Blogs

Office 365 Users — The Latest Phishing Scam is Targeting YOU.

Do you use Microsoft’s widely used Office 365 software? You should be on high alert or you might be the victim of the latest phishing campaign circulating around the web. 

Outsmart Cyber Creeps With Windows 10

The threat landscape has evolved significantly in recent years. It feels like every day we read another headline about an organization getting breached. With the average cost of a data breach totaling $3,500,000, enterprises need a security solution they can rely on.

The Migration Path for Toshiba Phone Customers After End of Technical Support.

“We regret to inform you, that as part of its continuing global restructuring, Toshiba Corporation has deemed it necessary to wind-down our Telecommunications Systems Division (TSD) business starting immediately.” -email received by Toshiba Dealers (March 2017) Toshiba had been a formidable force in the Telecommunications Customer Provided Equipment(CPE) market since 1969 when it became legal […]

Is Your Office 365 Account Leaving You Vulnerable? Check Your O365 Configurations

Organizations have been rapidly adopting cloud technologies and implementing organizational cloud strategies. Increasingly, these organizations are using third-party services to migrate their email services to Office 365 and other cloud services. Unfortunately, many companies that utilized a third-party for their cloud migration find themselves with configurations that reduced their security posture. If you’ve moved to […]

SMiShing: Your Guide to SMS Phishing

By now, you’re well aware of phishing and the threat it presents. You probably even think twice before clicking a link sent to you by a stranger. But, just as you’ve gotten familiar with the latest cyber threat, a new threat emerges. SMiShing.

[Case Study] The True Costs of the Atlanta Ransomware Attack

Ransomware attacks continue to be a regular cause of business interruption. While most attacks don’t make it into the news, you may remember the Atlanta ransomware attack that gripped headlines in 2018.

5 Cybersecurity Tips That Will Prevent Expensive Downtime

If you know how costly downtime is for your organization but you’re not sure how you can implement downtime defenses, you’ve come to the right place. Learn five actionable cybersecurity tips that will prevent downtime for your organization. We initially developed these tips for the manufacturing sector because they have the most to lose from […]

Backups 201: Intelligent Business Continuity Takes IT One Step Further

Implementing a backup solution is a good first step towards keeping your organization productive and avoiding costly downtime. But, not all backups are made the same.

Backups 101: Introduction to Intelligent Business Continuity

If you’ve been backing up to tape and manually testing your backups, it’s time to consider a cloud backup solution. Traditional backups are okay, but they have their limitations. For true protection, take your backups to the next level with intelligent business continuity.

The Limitations of Traditional Backup

You likely have some form of backup in place at your organization. Maybe you’re using external hard drives, USB drives, or backup with tape. These are okay options if the alternative is not having any backup in place, but these solutions have limitations that can be quite costly.

Backup Office 365: The 7 Things You Must Know

If your office is moving to a new location and you need to box up items, you might think about a do-it-yourself approach, which could save you money. When you need to backup your Office 365 data, a do-it-yourself approach is not a good idea.

Call Center Agent Success: Cultivating Super Agents

The nature of work is undergoing rapid changes brought on by evolving technologies and the entrance of generation z into the workforce. How will these changes affect your call center? Is your call center positioned to be a disruptor or be disrupted by these changes?

Verizon Customers – A New Phishing Scam Is Targeting Your Mobile Device

Security researchers at Lookout have discovered a sophisticated, new phishing campaign that is targeting Verizon Wireless customers on their mobile devices. This phishing kit is different from other phishing kits and demonstrates a new level of sophistication in two ways. First, phishing kits that target mobile devices aren’t very common. The Verizon phishing scam shows […]

New York’s Capital Has Been Hit With Ransomware

Albany, NY has been struck with ransomware. New York’s capital city is the latest ransomware victim in headlines, just weeks after a new strain of ransomware dubbed LockerGoga, crippled Norsk Hydro, one of the worlds largest aluminum manufacturers (not to be confused with Norsk Titanium in Plattsburgh, NY).

Defense in Depth: The Secret to a Successful Security Strategy

For better or worse the digital transformation has changed the way we live and work. While the digital age has improved our productivity and connectedness, it has also opened up new avenues for attackers to steal from us, and spy on us. To combat modern-day threats like targeted ransomware and social engineering, we must look […]

Contact Center Technology: 4 Ways Contact Center as a Service Puts You Ahead of The Competition

Cloud-based technology is bringing big changes to every business and contact centers are no exception. Today, Contact Center as a Service (CCaaS) is displacing old technology like on-premise ACD’s.

What is Vishing? Your Guide to Voice Phishing

Anyone who grew up in the days of landline phones and star 67 knows that manipulating people over the phone is a time tested source of entertainment for bored kids. However, sometimes those kids grow up and continue to deceive people over the phone, using their skills to scam organizations and individuals.

Antivirus Software & Endpoint Protection: How to Secure Your Network

It’s less likely that you will be infected with a simple computer virus in 2019. Today’s malware focuses on generating money for the hacker, and there isn’t much money to be made in spreading traditional computer viruses. The odds are that you will be hit with ransomware, trojans that steal your data, or a bot that […]

Intrusion Prevention System (IPS) vs Intrusion Detection System (IDS)

A firewall is often overlooked when thinking about your normal business operations, but that little box handles many critical processes, especially at the perimeter of your organization.

