We Define IT
  • Home
  • Plans
  • Testimonials
  • Professional Services
  • Blog
  • Contact
  • Login

Password Autofill: Convenience Compromising Security?

6/15/2023

0 Comments

 

“What’s that password again? Wait, I changed it … Harrumph. I don’t remember!” We’ve all been there, sometimes many times a day. Password autofill on our Web browsers felt like the sun was shining on our online activity again. Sorry to tell you, but this convenience may not be entirely safe.

Most browsers will ask after you’ve entered a new password into a site or changed a password if you want it stored for you. That way, when you revisit that site, the browser can autofill the access credentials for you. It saves you the struggle of trying to keep all your passwords straight.

The problem is that some sites, including legitimate sites, can be compromised with a hidden form. You’ll never see it, but your browser will. So, it will autofill that form, and in clear, unencrypted text. This allows bad actors to capture your username and password without your knowledge.

Another risk? Irresponsible digital marketers may use hidden autofill forms to track your online activity. That’s done without your consent.

Using browser autofill with a password manager can also cause confusion, especially if your browser autofills, whereas the manager asks before filling in forms. Using both at the same time you also run the risk of duplicating passwords, which could make it difficult to track your passwords and increase the risk of security breach.

How to disable autofill

You can protect your passwords by disabling autofill on any browser you use:

On Microsoft Edge, go to Settings, then Profiles, then Passwords, and disable “Offer to save passwords.”
On Google Chrome, go to Settings, then Passwords, and disable “Offer to save passwords.”
On Firefox, open Settings, then Privacy & Security, then Logins and Passwords, and “Autofill logins and passwords.”
On Safari, from the Preferences window, select and turn off Auto-fill.

Can I keep using password managers?

A password manager, such as LastPass or 1Password, typically provides more security than browser autofill. Password managers have strong encryption algorithms to protect your login credentials, which means that even if your device is compromised, your passwords are safe.

Still, if the manager autofills your credentials, you face the same risks. Most password managers have autofill disabled by default. That’s good. Leave preemptive autofill off. You might see it called “Autofill on page load.” Keep that turned off, too.

Our advice? Use a password manager that requires you to click a box before it fills in your credentials. This action avoids your information from automatically populating a hidden form.

Securing your online activity is an ongoing challenge. Our experts can help identify ways you can protect your privacy and data online. Contact us today at (888) 234-WDIT(9348).


0 Comments

How to Avoid Pets Damaging Your Computers

6/1/2023

0 Comments

 

You may be a cat or dog lover, have a bird, rabbit, or gerbil. Whatever creature you invite into your home, don’t overlook the potential damage a pet can do.

With more of us working from home, more pet owners are sharing photos of pet co-workers. That cat sprawled over your laptop or dog with his paws on your keyboard may make for funny photos, but they can also cause real damage.

Many pets have sharp claws. They won’t think twice about using them to scratch computer screens, keyboards, or other devices. Also, if your pets are close to your laptop or desktop, they could cause them to fall off your lap or other surface.

Your pup could pull at the cord while trying to remind you it’s time for a walk, or a curious cat could damage the cable or connecting port, pulling the cord in the wrong direction.

If a cat is climbing on the furniture, she might knock your device to the ground and crack the screen, or worse. A cuddly dog might want to get on your lap and swipe a nearby liquid over your keyboard with a happy tail wag.

Even when a dog curls up under a desk while you’re working or watching a show, it might pose a risk. Jumping to save you from a neighbor closing a door, they could push printers or hard drives off shelves. These devices are not built to sustain falls.

Other pets can cause problems, too

Many animals also like to chew, especially rodents. Their teeth are sharp enough to work through your electronic cables, which could lead to electrical shocks for them or exposed wires that are a danger to you.

Think you’re safe with a bunny or hamster? If you let them roam free around the room, you risk them urinating on your devices. Or a bird might nest near your electrical cords. These actions could cause costly damage or corrosion.

Any furry family member you have could also cause damage by shedding. Hair accumulating in computer vents and fans can cause overheating and performance issues.

Even if you have a snake or fish, you’re not entirely secure. Snakes and fish can require heat lamps or aquariums, which can cause an electrical surge that might damage your devices. You'll want to install a surge protector.

What to do about pet risks

It’s a good idea to keep your pets away from your personal electronics. When you have your computer out around your animals, keep liquids away from your devices. That’s good practice whether you have pets or not.

