Chelsea Technologies Blog
The latest and greatest technology news.
So What is Vishing?
Vishing -- a combination of the words "voice" and "phishing" -- is the fraudulent practice of attempting to steal information or gain unauthorized access to your personal information via a telephone call. Attackers use a special technique, caller ID spoofing, to make...
Tri-State Blizzard Warning
MAJOR WINTER STORM LATE TONIGHT INTO TUESDAY EVENING The National Weather Service has issued the following weather alerts for the northeast region. The National Weather Service in Upton has issued a Blizzard Warning, which is in effect from midnight tonight to...
Go Phish?
Don’t take the bait. Protect yourself from Phishing. Phishing is the act of sending out malicious e-mails with the intention of extracting personal information, business secrets, or financial material under false claims. Phishing attempts are often E-mails that ask...
A Hacker’s Primary Target
Hackers have increasingly set their crosshairs on small businesses as their primary targets, which has proven to be very profitable. Cyber threats have grown exponentially in the past few years and despite conventional wisdom, cybercriminals are not as interested in...
Chelsea Technologies Ranked Among Top 501 Managed Service Providers by Penton Technology’s MSPmentor
9th Annual MSP 501 Ranking and Study Identifies World’s Most Progressive MSPs in Information Technology NEW YORK, NY – June 7, 2016 – Chelsea Technologies ranks among the world’s most progressive 501 Managed Service Providers (MSPs), according to Penton Technology’s...
Internal Security Policies Every Organization Needs
Clients do not always realize how important it is to have proper internal security policies in place. They often view security policies as a nuisance as opposed to a layer of protection. We have assembled a list of three cyber security tips that we think are most...
The Joys of Virtual Desktops
As an Engineer for an MSP, we get to build, support and maintain the IT infrastructure of many different companies with many different styles of IT infrastructure. No two infrastructures are the same, as different companies have different needs, but all companies need...
The Single Most Important Tool in Supporting Technology
One of the most aggravating problems as an IT professional is dealing with inadequate or nonexistent documentation. Many IT professionals have witnessed firsthand the headaches that arise from organizations that do not maintain proper documentation of their systems,...
Social Engineering: What You Need to Know
What is Social Engineering? Social Engineering is the technique used to manipulate people to disclose confidential information. The difference between social engineering and other hacking techniques is that hackers use human psychology to manipulate people to reveal...
Disaster Recovery: What You Need to Know
Whether you are hit with a natural disaster like Hurricane Sandy or an infrastructure failure like a downed server, is your company prepared to continue its business operations? Do you have a Disaster Recovery Plan in place to limit the disruption and to ensure the...