Call Center Analytics: Metrics for Success With Contact Center Technology

Call centers adopting new technology such as contact center AI assistance, chatbots, and automation require new metrics and a fresh approach to measuring the success, efficiency, and productivity enhancements provided by technology.

Firewalls 101: What They Are & How They Work

Traditional firewalls block incoming traffic based on the kind of traffic it is. Firewalls have been the first line of defense in network security for nearly three decades.  They can come in many different types including traditional, next-generation, hardware, or software. With thirty years of technology changes and so many different firewall forms, it can be […]

Email Security Best Practices: Solutions to Secure Your Inbox

Email has made workplace communication efficient and convenient for everyone. While this has boosted the productivity of workers, it has also made hackers jobs easier.

Patching Vulnerabilities: Your Guide to Patch Management

Over sixty percent of small businesses fall victim to hacking each year, and unpatched software is the leading cause of computers getting exploited. Patch management is an integral part of network security as it protects your operating system and applications from malicious attacks that exploit vulnerabilities in unpatched software.

Recognizing Social Engineering: 11 Tips to Identify an Attack

Social engineering is essentially the hacking of a human. These exploits have a long history that predates the rise of the internet and even computers. They remain relevant in today’s tech-driven world because it is much easier to hack a human than it is to hack into software or hardware. This post dives into what […]

Should You Move Your Communications to the Cloud? [Infographic]

Cloud, hybrid and on-premise voice communications solutions each have their great features. Not every solution is right for every organization though, and there are things to consider when your organization is looking at upgrading your current phone system. Choosing a voice platform can be a daunting task for organizations of all sizes.

Vermont Health Network Hit With Email Account Breach

The latest example of a compromised username and password resulting in a massive data breach hits Northern NY town, Elizabethtown.

Optimize Your Call Center Queue, Adopt a Call Center in the Cloud

Do your customers get stuck waiting in long call queues due to your high call volumes? Does your queue depth consistently respond with QFULL? Are you spending too much when  Erlang C overestimates your staff requirements?

10 Cybersecurity New Years Resolutions for 2019 [Infographic]

Cyber threats are increasing as the years go on. Here are 10 cybersecurity resolutions you can accomplish in 2019 to protect your hard-earned business.

Child Identity Fraud: Keeping Your Kids Protected From Identity Theft

Pack their lunch, drop them off at school, check their credit history. That’s just one more thing responsible parents need to do to keep their kids safe. With identity fraud crimes reaching record highs, a worrying trend is emerging of data thieves who steal the social security numbers of minors and then open credit cards, […]

Third-Party Websites: what are they and how do they expose your passwords?

If you turn on the news, chances are they will be reporting on the latest big breach of a website, database, or company. Unfortunately, breaches are commonplace today. Occurring through phishing emails, third-party website breaches, and the issues associated with poor security practices in storing user data (but that’s another lengthy conversation for another time). 

UCaaS Solutions: Is UCaaS an Advantage for Your Business?

What is UCaaS? Unified Communications as a Service (UCaaS) presents a simple, secure, and cost-effective means of collaboration and communication for the modern workplace. UCaaS is a communications solution adapted for the internet age. Yes, you’ll still have the phone on your desk, but UCaaS adds cutting-edge software for desktops and mobile applications on top […]

Digital Transformation 101: Bringing Your Phone System into the 21st Century

What is the Digital Transformation? The digital transformation is how organizations use technology to boost performance and transform organizational activities and processes – has brought a rapid pace of change in IT and communications technologies.

NIST and DFARS Compliance 101: What You Need to Know

You only need to tune into the news for a short time to understand that hostile governments are doing everything they can to steal valuable information anywhere they can get it. Of particular risk to our national security are sensitive defense related secrets. However, the Department of Defense has identified that it’s not just information marked by […]

The NIST Cybersecurity Framework Core (Part 1 of 3)

The NIST cybersecurity framework is comprised of three main components:

The NIST Cybersecurity Framework Profiles: (Part 3 of 3)

The NIST cybersecurity framework is comprised of three main components:

Everything You’ll Ever Want to Know About NIST

The National Institute of Standards and Technology (NIST) has been advancing science, technology, and public-private adoption of the latest tools and procedures for over a century. Here we’ll explore everything you’ve ever wanted to know about the organization. 

Your Guide to Enterprise Grade VPNs

What is a Virtual Private Network (VPN)? Virtual Private Networking (VPN) is an encryption based method used to ensure that your web browsing traffic, network transactions, and emails, remain confidential.  If you’re not using a VPN cyber voyeurs can intercept your data to use and abuse for their own purposes. VPNs are an essential tool to block unwanted eyes […]

Dunkin’ Data Breach Highlights Third-Party Risks

DD Perks account holders found themselves the victims of a security breach that exposed their personal information.

4 Online Shopping Safety Tips Bound To Keep You Protected This Cyber Monday

The madness of crowds on Black Friday has many consumers opting to stay home and do their deal hunting from the comfort of their living room on Cyber Monday. While we can’t keep you safe from stampeding crowds, we can help keep your safe from hackers. via GIPHY With the shopping season upon us, and […]

Crime as a Service: This Is What Professionals Do

Hackers are bundling up this fall as they seek to freeze your data. A collection of 2018’s most potent strains of ransomware is making the rounds in a bundle deal on the dark web.

