Have any question?

Blog

MSPNetworks Blog

MSPNetworks has been serving the Farmingdale area since 2010, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Properly Manage Business Software

It's always important to maintain and manage the tools you use for work. Nowadays, this includes the software your business uses each day. Let's go over some tips for doing so properly.


Avoid Shadow IT

Without being provided the tools they need to complete their assigned tasks, your employees are likely going to seek out an alternative that allows them to do so. While their initiative might be admirable, the results can be quite regrettable. If software is added to your business' network without your awareness (and certainly without your approval), you have what is known as shadow IT

There are a litany of problems that shadow IT can contribute to, so it is best to keep it off your network entirely. The simplest way to do so is to simply ensure your team has all the tools they need to do their jobs, whether that entails a single software title or a full suite of business applications.

Carefully Manage Your Subscriptions 

Today, it's becoming rare to find business software that isn't offered as a subscription service. While this is a good option for long-term use cases, it can create a challenge if a certain software is only needed for a single project but the subscription is never canceled once the need for it has passed. This can quickly become expensive for a business, so we recommend that any organization using any subscription-based software titles regularly carries out an internal audit to weed out ones that are no longer needed.

Patch and Update Your Software

As threats are developed and mistakes are discovered in software, software developers will release updates and patches to resolve these deficits. This, however, is often where their responsibility ends—it is up to the user to actually apply these fixes, at the risk of opening up the business to a security threat.

This is another reason that many businesses now utilize Software-as-a-Service subscriptions. SaaS gives businesses the option to embrace a more cost-effective means of doing business. With the scalability that SaaS brings, a business can more precisely shape their subscriptions to fit their actual needs with the capability to change their preferences on the fly.

A good add-on to consider along with SaaS is a software management platform. With one, you can get a bird's eye view of your infrastructure and see what applications are actively being used.

Whatever your software needs may be, we can help you find the SaaS option that fits them. Find out more by calling (516) 403-9001 today.

0 Comments
Continue reading

Outlining the Usefulness of the Password Manager App

Businesses sure use a lot of online accounts, and if they don’t keep track of the passwords associated with these accounts, things can get messy fast. To help with this effort, password managers, or applications that store passwords in an encrypted vault, have really taken off. Here are some of the reasons why businesses invest in password management solutions.


Why Businesses Often Take Advantage of Password Managers

Password Managers Save Time

Many IT departments throw away much of their day resetting passwords for forgetful employees, but this time can be reclaimed through the use of a password manager. Since the passwords are stored in a secure vault, employees can rely on that instead of a call to the help desk.

Password Managers Are Secure

Due to their nature as repositories for credentials and important account information, password managers are also extremely secure. Some password managers have features built right into them that allow employees to generate complex passwords, as well as features like two-factor or multi-factor authentication to aid in security. Through all of these features, it’s possible for any employee to overcome their poor password practices. Keep in mind that not all password managers are the same, however, and you should never rely on the password management features of your web browser alone.

Password Managers Are Convenient

Modern password managers are simple to use and make it easy for users to retrieve credentials as needed, no matter the device. The cloud enables these credentials to be synced to multiple devices, something which deters employees from writing down passwords and carrying them around in an insecure way.

We Can Help You Take Advantage of a Password Manager

MSPNetworks can help you implement a password management solution for your business. To learn more, reach out to us at (516) 403-9001.

0 Comments
Continue reading

ALERT: Your Business Needs to Take the Log4j Extremely Seriously

You’ve probably already heard about Log4j this week. Maybe you don’t recognize the name, but it’s likely that you have run across emails or news articles talking about this widespread vulnerability. You need to take it very seriously.


What is Log4j?

When developing software, developers utilize different programming languages. One of these languages is called Java, and in Java, developers have multiple libraries to work with. Log4j is one of those libraries, and it has recently been uncovered that there is a huge vulnerability that cybercriminals can exploit to gain access to your systems and data. It’s a huge open door that has been there for years, and now that the world knows about it, it is just a matter of time before it is being used to do damage.

This particular Java library has been used a lot over the years. The vulnerability impacts some pretty big names in software and cloud hosting, such as:

  • Amazon
  • Apple
  • Cisco
  • Fortinet
  • Google
  • IBM
  • Microsoft
  • SonicWall
  • Sophos
  • VMware

…as well as others, large and small. Even the United States’ Cybersecurity and Infrastructure Security Agency (CISA) is affected.

Is My Business Impacted by Log4j?

It’s almost certain that it is. We can’t stress enough that this is a big issue, and that major tech companies are scrambling to put out patches. It doesn’t just affect the folks at Amazon and Microsoft, it affects those that use their products as well.

What You Can Do to Fight Back Against Log4j

One of the scary things about this vulnerability is that most businesses are at the mercy of their vendors to patch it, and some experts think it will take years before this vulnerability is totally removed from the world. Fortunately, as we mentioned earlier, the big names in tech are scrambling to get a patch out the door, and many, if not most, already have.

However, it also falls on the impacted webmasters and businesses to apply the patches that these developers put out. Beyond that, it is critical that you as an individual remain vigilant in your cybersecurity hygiene. That goes double for your business.

For example, let’s assume for a moment that you’re a user on a fantasy football league website. If that website relies on technology that Log4j impacts and they don’t apply the fixes, the information you’ve provided to the website—account details, financial information, and whatever else—would be vulnerable and easy to steal.

This applies to every website or application that uses this technology; if they don't react, your account with them is not very safe. 

The problem is, as a user, you can’t really tell if a website or piece of software is using this particular Java library. In other words:

Everything just potentially got a little more dangerous, when it comes to cybersecurity. It’s up to everyone to work harder to protect themselves.

How to Protect Yourself from Log4j, as an Individual and a Business

It’s critical to use strong password hygiene. “Password123” isn’t going to cut it. Using the same passwords across multiple accounts needs to stop, immediately. This involves following the basic password best practices that we always talk about, like:

  • Using a unique password for each account and website
  • Using a mix of alphanumeric characters and symbols
  • Using a sufficiently complex passcode to help with memorability without shorting your security
  • Keeping passwords to yourself

Audit your IT IMMEDIATELY

All organizations need to bring in a professional to audit all of their technology and update what can be updated to remove the influence of Log4j. Not only will this help protect your business and your employees, it will also protect the interests of your clients and customers. 

We recommend that you give MSPNetworks a call at (516) 403-9001 to schedule an appointment. This is extremely important, and you need a professional set of eyes to audit your IT to make sure you aren’t affected by this awful vulnerability. 

