Do you WannaCry again? Protect Yourself against BlueKeep: Upgrade to Windows 10

By: Joshua Weiss, Customer Success Manager 

It’s said that great risk brings great reward, but in this case, great risk brings nothing but great risk.  

Almost 1 million Internet connected Windows systems are unpatched at the moment, and one of them could be yours.

Recently, Microsoft discovered a new vulnerability. This vulnerability was found in their Windows Remote Protocol just two weeks after Microsoft released its latest security patch. BlueKeep, is a critical, wormable, remote code execution vulnerability. The threat of this is much greater due to the fact that it is  “wormable” which means, if one computer gets infected, it can easily pass it along to other computers.  

Like WannaCry (infected over 300,000 computers and 200,000 victims completely encrypted), the BlueKeep attack can give an unauthenticated remote attacker access to a computer with the use of specific code. Once they have access they can simply gain control of a victim’s computer. It does this by sending requests to the computers Remote Desktop Service through the RDP, which does not require anything from the user themselves. 

When it comes to this new BlueKeep vulnerability Microsoft has taken the proper steps in fixing this issue. They released patches for its Windows systems, even including patches for older systems like Windows XP, Windows Vista, and Windows Server 2003, who no longer get support from Microsoft but are still used by many customers.  

So, what can someone do to prevent being attacked by BlueKeep? Because the vulnerability only affects Windows 2003, XP, Windows 7, Windows Server 2008 and 2008 R2 edition, the newer Windows systems are safe from this attack.  

This makes upgrading to Windows 10 the easiest and safest thing you can do. The problem is that there are still a ton of people who do not want to upgrade to Windows 10 or even allow Windows to install the patches on their older systems because they have old applications that require outdated Windows. At this point it has become a risk to use the old systems and upgrading is the most sensible and responsible course of action.  

Take action now, upgrade to Windows 10, and protect yourself from the BlueKeep attack!! 

 To purchase Windows 10 visit our CSE Marketplace here: 

Even Google is telling you to be on Multi-Factor Authentication (MFA)

By: Ankita Paul, Marketing Associate

Everywhere you go, someone is handing out advice about account security. It hurts to be reminded all the time about the ways to protect your critical data. However, have you ever wondered whether any of the security measures you’re taking are effective?

Several companies, like Microsoft & Google, take up surveys to find out the most effective security methods. Recently, Google teamed up with researchers from New York University and the University of California. It analyzed 350,000+ account-hijacking attempts to see how its most basic account-security settings protected users’ accounts.

It turns out that its techniques were super-effective.

Google’s blog post reads, “We found that an SMS code sent to a recovery phone number helped block 100% of automated bots, 96% of bulk phishing attacks, and 76% of targeted attacks”.

The most basic security setting you can use with your account is adding your phone number as “Recovery Phone” so Microsoft or Google texts you if an account sign-in looks suspicious.

One of the most effective methods is on-device prompt. It requires an attacker to have physical access to your smartphone or tablet to authenticate a login request (Multi-Factor Authentication).

For the 100% effectiveness across all attempts, you should use security keys. Various study shows that it can block 100% of the attacks like automated bots, phishing attacks, or targeted attacks.

If your IT organization hasn’t deployed Multi-Factor Authentication, it is time to wake them up. Clearly the results backup the reasoning.

Give us a call at 914-355-5800 to find out more about Multi-Factor Authentication.


By: Joshua Weiss, Marketing Associate

According to Forbes, 74% of CFO’s say cloud computing had the most measurable impact on their business in 2017.

It is time to get rid of office servers or minimize the number of servers you have; you are unnecessarily increasing your companies’ risk. With on-premise servers, just like any other physical equipment, things tend to break. This can lead to loss of valuable information, not to mention the time and money wasted on replacing the server. Even if the server doesn’t break, the typical life span of a server is 3-5 years. This means within five years of buying a server you will need to replace it. Your IT team or IT guy are already spending weeks planning for that replacement.  How much is that costing you? On-premise servers over cloud-based options like OneDrive or SharePoint, require more money spent along with more time wasted (due to installation and delivery of the servers) compared to these cloud-based alternatives. 

So, if I want to reduce my costs and risk what should I do? Get OneDrive, SharePoint, or get an Office 365 Business Premium plan (1 year – $12.50 user/month) which includes both programs and more!

OneDrive is an internet-based storage platform that stores your documents in the cloud. While this can be purchased individually, Microsoft offers it to anyone with a Microsoft account. Microsoft offers it for free to its users with the free storage typically being around only 5 to 15 GB’s. For as little as 5$ per user/month you can get 1 TB of storage space.

SharePoint is a cloud-based service, hosted by Microsoft, for businesses of all sizes. Instead of installing and deploying SharePoint Server on-premises, any business can subscribe to an Office 365 plan or the standalone SharePoint Online service. You and your employees can create sites to share documents and information with colleagues, partners, and customers all without having to have a physical server on-premise.  