Also, store technology securely. Avoid leaving it unattended on high counters or other places that pets might reach.

Bundle electronic cords to protect devices from damage, and pets from electrical risks.

Getting your computer’s internals professionally cleaned occasionally is also a smart move. Again, this is good practice whether you have pets or not. Dust and hair can also build up inside and slow the computer’s mechanics. A good clean can help you keep that computer running its best for longer.

Our experts can help you set up your home computing centers safely and securely. We can also help you clean or repair your devices … but you are on your own for potty training or feeding mice to your snake. Call us today at  (888) 234-WDIT(9348)


0 Comments

Don’t Fall for Deepfake Voice Scams

5/15/2023

0 Comments

 

Deepfake has gone mainstream. You’ve probably seen a movie or TV show with a character complaining about images or videos that look real. You should also be wary of deepfake voice scams.

Deepfake is a mashup of the words deep learning and fake. The technology uses artificial intelligence and machine deep-learning algorithms. This can create convincing representations of people for special effects or silly videos, but these fake videos or images can also be more dangerous.

Malicious deepfakes spread false information or can defame or scam people. That’s what we want to talk about in more detail here: Deepfake voice scams.

What is a deepfake voice scam?
This type of scam manipulates synthesized speech to convince you someone is saying something they didn’t actually say. This increasingly common scam tricks you into providing sensitive information or sending money.

Criminals first record a voice sample from their victim. They might use speeches, TikTok or YouTube videos, podcasts, or phone conversations. Then, they turn to a tool such as ElevenLabs, Resemble, Overdub, ReadSpeaker, or Voice.ai. These platforms analyze speech patterns and create a voice mimicking the original. The bad actors can then generate a new speech that sounds like the original speaker said it. They script it, and the Ai voice says it.

Examples of deepfake scams include creating a voice that mimics a family member. They'll script a request for help in an emergency situation. Or you might get a call from a lawyer claiming to need payment to help defend a family member.

You might also hear from a celebrity who wants you to donate to their charity. The fake voice might also ask for sensitive information such as banking details. After all, who wouldn’t trust Liam Neeson if he called personally?

A tech support scam is another common one. The scammer creates a voice for a customer support rep from a prominent company. They request remote access to your computer to "fix" a non-existent problem. Instead, they’ll steal sensitive information such as login credentials, or install malware.

How to defend against deepfake scams?
This technology does a good job, and the scam can be very convincing. Be cautious of unexpected requests for personal information or money made by phone. Be especially suspicious if the request makes an emotional appeal to you to act now.

Confirm before you share sensitive data or transfer money. For example, if you’re asked to pay a lawyer to help out your grandson in an accident, check in with him first. Or, if someone calls from your internet service provider, use a trusted phone number to confirm their authenticity.

We can help you combat deepfake scams. We can install email and Web filtering, multi-factor authentication (MFA), and endpoint protection. Our IT experts can also watch networks for signs of attack and respond to cut potential damage. Call us today at (888) 234-WDIT(9348).
0 Comments

Are All Downloads on Mobile App Stores Safe?

5/1/2023

0 Comments

 

Mobile apps let us play, teach us, give us social media or music, and more. No wonder there were more than 142 billion downloads in 2022! Going to Google or Apple’s mobile stores to find the app you want feels safe, but even these heavy hitters can’t guarantee you’re downloading something secure.

Google and Apple do their best, but they are vetting many thousands of new apps submitted monthly. The vast majority of their offerings aren’t a threat, but some malicious apps can make it through.

What do malicious apps do?
Apps downloaded from mobile stores are typically more secure than your Web activity. On an app, you’re within a contained system, whereas on the Web, you click through various links and visit websites which could have viruses or malware.

Still, a malicious app can infect your smartphone and cause several issues:

Ad fraud. The app runs in the background and sends ad clicks to different websites. This runs down your battery and slows your phone activity.
Data theft. If you give a malicious app permission to cross the app/data divide, it could lead to information being stolen.
Browser hacking. The app may open website browsers that put you at risk of sharing sensitive data.
Apps access all your information (SMS, camera, contacts) and take control of your device.

Keep your mobile phone safe
When looking to download a mobile app, do your research. Look at the ratings and how many downloads it has had. Application reviews can also help you verify the credibility of the app. Check the logo and the name of the creator, too. You don’t want to install something from Microsaft instead of Microsoft.

Keep your mobile device’s operating system current. Installing the manufacturer’s updates can help cut your vulnerabilities.