A Privacy Focused Search Engine is Perfect for Executives

As tech titans like Google and Facebook continuously make headlines for user privacy violations, it’s no surprise that a pro-privacy company like DuckDuckGo would thrive in this environment. DuckDuckGo is a search engine that takes an aggressive position against tracking people online, emphasizes protecting searchers privacy, and avoiding filter bubbles that result from the personalized […]

Top 4 Quotes from Albany Business Reviews’ Table of Experts: Data Theft

Recently, Twinstate Technologies’ Devi Momot sat down with three other Data Theft Experts at the Albany Business Review, in Albany, New York. The round table discussion regarding Data Theft was engaging, educational, and fun.

Understanding HB1612  – A Guide For New Hampshire Schools

What is New Hampshire HB1612? In an effort to improve data security in New Hampshire schools, House Bill 1612 was introduced to the House in November 2017 by representative Glenn Cordelli and signed by governor Sununu on June 18, 2018.

What Can DerbyCon Teach You About Social Engineering?

Recently I had the opportunity to attend DerbyCon 2018 in Louisville, Kentucky. As a new member of the Information Services Advisory Team (ISAT) at Twinstate Technologies, this was a new experience, and one that was unique, to say the least.

What is Primary Rate Interface (PRI)?

Primary Rate Interface is used in the telecommunications industry to send voice and data transmissions over the Integrated Services Digital Network (ISDN). ISDN gives you better call quality and enables the transmission of data by making use of packet switched networks.

What is SIP Trunking?

Session Initiation Protocol (SIP) is a protocol used to create and terminate real-time sessions between two or more parties over an IP network. SIP sessions can involve the transmission of multimedia including video, voice, or other communications but are often used to deliver phone calls over the internet, commonly referred to as Voice over IP […]

New Phishing Attack Uses Decoy PDF to Scalp Credentials at Colorado Law Firm

Recently, A PDF decoy was used in stealing credentials from a Denver based law firm. This phishing attack was made possible by use of Azure blob storage that contained a Microsoft-issued domain and SSL certificate.

Norwich University Tackles the Cybersecurity Skills Gap

The fastest growing crime in the United States is cyber theft. As data breaches and hacks continue to advance in complexity and frequency, companies are scrambling to hire workers with the right cybersecurity skills to keep their businesses secure. A lack of qualified job seekers makes finding the right talent an arduous task that often […]

Quick Guide to Purchasing A Unified Communications Solution

Customers today are inundated with opinions about what technology is best for their business and also how they should purchase that technology. All businesses are different, and so it is important to consider what they need for communications tools and what makes the most sense from a financial aspect.

Six Ways to Prevent Ransomware at Your Business

Ransomware is becoming one of the more common types of malware and  its prevalence is growing fast. With sanctions taking their toll on the Iranian economy, Iranian hackers have ramped up their development and deployment of ransomware to make a quick dollar online.  Rather than targeting one high-value organization for a single large payout, ransomware attacks often […]

How Stop Identity Theft Using Your Credit Reports

A prominent Colchester, VT business was recently the victim of a ransomware attack that resulted in their customer names, addresses, and other personally identifiable information being stolen by hackers. The Vermont based company, had nearly a decade worth of sales information siphoned off in the attack. 

Fix Your WiFi That Sucks With Your Cell Phone

Do you question why your APs are able to broadcast on the 5Ghz band, yet you don’t see the performance difference that you may have been promised? 5Ghz is indeed a better frequency band to be on. It has more space in its spectrum with less interference and the AP radios support higher throughput capacities […]

Fix Your WiFi That Sucks With Your Cell Phone

Do you question why your APs are able to broadcast on the 5Ghz band, yet you don’t see the performance difference that you may have been promised? 5Ghz is indeed a better frequency band to be on. It has more space in its spectrum with less interference and the AP radios support higher throughput capacities […]

Mitel’s Second Quarter Magic

Its been a booming quarter for Mitel. The Ottawa based company secured valuable new contracts, grew revenues, and for the fifth consecutive year was named a Unified Communications Leader by Gartner. Mitel’s evolving portfolio continues to make them a strong competitor in the unified communications market. Mitel delivers a comprehensive set of UCaaS, collaboration, and […]

Electoral Cybersecurity: Hackers Put Voting Equipment to the Test

Electoral cybersecurity started to receive nationwide interest after the 2016 election when hackers working for the Russian government launched a targeted influence campaign on Facebook and broke into systems at the Democratic National Committee.

President Trump Puts US Cybersecurity on the Offensive with Reversal of Obama-era Directive

On Wednesday, President Trump signed an order to reverse an Obama-era memorandum, dictating the U.S. governments use of cyberweapons. By reversing the rules outlined in the classified memorandum known as Presidential Policy Directive 20, President Trump is making it easier for U.S. Cyber Command to deploy cyberweapons and interfere with adversarial cyberattacks on the United […]

Producing and Protecting Manufacturing Technology with NIST MEP

Manufacturers are the back bone of our economy.  For three decades the National Institute of Standards and Technology (NIST) and the Manufacturers Extension Partnership (MEP) have been focused on improving competitiveness by creating efficiencies and output for small and medium sized manufacturers in the United States. Since 1988 the NIST MEP program has helped produce […]

Are You Being Sold on the Dark Web?

