For Sales: 888-800-4644  For Support: 973-777-7227                     “YOUR TECHNOLOGY MANAGED”
Logo Logo Logo Logo Logo Logo
MENUMENU
  • Home
  • Services
    • Managed IT Services
      • Co-Managed IT Services
      • IT Solutions
      • VoIP Phone Systems
      • Cloud Apps
      • Cloud Infrastructure
      • Microsoft Teams
      • Microsoft 365
      • Office 365
      • SharePoint Online Services
      • Data Backup & Continuity Solutions
      • IT Project Management & Strategic Planning
      • IT Hardware & Software Procurement
      • Structured Cabling Installation Services
    • Managed Security Services
      • Dark Web Monitoring
      • Cyber Awareness Training
      • Risk Intelligence Solutions
      • Advanced Threat Intelligence
      • Network Penetration Testing Services
      • Business Continuity & Disaster Recovery
      • Security Solutions
    • Managed Business Services
      • Employee Activity Monitoring
      • Business Intelligence Services
      • Microsoft Dynamics 365 Finance & Operations
      • SAP Crystal Reports Services
      • Database Management Services
      • Software Services
    • Cybersecurity Compliance Services
      • CMMC 2.0 Compliance Services
      • Cyber Insurance Readiness
      • PCI DSS Standard Compliance
    • Staff Augmentation Services
    • Cloud Technology Information Services
  • Industries
        • Manufacturing and Warehousing
        • Education
        • Government
          • Virtual Police Training
          • Virtual Fire Training
        • Non-Profit
  • Store
  • About Us
  • News & Events
  • Contact Us
MENUMENU
  • Home
  • Services
        • Managed IT Services
          • Managed IT Solutions
          • VoIP Phone Systems
          • Managed Cloud Apps
          • Managed Cloud Infrastructure
          • Microsoft 365
          • Microsoft Office 365
          • Microsoft SharePoint Online Services
          • Microsoft Teams
          • Data Backup & Continuity Solutions
          • IT Project Management & Strategic Planning
          • IT Hardware & Software Procurement
          • Project Management & Strategic Planning
        • Managed Security Services Overview
          • Business Continuity & Disaster Recovery
          • Network Penetration Testing Services
          • Advanced Threat Intelligence Services
          • Dark Web Monitoring
          • Managed Security Services
          • Risk Intelligence Solutions
        • Managed Business Services
          • Business Intelligence Services
          • Employee Activity Monitoring
          • Database Management Services
          • Microsoft Dynamics 365 Finance & Operations
          • SAP Crystal Reports
          • Software Services
          • Staff Augmentation Services
        • Cybersecurity Regulatory Compliance Services
          • CMMC 2.0 Compliance Services
          • Cyber Insurance Readiness
          • PCI DSS Standard Compliance
  • Industries
        • Government IT Services
          • Virtual Police Training
        • Manufacturing and Warehousing
        • Education
        • Non-Profit
  • About Us
  • News & Events
  • Contact Us

05 Jun Passwords: boring but they matter

Posted at 14:41h in Compliance Regulations, Cybersecurity, SMB Small and Medium Business Technology
Share

    Passwords are something that you and every employee can use to protect your data and maintaining this important protective wall against criminals is relatively easy. Take the time to follow basic good practices, most of which are relatively easy to do. Here are four easy...

    Read More

    30 May Four easy ways to thwart cyber criminals

    Posted at 14:31h in Cybersecurity, Security, SMB Small and Medium Business Technology
    Share

      With all the talk about cybercrime and the recent spate of headlines about ransomware, concerns for your data security and the safety of your business keep growing. Avoiding a data breach is critical to your business, so it is vital that you focus resources and...

      Read More

      22 May Password Hygiene Best Practices

      Posted at 15:18h in Compliance Regulations, Cybersecurity, SMB Small and Medium Business Technology
      Share

        Password Hygiene Best PracticesAccording to a report by Verizon, 80% of data breaches are caused by weak or stolen passwords. In addition, the report found that 60% of users reuse the same password across multiple accounts, making it easier for hackers to access multiple accounts...

        Read More

        15 May Password Management Tools: An overview

        Posted at 19:30h in Cybersecurity, Security, SMB Small and Medium Business Technology
        Share

          Effective password management is an essential aspect of cybersecurity. With the increasing number of online accounts and services, remembering all those passwords can be a daunting task. Password management tools provide an effective solution to this problem. This blog discusses the benefits of using password...

          Read More

          08 May Three common sense data safety reminders

          Posted at 12:26h in Cybersecurity, Security, SMB Small and Medium Business Technology
          Share

            When it comes to smaller and medium-sized businesses, anything that distracts from the day to day concerns about bringing in revenue tends to fall by the wayside. With that in mind, we have put together a list of seven things that a small business needs...

