Link High Technologies
Link High Technologies has been serving the Morris Plains area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Imagine for a second what would happen if your business’ data was exposed and stolen. You’d have a really difficult time going forward as your client-base dwindled and you opportunities for growth dried up. The amazing part is that some very successful companies have this type of thing happens all the time. Today, we will look at some of the largest data breaches since September 1. September 9/5 Providence Health Plan – 122,000 members of the Providence Health Plan had personal information leaked when an unauthorized party accessed the company’s servers. Information that was stolen included plan member names, addresses, email… Continue reading Recent Data Breaches You Should Know

It’s the holiday season, which means many offices are holding gift swaps between employees. In the spirit of the holidays, we thought it would be helpful to share some gift ideas for the people you work with. Here, we’ve put… It’s the holiday season, which means many offices are holding gift swaps between employees. In the spirit of the holidays, we thought it would be helpful to share some gift ideas for the people you work with. Here, we’ve put together a list of suggestions for the different kinds of coworker you might have to provide a present for. The… Continue reading Office Gadgets to Add to Your Holiday Shopping List

A Bring Your Own Device (BYOD) policy is something that many organizations have adopted, for a few good reasons: employee satisfaction, cost savings, and productivity boosts included. However, it’s crucial that you don’t just assume that you can adopt a… A Bring Your Own Device (BYOD) policy is something that many organizations have adopted, for a few good reasons: employee satisfaction, cost savings, and productivity boosts included. However, it’s crucial that you don’t just assume that you can adopt a policy like BYOD without establishing some ground rules that your employees need to abide by. Here, we’ll go over a… Continue reading What to Include in a BYOD Policy

IT inventory management, also known as IT asset management or ITAM, is an important process for any business to undergo. This is effectively the process of ensuring that all of your information technology resources are accounted for and protected. Here,… IT inventory management, also known as IT asset management or ITAM, is an important process for any business to undergo. This is effectively the process of ensuring that all of your information technology resources are accounted for and protected. Here, we’ve assembled some practices that will help make this process much simpler. First, let’s delve into what ITAM actually covers.… Continue reading Tip of the Week: Tips to Help Manage Your IT Inventory Better

Every business can use some cost reductions. Most businesses have seen their margins shrink and would love to save some money, especially when it seems like as soon as it’s made it’s heading right back out the door. One way… Every business can use some cost reductions. Most businesses have seen their margins shrink and would love to save some money, especially when it seems like as soon as it’s made it’s heading right back out the door. One way businesses can shave off their operational expenses is by shifting their business’ telephone system to a VoIP system. What is… Continue reading Is VoIP Really More Cost Effective?

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of… Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get. How Does This Happen? An employee had access to data that they weren’t authorized to have.… Continue reading Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

The Internet is more than a piece of technology, it fuels huge swaths of the modern world. The economic benefits of the Internet are hard to estimate, but Cisco has tried, giving it a $19 trillion valuation, or about 21… The Internet is more than a piece of technology, it fuels huge swaths of the modern world. The economic benefits of the Internet are hard to estimate, but Cisco has tried, giving it a $19 trillion valuation, or about 21 percent of the total amount of money that is currently available in the world. So, if you have a resource… Continue reading Know Your Tech: Fiber Optics

When you think of professional services, you may think about smart people doing important things that took them years to learn how to do. You may not, however, consider them the kind of people that lean on their technology to… When you think of professional services, you may think about smart people doing important things that took them years to learn how to do. You may not, however, consider them the kind of people that lean on their technology to make their businesses work. This is because for the longest time, technology wasn’t a major part of the professional services… Continue reading IT and Professional Services: A Strategic Relationship

Do you know what drives me crazy? It’s the fact that, of all the lists of things you can do to improve your business and boost your productivity and optimize something or other… it seems there’s not much to be… Do you know what drives me crazy? It’s the fact that, of all the lists of things you can do to improve your business and boost your productivity and optimize something or other… it seems there’s not much to be said about how your employees factor in. Which seems a little ridiculous to me, if I’m being honest. Your staff… Continue reading Considering How to Monitor Your Employees
New Security Offering: Endpoint Detection & Response (EDR)

In today’s threat landscape, malware and ransomware have become very effective malicious tools used by cyber criminals to infiltrate, disrupt, and in many cases completely devastate business operations for organizations of all sizes. For years, Antivirus clients have been relied… In today’s threat landscape, malware and ransomware have become very effective malicious tools used by cyber criminals to infiltrate, disrupt, and in many cases completely devastate business operations for organizations of all sizes. For years, Antivirus clients have been relied on to protect workstations and servers from viruses and malware. Unfortunately, we continue to see the effectiveness of traditional Antivirus decline, particularly… Continue reading New Security Offering: Endpoint Detection & Response (EDR)