You may have seen a lot of buzz around something called the dark web recently, with the recent leaks of classified documents regarding the Air Force drone program, the first ever national level bust of underground vendors selling various illegal contraband, and a large data breach that exposed over 230 million American’s basic Personal Identifiable […]

GE Engineer Charged in Elaborate Theft of Trade Secrets

UPDATE: April 23, 2019An indictment unsealed today, charges Xiaoqing Zheng, of Niskayuna, New York, and Zhaoxi Zhang, of Liaoning Province, China, with economic espionage and conspiring to steal General Electric’s (GE’s) trade secrets surrounding turbine technologies. It is alleged that their efforts were intended to benefit the People’s Republic of China, the Malaysian Armed Forces Fund […]

Your Complete Guide to an Easy Cloud Migration

Cloud computing brings a multitude of benefits to an organization. From simplified operations to cost-savings, there’s reasons for everyone from your CFO to your IT Manager to celebrate modernized infrastructure. The modernization of infrastructure means the whole IT environment needs to be virtualized. This means compute, storage, networking and management for operations.

Weighing the Pros and Cons: On-premise vs Cloud Communications

One of the biggest decisions our clients face when considering a new unified communications solution is choosing between Hosted and Premise Based products. Over the last five years we have seen the shift in interest towards hosted/cloud based IT solutions and in the natural course of things voice and unified communications have followed suit.

Is Unified Communications The Key to Unlocking Productivity Gains?

Businesses often unlock productivity gains by spending money on new tools and technologies. Unified Communications tools are one investment that boosts productivity while reducing your costs. How Team Collaboration Drives Results With the right collaboration tools, your business can realize the benefits of increased productivity from a Unified Communications and Collaboration Platform. Benefits include: My introduction […]

DattoCon ’18: Machine Learning, Managed Power, GDPR, & BCDR

Last week Twinstate’s Cybersecurity Analyst, Ashton Momot and Unified Defense Strategies Technical Manager, Alex Insley had the opportunity to visit Austin, Texas for the DattoCon 2018 conference. While the majority of the conference is focused on how Managed Service Providers (MSPs) operate, there was a lot of focus on products and technology that the average […]

How to Fend Off Outages Using Diverse Routing

A recent storm in New Hampshire caused thousands to lose power and resulted in the third major phone outage of the month. If you depend on stable communications, in good weather and bad, it’s time to consider implementing backup and redundancy plans for your businesses phone system.

Four Simple Steps to Make Better Password Combinations

It goes without saying that the Internet is part of our daily lives whether at home, at school, or at work. While the resources we access in each of those aspects of our lives might be different, they all have one feature in common: passwords. A password is literally the string of characters that controls […]

7 Tips for CPAs on Client Information from a Service Provider’s View

CPA’s and bookkeepers are entrusted with confidential information by their clients. In the wrong hands, this information can be of value to someone else. It has been estimated that a full online identity can bring in $1,300 on the dark web, the more pieces of your clients’ information, the more value to crooks. So, even […]

Cybercrime from CEO Fraud

The good news is we just landed a large, successful customer. The bad news is they were a victim of a cybersecurity breach. This one was fairly simple and fairly common. It’s called the “Bogus Boss” email scam. The FBI also calls it “CEO Fraud” According to their website, the scam starts like this:  

The Microsoft Cloud – 5 Things to Know About Office 365

Microsoft’s Office 365 platform is becoming the cloud service of choice for hosted Exchange at businesses of all sizes. Here are 5 important things you may not have known about this popular service. Microsoft does not protect your email Office 365 isn’t just about email Office 365 can help you become compliant Perpetual licenses are […]

Twinstate Technologies Celebrates 50 Years of Making Business Better

MORRISONVILLE, N.Y., Feb. 27, 2018 – Established in 1968, 2018 marks the 50th Anniversary for heritage brand Twinstate Technologies®, a business telephone system, VoIP, unified communications, IT, network security and infrastructure solutions provider. This milestone year not only commemorates the company’s 50 years in business, but it also celebrates its customers and the company’s commitment […]

Introduction to NIST and the NIST Cybersecurity Framework

In the world of cybersecurity, the only constant is the quickly-changing environment. With this rapid pace, threat vectors change, and so too must the industry best practices that are used to protect against them. Documentation in the world of cybersecurity is often behind and outdated, as trends usually change quicker than documents are able to […]

Twinstate Technologies Celebrates 50 Years

As we enter 2018, Twinstate Technologies is preparing to celebrate its 50th Anniversary. Looking back on the past half-century, we see what was once a small company started in a chicken coop and laundry room by founders Chuck Currier and Dulcie Sherman (pictured here) in 1968 has now grown into a competitive technology company serving […]

Twinstate and FirstLight Fiber To Offer Collaborative Solutions

COLCHESTER, V.T., – Jan. 12th, 2017 – As a benefit to offer collaborative solutions to customers all over the Northeast Region, Twinstate Technologies® has partnered with FirstLight Fiber out of Albany, New York to broaden products and services.

What is GDPR and What Does It Mean for Businesses?

May 25, 2018 may seem like it’s far enough away, but if you’re a business that will need to be compliant with the EU General Data Protection Regulation (GDPR), you don’t have much time left to adhere to laws.

