About Link High Technologies Inc.

As a local, privately-owned small business ourselves, we understand how important effective, on-time IT solutions are in keeping your business vigorous and growing. We are dedicated to helping our clients grow their businesses by delivering customized IT solutions that increase productivity, decrease risk, and provide measurable value.

Blog

Link High Technologies

Link High Technologies has been serving the Morris Plains area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Software Patching in the Cloud

cloudupdate_68996071_400-1

A lot of computing is done today using cloud computing – basically, making use of the computing power, space, and applications that a provider has on their infrastructure as if they were your own. Doing so can provide a very…

  0 Comments
0 Comments
Continue reading

New Security Offering: Endpoint Detection & Response (EDR)

network-security_550x400

In today’s threat landscape, malware and ransomware have become very effective malicious tools used by cyber criminals to infiltrate, disrupt, and in many cases completely devastate business operations for organizations of all sizes. For years, Antivirus clients have been relied…

  0 Comments
0 Comments
Continue reading

Ransomware Could Mean Life Or Death

computer_ransomware-1240x868

The smaller your company is, the more prone it is to being hacked with ransomware. It may seem unlikely, given your revenue or less intimidating position in the market. However, businesses like yours are equipped with fewer cyber security defenses

  0 Comments
0 Comments
Continue reading

What is Identity Theft?

identity_theft-1240x827

It’s a fact that in 2016, identity theft was the fastest-growing crime in America. Phew. That pushes murder and robbery down the list. But identity theft is a form of robbery—a crime involving perpetrators that might be more difficult to

  0 Comments
0 Comments
Continue reading

8 Tips to Fight Phishing Attacks During Tax Season

qtq80-lskvQB-266x266

It's a good time to prepare your staff to defend against phishing attacks.

We still have some time until Tax Day, but as we’ve all become painfully aware, tax time means you might be getting a call from a fictional IRS agent trying to scare you into paying non-existent fines. Scammers are also pretty crafty when using various methods to get malware on your system.

  0 Comments
0 Comments
Continue reading

An IT Security Primer: Threat vs. Risk

New York State has implemented cybersecurity requirements that affect financial institutions and these changes seem to be coming down the pike for neighboring states. When discussing information security, the question of what constitutes a risk versus a threat comes up quite often. 

  0 Comments
0 Comments
Continue reading

3 IT Security Keys for SMBs in 2019

Tim and Marina Wainwright were first time home buyers. They’d lived in an apartment, managed to save $30,000 over six years for a down-payment, and were only a few weeks away from closing on their new home.

  0 Comments
0 Comments
Continue reading

Creating a Culture of Security and Regulatory Compliance

compliance-1240x734

In a perfect world, security would just be an IT problem. Employees would take advantage of the latest and greatest technologies without having to worry about inadvertently putting data at risk.

  0 Comments
0 Comments
Continue reading

2018 Cybersecurity Review

It’s our 2018 Year-End Cybersecurity Review! It’s not quite the end of the year, but it’s time for our 2018 Year-End Cybersecurity Review.

  0 Comments
0 Comments
Continue reading

What is Phishing?

phishing_scam-1240x827

Malware. Clone phishing. Whaling. Phishing comes in many forms, and all could be taking place this very minute. It’s become the most common form of cyber hacking, “accounting for 91% of all cyber attacks.” Steve Zurier, Dark Reading Last year,…

  0 Comments
0 Comments
Continue reading

Link High Unveils Cybersecurity Program

SecureLink – All-Inclusive Security Platform Designed to Manage Risk, Mitigate Threats, & Maintain Compliance Morris Plains, NJ, December 17, 2018–After announcing its Information Security practice in Spring 2018, Link High Technologies, a Managed IT Service and Security Provider, has expanded…

  0 Comments
0 Comments
Continue reading

Link High Partners with Perch Security

Link High Technologies and Perch Security Partner to Bring Added Security to MSP Clients  Morris Plains, NJ, January 2, 2019–Link High Technologies, a cybersecurity and compliance focused IT management provider, is excited to announce its partnership with Perch Security. Through..

  0 Comments
0 Comments
Continue reading

What is a Security Operations Center

background-outsourced-it-1240x555

With the advent of the Fourth Industrial Revolution and the pervasive digitization of virtually all industries, information systems have become indispensable. Savvy organizations leverage them to improve efficiency in production and delivery of products/services to clients. With their widespread adoption and integration into nearly all areas of business activities, information systems now rule today’s business landscape.

  0 Comments
0 Comments
Continue reading

Healthcare and Managed Service Providers - a Winning Combination

In recent years, professionals in the healthcare and financial services industries have been bombarded with stories in the media on the latest data breach. Typically, these stories detail instances where loss of billing information or clinical records have resulted in reputational damage, financial penalties, or a situation where customer trust is no longer present.

  0 Comments
0 Comments
Continue reading

Step Up Your Spring Cleaning with A Network Assessment--Part 1

Spring has sprung, and you’re already busy clearing out all the clutter that accumulated during the winter months. But shiny floors and polished tennis trophies won’t keep you in business. A reliable and robust network will. When your network is a mess, employees waste time troubleshooting, customers disengage, and revenue is lost. To avoid this, in addition to busting out the broomsticks, it’s imperative that you set aside some time this spring to complete a full network assessment.

  0 Comments
0 Comments
Continue reading

Spring Cleaning-Network Assessment Part 2

header-managed-it-services-1240x555

Step Up Your Spring Cleaning with A Network Assessment (Part 2)

In part-one of our Network Assessment piece, we showed you how to focus your spring-cleaning efforts on creating a network inventory and examining your IT infrastructure. In section two, we look to audit three more critical aspects of your network: performance, security, and management.

  0 Comments
0 Comments
Continue reading

How Hackers Steal Your Data—Part 1

bg-2-300x116

It’s no secret that your data is a hot commodity. Each day sophisticated cybercriminals attempt to make money by stealing your private information. They may use the info to pose as you, blackmail you, or simply sell your information to someone who will. If you want to stay in business, you’ll need to be able to thwart these attempts. But to do so, you must understand the increasingly advanced methods hackers use. Here are the top two techniques hackers utilize to gain access to sensitive data. (Be on the lookout for Part 2).

  0 Comments
0 Comments
Continue reading

BYOD Management: Part 1

byod1

Bring Your Own Device (BYOD) policies are here to stay. The flexibility, familiarity, and increased productivity that personal devices provide has forced companies to adapt to this workplace revolution in a hurry. Yet many companies are still struggling to strike the right balance between personal freedom and corporate responsibility. In part one of our two-part article, we'll detail a six-step plan for developing the strategy and policy necessary to manage BYOD effectively.

  0 Comments
0 Comments
Continue reading

How You Should Judge Potential Password Management Programs

119686351_400

Passwords are hard to remember - there’s no denying that. However, there is also no denying how important it is to use different ones for each account, all sufficiently complex, and all the rest. The point is, a lot of people use bad password practices because (to be frank) good password practices are too intimidating. There has to be some kind of acceptable middle ground… right?

  0 Comments
0 Comments
Continue reading

Your Trusted Advisor for Cyber Security

logo_400

Did you know Link High has a dedicated and separate practice focused on Cyber Security? One of the key differentiators between Link High and other IT service providers is that we have dedicated security professionals separate from our Managed IT practice.

  0 Comments
0 Comments
Continue reading

Customer Login

News & Updates

Link High Technologies Inc. is proud to announce the launch of our new website at https://linkhigh.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...