0 Comments
Continue reading

VoIP Can Make Communications Easier

Nothing changes the fortunes of a business faster than having clear lines of communication, especially after operating with less-than-effective communications for a time. Today, there are options that provide businesses with enterprise-level communications without the massive price tag and commitments that they typically bring. 


Business is moving faster and from many more places, and with that, antiquated communications strategies just don’t provide the sustainable features and benefits that hosted VoIP can provide. Hosted VoIP, or Voice over Internet Protocol, is a dynamic communications platform that is accessed through an app and uses your company's existing bandwidth. This means that all that bandwidth you pay for is repurposed to support your phone system. Let’s talk a little bit more about Hosted VoIP:

You know how you get all the productivity applications, email, and a bunch of other software from the cloud? Well, Hosted VoIP is also purchased as a cloud service. You don’t have to make any large hardware purchases, maintain and manage a PBX server, or any of that. You simply call MSPNetworks to get a VoIP provider and it doesn’t take long to get your whole business the crystal-clear calling and dynamic features that today’s VoIP platform offers. 

What's great about it is that each user can be added in seconds and once connected, they will be able to use their personal smartphones as a business phone. It allows companies that have  teams working remotely to have a feature-rich and reliable communications platform in a cost-effective way. In fact, you are sure to save up to 40% off of your current phone system. 

Benefits of Hosted VoIP

We’ve already outlined the cost reduction that’s possible with VoIP, but there are some other benefits as well. They include:

  • Easier to Manage: Switching to VoIP eliminates your relationship with the phone company. More than that though, VoIP doesn’t need special hardware, it can use the same wiring and switches as your LAN.
  • Unified Communications: Installing a VoIP platform likely means that you are able to unify your organization’s communications platform, giving your staff the option to communicate multiple ways at the click of a button.
  • Functionality: A VoIP platform can integrate with all types of business-management software to provide easy access to the communication capabilities that often make a business run better. VoIP also has innovative features like Voicemail-to-email transcription, interactive voice recognition, and integrated chat.
  • Scalability: When you onboard new users and need to add a line to your business, it’s as simple as a couple of clicks.

You should at least have a conversation with an IT professional about Hosted VoIP. We want you to get the best value out of your IT and Hosted VoIP is a good option. Give us a call at (516) 403-9001 today to learn more.

0 Comments
Continue reading

Software Management Doesn’t Have to Be Hard

We live in a world of the “as a service” business model, where services are rendered on a per-month or per-billing cycle service model rather than the traditional “buy now, replace later” one. What they don’t tell you, however, is that when you use Software as a Service (SaaS) for multiple purposes, things can get messy pretty quickly. How do you manage all of your software solutions without breaking the bank (and your brain)?


A SaaS management platform can be a great way to ensure that you are getting maximum value from your SaaS applications, as well as optimize aspects of your operations that you may not have considered. Here are four benefits that your organization can stand to take advantage of through the use of a SaaS management platform.

Analytics and Usage Statistics

Have you ever wondered how your employees use the solutions you provide them? A good SaaS management solution will give you the ability to see at a glance which applications your employees use the most and how they use them. Doing so can help you make educated decisions about your technology moving forward and whether or not you actually need certain solutions.

License Management and Renewal

The more software your organization uses, the greater the chance that something can go wrong with the licensing. If the license expires, the application might suddenly be unavailable for use, leading employees to find their own solutions. SaaS management allows your organization to get a bird’s eye view of your entire software infrastructure to manage and renew licenses as needed.

Enhanced Security and Compliance

It doesn’t matter how little or how much you use SaaS applications. Chances are, at some point, these applications are going to store your organization’s data in some capacity, a practice which can create problems if you do not know what information they are storing and where. If your business is using a SaaS management platform that gives you the opportunity to outline each and every software used for your business, it becomes much easier to shore up weak points in its infrastructure.

Tighter Control over SaaS Applications

SaaS gives you a centralized method of managing your software, a concept that can help to cut down on shadow IT (the practice of employees purchasing or making use of unapproved solutions). If employees have a pool of applications that they can pick and choose from at a whim, they will be less likely to go out of their way to find their own solution that suits their needs.

MSPNetworks can help your business get started with SaaS management by offering a comprehensive network audit. This will help you determine the best path forward for your software management needs. To learn more, reach out to us at (516) 403-9001.

0 Comments
Continue reading

Is Your PC Ready for Windows 11?

Microsoft has officially unveiled Windows 11, the latest in its line of PC operating systems, as well as detailed its system requirements. Will your business be upgrading to Windows 11 when the time comes? We think a lot of it will depend on its current IT infrastructure and whether or not you meet the minimum requirements right out the gate. Let’s dive into the details and what you need to know about Windows 11.


First, a short disclaimer--Windows 11 does not release until fall of this year, and even if you can’t get your hardware up to speed before then, Windows 10 will remain supported until 2025. As for the hardware requirements themselves, that seems like a good place to start.

Windows 11 Hardware Requirements

Before we dive into Windows 11’s requirements, let’s first provide a little bit of context. The current system minimum requirements for Windows 10 are a 1GHz processor, either 1 or 2 GB of RAM, depending on whether you are using a 32 or 64-bit OS, and a display with at least a 800 x 600 resolution. Of course, these are bare minimums. You won’t get much mileage out of a PC with these specs.

Windows 11, on the other hand, has more stringent requirements for its operating system. Windows 11 will require a 1GHz multicore processor, but it doesn’t have to be top-tier to run the operating system. In terms of memory, Windows 11 will also need more of that as well; at least 4 GB of RAM will be required to run Windows 11, as well as 64 GB of onboard storage. Furthermore, the display requirements are also a bit higher, needing a resolution of at least 720 pixels.

For more on the specific requirements of Windows 11, check out this document from Microsoft.

For the most part, modern PCs won’t have an issue running Windows 11, but for now, we don’t recommend installing it on a PC that you need to use everyday for work. 

Get Ready for Windows 11 Today

While Windows 10 will still be around until 2025, we want you to start thinking about your update strategy now. The reason for this is simple; you don’t want 2025 sneaking up on you out of nowhere (and trust us, it can and will sneak up on you if you let it). The last thing you want is to wind up in a situation where you are using an unsupported operating system in much the same way that many Windows XP users did all those years ago.

For Help, Contact Us!

