For Sales: 888-800-4644  For Support: 973-777-7227                     “YOUR TECHNOLOGY MANAGED”
  • Facebook
  • X
  • Pinterest
  • LinkedIn
  • YouTube
Logo Logo Logo Logo Logo Logo
MENUMENU
  • Home
  • Services
        • Managed IT Services
          • Co-Managed IT Services
          • Managed VoIP Phone Systems
          • Managed Microsoft 365 Services
          • Managed Microsoft Copilot
          • Managed Microsoft Sharepoint Services
          • Managed Microsoft Teams
          • Managed Cloud Infrastructure
          • Structured Cabling Installation Services
          • Managed Backup & Disaster Recovery Services
          • IT Project Management & Strategic Planning
          • IT Hardware & Software Procurement
        • Cybersecurity Compliance Services
          • CMMC Compliance Readiness
          • Cyber Insurance Readiness
          • PCI DSS Standard Compliance
        • Managed Cybersecurity Services
          • Managed Security Services
          • Network Penetration Testing Services
          • Dark Web Monitoring
          • Cyber Awareness Training
          • Business Continuity Planning
          • Risk Intelligence Solutions
          • Advanced Threat Intelligence
        • Managed Business Services
          • AI Readiness Assessment
          • Security Camera Systems
          • Employee Activity Monitoring
          • Business Intelligence Services
          • Microsoft Dynamics 365 Finance & Operations
          • SAP Crystal Reports Services
          • Managed Database Services
          • Software Services
          • Staff Augmentation Services
  • Industries
        • Manufacturing and Warehousing
        • Education
        • Government
          • Drone Services
          • Virtual Police Training
          • Virtual Fire Training
        • Non-Profit
  • Tools
        • Managed IT Services Cost Calculator
        • CMMC Readiness Checker
        • Email Header Analyzer
  • Store
  • About Us
  • News & Events
  • Contact Us
MENUMENU
  • Home
  • Services
    • Managed IT Services
      • Co-Managed IT Services
      • VoIP Phone Systems
      • Managed Cloud Infrastructure
      • Microsoft Copilot for Business
      • Managed Microsoft 365 Services
      • Managed Microsoft Sharepoint Services
      • Microsoft Teams
      • Managed Backup & Disaster Recovery Services
      • IT Project Management & Strategic Planning
      • IT Hardware & Software Procurement
    • Managed Cybersecurity Services
      • Network Penetration Testing Services
      • Business Continuity Planning
      • Advanced Threat Intelligence Services
      • Dark Web Monitoring
      • Managed Security Services
      • Risk Intelligence Solutions
    • Managed Business Services
      • AI Readiness Assessment
      • Security Camera Systems
      • Business Intelligence Services
      • Employee Activity Monitoring
      • Managed Database Services
      • Microsoft Dynamics 365 Finance & Operations
      • SAP Crystal Reports
      • Software Services
      • Staff Augmentation Services
    • Cybersecurity Regulatory Compliance Services
      • CMMC Compliance Readiness
      • Cyber Insurance Readiness
      • PCI DSS Standard Compliance
  • Industries
        • Government IT Services
          • Virtual Police Training
          • Virtual Fire Training
        • Manufacturing and Warehousing
        • Education
        • Non-Profit
  • Tools
    • Managed IT Services Cost Calculator
    • CMMC Readiness Checker
    • Email Header Analyzer
  • About Us
  • News & Events
  • Contact Us

26 Jun How to avoid falling victim to ransomware

Posted at 15:02h in Cybersecurity, Ransomware, Security, SMB Small and Medium Business Technology
Share

    We hear routinely in the news that a major corporation or government agency has had its data integrity compromised, with millions of pieces of personal data accessed. In these cases the criminals behind the attack hope to get money by selling that data to other...

    Read More

    19 Jun Ransomware attacks just keep increasing: Vet practices aren’t immune

    Posted at 13:03h in Cybersecurity, Ransomware, Security, SMB Small and Medium Business Technology
    Share

      This cyberattack scheme isn't new, but it has become increasingly common over the past several years. Many of the viruses lurking out there steal data to be used for nefarious purposes. The goal has long been to access important financial and personal data that can...

      Read More

      12 Jun Three responses after a Ransomware attack

      Posted at 14:14h in Business Continuity, Cybersecurity, Ransomware, Security, SMB Small and Medium Business Technology
      Share

        If you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options open to you. Ransomware is a type of computer virus that kidnaps your data and holds it hostage for money. It has become increasingly common attacking...

        Read More

        05 Jun Passwords: boring but they matter

        Posted at 14:41h in Compliance Regulations, Cybersecurity, SMB Small and Medium Business Technology
        Share

          Passwords are something that you and every employee can use to protect your data and maintaining this important protective wall against criminals is relatively easy. Take the time to follow basic good practices, most of which are relatively easy to do. Here are four easy...