While both are great tools for one to have, using them together is ideal. Both OneDrive and SharePoint allow its users to do things like co-author, which is when multiple people simultaneously work on one document, and file share (both internal and external) all from the Microsoft Cloud. The real question is when you should use each of them.

For OneDrive, personal storage is the main goal. Everyone in the company gets their own OneDrive account, allowing them to safely save documents that are not meant to be shared such as personal documents or drafts that are not quite ready to be presented.

SharePoint on the other hand, is typically best used to collaborate on files with others in your organization. SharePoint is also where you would go to publish your files for all to see.  

Ideally, by using both OneDrive and SharePoint, a user can have a saved copy of their work on OneDrive until they are finished with it. Then they would upload it to SharePoint for everyone to see. This would also allow others to give input and even update the document from SharePoint.

Both OneDrive and SharePoint are very useful tools and are simply better options to have than just on-premise servers. Do more for your business, get OneDrive and SharePoint.

Check out our marketplace to purchase OneDrive and SharePoint!


By: Indira Ghosh, Marketing Associate

Microsoft introduces a new way to give teams an unprecedented level of collaboration to meet the demand of the new modern workforce. 

Microsoft has launched its next-generation Surface hub 2S, an all-in-one collaboration device built for teamwork. It has a 50 inch display with a 4K pixel resolution as well as a lighter and thinner design.

This device bridges the gap between digital and physical work spaces. It meets the increasing demand for rapid innovation and problem solving by helping teams collaborate their ideas in real-time. It combines several functions, most notably, the digital white-boarding and video conferencing with Teams and OneNote built into it through a single combined integrated package.

Surface Hub 2S is a transportable computing display that can be wheeled from one meeting room to another. It is an ideal solution for businesses that work in co-working sharing spaces, real estate agencies, and developers to showcase their projects interactively with their customers, or retail spaces that are looking to provide a sophisticated experience to their customers.

Surface Hub 2S can also be a perfect solution to business lounges to enhance a virtual concierge experience.

The Surface Hub 2S will arrive in the US this June, Reserve yours today!

Give us a Call at 914-355-5800 to know more about team collaboration in the modern workplace. It will begin shipping in June starting at $8,999. We will help you with pre-site inspection, installation, deployment, and ongoing management.


By: Indira Ghosh, Marketing Associate

When it comes to data breaches and other cyber security threats, many people discuss the risks from outside hackers.  

While outside hackers are a huge concern, Internal employees can do a lot more damage to an organization’s IT infrastructure. Recently, an IT employee stole the credentials of a colleague after he was fired. He decided to steamroll through his former employer’s Amazon Web Services (AWS) accounts and deleted twenty-three servers. The company lost big contracts with transport companies as a result.  

Police say that the wreckage caused an estimated loss of $700,000 at the time. The company reportedly was never able to retrieve back the deleted data.  Also, it took months to track down the culprit. 

A Few Statistics  

$2.4 million  

The average cost of a malware attack on a company 


The net increase in the average annual number of security breaches 

50 days  

The average time to resolve a malicious insider attack 

191 days 

The time it takes for organizations to identify data breaches

Could Have, Should Have, Would Have  

The company, could have done a few things to protect itself from this sort of nightmare.Voova CEO, Mark Bond, admitted to the court that the company should have implemented Multi-factor authentication (2FA), 2FA would have made it much harder for this to have happened. 

  • Set a Two-Step Verification Process:

Two-step verification helps by making it more difficult for someone else to sign in to your account. It uses two different forms of identity: your password, and a contact method (also known as security info) like: 

  1. Something you know (typically a password)  
  2. Something you own (a trusted device that is not easily duplicated, like a phone) 
  3. Something you are (biometrics) 
  • Azure Multi-factor Authentication strengthens security preventing the outflow of sensitive data

For Example: When you log in to your account, you will type a unique code from your phone to get access to Microsoft 365. MFA can prevent hackers from taking over even if they know your password.  

  • You should educate your users about MFA

Since most users are familiar using only passwords to authenticate, it is essential that your organization communicates to all users regarding this process. You should experience this in your business by enabling this for a couple of users first. Then extend the capability to all users, including your IT admins. 

  • Authentication process keeps productivity high

MFA makes it easy to access business applications from anywhere, at any time, safely.  

Make sure you have a plan in place for when employees leave that covers everything from physical access to your property and hardware like laptops, phones, and access tokens, to email, call forwarding, and logins for all the company software and services they had access to.

Give us a call at 914-355-5800 to find out more about Multi-Factor Authentication and other Microsoft security products. 


