Blog

FOLLOW PCS

Seminar: How to Avoid a Cyber Attack and What to do WHEN it Happens to Your Business

It typically takes over 6 months to detect a hacker in your network – and by then, your company, customer, and employee data will have been compromised. Could your organization manage a cyber-breach, hack or employee mistake?  Do you know how to reduce your liability and protect your business for cyber security problems? Cyber Risk […]

New Features of iOS 11

Coming Fall 2017, iOS 11 is going to continue offering everything we know and love about Apple with a few upgrades, of course. Check out what you can expect with Apple’s latest software update this autumn. Subtle Design Changes. Expect minor superficial updates like bolder text and a redesigned lock screen and control center. Your […]

New Features of Exchange 2016

Microsoft Exchange is a business class communication system that integrates email, calendars, and other tools together to make collaborating and messaging a simple and effective process. Forged in the cloud, Microsoft’s newest update to Exchange combines multi-role servers with a focus on enhanced hybrid solutions. In addition to simplifying the architecture of the software, Microsoft […]

Bitcoin & Cryptocurrency

Cryptocurrency is an encrypted, decentralized digital currency that is transferred from one person to another confirmed in a public ledger in a process called mining. No government issued money backs the numbers in the ledger – instead, Bitcoins, the most common type of cryptocurrency is traded. Transactions take place without the need for an intermediary, […]

Ransomware

Imagine logging onto your computer only to find that you can’t access any of your files. You inbox contains an email that demands a payment for the return of your files. This type of hack uses ransomware to access your information and hold it at ransom, and it is an all too common threat that […]

How To Spot Phishing Emails

Phishing emails are everywhere, from your personal account to your CEO’s inbox. Often, these emails can take on the appearance of a harmless email, but in reality, unsuspecting victims the world over have been taken advantage of by carefully crafted, fraudulent emails. Learn more about how to protect yourself from internet fraud by understanding the […]

Mobile Device Management

Consider all of the information your company shares on a daily basis. From cell phones to tablets, laptops, and desktop computers, your staff and clientele are sharing all kinds of information (both public and private) on a daily basis. Keeping track of the information passed from device to device is vital to the health of […]

Fox 29 Philadelphia- Computer expert demonstrates the Companion App

Anthony Mongeluzo demonstrates new app which enables users to request a friend or family member to keep them company virtually on a walk.View Video

Fox News with Neil Cavuto: Government Debt

Anthony Mongeluzo joins host Neil Cavuto and other guests to discuss the US government’s debt and how it relates to small business.View Video