Also, take a moment to review the permissions for that new app. There’s no reason a calculator app needs access to your entire address book and camera. If the app asks for too much access, it can be a good idea to delete it and look for another option.

Be wary if you decide to download an app directly from a website other than the app store. This is a greater risk. Plus, know that illegally pirating software or media is a real risk for viruses.

Also, keep an eye out for common signs of a virus on your phone such as:

other apps taking longer than usual to open or install;
phone battery running down faster than normal;
your monthly data usage increasing;
your contacts receiving odd messages from you via email, text, or social media.
Worried you may have a virus on your device? We can check and see. We can also help backup your data and, if necessary, wipe a compromised phone. Call us today at (888) 234-WDIT(9348)
0 Comments

Tech Tips Everyone Should Know

4/15/2023

0 Comments

 

There are billions of computers in the world today. In fact, 286 million computers shipped globally in 2022, and that was a 16% drop! Those figures make it obvious how many of us have access to computers, yet that doesn’t mean we all know the simple shortcuts available to us. This article rounds up top tech tips that can benefit every user.

Search Google smarter
Google is the market leader with over 85% of Web search traffic. But did you know you can search this popular online engine even easier? When you know you are looking for something on a particular site, you can narrow your search. Go to the Google search bar as normal, then, in the search box, type “site: www.website.com" (without quotes) with your search term. This refines your search.

So, if you wanted to find an article on coaching on the Forbes website, you would search “site: forbes.com and coaching.” You’ll see that all the responses you get back come from the Forbes domain.

Undo your mistakes
We all make mistakes while working on our computers. Here are some ways to undo the common ones.

“Unsending” an email is possible in Gmail. Go to Settings and set up the Undo Send section to give yourself 5, 10, 20, or 30 seconds. Then, save your changes, and you’ll have this option enabled in the future. It doesn’t technically “unsend” the email but delays sending it for a few seconds so you can stop it if need be.

You can also reopen a closed browser tab by using Ctrl+Shift+T on your PC or Command+Shift+T on your Mac. This reopens the last tab you closed. If you closed a bunch at once, you can also reopen them from your browser’s History dropdown menu.

Then, there’s Ctrl + Z for just about everything else. Pressing the control button and Z key together undoes your action in many Web browsers and operating systems. It will depend on your application and how far you can go back with this shortcut.

Capture your screen
Some modern PC keyboards come with a “print screen” key, which you can use to get a screenshot of the desktop windows. If you want to crop that screenshot, on Windows 10, go to Start and type Snipping Tool in the Search bar. You’ll get a box you can drag to any shape over your screen.

You can also take a screenshot on a Mac by pressing Command + Shift + 4. To crop the screenshot size and shape, you’ll press Command + Shift + 5.

One more little secret
How many times do you find yourself picking up your USB cable and trying to put it in the wrong way? You can stop doing so by looking for a symbol on the cable near where you’ll plug it in. It’s only found on one side, and it’s not for decoration. The symbol should be facing you when you plug in the USB. This will get it in the first time, whether you’re plugging in a vertical or horizontal cable.

These tech tips can help you be more efficient and effective with your technology, but you may still want help in other areas. Reach out to our IT experts today. We’re here to help. Call us at (888) 234-WDIT(9348).

Picture
0 Comments

Choosing the Right Laptop for Your Content Creation

4/1/2023

0 Comments

 

​Are you an influencer? Or do you aspire to join the more than 50 million people making content for YouTube, TikTok, or Instagram? If you want to be a content creator, don't struggle with a computer that isn’t up to the task. Considering these factors can help you land the best laptop for your needs.

Yes, the average person can take a video on their smartphone and post it for friends to enjoy, but when you're serious about your video editing or creating high-quality, long-form content, you’ll need more.

To make your content look professional, pay attention to these factors. It will help you choose the laptop that sets you up to be the next Spielberg.

Video card
Pay attention to the video card. Also known as a graphics card, this is the piece of the computer that renders images on the display.

A laptop typically has a less robust video card than a desktop. That’s because laptops are often thinner. For the benefit of mobility, you compromise on the space available for a beefier graphics card. The card may also run slower because the card needs to be efficient without setting the laptop on fire.

So, when selecting a laptop with plans to edit video, do your research. You can easily find rankings for “laptops with good graphic cards” online. You can get away with an RTX 2080 (that’s a few generations old). Ideally, though, you’ll want the RTX 3080 or Intel Iris Xe.