If you can’t tell the difference or don’t know the difference between your various components and hardware specifications, we would be happy to help you make a determination about your current system specs. If you want to make sure your business can seamlessly transition to Windows 11 upon its release, MSPNetworks can help with the acquisition of new hardware, installation, and monitoring/maintenance. To learn more, reach out to us at (516) 403-9001.

0 Comments
Continue reading

Patch Management and How It Can Save Your Business

Software runs our lives. It certainly runs your business. What if I told you that this essential cog in your business’ operations can also be the thing that is most susceptible to being exposed by outside attackers? It’s true, software can be the very door that hackers and scammers need to get into your network and run amok. Let’s take a look at the unsung service that is patch management and why it is so important. 


For the first years of managed IT services, patch management was more of a value proposition than it was a crucial part of the offering. Today, the script has officially flipped and it is no longer perfunctory, but crucial. This is because threats have changed. In fact, they’ve changed for both the business and its IT service provider. 

MSPs and IT departments use software known as Remote Monitoring and Management (RMM) tools to cover all the ends of a business’ IT infrastructure and network. As the core software that allows IT experts to keep a watchful eye over their domain, IT providers were horrified to learn that hackers with a keen eye for opportunity, hacked into unpatched RMM software and were able to not only able to access that company’s information, but other companies that were being managed by the platform. These hackers exploited these vulnerabilities and injected malware into all managed systems. We don’t have to tell you, that’s not a good look for any service provider. 

That’s just an anecdote, sure, but it goes to show what can happen if your software isn’t patched and updated properly. 

Challenges of Patch Management in 2021

Managing software updates isn't a very easy process anyway, but with all that has happened recently, patch management has become extremely difficult. With growing complexities of remote workers, cloud platforms, the immense amount of software that an organization uses, and the rapid-fire updates being developed, it isn’t as simple as signing in and updating eight files once a month. You really have to stay on top of it to ensure that your network and infrastructure are properly protected. 

A big challenge for IT teams concerning patch management is actually downtime. When software is patched, systems typically need to reboot. This can be a real hindrance to productivity if it is done while someone is working. Most IT administrators won’t make people restart in the middle of the workday, but then they have to remember to reboot these machines when they are not in use. Forgetting is just like not patching the system in the first place, so coordinating patches and reboots at a time when people aren’t working is its own challenge. 

It’s a fact that most vulnerabilities that are exploited are over six months old. This tells you that somewhere along the way that either patches and updates were overlooked, or they weren’t properly coordinated in the first place. Combine all that wrangling with the fact that sometimes patches simply don’t “play nice” with corresponding systems and cause more headaches and hand wringing and you have a complicated and often frustrating task list that is just a fraction of the IT admins’ responsibilities. 

Some MSP Patch Management Tips

Of course, the best way to get comprehensive patches and updates is to outsource your patch management to a managed IT services provider like MSPNetworks. Any business can save time and money by relying on our certified technicians to ensure that your systems are up-to-date and patched correctly. Furthermore, we won’t cause any downtime as we will schedule patches for times when traffic is low or non-existent. 

If you insist on doing your own software maintenance, a couple of tips that you should adhere to include:

The first thing you should consider is to understand all the software your company is using officially and ensure that you are up to date with all the relevant patches. Missing software updates, while probably not the end of the world for an individual, is a horrible practice for any business. 

You’ll also want to schedule maintenance on some machines as soon as possible after official software updates are released and if there are no problems, schedule maintenance on all other machines the following week. The test group will go a long way toward exposing any possible hiccups you may be facing. 

Software is extremely important to your business, and your business is extremely important to your employees and customers. In order to keep it that way, you will need to ensure that your software systems are patched and updated regularly. To talk to one of our It professionals about patch management, co-managed IT services, or comprehensive managed IT services, give us a call today at (516) 403-9001.

0 Comments
Continue reading

How to Determine Which Productivity Suite Is Right for Your Business

The productivity suite is one of the most utilized software combos going. Usually it comes with a word processor, a spreadsheet program, a note taking program, and a presentation creator. There are other pieces of software included in some of today’s most dynamic options, but for our purposes we are going to limit it to these. 


It’s not a surprise that most businesses choose tools they can both afford and work for their needs. This typically has more to do with integrations it has with other pieces of software the organization uses. Let’s look at some of the variables that businesses have to consider when determining what productivity software is right for them. 

Cost

For businesses, it’s no secret that cost really matters. Most organizations, when comparing productivity suites, will find little differences between the actual software itself. Sure, one particular word processor is better than another, one spreadsheet program works best with your existing tools, and so on...but as a suite, the cheapest option is probably going to give you the ability to do what you need to do. That said, this software is going to be used for storing (and sharing) presumably sensitive company data. For that reason it has to be a reliable option. 

Compatibility

Your staff has a way of functioning that is different from another set of people. As a result, your productivity software has to be compatible with as many platforms as possible. If you have a team that uses ChromeOS-fueled laptops, but your productivity suite only supports Windows 10, it’s not going to do them any good. Make sure that the apps can be available on most or all of the major computing platforms. 

Mobility

The ability to access files on a mobile device has to be considered essential for today’s business. Today, many of the top productivity suites are available as a cloud-hosted service. This provides much of the mobility that users who access business data on the go would need.

Security

This kind of goes hand-in-hand with reliability, but it’s always important to prioritize security when you are picking software for your business. Two of the most-utilized productivity suites, Microsoft Office 365 and Google Workspace, come as cloud-hosted solutions. This means that Microsoft and Google, respectively, will host your files and data as well as the software.

Communications

Today, communications that happen over the Internet are extremely important to any business with remote workers. Most of the top productivity suites also come with hosted email and the ability to at least integrate a video conferencing solution. This ensures that your team will have options in which to communicate and collaborate in innovative ways.

Regardless of which appset you choose, you should know that MSPNetworks can help your organization design a computing infrastructure and deploy all the tools your staff needs to keep your company productive. Call our expert technicians at (516) 403-9001.

0 Comments
Continue reading

Document Your IT Infrastructure

Quick, off the top of your head, how many network switches are in use at your office? How many wireless access points? How many routers are past their warranty or no longer getting support?

That’s not a question most business owners are asked on a regular basis, and we don’t really expect you to be able to rattle off the answers. You should have all of that information documented though.


Documenting your entire IT infrastructure saves you a ton of time and hassle later. It can help with insurance, it can help simply keep track of everything you are supposed to be keeping secure, and it can help prevent you from buying something you don’t need.

