US itek’s Blog

Why your company needs technology business reviews

Businesses across all industries need to invest in technology to remain competitive. But because not all technologies deliver on their promised benefits, it’s vital for business leaders and/or their IT partners to make sure that their technology investments are worth keeping.

What is MTD, and how can it improve mobile security?

Protecting your business data goes beyond securing your office computers and networks. Especially now that implementing remote and hybrid work environments is critical to business survival, you need to put up digital barriers around your company’s mobile devices to block malware and other threats.

How to move data from your old PC to your new Mac

December 17th, 2021 Apple

If you’re switching from a Windows PC to a Mac, and you’re worried about losing years’ worth of data on your old machine, don’t fret. Changing platforms doesn’t have to mean starting over with Apple’s free tool called Windows Migration Assistant.

Here’s how to tidy up your workstations

A tidy workstation helps employees be more productive. Cleanliness also contributes to better employee health, safety, and office hardware maintenance. Keep your computers and mobile devices dirt- and dust-free with these tips.

Desktop monitors

You spend several hours looking at your computer monitor, so it’s important to make sure it doesn’t have any dust or smudges.

Chip Price War On The Verge

With the impending release of the Core 2 Duo processor, formerly code-named Conroe, on the heels of the successful Xeon launch, the chip maker's products are generating a new kind of buzz. It's the same kind of anticipation that was a given several years ago, before rival Advanced Micro Devices hit the scene with technology impressive enough to turn heads of corporate buyers and enthusiasts.

Managed Services, Recycling Revive Declining PC Sales

US itek lives in a world of declining PC sales. Yet business has never been better for the Buffalo, N.Y., solution provider and system builder, whose early foray into managed services is paying off handsomely.

The eight-year-old company, which derived about half of its $2.5 million in revenue last year from product sales and the other half from services, was in the red five years ago and struggling with a declining PC building business.

Hackers ‘Abusing’ Microsoft Exchange Server Vulnerabilities: Huntress

Threat researcher Huntress is warning MSPs of on-premise Microsoft Exchange Server ProxyShell vulnerabilities that could be exploited by cybercriminals as early as this weekend.

Huntress has seen 140-plus webshells on Microsoft Exchange Server 2013, 2016, and 2019. The threat researcher said it has uncovered 1,900 plus unpatched boxes in 48 hours.

LockFile Ransomware Encrypting Domains Via Exchange Hack

A new ransomware operator is taking over Windows domains on networks around the world after exploiting a chain of Microsoft Exchange server vulnerabilities called ProxyShell.

The LockFile ransomware gang has taken advantage of the Microsoft Exchange ProxyShell and Windows PetitPotam vulnerabilities to hijack Windows domains and encrypt devices, security researcher Kevin Beaumont reported Saturday.