Processing power
The laptop’s processing power can also play a role in your video editing success. A lot of video editing software needs multi-core processors. You can think of it as having many arms to get different things done at once.

For a PC laptop, go for at least an Intel i9 CPU. For Mac, a modern Macbook Pro with an M2 Pro CPU is a good choice.

Memory
For your laptop to be able to do many things at once, you also need powerful memory. Random access memory (RAM) is what you'll be comparing here. RAM loads the operating system, runs video editing software, and performs other background functions.

At minimum, you’ll want 16GB of RAM, but the more you have, the better. Obviously, the budget will factor in here.

Storage
Your storage capacity also impacts how efficiently you can do all that you want to do.

If you’re working in Full HD (1920 × 1080), you could have some big project files to move around. The more storage you have, the easier this will be.

You’ll be choosing between hard disk drives (HDDs) and solid-state drives (SSDs). SSDs are good for working on the fly. They can run faster, as they don’t use any mechanical parts, but they can cost more.

A good idea is to work off your SSD for your current editing needs. Meanwhile, you can store archived videos and completed footage on a second hard drive. This can be on the laptop if there’s space, or you can attach an external HDD.

Display
Whether you are the star of your content or someone else is, you’ll also want to consider laptop display size. There are two main display types: Twisted Nematic (TN) and In-Plane Switching (IPS) panels.

TN panels cost less, but you can lose color accuracy on angles. The IPS panels give you more color at more angles, but they cost a little more.

Connectivity
You might want to attach an external HDD or connect to a larger desktop monitor. In that case, look for accessory ports and external display connectivity.

Need help deciding on the laptop that best suits your content creation needs? Our experts are here to help. Connect with us today at  (888) 234-WDIT(9348).

Picture
0 Comments

How Much Laptop Storage Do You Need

3/15/2023

0 Comments

 

When looking to buy a laptop, one of the main things you have to decide is how much storage you need. That’s a challenging question for many of us to answer. Let’s discuss the factors that matter and how to decide.

The short answer, for many people, is that you don’t need much laptop storage. Having 512 GB available is often enough for a regular user, but it’s going to depend on how you’re using the laptop.

For example, if you use cloud email, your account likely comes with cloud storage. Using cloud-based applications such as Google Docs also saves storage space.

If you’re using the laptop to stream videos on TikTok or YouTube, or watching your series or movies on Netflix or the like, you’re also taking advantage of the cloud. Very little data is actually stored on your computer.

Even so, remember to account also for your operating system. Microsoft and Apple recommend 32 GB of storage space to accommodate their OSs. Otherwise, you could encounter performance issues.

Also, if you edit videos or work in graphic design, you’ll likely want a lot more available storage.

How storage space impacts your computer use
Storage space is the capacity your computer uses to store files and data. So, when you have a lot of data, images, or video to hold and work with, more storage helps the PC recall them more quickly.

If you are a digital hoarder, that can also factor into your storage needs.

When thinking about storing photos, you’d have to have many albums to make a dent. If the average image size is about 4 MB, it would take 1000 photos to use up 4 GBs of space. But video eats up a lot more space. An hour-long 1080 p video could occupy 10,000 MB (10 GB).

If you regularly download new apps and games, you can quickly fill up your storage space. Purging unused files and apps consistently frees up space.

Considering the cost of laptop storage
More storage can mean a bigger price tag, so you’ll want to balance your storage needs against your budget constraints.

If you can spend freely, go ahead and get more storage. Otherwise, you’ll want to weigh hard disk drive (HDD) and solid-state drive (SSD) upgrades.

HDDs offer more storage for less cost, but slower reading and writing. SSDs can be three to four times as expensive, but you do get greater speed. SSDs are also typically quieter, more durable, and consume less energy.

One option is to buy a laptop with a smaller SSD and get an external HDD to meet both your speed and storage needs. HDDs can be better for data recovery and for storing large amounts of data you’re not accessing often.

Need help making decisions about your laptop purchase or storage needs? Our IT experts have the answers you need. Contact us today at (888) 234-WDIT(9348).

Picture
0 Comments

Benefits of a Vertical Monitor

3/1/2023

0 Comments

 

You’ll find it’s easier to scan websites, view search engine results, and read online content or long blocks of code. If you’re big into cryptocurrency, you might enjoy displaying data in an easy-to-read form, plus, you’ll be able to react more quickly.

You can also have a full view of photographs or a project if you’re trying to design something with a vertical layout.