What Information Needs to be Documented?

While it’s going to depend a little bit from device to device, you’ll at least want to track some of the basics.

Device Name: Pretty straightforward—the name of the device on the network, if it has one, or give it a descriptor name if it doesn’t, such as “Conference Room Network Switch.”

Device Model and Serial Number: You’ll want this for support and warranty issues. It’s easier to have it written down than having to find the tiny label on the device after it is in place and hooked up.

Installation Date: When was the device purchased and installed?

Who Installed It: It never hurts to know—if a particular company or employee set it up, and it wasn’t set up properly, you’ll want to know who to reach out to.

Warranty Information: How long does the manufacturer’s warranty last? Did you purchase extended warranty? Does the device have an estimated end of life date?

Vendor Information: Is there a support number? Did you purchase the device directly from the vendor or a third party?

Location: Where is the device located in the office? Is it in the server room, or behind the reception desk? 

Service History: This one is huge, and the hardest information to keep up with. If work is done on the device, it should be documented. That includes the initial setup and ongoing administrative changes. If the device has a tendency to fail often, your documentation will show this as you audit your network.

Documenting your IT is a huge part of keeping your IT running smoothly. You don’t need to do this by yourself. At MSPNetworks, we document every piece of hardware and software we touch and keep a very clear historical record of the work we do so we can always adjust our processes and help business owners make informed IT-related decisions.

Want to learn more? Give us a call at (516) 403-9001.

0 Comments
Continue reading

Google Adding Features to the G Suite

It is apparent that Google is deeply invested in the G Suite, as they recently added an assortment of features to make basic processes much simpler and more convenient for their users. Here, we’ll go over a few of these updates, and how they can positively influence your operations.


Search Chips in Gmail

All G Suite subscribers will soon see improved search capabilities within Gmail, as Google’s developers have added an extra feature to help narrow down search results. Once a search is performed within Gmail, contextual options will appear below the search field.

For instance, let’s say you were looking for a specific email from your colleague Brian. Simply searching for “Brian” would bring up a mess of messages, chats, updates, and invites. Search Chips allows you to narrow your search by various filters without manually typing them. So, if you knew that the message from Brian you were looking for had a PDF attached, you can search for emails from Brian with PDFs attached.

Again, while this feature is currently exclusive to the G Suite, all Gmail accounts will soon have this capability built in.

Expanded Out of Office Notifications

Are you planning on being out of the office for an extended amount of time? Google is adding a feature that allows you to present this information in more context to your contacts who have access to your Google calendar. Suppose you have a vacation scheduled in your Google calendar. If Brian wanted to get in touch with you during that time, he would see that you were gone and when to expect you back.

Google Docs Autocorrect and Smart Compose

Google Docs (at least, the online version) is being augmented with the ability to automatically correct a user’s errors as they type – something many users will likely find to be a welcome addition. This feature is slated to be released to select G Suite subscription types. Likewise, select G Suite subscriptions may have noticed Smart Compose predictions appearing in their Google Docs as of late.

Admin Console Improvements

Administrators should be happy to see the assorted improvements that have been made to their Admin consoles, and we’re talking about more than the aesthetic changes. The entire interface’s integration has been improved, with more context provided in the options.

Context Aware Access in G Suite

There are just some things that different levels in an organization need and don’t need, respectively, which means that certain users shouldn’t be able to access certain things.  While admins were once only able to differentiate access control through organizational units, you can now control access via a user’s identity and the context that is inferred by a request. This means more granular control over your data, and by extension, more secure data. However, to use this feature, you have to be a G Suite user of Enterprise, Enterprise for Education, Cloud Identity Premium, or Drive Enterprise.

Which of these additions do you find the most promising? Do you wish any were more widely available? Let us know in the comments!

0 Comments
Continue reading

Tip of the Week: Activate Microsoft’s Two-Step Verification

Nowadays a lot of accounts give you the option to set up two-step authorization; and, most of the time you probably should. The security and privacy benefits that your business can gain are substantial. Today, we’ll describe how to enable what Microsoft calls two-step verification. 


What is Two-Step Verification?

It’s two-step authentication, a security measure that adds the traditional password with a secondary authentication that forces users to add additional proof of identity. Microsoft’s strategy is to contact a user every time a device is used to access an account. Users can use email, phone, or an authenticator app to gain access. 

Turning on Two-Step Verification for Your Microsoft Account

The process to activate two-step verification is simple:

  • Sign into the Security basics page for your Microsoft account
  • Access More security options
  • Locate Two-step verification, and select Set up two-step verification
  • Follow the on-screen instructions to complete the process

Microsoft offers the options of choosing a phone number, an email address, or an authentication app. If you choose the latter, you will have to link your account to the app of your choice. 

If you are looking to add two-step verification for your Microsoft account, our professionals can help. To get the help your organization needs, contact our knowledgeable IT professionals today at MSPNetworks at (516) 403-9001.

0 Comments
Continue reading

Defining Shadow IT and Its Risks

IT administrators are pretty particular about what software is used on the networks that they manage. This is not because we have any vested interest in the software itself, it’s because of the inherent reliability of the software they manage. They’ve tested it, they manage it, they know it. When an organization starts dealing with employee-downloaded software--especially if there is no procedure in place to report additions to IT--they can quickly lose control over the network. 


The software that isn’t properly vetted (or even reported most of the time) is called shadow IT. Since it’s the IT administrator’s job to oversee the data security and overall effectiveness of your company’s technology deployments, shadow IT can present them with a bunch of risk.  IT administrators hate risk. Today, we’ll take you through the good and bad of shadow IT.

Shadow IT is Bad

Most of the people that work with a computer have been working with similar technology for a long time. While they aren’t IT experts, they know what software works best for them. That experience will often result in them downloading software that hasn’t been approved by their company’s IT department or outsourced IT service vendor. This software, while useful for the user, may be a major problem for an organization, for several reasons.

The main issue is that any software that is downloaded may come with adware, spyware, malware, vulnerabilities, and other nefarious code that can put a business at risk. Worse yet, that software isn’t known to your IT admin, keeping it from the routine maintenance it needs to keep it from being a vulnerability. If your business carries vulnerable software, it can create a breachable hole in your network. So, while you may not see continuous problems, risk is magnified. 