Spectre and Meltdown Kernel Memory Leak Vulnerability

A flaw in most computer processors has been discovered that leaves systems vulnerable to attack. The kernel memory leak vulnerability allows access to the operating system’s protected memory. With this vulnerability, any information that is being handled in memory can be siphoned from the affected system. This can include passwords, database security keys, and any […]

Twinstate Brings Collaborative Solutions to Vermont School District

ESSEX JUNCTION, V.T., Dec. 29, 2017 – Twinstate Technologies® has long been proud to partner with educational institutions throughout the Northeast – not only to provide excellent service but to also demonstrate how vital quality technology is to ensure functionality of K-12 and higher education organizations. In 2017, Twinstate Technologies played an instrumental role in […]

Twinstate Speaks at Malone NY Technical Symposium

Twinstate Technologies’ Alex Insley, Unified Defense Strategies (UDS) Technical Manager, will be participating in the first Malone Technical Symposium in Malone, NY), an event hosted by Westelcom on Tuesday, December 19th at the Holiday Inn Express.

Download Free Ransomware Whitepaper by Twinstate and Sophos

Cyber attacks, and more specifically ransomware attacks, are on the rise. We hear in the news daily of an attack happening on businesses, individuals and government agencies. Today, there is no excuse not to be well aware and prepared for an attack. Prevention is the key.

Webinar Download: Surviving Ransomware, Don’t Get it.

On Thursday, December 14th, from 12:30 to 1:30 pm, Twinstate Technologies hosted the webinar “Surviving Ransomware: Don’t Get It in the First Place.” With ransomware predictions for 2018 expected to worsen and ransomware being one of the most sophisticated, effective and frequent attack vectors, everyone must be prepared; 2019 doesn’t look much different.

Twinstate Partners with Ruckus Wireless to Bring Next-Gen Solutions

MORRISONVILLE, N.Y., Oct. 17th, 2017 – Twinstate Technologies® is proud to announce our newest partnership with Ruckus Wireless, an industry leader in delivering best-in-breed technology in access points to customers worldwide.

How to Stop Bad Rabbit Through Cyber Awareness

On Tuesday, October 24th, “Bad Rabbit,” the latest ransomware worm started in Russia and Ukraine spread to the Middle East, Asia, other parts of Europe and the United States. So, what is this new virus spreading like wildfire and how are IT professionals planning on tackling the ransomware?

5 Reasons Why Business Continuity Needs to Be In Your Security Stack

Your security stack has several important elements such as a next-generation firewall or endpoint security. When all the others fail, a solid business continuity platform is going to get you back on your feet. Learn the top five reasons why business continuity needs to be in your security stack.

Twinstate Technologies: Upcoming Events and Causes in Plattsburgh

Summer might be over, but that doesn’t mean that our schedules and events are cooling down! See what Twinstate has planned for this month.   

Twinstate Technologies, Taylor Rental Team Up for a Local Cause

Ever wonder how you can make a big impact in your community? Well, Twinstate Technologies® has the answer you’ve been waiting for! Join Twinstate on Friday, October 20th from 11 am to 2 pm alongside our friends at Taylor Rental on Route 3 in Plattsburgh for a local blood drive.

Twinstate Success Stories: Twinstate Helps Village of Massena, NY

As technology advances, naturally, software, systems, and devices need to update with the times or be replaced with newer models. This was the case with the Village of Massena when Lisa Tyo, Account Clerk for the Village of Massena, realized that the municipality was depending on two servers that were old and outdated for all […]

Getting Your First Job: What New Grads Should Know

So, you’re a Computer Science major fresh out of college. You’ve walked the stage, they’ve mailed you your diploma, and you have no idea what to do next. You’ve sent your resume out a few times, but to no avail, the radio silence or the stream of rejection is deafening, and your motivation is now […]

Why Cloud Backup Should Be a Part of Your Contingency Plan

Unless you’ve isolated yourself from the world, I’m sure you have seen the news feeds on the hurricanes and the damage they are causing. These disasters bring up the perfect opportunity to discuss cloud backup solutions and the importance of your business continuity plans when faced with these conditions.

Twinstate Success Stories: Twinstate Helps Morrisonville, NY Business

Large or small, privately owned or corporate, ransomware isn’t picky. This point never became more of a reality for Morrisonville’s Tony Searing, Franchise Owner of Hospitality Recruiters of New York, LLC, than in May 2017. What started out as an average day fulfilling placements and vetting candidates turned into havoc when Tony’s network was hit […]

Twinstate Success Stories: Twinstate Helps Village of Potsdam, NY

Ensuring that a town operates smoothly requires a lot of moving parts. Balancing the needs of different departments whose sole purpose is to function for the people living there is key. The same goes for the Village of Potsdam who was in need of a new security and IT partner. They looked to Twinstate Techonologies […]

Mitel Takes the Lead in UC Cloud Communications

This month, Gartner released its annual Magic Quadrant for Unified Communications (UC) Report. Mitel and Microsoft, Twinstate Technologies® partners, and Cisco ranked in the “Leaders” category for enterprise UC, excelling in vision and execution.