Vertical screens can also reduce eye strain. With this setup, you reduce the range of movement, which can save your eyes from getting as tired.

Further, you might be able to save space with a vertical monitor if you have less room on your desk.

A vertical monitor can be appealing if you use two monitors at once. Having dual monitors can increase productivity. You enjoy added viewing space to multitask, browse the Web, watch videos, or games. If you’re working from home, you may also find it easier to collaborate with colleagues with a second screen. When you set up one screen to be vertical, you can benefit from the best of both worlds.

Going vertical is easy
You don’t have to buy a special monitor to take advantage of a vertical setup. While many screens are only capable of a horizontal display, you may be able to adjust the way it is mounted. You can get a stand or mount that allows you to easily rotate the screen. As long as it is a VESA-compatible monitor, you can easily make the choice of horizontal or vertical. Then, you can change the layout in the operating system’s display settings. Windows, MacOS, and Linux all support vertical screen rotation.

Some monitors have mounts that allow physical rotation, which is a good way to test drive the vertical monitor. That way you can see how it compares to a horizontal layout for your needs. Keep in mind, though, that this repositioning of the monitor will affect your stereo speakers. You’ll need to attach an external pair of speakers to have them work with the new orientation.

Vertical monitors aren’t for everybody; if you game a lot or want to watch movies or do 3D modeling, you might prefer the horizontal screen. Many computer games, for example, are programmed for horizontal play, and opening that game up on a vertical rotation can cut off or compress your visuals.

One other common criticism of vertical screens is that they catch glare from nearby light sources more easily. So, if you don’t want to deal with glare, stick with horizontal.

Our IT experts are here to consult on your computer needs. We can advise you on your screen choices and so much more. Contact us today at (888) 234-WDIT(9348).

Picture
0 Comments

Why Are Printers Still So Terrible?

2/15/2023

0 Comments

 

Our phones can recognize our faces. Digital watches can detect that we’ve been in an accident. We can put on a virtual reality headset and feel as if we’re swimming with dolphins. With all this technological innovation, why are home printers still so frustrating? This article explains why and how to make the most of the situation.

Hewlett-Packard released its home DeskJet inkjet printer in 1988. These printers spray liquid ink onto the page through printheads. Home laserjet printers followed shortly after. They use lasers to create static electricity to attract and melt toner onto the paper.

And here we are, thirty-five years later, with pretty much the same printer technology. Although now, you might also consider a multifunction (all-in-one) printer. These print documents and can often also scan, copy, fax, and email documents.

But we're still saddled with clogged inkjets and leaking ink cartridges, plus paper jams, or a printer that can’t recognize the paper that you’ve now taken in and out of the tray 16 times in a row. Why?

Manufacturer priorities for printers
Printer manufacturers often lose money selling you the printer. Printer technology is quite complicated, but you’re getting the device for the price of parts. That’s because the manufacturer banks on making their money back on the sale of the ink.

Because they’re looking to make money off ink sales, printer users now endure:

ink cartridges that run out quickly – yes, they’re putting less ink in their cartridges these days;
printers designed not to work as well if you use off-brand cartridges;
having to perform printer maintenance that uses up more ink.
Even if you do invest in top-quality, on-brand ink, you could still encounter problems. Connectivity issues or error messages when you change paper are common.

That’s because the internal workings of the printer can be outsourced to the lowest bidder. Printer longevity is not the goal, so there’s less incentive to develop robust networking components or print drivers.

Plus, printing is hard
It’s not all down to printer manufacturer choices. Printing is a complicated process. Many moving parts need fine-tuning to apply the right pressure and position the ink. Plus, people could be using glossy photo paper one minute and recycled paper the next. At the same time, humidity or air that is too dry can also impact the paper and how the printer can move it around.

So, what can you do? Prefer a laser printer, which uses dry powder, if you’re going to print mostly in black and white. You’ll pay more upfront, but you’re no longer hostage to the ink-cartridge dilemma. If you need to do color prints, you might find it’s cheaper to actually go to your local print shop or big-box store.

If your Wi-Fi connectivity conks out, connect the USB cable that shipped with the printer. It may not be as pretty, but it will get the job done.

Want to save hours of your life troubleshooting your printer woes? We can help. Contact our experts today at (888) 234-WDIT(9348).

Picture
0 Comments

Is Your Data Breached? What To Do

2/1/2023

0 Comments

 

News of data breaches is all too common. This company apologizes for six million accounts breached. That company acknowledges hackers accessed 35,000 users’ personal identifiable information. But the question that probably matters most: Is your data breached, too?