What are the risks? Here are a few:

  • A lack of security - Without the visibility and control over network-attached resources, IT management becomes much more difficult. If there is a potential that a piece of software can put a hole in your network, you are compromising the network’s security.
  • Problems with performance - If the tool that’s implemented doesn’t mesh with the system it’s installed on, the app’s performance--and thus the user’s--will be compromised.
  • Compliance problems - If your organization needs to meet certain compliance standards, the presence of unmanaged software makes it almost impossible to meet said standards.
  • Data loss - If IT management doesn’t know that a software is on the network, it won’t be covered by organizational backup strategies, meaning work completed using shadow IT apps won’t be backed up.

The minute you understand the risks, it becomes clear why IT admins typically don’t like shadow IT at all.

Can Shadow IT be Good?

Risky behavior can be a major problem for a business. It can also result in significant reward. According to a study conducted in 2019, there is a shift in the way that IT admins are looking at shadow IT. This is mainly the result of organizations looking to improve productivity and to use available capital more effectively. For the detrimental risk that shadow IT can bring a company, there is an opportunity to save time and cut costs.

The study, which included 1,000 IT professionals, showed that a whopping 77 percent believe that embracing shadow IT solutions can help a company innovate quicker than their direct competition. That’s not all.

  • 49 percent said that shadow IT boosts productivity.
  • 45 percent said that shadow IT helps promote employee engagement.
  • 40 percent said that shadow IT helps promote adherence to IT security requirements.
  • 40 percent said that shadow IT would help reduce employee turnover.

Effectively, two-fifths of IT admins said that shadow IT’s detriments could be ignored. That’s not to say that I know any IT administrator that would be totally okay with having unsupported applications on company-owned machines. Not one would deliberately put a gaping hole in their organization’s network to boost productivity. 

What they would promote is the use of shadow IT that is brought onto the network through employee-owned devices. This practice is being shown more leniency now more than ever. After all, IT admins can’t possibly be responsible for every piece of software brought onto the network by employees. They bring laptops, and tablets, and smartphones, and IoT devices, and with all those devices, there are bound to be programs that IT admins typically wouldn’t want on there, but would accept if it kept decision makers happy and productivity high.

If you would like to learn more about shadow IT, what constitutes shadow IT, or have any other software and maintenance questions, call our knowledgeable professionals today at (516) 403-9001.

0 Comments
Continue reading

What Happens During an IT Assessment?

With technology being deployed to help businesses solve all manners of operational inefficiency, it’s often difficult to pinpoint what IT will work best for your business. Organizations of all types look to technology; and, at some point you need to ask yourself if your technology is set up to help reach your business’ potential. 


If you are like many other businesses, IT is a crucial part of your business’ day-to-day operations and it stands to reason that it should be a priority to understand just how it functions to do so. This process, while pretty transparent, is not always cut and dry. With a simple IT assessment, you can get a clear look at how your organization’s IT functions, how it works to tie your business together, and get an idea how it can be improved. Today, we’ll take a look at an IT assessment and how it can be the first step on a path to improving your operations. 

The Assessment 

In order to get the most comprehensive look at how your IT is functioning for your business, you need to take a look at core functions those technologies are used for. They typically include human resources, financial information, hardware, software, specific needs of your business, governance (compliance), managing risk, and the ever-prominent security of said network.

Before we get started going through what to expect from an IT assessment, there are a couple terms that you need to understand:

  • Total Cost of Ownership (TCO) - This metric will measure the total cost of a piece of technology. This takes into account the initial cost, the cost of operation, the cost of maintenance, and the cost of any downtime related to the solution in question.
  • Return on Investment (ROI) - This metric will measure how much you’ve profited off of an investment. 

These two metrics will come into play frequently during the IT assessment. 

But First...

You have to know why you would need an IT assessment in the first place. An IT assessment, or IT audit, is going to be the basis for the decisions that will come after. For that reason it is extremely important that you have trained technicians who know exactly what they are looking at, conducting the audit. It’s crucial that the people who conduct the assessment understand how IT should be used as a part of your business’ workflow, not aside from it. 

Starting the Assessment

The first thing that will happen during an IT assessment is to put together something called the Asset Detail Report. The Asset Detail Report lists all computers, servers, virtualized computing platforms, printers, switches, routers, and any other hardware and software that you have or pay for. This will present the age of all the hardware systems your organization has; provide the names of software, when it was installed, and what versions you’re working with; the status of endpoint security; where, and how much, data is stored; IP addresses and much, much more. 

At this time, it may be advantageous to create a site diagram. A site diagram shows you how your data flows through your network and devices. This visual representation of your IT infrastructure will give you a map of sorts of your organization’s network. The IT technicians at MSPNetworks can assist you with any part of the IT assessment process. 

Next the IT SWOT analysis, which is a metric that separates the strengths, weakness, opportunities, and threats affecting your business’ IT network. First, technicians will identify internal and external factors that are considered favorable or unfavorable to the network and infrastructure health--including security--of the organization’s IT.  Next, the techs will use the SWOT results to make recommendations on how to improve network security and suggest what types of investments will be needed to reduce organizational risk, promote rapid and sustainable ROI, and maintain a positive TCO. These suggestions will then be put into an actionable plan with the design to help a business make the right technology decisions. 

Finally, the assessment will produce a risk report from an evaluation of:

  • Network hardware
  • Security configuration
  • Servers
  • VPN/Remote Access
  • Websites, domain names, and hosting provider
  • ISP
  • Phone System
  • Email, messaging, and conferencing
  • Computers, mobile devices, tablets
  • Cabling
  • Printers
  • Software and mobile apps
  • Procedures, policies
  • Technology vendors

...and more

This report will identify domain controllers and online statuses, list users in Active Directory, a user’s last login, identify potential security issues such as weak passwords and machines that haven’t had their software updates, and provide the known vulnerabilities found on the network. With this report you will understand everything you need to know about your organization’s IT infrastructure and networking; and, their relationship to your team’s ability to be productive. 

Your organization’s IT is often what holds it all together. For more information about an IT assessment, or to schedule our knowledgeable technicians to complete one for you, call MSPNetworks today at (516) 403-9001.

0 Comments
Continue reading

Holy Moly It’s 2020: 50 Years of Technology

Today is the first day of the third decade of the 21st century. For some, it’s just another year, but for others it seems almost impossible that we’ve reached this point without floating cars and manned missions to Jupiter. Fifty years ago, some of the technology that is used in the course of doing business was simply fiction or conjecture. We thought it would be neat to take a look at some of the technological changes made since 1970.