Disaster Recovery and Business Continuity for IT

Businesses are relying on technology more and more every day, which is great when business is as usual. However, what happens when your business operations cease to a grinding halt due to an event? Your business continuity planning should kick in. If your leaders planned accordingly, your operations should resume, maybe with some extra steps and […]

DEF CON 25: Hackers Want Your Things

With the advent of IoT devices in every home and business, from networked garage doors to luxury home environments available from your mobile phone, hackers both good and bad have started chanting another motto. Hack The Planet! has become Hack All The Things! Def Con 25, an annual hacker conference and largest of its kind in the world, […]

Twinstate Technologies Sponsors Blood Drive, Lunch (8/21)

This Monday, August 21st, from 11 am to 2 pm, Twinstate Technologies will be hosting a blood drive at its headquarters (291 Rand Hill Road in Morrisonville, NY) to sponsor the North Country Regional Blood Center, which is currently experiencing a blood supply shortage. Those who donate will enjoy a picnic-style lunch on us. What a […]

Def Con From a Twinstater’s Perspective

I have always been interested in the offensive security field and its benefits to businesses and people. I believe that sometimes, people don’t understand a threat unless it has directly affected them or someone they know. I was recently promoted to the position of Cyber Security Specialist at Twinstate Technologies®, but more notably, am known […]

Twinstate Technologies and Champlain National Bank: Teaming Up for the Community

As part of their regular event series, Champlain National Bank enlisted the help of Twinstate Technologies to host “Learn to Protect Yourself Online.” The event kicked-off on Wednesday, August 9th after hours at Champlain National Bank’s Route 3 location in Plattsburgh.

Ransomware as a Service (RaaS): Attacks for the Non-Technical

When you think of ransomware, you probably think of the people behind these malicious exploits to be basement-dwelling, hoodie-toting, socially-reclusive hackers. Or maybe you think of big bad cybercriminals within an anonymous organized crime network. But the truth of the matter is ransomware is not as elusive and complex as you may have believed. It […]

With Recent ShoreTel Merger Agreement, Mitel’s Future Looks Golden

Mitel’s recent merger agreement with ShoreTel is paving a path to accelerated growth for Mitel, putting the Com giant in second place in the UCaaS space. Twinstate Technologies®, a Mitel partner, weighs in.

MSPs Aren’t Here to Replace; They’re Here to Elevate

So, you’ve been in the business awhile with a company you’ve dedicated the latter half of your career to. You know the network inside out and every name and face on it. You have patiently – and maybe not so patiently – solved the plethora of problems your network’s end users have presented to you. […]

Wireless Network Configuration Tips for Your Business

Slow Wi-Fi bringing you down? Check these settings to see if your wireless network is misconfigured. Too many or too few access points If you have too many access points (especially ones that live on the same channel), your access points will constantly be interfering with one another. On the flip side, if you don’t […]

On the Road Again with the Twinstate Team

As summer continues, Twinsate Technologies is sending representatives to yet another cyber-related event, this time at Ceasars Palace in Las Vegas. Def Con which started in 1993 is a conference created out of love for hacking. IT professionals, ethical hackers, and hobbyists alike flock to Def Con each year.

Countdown to Webinar: Traditional Backup vs. Business Continuity

The third installment of our webinar series, “Traditional Backup vs. Business Continuity,” is a topic that often gets forgotten. We’ve all experienced a computer glitch, but what happens if that glitch causes your business to lose all of its data. What if there is a fire or a flood? What if a ransomware attack hit […]

NYDFS and Finding Your CISO

With cyber policies tightening up by the New York State Department of Financial Services (NYDFS), we created an overview of what these new regulations will look like to companies who fall into this category. Though as a whole, laws and regulations are becoming stricter for businesses across all industries due to high-targeted cyber threats; the […]

What to Pursue as a Computer Security Student

As a double major, SUNY Plattsburgh student in both computer security and management information systems, going into my last year of college, there are so many things I’d like to go back and do over. Things I’d like to tell my freshman self that would have made a real difference in the path I took […]

Wrapping Up the First Annual ANYCon

Held in Albany on June 16th and 17th, 2017, the first annual ANYCon conference took place at the new Albany Convention Center. ANYCon creator and coordinator, Tyler Wrightson, had a goal to bring hackers, information security professionals, hobbyists and the like together from throughout the region.

“How to Combat Ransomware” Webinar Roundup

On June 20, 2017, Twinstate Technologies’ Alex Insley, Unified Defense Strategies Technical Manager, conducted a webinar with Datto’s Michael DePalma, Security Expert & Channel Development Manager, for a discussion on Ransomware. The webinar’s focus was on ransomware and how business continuity will save your business from experiencing downtime. For those who are unaware, business continuity […]

Petya, Ransomware Trends – A Sysadmin’s View

Ransomware – the new vector of attack that is garnering worldwide attention and causing undue stress on those managing business computing environments. When I started my venture into the tech support role, I remember being thrilled to find different viruses and observe their behaviors. Nowadays, I resent the idea of one making it through our […]

Join Us for Our Webinar: Traditional Backup Vs. Business Continuity

Join Twinstate Technologies® and Datto on Tuesday, July 25th, from 12:30 to 1:30 pm, for our webinar, “Traditional Backup Vs. Business Continuity.” Register today!