The company should contact you if your information is in a data leak, but you can’t rely on that. You can also find out if your phone number or email address has been leaked by visiting https://haveibeenpwned.com/.

HaveIBeenPwned has uploaded various breaches and consolidated the information to make searching easy. Enter your address and get a list of breaches that compromised that email. You’ll get a summary paragraph as well as a description of data compromised in each breach.

It is not uplifting reading!

Next, the question is what to do about your breached information.

Steps to Better Security
First, change your passwords for those breached accounts. If you use that same password to access other accounts, change those passwords, as well, even if they are not listed as leaked.

Always avoid reusing passwords. Yes, it can be a hassle to remember many different access credentials, but you risk exposing many accounts if you keep reusing one email address and password combo over and again.

Make using unique passwords for all accounts easier by using a password manager. A manager can store your many passwords in one place and generate strong ones to use. You can often download an app to your mobile device, which gives you the convenience of filling in your credentials when you’re on the go, too.

The next step is to use two-factor authentication (2FA).

Understanding 2FA
This adds a layer of difficulty for hackers trying to access your accounts. Even if they had your username and password, they would need a second way to verify your identity.

Using 2FA requires you to provide one of the following before you can gain access:
  • something you know (e.g. the answer to a secret question);
  • something you have (e.g. your smartphone);
  • something you are (e.g. your fingerprint).

A bad actor would need to have not only your leaked credentials but also your other "something."

A common approach to FA is an SMS text message or voice-based authentication. You enter your credentials, then the site follows up with a text or phone call providing a separate code you must then enter. This is not the best method, however. Scammers can hack the SIM card associated with your device, and then use your number to make and receive calls and texts.

Software tokens for 2FA are a safer solution. You’ll download and install an application on your phone (e.g. Authy or Okta Verify). It can generate a unique verification code that is valid only for 30–60 seconds.

Want to learn more about password management and soft-token 2FA. We’re here to help. Contact us today at (888) 234-WDIT(9348).

Picture
0 Comments
<<Previous

    Author

    Stay connected to our Blog for vital, timely and  relevant information to keep your personal technology optimized, updated and protected.

    Categories

    All
    Browsers
    Cconnectivity
    Cell Phone
    Children
    Cloud
    Computer
    Content Creation
    Cybersecurity
    Data
    Email
    Google Search
    Graphics Card
    Guide
    Hard Drive
    Hardware
    Holidays
    Influencer
    Laptop
    Laptop Batteries
    Malware
    Managed Services
    Memory
    Monitor
    Network
    New Device
    Online Shopping
    Operating System
    OS
    Password
    Printers
    Privacy
    Ransomware
    Repair
    Residential
    Safety
    Seniors
    Shortcut
    Social Media
    Software
    Storage
    Tablets
    Tech Tips
    Video Card
    Video Editing
    Windows

    Archives

    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020

    RSS Feed

Connect With Us
Remote First - Our Company Blog
 Facebook
Twitter
E-Mail
Instagram
LinkedIn
RSS Feed
Services

24/7 Remote Help Desk & NOC Services

Unlimited On-Site Technical Repair Services

Managed Anti-Virus, Malware, Spyware, Greyware, Rootkit and Identity Theft Protection


Windows / Mac / Linux / Unix File Server, Exchange and SQL Backup & Disaster Recovery

Secure, Redundant Cloud Storage

Apple, Windows Activesync, Android, Blackberry & Nokia Symbian Mobile Device Management

Managed IT Services Consulting

Virtual Chief Information Officer (CIO) Services
Client Remote Support

Enter 6-Digit Remote Support Code




Picture
Search Our Site

Home  |  @Home - Residential  |  @Work - Business  |  @School - Educational  |  @Worship - Spiritual |  Virtual CIO  |  Contact Us  |   Login

CALL US TOLL-FREE:  888-234-WDIT
Copyright ©2021  We Define IT LLC, All Rights Reserved. 
Site Design by  Nu Web Order Designs.  Hosting Powered by  Hostivity.

New York, New Jersey,  Connecticut, Pennsylvania, Brooklyn, Manhattan, Queens, Bronx, Staten Island, Long Island, Technical, Computer,  Managed IT, Support, Services
  • Home
  • Plans
  • Testimonials
  • Professional Services
  • Blog
  • Contact
  • Login