of cybersecurity. With the increasing number of online accounts and services, remembering all those passwords can be a daunting task. Password management tools provide an effective solution to this problem. This blog discusses the benefits of using password...

              Read More

              08 May Three common sense data safety reminders

              Posted at 12:26h in Cybersecurity, Security, SMB Small and Medium Business Technology
              Share

                When it comes to smaller and medium-sized businesses, anything that distracts from the day to day concerns about bringing in revenue tends to fall by the wayside. With that in mind, we have put together a list of seven things that a small business needs...

                Read More

                27 Feb Internal threats: A new angle to email security

                Posted at 13:39h in Cybersecurity, Security
                Share

                  You know how important your email system is to your business. Not only is email your core communication tool, but also bears a lot of weight from the legal perspective and must be accessible at all times. You have a good email security system and...

                  Read More

                  20 Feb What to look for an email security solution

                  Posted at 14:12h in Cybersecurity, Security
                  Share

                    An important aspect to email security is, of course, deploying a good email security solution. But, with so many available in the market, what should you be looking for when opting for an email security tool? Here are some key features you would want in...

                    Read More

                    13 Feb Email safety: Firewalls and antivirus are great, but what about your employees

                    Posted at 14:20h in Cybersecurity, Security
                    Share

                      The Verizon Data Breach Investigations report states that emails are the primary source of two-thirds of malware. Email is an easy target simply because there is more human touch involved in the case of emails. There’s always a stray chance that someone will end up...

                      Read More
                      • 1
                      • 2
                      • 3
                      • 4
                      • 5
                      • 6
                      • 7
                      On-Site Technology

                      On-Site Technology was launched in 1999 as an IT consulting firm. Our client list rapidly grew via success in solving complex technology problems. Today, On-Site Technology continues to deliver clients with comprehensive technology solutions.
                        

                      “Your Technology Managed”

                         

                      On-Site Technology Locations:

                        

                      164 Brighton Rd
                      Clifton, NJ 07012

                        

                      1451 W Cypress Creek Road Suite #300
                      Ft. Lauderdale, Florida 33309

                      Other Links
                      • Managed IT Services
                      • Structured Cabling Installation Services
                      • Dark Web Monitoring
                      • Network Penetration Testing Services
                      • Business Continuity & Disaster Recovery
                      • Managed Security Services
                      • Advanced Threat Intelligence Services
                      • Business Intelligence Services
                      • Microsoft Office 365 Services
                      • Microsoft Teams
                      • Microsoft Office 365 SharePoint Online Services
                      • Microsoft Dynamics 365 Finance & Operations
                      • Employee Activity Monitoring
                      • IT Project Management & Strategic Planning
                      • VoIP Phone Systems
                      • Cyber Awareness Training
                      • Staff Augmentation Services
                      • SAP Crystal Reports
                      • Software Services
                      • Industries
                      • About Us
                      • Contact Us
                      • Privacy Policy
                      News & Events
                      • 5 Lesser known benefits of choosing the co-managed IT model
                      • Four reasons to opt for the co-managed IT services model
                      • Best practices for data safety in a remote work environment
                      • Episode 2 of the On-Site Technology PODCast is now LIVE!
                      • How safe is your data when your staff works from home?
                      • Automated Penetration Testing: Everything You Need to Know About Modern Cybersecurity Practices
                      • 4 things to do to ensure your business continuity planning is a success
                      • What are the essentials of a business continuity plan?
                      • The Complete Guide to Penetration Testing Cost: Understanding Pricing Factors and Budgeting Effectively
                      • How to Choose a Penetration Testing Provider: A Comprehensive Guide for Strengthening Your Cybersecurity
                      • The Benefits of Penetration Testing: How It Enhances Security, Ensures Compliance, and Delivers ROI
                      • 3 Reasons to prepare a business continuity plan if you haven’t done so already
                      • The Penetration Testing Process: Best Practices for Cybersecurity
                      • Business continuity planning: A must-have, not a luxury

                      Copyright © 2025 by On-Site Technology. All Rights Reserved.