spam and virus protection

Malware Alert: Flame Virus and High-Tech Espionage

Last week, researchers at Kaspersky Labs announced they had discovered Flame malware, a complex targeted virus that has been infecting computers through the Middle East. Believed to be a cyber-espionage tool, Flame is said to have spread by taking advantage of spoofed Microsoft security certificates. Flame malware leaves a backdoor on computers and can be…

Learn More

Common IT Mistakes Technology Consultants Help Businesses Avoid

Small and mid-size businesses are always trying to do more with less, executives are pulled in 100 different directions and technology often falls through the cracks while businesses focus on core business functions. SMBs don’t have the time to track the latest tech news, cost-saving breakthroughs, security threats and common break/fix tips, so it is…

Learn More

Ten Steps to a Faster PC (part 2)

Last week’s blog post discussed five tips for speeding up your computer. This week, we’ll offer five more troubleshooting tips for a faster PC. Before you plunk down money for a new computer, try troubleshooting, you might find that a quick-fix (or cheaper-fix) will save you big bucks. If these troubleshooting tips seem too intimidating,…

Learn More

Slow Computer?

Ten Steps to a Faster Computer (Part 1) Last week’s blog post discussed the PC lifecycle and when to replace your PC.  For many businesses, a slow computer is the major reason for a new computer purchase.  A slow computer can have a negative impact on employee productivity. Computers that at one time started up…

Learn More

Cloud Computing Security

This is the third installment in our series on Cloud Computing. Previous posts discussed why cloud computing is a technology you can’t afford to ignore and the differences between private and public clouds. This week, we focus on the security of the cloud. Many businesses that should be benefiting from cloud computing are dissuaded due…

Learn More

The Real Cost of Free Software

Given the current economic climate, it  may be tempting to try and cut corners by not paying to properly license software. According to a poll on TechRepublic blogs 80% of IT providers surveyed claim that their clients have asked them to install unlicensed software. However, cutting corners by installing unlicensed software often causes more headaches…

Learn More

Better Data Security & Identity Protection Through Passwords

Are bad password habits putting your identity and your personal data at risk? A recent study conducted by internet security provider Webroot, claims that poor password practices are putting consumers’ identities in a vulnerable position. According to Jeff Horne, Director of Threat Research at Webroot, “We’re seeing between 40,000 to 100,000 new samples of malware…

Learn More

Get More Information

Use the form below to get more information about ACE IT Services and what we can do for you.

  • This field is for validation purposes and should be left unchanged.

Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.

Call (646) 558-5575
Or Request More Information

  • This field is for validation purposes and should be left unchanged.