Using our time machine, we want to travel through time to identify some technologies that have been invented in the past 50 years. The microchip (microprocessor) was invented in 1959, so that doesn’t quite fit the criteria of our list. Multi-location networking was also a thing as the ARPANET had just rolled out the year before. These technologies were the predecessors for some of the best tech we’ve seen developed over the past 50 years.

We start in the 1970s... 

1970s

Like most of society, the technology world was changing rapidly in the early 1970s. In quick succession, computing went from something that businesses and individuals only thought of in passing to a revolution that could change the world. New technologies that we would laugh at today were just reaching the market. Here is a brief list of some of the technologies that debuted in the 1970s:

  • Automated Teller Machine (ATM) - Introduced automated banking.
  • Intel 1103 memory chip - It was the first memory chip produced by Intel that introduced their dynamic random-access memory (DRAM). 
  • Intel 4004 microprocessor - Intel also released the very first microprocessor.
  • Email - The first emails were introduced and sent over the ARPANET.
  • Xerox Laser Printer - The Xerox 9700, the first laser printer was developed.
  • SuperPaint - The first computer used for digital imaging manipulation was introduced.
  • Mobile Networking - ARPA developed the first wireless network out of a van in San Francisco and tested out early versions of VoIP. 
  • The First Cell Phone - Motorola introduced the cell phone in 1973.
  • Groundwork for the Internet - European researchers created “networks of networks” in a process called internetworking.
  • Local Area Networks (LAN) - Using ethernet, Xerox created the first commercial LAN. IBM and Datapoint also introduced solutions.
  • First Mass Storage - IBM introduces their 3850 mass storage system. It stored up to 236 GB of data. 
  • Business Networks Expand - Packet-switched business networks like CompuServe, Telenet, and Tymnet are introduced, connecting business terminals to servers. 
  • PC Wars - Apple’s first commercial personal computer, the Apple II was released in 1977 as were the Commodore PET, and the Tandy/Radio Shack PC called the TRS-80. 
  • LaserDisc - The forerunner to the CD, DVD, and Blu-Ray disk, the LaserDisk was expensive, but offered superior audio and visual quality than the tape-based systems of the time. 
  • WordStar - One of the most popular word processors of the early PC age. 
  • Introduction of Online Services - Services such as MicroNet (also known as CompuServe Information Service) and The Source started what could be described as a precursor to the Internet. These services provided early versions of what you would find with AOL and Prodigy in the early 90s. 
  • Business PCs - VisiCalc, a software that automated the recalculation of spreadsheets effectively turned the growing PC market into a business PC market overnight. 
  • The First Malware - In 1979 the first Internet worm was created as a way to search for idle processors on the ARPANET. 

1980s

After the immense amount of technological invention in the 1970s, innovation was the name of the game going forward. In the 1980s, many of the systems that were lauded as revolutionary got a new look, and many of the technologies expanded, especially for businesses. Here are some of the computing technologies that were introduced--or improved upon--in the 1980s:

  • 3½-inch Floppy Disk Drive - There was a 5½-inch disk drive, there was a 3-inch, 3¼-inch, and the 3.9-inch floppy drive, but Sony developed the 3½-inch drive that Hewlett-Packard started putting in their PCs. It quickly grew to become the standard. 
  • Hard Disk Drive for Microcomputers - Seagate Technology’s ST506 was the first hard disk drive created for microcomputers. The drive held 5 MB of data, five times your average floppy disk. 
  • Business Workstations - Both Apollo and Sun Microsystems created hardware that would run resource-intensive graphics programs used for engineering and scientific research. 
  • MS-DOS - Microsoft Disk Operating System, or MS-DOS, was released for IBM computers. 
  • Lotus 1-2-3 - The first software suite that offered a word processor, spreadsheet program, and a database. It helped businesses get the tools they needed in one single software suite. 
  • Apple Lisa - The first personal computer that came with a functioning graphical user interface (GUI).
  • Bernoulli Box - The Bernoulli Box was the first hard drive that was removable. Disks ranged from 5MB to 230MB.
  • CD-ROM - The CD was already catching on in the mid-1980s when the CD-ROM, a construct that could store 550MB of data caught on and was the standard for years to come.  
  • Apple Macintosh - Apple’s Macintosh was the first mainstream mouse-driven computer, that came equipped with several applications that set the standard for personal computing of the time including MacWrite (first to use WYSIWYG) and MacPaint, which was the first mouse-based drawing program. 
  • Flash Memory - Flash memory, which can be quickly erased and written over several times was invented in a Toshiba lab.
  • PC Limited - Michael Dell dropped out of school to focus on a business where he built IBM-compatible computers from stock components. It soon became one of the most successful computer retailers in the world. 
  • The Internet - U.S. Internet protocols are improved by the formation of NSFNET, the last step in what would become the Internet. 
  • GSM Standard - Setting a standard for mobile networks, and introducing text messaging, the mobile revolution started in the late 1980s in Europe. 
  • Computer Fraud and Abuse Act - The result from Robert T. Morris sent a nondestructive worm through the new Internet causing major damage. He was tried and convicted and had to serve community service for hacking the Internet.
  • Macintosh Portable - It may not have sold well or been a success by any measure, but it did start computer manufacturers in their quest to build portable computers; something most users today completely appreciate. 

1990s

The 1990s saw a complete shift in the way that people used technology. Businesses, schools, and home users increased their use of computing technology and the growth of the Internet, which brought with it extreme prosperity followed by a crash that threatened the economies of some of the most technologically-savvy countries in the world. Here is a look at some of the technologies introduced in the 1990s.