            Read More

            02 May 7 Cybersecurity basics to never forget

            Posted at 11:48h in Cybersecurity, SMB Small and Medium Business Technology
            Share

              No matter how much people hear “data safety,” they still can get sloppy about their cybersecurity. One of the reasons is that there are so many constant reminders that the warnings just become that much more background noise. Today, let's do a quick review of...

              Read More

              24 Apr Open sesame! Life is not a fairy tale…your passwords need to be stronger than that

              Posted at 15:01h in Cybersecurity, SMB Small and Medium Business Technology
              Share

                You will agree that having passwords to access your IT devices, networks and data is the first step to securing your business data. However, having passwords is not enough. The passwords have to be strong and difficult to detect or hack into. A lot of...

                Read More

                17 Apr Fix that lock…and get a spare key! Software updates, security patches and data backups

                Posted at 15:35h in Cybersecurity, MSP, SMB Small and Medium Business Technology
                Share

                  If the lock to your home’s main door breaks, do you fix it or just let it be? My guess is, you would get a locksmith to fix it for you at the earliest. And, what do you do if you lose the key? Use...

                  Read More

                  10 Apr What should your privacy policy cover?

                  Posted at 14:39h in Compliance Regulations, SMB Small and Medium Business Technology
                  Share

                    As a business, you deal with a lot of personally identifiable information on a daily basis. It can come from anybody who interacts with your business. It could be your clients, your vendors, employees, etc. You need to have a privacy policy declaring how you,...

                    Read More

                    27 Mar What is a privacy policy and why do you need one

                    Posted at 18:52h in Compliance Regulations, SMB Small and Medium Business Technology
                    Share

                      Your business is privy to a lot of data. A lot of information flows in from clients, vendors and even your employees. This includes Personally Identifiable Information (PII)--data that can help identify an individual and perhaps even get in touch with them. A privacy policy...

                      Read More
                      • 1
                      • 2
                      • 3
                      • 4
                      • 5
                      • 6
                      • 7
                      • 8
                      • 9
                      • 10
                      • 11
                      • 12
                      • 13
                      • 14
                      • 15
                      • 16
                      • 17
                      • 18
                      • 19
                      • 20
                      • 21
                      • 22
                      • 23
                      • 24
                      • 25
                      • 26
                      • 27
                      • 28
                      • 29
                      • 30
                      • 31
                      • 32
                      • 33
                      • 34
                      • 35
                      • 36
                      • 37
                      On-Site Technology

                      On-Site Technology was launched in 1999 as an IT consulting firm. Our client list rapidly grew via success in solving complex technology problems. Today, On-Site Technology continues to deliver clients with comprehensive technology solutions.
                        

                      “Your Technology Managed”

                         

                      On-Site Technology Locations:

                        

                      164 Brighton Rd
                      Clifton, NJ 07012

                        

                      1451 W Cypress Creek Road Suite #300
                      Ft. Lauderdale, Florida 33309

                      Other Links
                      • Managed IT Services
                      • Co-Managed IT Services
                      • Structured Cabling Installation Services
                      • Dark Web Monitoring
                      • Network Penetration Testing Services
                      • Business Continuity & Disaster Recovery
                      • Managed Security Services
                      • Advanced Threat Intelligence Services
                      • Business Intelligence Services
                      • Microsoft Office 365 Services
                      • Microsoft Teams
                      • Microsoft Office 365 SharePoint Online Services
                      • Microsoft Dynamics 365 Finance & Operations
                      • Employee Activity Monitoring
                      • IT Project Management & Strategic Planning
                      • VoIP Phone Systems
                      • Cyber Awareness Training
                      • Staff Augmentation Services
                      • SAP Crystal Reports
                      • Software Services
                      • Industries
                      • About Us
                      • Contact Us
                      • Privacy Policy
                      News & Events
                      • The Complete Guide to Co Managed IT Benefits: Maximize Cost Savings and Efficiency
                      • Do your homework: 3 things to do when looking for an MSP
                      • What is Co Managed IT: A Comprehensive Guide
                      • 5 Lesser known benefits of choosing the co-managed IT model
                      • Four reasons to opt for the co-managed IT services model
                      • Best practices for data safety in a remote work environment
                      • Episode 2 of the On-Site Technology PODCast is now LIVE!
                      • How safe is your data when your staff works from home?
                      • Automated Penetration Testing: Everything You Need to Know About Modern Cybersecurity Practices
                      • 4 things to do to ensure your business continuity planning is a success
                      • What are the essentials of a business continuity plan?
                      • The Complete Guide to Penetration Testing Cost: Understanding Pricing Factors and Budgeting Effectively
                      • How to Choose a Penetration Testing Provider: A Comprehensive Guide for Strengthening Your Cybersecurity
                      • The Benefits of Penetration Testing: How It Enhances Security, Ensures Compliance, and Delivers ROI

                      Copyright © 2025 by On-Site Technology. All Rights Reserved.