Need IT Help?

Discover How Pc Doctor Westchester Can Make the Difference - Call 646 784 5651 to Find out more about our IT Services

What Does it Mean to Be a Network Security Officer

    Security has many facets and is a mandatory field of study especially today that large corporate companies are suffering data breaches and credit card information theft. Malware got into their systems because of genetic weakness in the credit card encryption process, infected pdf attachments, poor security implementation, weak anti-spam tactics. Computer security is a broad topic: it can…

Are Your Data Safe in the Cloud?

   Do you know where your data really are once they land on the Internet? Until a few months ago only a few people realized that their personal health data was being used by drug companies to develop products and advertising campaigns. Cloud computing is another technology where users entrust their data to service providers. Google, Microsoft, Dropbox etc are…

Valuable Tips Regarding IT Disaster Recovery Management

Recovering data from a network of computers is a multi-layer process that involves basically three main steps: data protection, system recovery and people education. After natural disasters like hurricanes and storms, power outages have forced IT experts to envision ways to safeguard data, switching from tape-based backup towards real-time mirroring and replication technologies. Many network administrators realized that their recovery procedures were…

Network Security Tips to Share with our Readers

We all know how malware is nasty and how it can harm networks and computers, but day to day users are often unaware of the security threats landscape that populates the web and that can affect their email and smartphones. Even the most careful user can be outsmarted if he/she is distracted for a moment. Therefore, to defend gainst network…

Caveat Emptor: Tips Before Buying a New Computer

Our computers soon or later will show their end of life cycle and will die out. The main reasons why a computer stops working are electrical shocks from storms, hard drive failure and motherboard failure. If we have not backed up our machine, a IT professioanl will be able to recover the data for you. When it is time to get…

What Perception Users Have of Computer Security

For many years we have all been educated to buy security for our Windows computer and companies have been offering many products and solutions to fight against viruses and online threats. Once purchased and activated, we have all trusted that our antivirus would do the job. Nowadays, however, with the rise of sophisticated malaware, the antivirus is not eough to drive…

Windows XP is Dead: Now What?

As of April 9 2014, Microsoft stopped supporting Windows XP leaving millions of computers without patches. Confusion and misinformation are still playing a pivotal role during this transition period and in this article Pc Doctor wants to take the chance to explain what’s going on and suggest what the best move would be in the post XP environment If You…

Upgrading Networks with a Nas Backup

Most of computer users are used to back up files and folders to an external hard drive, but when the network has multiple devices and more computers, backing up to an external hard drive does not mean always the right choice. Network Attached Storage, better known as NAS is a very reliable backup solution that is plugged in directly into…

Speeding Up Your Mac

For many years Apple has manufactured and sold its Macs with a few memory, causing the users to wait for the spinning ball to end before performing another computer task. Today Apple sells its computers with faster processors, but with still 4 GB of memory which, honestly, does not grant a fast machine at all. With apps, Itunes, videos and…

How to Protect Wireless Networks

  When the first models of routers came out in 2005, users had hard time configuring security, partly because it was described as complicated, but also because people were not aware of the risks. Today, you need to know that wireless connections carry their own, unique security risks. These fall into a range of categories: – Piggybacking: other users can…