  • High Performance Computing and Communication Act - The U.S. Congress created the National Information Infrastructure that spent nearly a billion dollars on various networking initiatives that were aimed at improving commercial and individual access to the Internet. 
  • NSF Lifts Internet Restrictions - Soon after the National Science Foundation (NSF), the entity that oversaw the modern Internet, removed its restrictions, giving businesses and individuals access to Internet-based materials. At this time the Internet service provider (ISP) is introduced as well.
  • JPEG - The JPEG compression standard for images was introduced. 
  • Solid State Drive - The first commercially available solid-state drive was introduced by SunDisk (today SanDisk).
  • Personal Data Assistant - Before there was Siri and the Google Assistant, there were devices that aimed to help people keep organized. Apple’s Newton and Palm’s Pilot are two examples of mobile computing platforms aimed to help users.
  • Intel Releases Pentium - Pentium was the fifth generation of the “x86” line of microprocessors. The new processors made programs run faster as multi-instructional computing became more necessary. 
  • Microsoft Windows NT - It was the first 32-bit version of Windows, making it a powerful option for IBM and IBM-compatible machines. 
  • Mosaic - The first true Internet browser, it had provided users a new level of access to Internet resources. 
  • The First Online Ads - As people started to join the “world wide web” en masse, online ads were a rare occurrence. As you know, today, the Internet is one large billboard.
  • CompactFlash - SanDisk introduced flash disks which were then incorporated into many consumer and professional electronic devices. 
  • Zip Disk - Understanding the need for more data storage, Iomega introduced the Zip Disk that provided users the ability to get 100MB of storage on a disk not much bigger than the standard 3.5-inch disks that had become standard. Over time Zip drives could store up to 2GB before the technology became antiquated.
  • Browser wars - Half of Mosaic's team broke off and started Netscape, while Microsoft used the source code of the Mosaic browser to create their Internet Explorer browser. The two browsers went head-to-head. Netscape thrived for a short time, but since IE was shipped with every Windows OS, it was hard for them to compete. Today, Microsoft has scrapped IE and features the Edge browser, while Netscape failed and became the basis for Mozilla’s Firefox browser that is still popular today. 
  • The ThinkPad 701C - Manufacturers had been trying to make a laptop computer for several years, but the ThinkPad 701 gave users a full desktop experience in a portable machine. 
  • Java - Sun Microsystems introduced Java, which let a program run on any system, opening up development for modern PCs from just the major players in computing. The language JavaScript was developed at the same time, but stands independently despite sharing the same handle. 
  • Online Services - AOL, Prodigy, and CompuServe had been the major players for much of the late ‘80s and early ‘90s, giving users a “walled garden” experience of the web, but with the development of Microsoft Network (MSN) it opened up the web much more to the end user.
  • Windows 95 - The first modern OS that focused on an Internet-connected experience. It also introduced the concept of plug and play, a great innovation for allowing peripherals to connect without having to initiate setup from a driver disk. 
  • CD-RW - An optical disk used for data storage and could be written and written over several hundred times; a feature not many people actually took advantage of.
  • Visual Studio - Programming new software became big business and essential to the sustainability of new web-based platforms. Visual Studio 97 helped push this along. 
  • Digital Millennium Copyright Act - A law passed by the U.S. congress that began to crack down on the sharing of copyrighted intellectual property over the Internet.
  • Wi-Fi - The establishment of Wi-Fi expanded the ability for computers to access networks and the Internet without wires.

2000s

As the millennium approached there were fears that the software developed wouldn’t work when the calendar changed. Millions of dollars were spent ensuring the world wouldn’t stop. After Y2K (as it was called), the 2000s would produce some of the most amazing technology the world had ever seen; and, would change the way people look at the world, forever. Let’s take a look at the list:

  • The Camera Phone - Japanese manufacturer SoftBank introduced the first cellular phone with a built-in camera. 
  • USB Flash Drive - The USB flash drive, jump drive, or memory stick was just a way for people to take data on the go, but it has turned out to be the basis of many other technologies as well. 
  • BitTorrent - A peer-to-peer file sharing service that allows users to upload and download files, typically media. It has seen controversy as lawyers of the music and movie industry have claimed that BitTorrent facilitates the theft of their clients’ intellectual property. 
  • iTunes - iTunes introduced the sale of new music through a digital medium. Unlike the peer-to-peer sharing, iTunes was set up as a store for music. 
  • Myspace - Myspace might not have been the first or the largest social network, but it was the most important in the early 2000s. Facebook soon entered the market and is now one of the world’s most important and divisive companies. 
  • Google - Google’s IPO was a seminal moment for the Internet as we know it. Already a popular search engine, Google cracked the code for how to monetize search results online. Today, it is one of the largest, and most lucrative companies in all of tech.
  • AWS Cloud Services - The retail giant Amazon launched its Amazon Web Services providing companies the computing hardware they need in the cloud. Services like Google Cloud and Microsoft Azure followed. 
  • Netflix - A streaming movie service that has changed the way people look at media. 
  • Apple iPhone - In what was one of the most important technology inventions in decades, Apple released the iPhone, which may have not been the first smartphone, but it sure seems like it was.
  • Bitcoin - The first cryptocurrency was the result of a blockchain created by a person (or people) that goes/go by the pseudonym Satoshi Nakamoto. Releasing the source code as open-source software has resulted in thousands of other cryptocurrencies, as well as many innovations using the blockchain ledger technology.
  • BDR - Before backup and disaster recovery, there was mostly tape. When the cloud-based network-attached storage solutions came to be, businesses had a better solution to protect their data. 

2010s

The more that technology was innovated upon, the less was going into developing new technology. After the launch of the iPhone, there was a definite trend in the way that people began to look at their tech. If it wasn’t mobile or simple to use, it had no function. Let’s take a look at how those ideas came to pass in the 2010s:

  • IBM’s Watson - The world was introduced to Watson when the AI defeated some of the very best humans at Jeopardy! Unfortunately, that is the end of lots of people’s exposure to Watson. Watson has subsequently been used in several fields to improve efficiency, education, cooperation and more. 
  • Apple iPad - Just as they did with the iPhone, a few years later Apple introduced the iPad. The tablet computer that was completely touchscreen and used the same App store found on the iPhone was the beginning of one of the largest consumer electronics booms since the advent of the TV. 
  • Adobe Creative Cloud - Just as Amazon Web Services and Azure provide virtual hardware services, Software as a Service (SaaS) started to expand rapidly at the beginning of the last decade. One title (of the many) was Adobe Creative Cloud, which gives users access to all the creative Adobe software through a monthly subscription service. 
  • Arab Spring Protests - For the first time in human history, social media became the center of a series of organized protests that resulted in regime change, election transparency, and more. 
  • Spotify - A music streaming service competes directly with other streaming services like Google Play Music, iTunes, and more. This Netflix-style model is proving to be a huge selling point for users.
  • The Internet of Things - Smart devices started popping up quickly and with exponential growth now find themselves almost everywhere. 
  • Virtual Assistants - Using AI, the development of Apple’s Siri, Microsoft’s Cortana, Amazon’s Alexa, and Google’s Google Assistant have started integrating technology into moment-to-moment situations.
  • Ransomware - A devastating strain of malware that locks down a user’s files and demands a ransom payment. It has affected millions of users, thousands of businesses, and some municipalities.
  • Net Neutrality and Its Repeal - Trying to find an equitable arrangement on who controls the Internet has been nothing but contentious over the past decade. As it stands today the ISPs hold the power, but for much of the past decade the FCC did. Stay tuned.

