US itek, Incorporated

716-447-7000

  • Home
  • Support
  • Why US itek
    • Partnerships
    • Testimonials
    • Awards
  • Services & Solutions
    • Cloud Computing
    • Compliant IT Support
      • Business Continuity & Data Protection
      • NIST CSF
    • Managed IT
    • Technology Consulting & Cybersecurity
    • Voice & Collaboration
  • Resources
    • Referral Program
    • Say No to Computer Problems
    • Security Assessment
    • White Papers
    • Blog
    • Video Library
  • About Us
    • Contact Us
    • Our Team
    • Brand Assets
    • Careers & Internships
    • News and Press Releases
    • Timeline

Make site visitors feel secure with these tips

October 23rd, 2019 Security 2019october23security_c, 2fa, browser updates, Encryption, hacker, HTTPS, Internet security, mfa, multifactor authentication, os updates, software updates, Two factor Authentication
Make site visitors feel secure with these tips

When customers visit and use your website, engender feelings of trust and security instead of alarm and distrust. Easily improve feelings of internet security with these three tips.

Read more

Guarding your company’s data

June 10th, 2019 Cybersecurity 2019june10security_c, backup, data breach, Encryption, hacker, password, QS_3, securing data, security, update
Guarding your company’s data

Some of the most well-known companies in the world have been victims of cyberattacks, including Sony Pictures, Home Depot, Adobe, and eBay. While major corporations are high-profile targets for hackers, small- and medium-sized businesses are not exempt, so they need to secure their networks and data.

Read more

Return of the smartphone attack

June 2nd, 2017 Hardware 2017june2hardware_c, bluesnarfing, bluetooth, cyber-crime, hacker, smartphone attack
Return of the smartphone attack

Due to the recent WannaCry ransomware exploits, business owners are refocusing their efforts on protecting computer networks. Despite that, many leave one key device unaccounted for: their smartphone. The truth is hackers can exploit the technology in your smartphone to conduct malicious acts, and one of the most common is Bluetooth technology.

Read more

Categories

  • Android
  • Apple
  • Business
  • Business Continuity
  • Business Value
  • Cybersecurity
  • Google
  • Hardware
  • Healthcare
  • Healthcare IT
  • iPad
  • MS Office
  • News
  • News and Press Releases
  • Security
  • Social Media
  • Uncategorized
  • VoIP
  • Web & Cloud
  • Windows
©2025 US itek, Incorporated. All Rights Reserved.
  • Master Service Agreement
  • Privacy Policy
  • Website by Pronto.
  • Master Service Agreement
  • Privacy Policy
  • Website by Pronto.