Twinstate Success Stories: Northern Insuring Agency, Plattsburgh, NY

When Northern Insuring Agency decided to remodel their Plattsburgh location in 2016, they knew it wouldn’t be an easy task. The company was in need of more office space, but one thing stood in the way – their server room and data closet. It was taking up prime office real estate and needed to be […]

How a Perimeter Scan Can Be Your First Step to Stopping Hackers

You know that your network needs better cybersecurity. But, the tricky part is figuring out where to start. Depending on how much or how little protection you currently have can dictate how much or how little your company will need. For the average person who isn’t so sure where to start, a Perimeter Scan by […]

NYDFS: What You Need to Know

Cybersecurity is a growing concern for any business owner no matter the sector you operate in. However, when it comes to the New York State Department of Financial Services (NYDFS), specific guidelines and regulations for entities need to be followed to be compliant. Without these mandatory cybersecurity requirements, entities under the Department of Financial Services […]

Combating Ransomware and Protecting Your Business

Set to kick-off on June 20th at 12:30 pm, Twinstate Technologies is teaming up yet again with partner Datto, a world leader in data protection, to bring you “How to Combat Ransomware,” a free webinar focused on helping businesses recognize and build resiliency against attacks. Set to be our second presentation of “How to Combat […]

Out and About with Twinstate Technologies

Summer has officially started with Twinstate team members traveling all over the United States to conferences and events seeking more knowledge and offering expertise on our lines of business.

Backup vs. Business Continuity: What They Mean for Your Business

Everyone knows the importance of backing up data. Typical backups often use external hard drives, local backups, or cloud, but is this enough to support your business in the event of a disaster, truly? Whether it’s a fire, storm or even a security breach, the answer is: not likely. It’s important to understand what your […]

Helping Your Business Guard Against Ransomware

Twinstate Technologies hosted a webinar this week to address the growing concern surrounding cybersecurity. Datto, our partner in this effort, joined Twinstate to discuss ‘How to Combat Ransomware’ – a topic that demands to be discussed especially after recent incidents like WannaCry.

Global Hack WannaCry and What That Means for Your Business

You’ve seen the headlines this week about the global hack WannaCry. The world is in the wake of the largest ransomware attack in history that infected 200,000 Windows systems in the first 24 hours of deployment. Though it might seem to some that the worst is over and they’re in the clear, the reality is they […]

Global Hack WannaCry and What That Means for Your Business

You’ve seen the headlines this week about the global hack WannaCry. The world is in the wake of the largest ransomware attack in history that infected 200,000 Windows systems in the first 24 hours of deployment. Though it might seem to some that the worst is over and they’re in the clear, the reality is they […]

Mitel MiCloud: Your VoIP and Inbound Call Center Solution

You’re a business owner who is striving to be ahead of your competition in every way. So why settle for anything less than a phone system that can deliver all of your business needs? Mitel MiCloud as part of a Hosted Voice solution, allows small and medium-sized businesses to operate at a Fortune 500 level […]

What’s the Deal with WannaCry?

Questions have circled over the past few days, “What is this malware?”, “Where did it come from?”, “Am I a target?”, “How do I stop it?”  With this cyberattack being the largest in history, there are bound to be more questions than answers in the wake of this incident. Here is a breakdown of what […]

Twinstate Ransomware Alert: WannaCrypt, WCry & WannaCry

Since Friday, you may have seen news alerts about ransomware known as WannaCrypt, WCry and WannaCry, which began encrypting victims’ computer files in the UK, causing some businesses to temporarily close down. This particular form of malware exploits vulnerabilities in Microsoft, specifically older versions of unsupported software (Windows XP/Server 2003, for example) that might be ineligible […]

Twinstate Technologies Becomes Gold Sponsor in ANYCon Conference

MORRISONVILLE, N.Y., May 11th, 2017 – Twinstate Technologies® is excited to participate as a gold sponsor at the first ever annual ANYCon conference in Albany, New York on June 16th and 17th. The event will focus on hacking, InfoSec, and cybersecurity while attracting participants from the Capital District and throughout the northeast region in an […]

Twinstate Technologies to Host Free Ransomware Webinar

Malware attacks are happening everywhere, at all times, and businesses are worried about how they will protect themselves. Statistics say that 60 percent of small companies that suffer a cyberattack are out of business within six months. Ask yourself, “Can my business afford to be attacked?” Probably not.

Benefits of Working with a WBE

Here at Twinstate Technologies®, we have long been proud to call ourselves a Women-Owned Business Enterprise (WBE). Since 2003, Twinstate has obtained and maintained our certifications on the federal level along with certifications in New Hampshire, New York and Vermont. Holding our certifications isn’t just something to be proud of; our customers benefit from Twinstate’s accomplishments, too. […]

Social Engineering Techniques and Your Privacy and Security

Clicking “Like” on a Tweet, tagging yourself in a photo on Facebook; today, almost everyone has at least one form of social media account where information is shared openly within their immediate friend circle. But in reality, your information is shared far beyond your network and can easily be captured by social engineering criminals who […]

Growing Cyberthreats

Each day that goes by, cyberthreats increase simply because we live in a world where technology is ever changing and advancing. Today we are surrounded by devices that would have never been possible, ten or even five years ago. Threats have grown larger than just mobile phones, computers and tablets. Now that the Internet of […]

Prevent Downtime with Redundancy and Resiliency

You’re in the middle of negotiating an important contract with your top client when the phone cuts out. Your firm is deep into filing clients’ taxes when the internet goes offline. Your customers are trying to reach out to you with important questions, and they can’t get through, and if they can’t get through to […]

What is UCaaS and Why Do We Sell It?