Technology has come a long way in the past 50 years, and it will be interesting to see where it goes in the next 50. Is there anything we missed? If so, share it with us in the comments section below. Happy New Year! 

0 Comments
Continue reading

Taking a Look at a Manufacturer’s IT

Manufacturing products is still a major part of the western economies; and, like other businesses, manufacturers are using information technology to fuel and manage their supply chains and business processes. We’ll take a short look at what IT manufacturers use, and how it helps them forge their business ahead.


The Production Labyrinth

The process of creating products can be quite the maze. If you make the right decisions, operations can go smoothly, but if you take the wrong turns, you could be facing a no-win situation. The use of IT can help navigate the modern manufacturer to a successful end more than it will lead them nowhere, but they need to know where to start.

For the modern manufacturer, IT begins as the supply chain starts, during the process of procurement. In order to produce the product, you plan to sell, you need to procure the resources needed to make that product. Since all these resources tend to come from separate places, and are often made by other manufacturers, getting the resources you need to keep production moving consistently is important for the effectiveness of the operation.

The most cost intensive part of running any manufacturer is the actual production end... largely because of the capital costs of purchasing the machinery needed to manufacture goods coupled with the operational costs (payroll and downtime caused by machinery malfunction and the subsequent maintenance required) add up. As a result, most manufacturers are looking to mitigate wasting capital by instituting some type of IT. With IT comes automation. Enhancements in automation make it possible for businesses to cut their production costs, making them more predictable, and creating a state of efficiency.

Distribution of the finished product is the final step for a manufacturer. If costs in this part of the business get too high, it can put a definite squeeze on the potential of the business and create major problems in its ability to offer products at a low-enough price point where retail businesses and other customers will continue to purchase their products.

Where IT Fits

Fortunately for the small to medium-sized manufacturers, there are now problem-solving technology solutions that can reduce downtime, enhance efficiency, and promote revenue growth. A few of these technologies include:

  • Asset Tracking - Using sensors, every product and resource can be tracked to provide efficiency.
  • Customer Relationship Management - This software helps a company streamline their customer service. It’s used to manage leads, opportunities, and customers.
  • Inventory Management - Manages stock and standardizes and allows for automation in the act of replenishment.
  • Supply Chain Management - This software helps a company control their entire supply chain from procurement to distribution.

Enterprise Resource Planning

Each of the processes can be implemented on its own and be of great benefit for the modern manufacturer. If you are looking for an all-in-one solution for your manufacturer’s management, there is a software called Enterprise Resource Planning (ERP). An ERP solution allows for each division of a manufacturer to be managed by one single piece of software that not only works to automate parts of the business, it also allows administrators from different departments to know exactly what to expect. Outfitting your organization with an ERP promotes overall business efficiency, getting your products to market faster, creating better revenue generation and enhancing customer satisfaction.

If you are searching for a way to make your manufacturing business more effective at getting products to market, MSPNetworks has some options for you. Call our professional consultants today at (516) 403-9001 to learn more about how an ERP solution can improve your business.

0 Comments
Continue reading

Tech Term: What are All These “-Wares?”

When you’re talking about something to do with a computer, you’re going to start hearing about some word that ends with “-ware.” You could probably list off a few yourself, but have you ever stopped to think about why they’re all described as “something-ware?” For this week’s Tech Term, we’ll take a peek at why we refer to things that way.


Why ‘Ware?’
It does seem like a strange part of the word, unless you look back to where we get it. According to Wiktionary, Software was first coined as a term in 1953, and was named based upon the fact that the term for the physical elements of the computer were already known as hardware. A quick peek into the online Merriam-Webster dictionary gives us a few definitions for the root of that word, ware.

The ones we’re concerned with are the first and the last definitions in the first entry: “manufactured articles, products of art or craft,” and “an intangible item (such as a service or ability) that is a marketable commodity.” We can combine these to give us a fair representation of what soft-’ware’ means: “manufactured articles to provide a service that is marketable.” After all, what is a computer program, if not an assortment of code meant to complete a specific task desired by a specific audience?

The word was first coined by Paul Niquette in 1953.

Different Software ‘Wares’
As you may imagine, there are plenty of varieties of ‘wares.’ Wiktionary.org offers a pretty impressive list of software types, with names derived from ‘-ware’, including the ones that you’ve already heard about, and some that are minutely specific. We’ll go over a few of these lesser-known varieties here:

Dreamware - This software type covers those that have not yet begun development and are still in the “what if there was a software that…” phase. Many of these projects never begin development, remaining something that some software developer once dreamt up.

Trialware - This variety of software is that which is only available to the user for a limited period of time, after which it is only available in a restricted form (if at all). This can be considered the free sample of software, offering just enough to make you want more.

Crapware - You know how a new computer often comes pre-installed with programs that you have no interest in, let alone the need for? This is what is known as crapware, as it takes up space without really offering anything to you. Another four-letter synonym for ‘crap’ can also be combined with “-ware” to make another, more forceful term for this variety.

Foistware - Malware can often come bundled with other, more legitimate software titles, to be installed without the user knowing. Of course, other programs can do this as well. Foistware is the term given to these software stowaways.

Fanware - Professionals aren’t the only ones capable of writing code, and even professionals will continue their coding in their off hours. Fanware describes the products that special-interest coders write to promote that interest.

Nagware - Another version of trialware, nagware describes a software title that will interrupt a user with persistent reminders to register it. Nagware will often disable the use of the program for short intervals during use, or display pop-up dialog boxes. In essence, this kind of trialware is designed to coerce a user into purchasing the full version through annoyance.

Garageware - This is a not-so-nice term for software that simply doesn’t perform as it should or has a lot of mistakes. The name is meant to suggest that the creators were total amateurs, developing this program literally in their garage.

Again, this is just a short list of the many different software varieties out there. What other ones have you heard of? Share them in the comments!

0 Comments
Continue reading

Customer Login

News & Updates

MSPNetworks is proud to announce the launch of our new website at www.mspnetworks.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact Us

Learn more about what MSPNetworks can do for your business.

MSPNetworks
1111 Broadhollow Rd Suite 202
Farmingdale, New York 11735