          Read More

          30 May Four easy ways to thwart cyber criminals

          Posted at 14:31h in Cybersecurity, Security, SMB Small and Medium Business Technology
          Share

            With all the talk about cybercrime and the recent spate of headlines about ransomware, concerns for your data security and the safety of your business keep growing. Avoiding a data breach is critical to your business, so it is vital that you focus resources and...

            Read More

            22 May Password Hygiene Best Practices

            Posted at 15:18h in Compliance Regulations, Cybersecurity, SMB Small and Medium Business Technology
            Share

              Password Hygiene Best PracticesAccording to a report by Verizon, 80% of data breaches are caused by weak or stolen passwords. In addition, the report found that 60% of users reuse the same password across multiple accounts, making it easier for hackers to access multiple accounts...

              Read More

              15 May Password Management Tools: An overview

              Posted at 19:30h in Cybersecurity, Security, SMB Small and Medium Business Technology
              Share

                Effective password management is an essential aspect of cybersecurity. With the increasing number of online accounts and services, remembering all those passwords can be a daunting task. Password management tools provide an effective solution to this problem. This blog discusses the benefits of using password...

                Read More

                08 May Three common sense data safety reminders

                Posted at 12:26h in Cybersecurity, Security, SMB Small and Medium Business Technology
                Share

                  When it comes to smaller and medium-sized businesses, anything that distracts from the day to day concerns about bringing in revenue tends to fall by the wayside. With that in mind, we have put together a list of seven things that a small business needs...

                  Read More

                  02 May 7 Cybersecurity basics to never forget

                  Posted at 11:48h in Cybersecurity, SMB Small and Medium Business Technology
                  Share

                    No matter how much people hear “data safety,” they still can get sloppy about their cybersecurity. One of the reasons is that there are so many constant reminders that the warnings just become that much more background noise. Today, let's do a quick review of...

                    Read More

                    24 Apr Open sesame! Life is not a fairy tale…your passwords need to be stronger than that

                    Posted at 15:01h in Cybersecurity, SMB Small and Medium Business Technology
                    Share

                      You will agree that having passwords to access your IT devices, networks and data is the first step to securing your business data. However, having passwords is not enough. The passwords have to be strong and difficult to detect or hack into. A lot of...

                      Read More
                      • 1
                      • 2
                      • 3
                      • 4
                      • 5
                      • 6
                      • 7
                      • 8
                      • 9
                      • 10
                      • 11
                      • 12
                      • 13
                      • 14
                      • 15
                      • 16
                      • 17
                      • 18
                      • 19
                      On-Site Technology

                      On-Site Technology was launched in 2001 as an IT consulting firm. Our client list rapidly grew via success in solving complex technology problems. Today, On-Site Technology continues to deliver clients with comprehensive technology solutions.
                      “Your Technology Managed”

                       

                      On-Site Technology Locations:

                        

                      164 Brighton Rd
                      Clifton, NJ 07012

                        

                      1451 W Cypress Creek Road Suite #300
                      Ft. Lauderdale, Florida 33309

                      Other Links
                      • Managed IT Services
                      • Co-Managed IT Services
                      • Structured Cabling Installation Services
                      • IT Project Management & Strategic Planning
                      • Microsoft Copilot for Business
                      • Managed Microsoft 365 Services
                      • Managed Microsoft Sharepoint Services
                      • Microsoft Teams
                      • AI Readiness Assessment
                      • Managed Cybersecurity Services
                      • Network Penetration Testing Services
                      • Dark Web Monitoring
                      • Cyber Awareness Training
                      • Business Continuity Planning
                      • VoIP Phone Systems
                      • Microsoft Dynamics 365 Finance & Operations
                      • CMMC Compliance Readiness
                      • Tools
                      • Managed IT Services Cost Calculator
                      • CMMC Readiness Checker
                      • Email Header Analyzer
                      • About Us
                      • Contact Us
                      • Privacy Policy
                      News & Events
                      • Microsoft 365 Price Change Notice – July 1st 2026
                      • MFA for CMMC Enhances Access Control Compliance
                      • Reliable Backup and Recovery Solutions NJ for Your Business
                      • Managed vs Co-Managed IT Services Guide for Businesses
                      • Comprehensive Guide to Information Technology Services NJ
                      • On Site IT Support: Essential Guide for Business Success
                      • C3PAO Audit Turnaround Times Comparison Guide
                      • IT On Site Support: Key Benefits & Expert Services Guide
                      • Understanding Services in IT A Comprehensive Guide
                      • Top Advantages of Penetration Testing for Organizations
                      • Your Guide to Using a CMMC Level 1 SSP Template
                      • Explore Top Copilot AI Features for Seamless Integration
                      • Onsite IT Consulting Benefits: Your Complete Business Guide
                      • Why Your Business Needs Microsoft Teams IT Support NJ
                      • Facebook
                      • X
                      • Pinterest
                      • LinkedIn
                      • YouTube

                      Copyright © 2026 by On-Site Technology. All Rights Reserved.