Gone are the days where a business is limited by certain features its phone system can and cannot provide. All around the world organizations are choosing to make the switch to a cloud-based Unified Communications as a Service, or UCaaS, solution, rather than the traditional premise-based phone system. When it comes to providing advanced technnology and […]

Twinstate, Champlain College, Gov’t Agencies Educate on Cybersecurity

With all of the chaos in the world today surrounding the topic of cybersecurity, the subject demands to be discussed. It should come as no surprise that cybersecurity is a growing concern that affects virtually everyone from the small business owner who was attacked, all the way up to the federal agencies who are working […]

Introducing Mitel to a K-12 Environment

The K-12 environment is significantly different than it ever has been before. With technology advancing at such a rapid rate, schools, like other organizations, have the need to stay updated with the latest conveniences. However, a major pain point for school districts is being outfitted with outdated phone systems that tether faculty to their desks […]

Twinstate Technologies CEO Devi Momot Joins InfraGard Board, Albany

MORRISONVILLE, N.Y., Apr. 11th, 2017 – Twinstate Technologies® CEO and Acting CISO®, Devi Momot, CISSP®, GSLC®, GISP®, was accepted to the InfraGard board under the Albany Chapter last month. InfraGard has been a strong partner with the FBI for over 20 years, bridging the gap between the federal agency and the private sector. Joining the initiative […]

How Red Team Services Can Protect from Vendor Vulnerabilities

Every company in operation has vulnerabilities. It’s fair to say that vulnerabilities never truly go away in your business’s environment, but you do your best to maintain the integrity of your database. No matter how tight your cybersecurity, there will always be some amount of vulnerability, especially when you factor in human error. That’s why […]

The Fight Against Cybercrime

With all of the chaos in the world today surrounding the topic of cybersecurity, the subject demands to be discussed. It should come as no surprise that cybersecurity is a growing concern that affects virtually everyone from the small business owner who was attacked, all the way up to the federal agencies who are working […]

Why Having Up-To-Date Technology in Schools is Critical

You’re in the educational system and have mastered the art of juggling. Budgets, curriculum, state and federal requirements to abide by, ensuring students pass and so on. But wrapped into all of that is also the technology piece that without, a school would cease to exist. Some of the best institutions in the country are […]

Twinstate Attends Opening for Center for Cybersecurity and Technology

MORRISONVILLE, N.Y., March 27th, 2017 –Twinstate Technologies, one of several organizations in Academic Alliance with the SUNY Plattsburgh School of Business and Economics (SBE) new Center for Cybersecurity and Technology (CCT), attended the open house on Friday, March 24th from 12 p.m. to 3 p.m. at AuSable Hall.

Twinstate Technologies Announces Academic Alliance with SUNY Plattsburgh SBE

MORRISONVILLE, N.Y., MAR. 20TH, 2017 – Twinstate Technologies® has joined SUNY Plattsburgh School of Business and Economics (SBE) as an Academic Alliance partner for the new Center for Cybersecurity and Technology (CCT). Twinstate Technologies® along with other Academic Alliance partners such as Sophos, Palo Alto Networks and Dell EMC2 will be offering expertise and guidance to […]

IT Solutions for the One-Person IT Department: Part 3

Last week we dove deeper into your next steps to building your IT department structure and learning valuable IT solutions. Now that you have completed the bulk of your IT department structure planning, we are going to wrap up our One-Person IT Department series with this final edition. You’ve come this far and put a large […]

Red Team Services: Introduction to Vulnerability Assessments [Free ebook]

Whether your business is big or small – 10, 100 or 1,000 employees – the reality is your system, unless checked regularly, has vulnerabilities. And truth be told, the larger your business and the more employees you have opens your network up to even more vulnerabilities than smaller businesses.

IT Solutions for the One-Person IT Department: Part 2

In our February 24th post, we discussed specific challenges one-person IT departments face and first-step IT solutions to take in IT department structure planning. Whether you’re the CEO of a company, office administrator or anyone in between, we focused on highlighting what your first steps in organization should be. Starting out, it was important to […]

Your Network Security: Just Do Something

As business owners, we wear many hats. One of those hats is protecting our assets. We hire a lawyer to draw up contracts to protect us from bad deals. We hire a CPA to oversee our financials. But, who is overseeing our network security? Who’s protecting our clients’ information that they’ve entrusted to us?

The Value of Working with a Heritage Brand

There is something to be said for small, family-owned companies these days. In a world where large corporations reign supreme, it’s any wonder that small and midsized businesses (SMBs) have a fighting chance to stay in business. Yet, SMBs still have a strong presence in markets today and hold a special value that larger companies […]

PoE vs. PoE+: What’s the Difference?

If you’re trying to decide which system to use to pass power and data over your twisted pair Ethernet, you’ve come to the right place. Though the main difference between PoE (Power over Ethernet) and PoE+ is the max amount of power provided, your considerations may run deeper. Power over Ethernet Comparison: PoE vs PoE+ […]