Need IT Help?

Discover How Pc Doctor Westchester Can Make the Difference - Call 646 784 5651 to Find out more about our IT Services

Network Security

How Microsoft Will Protect Windows 10 from Ransomware

The latest spread of ransomware virus between June and July 2017 has forced IT departments and software manufacturers to take action to avoid network downtime. Multiple high-profile incidents have demonstrated that ransomware can have catastrophic effects on critical public and private services. Hospitals, transport systems, and other high-tech facilities across the globe have been affected. No matter if it were…

How to Share Files and Folders with a Remote Desktop

The way in which people work today has changed. Many people work from home and by remoting into company resources such as servers,  users can share files and folders with their local computer while sitting at their home desk. Fortunately, technology today allows to share files and folders no matter if you have a mac and a pc with windows.…

How to Set up a Firewall for a Corporate User

A recent assignment saw Pc Doctor Westchester involved in setting up a corporate firewall for a user located in New York. Firewalls have more security features than home routers and should be a requirement in business networks. The firewall replaced an existing home router and these are the features we have been looking at before installing it: Numbers of Users:…

The Meaning of Managed IT Services and Support

At the moment of discussing IT solutions with our clients, we use to introduce the concept of “Managed IT Services”. For networks ranging from 10 to 100 computers, we believe that an efficient way to handle business continuity is to suggest that a particular network should “go managed”. Usually offices have an office manager who knows basic IT but cannot…

Tips for Scanning to a Network Folder

Are you having hard time scanning to a network folder in your office? Last week we visited a client of ours in White Plains who has a small office and he was unable to get his network printer to work for scanning over his network. Try to troubleshoot the following steps before getting your printer to work: – Check if…

Is WIFI in yor Home in Westchester Weak?

After having spent a few months troubleshooting Wifi networks in Westchester New York, we believe that it would be reasonable to come out with a blueprint to troubleshoot those home networks that are getting busier and busier since more people work from home. This short article will help you understand what needs to be done on the ISP (Optimum or Verizon)…

What is the Mobile Internet ?

   Over the past years, wireless carriers such as AT&T, Verizon and T-Mobile have offered only cellular telephone services. The farthest old cell phones could go was text messaging. The most recent smartphone revolution allows phones to be and act like real computers: users now can browse the web, read and respond to emails and even use their most favorite…

How to Discern the Good, the Bad and the Ugly on the Internet

   One of the beauties of the Internet is that it is an uncontrolled platform where users can express themselves. There is no before-publication censorhip, no after-the-fact policing and the same content can be shared among milions of users. On the other hand, unless a felony is committed, the government cannot shut down a website, for the sake of political…

Going Wireless? This is What You Need to Do

   When you buy a new pc or laptop, one of the first things to do is to manage your machine to communicate with a printer, a modem and finally with your wireless router. Sometimes to connect to the wireless takes longer and you may want to check first if your router’s firmware is up to date. If your wireless…

What Does it Mean to Be a Network Security Officer

    Security has many facets and is a mandatory field of study especially today that large corporate companies are suffering data breaches and credit card information theft. Malware got into their systems because of genetic weakness in the credit card encryption process, infected pdf attachments, poor security implementation, weak anti-spam tactics. Computer security is a broad topic: it can…