By: Joshua Weiss, Marketing Associate

The Enterprise Connect Expo in Orlando, Florida was an amazing experience. With around one hundred companies at the expo there was no shortage of exciting things to check out. From businesses dedicated to improving your company’s customer service to emergency services that send direct messages to everyone in your company, just about everything you could ask for was at this expo.

What should your conference room look like?

Companies like Poly, Biamp, Yealink, Teem, and Evoko bring value with the products they provide. These companies all make setting up and attending meetings easier.

For example, Poly demonstrated their Polycom Studio, which is a USB video bar built for small rooms. This is a camera and microphone that is easily plugged in and used without hassle. It also has a feature where it tracks the person talking and focuses more on them. Poly even won an award called Best Communications/Collaboration Device for this product at Enterprise Connect 2019.

Biamp was demonstrating their products and how they are effective for Microsoft Teams meetings. They had a couple different types of ceiling microphones which can be useful for conferences with 8 to over 25 people. The different types of microphones included ones that went directly into the ceiling and ones that hang down low for even better sound quality. They also showed off their product called Tesira which is an integrated, networked AV processing and distribution platform. This is used for helping you create the dynamic, efficient AV systems your customers need.

Evoko demonstrated a product called Evoko Liso which is a piece of hardware that is put up outside the meeting room. This product is a touch screen room manager that tells you when a meeting is scheduled in that room. You can even book, end, or extend a meeting directly from the home screen (which is a clock) or use the calendar to search for other rooms based on availability, size and equipment. You can also easily see if a meeting is available by the light it emits, green for available, red for in use, or amber for scheduled.

Teem, does the same thing as Evoko with the hardware outside of the meeting room but takes it up a notch. While you can schedule meetings directly on the touch screen monitor, you can also do it through your voice. Teem implemented Alexa, which can use your voice commands to schedule a meeting for you. Not only can you schedule meetings in person but you can schedule meetings through your already existing calendar system, including Office 365. This would allow someone on Teams to set up a meeting in a specific room and have it show up on the monitors outside of the meeting rooms which is very valuable.

All of these businesses bring value to a company that often has in person meetings and trouble with conflicting meeting times between teams and needs great quality audio and visual during those meetings.

The Microsoft space was amazing. Their space was dedicated to Microsoft Teams and all of the stuff we can expect in the future for Teams. Features such as customized backgrounds in meetings are expected very soon. This is like the blur feature it already has but instead of blur you can have the background be trees or an office setting.

Microsoft showed off the star of their show, their updated Whiteboard, which is a tool that can be used in meetings to assist in teamwork. Whiteboard provides an infinite digital canvas for meeting participants to work together directly in Teams. Essentially, it is a huge touch screen that is running Teams, which allows you to draw stuff out while in meetings.


By: Indira Ghosh, Marketing Associate

Time for some Facts and Figures related to Cyber Security issues! 

The annual number of data breaches and exposed records in the United States from 2005 to 2018 (in millions) shows a rise of more than 600%  
  • 92% of malware is delivered by email. 
  • 60% of small companies go out of business within six months of a cyber-attack. 

With a Microsoft Data Loss Prevention (DLP) Policy you can: 
Identify sensitive information across many locations, such as Exchange Online, SharePoint Online, and OneDrive for Business. 

For example, you can recognize any document containing a credit card number that stored in OneDrive for Business site. 

Prevent the accidental sharing of sensitive information:
You can identify any document or email containing financial data shared with people outside your organization, and then automatically block access to that document or block the email from being sent. 

Monitor and protect information in the latest desktop versions of Excel, PowerPoint, and Word:
DLP Policies have capabilities to identify sensitive information. DLP provides continuous monitoring when people share content.

You can educate your users about DLP policies:
If a user tries to share a document containing confidential information, a DLP policy can send them an email notification and show them a policy tip.

Give us a call at 914-355-5800 to find out more about Data Loss Prevention and other Microsoft security products. 


By: Indira Ghosh, Marketing Associate

First, here are some facts about security vulnerabilities:

  • More malware is being launched than ever before, with approximately 230,000 new malware samples per day.
  • 92% of malware is delivered by email.
  • 56% of IT decision makers say targeted phishing attacks are their top security threat.
  • The average ransomware attack costs a small business anywhere from 40 thousand to 1 million dollars.
  • It takes organizations an average of 191 days to identify data breaches.

Microsoft Office 365 Exchange Online gives you basic protection, is that enough?

This is what you get:

  • An Email filtering service that helps protect your organization against spam and malware. This filters out thousands of unsolicited messages daily that might contain malware.
  • It is simple to setup and already has a powerful default out of the box. 
  • You can add additional rules to block emails that still pass through as well.

Now, what doesn’t it do?

  • It does not check emails for malware attachments at all.
  • It does not protect email content for website links that take you to Phishing sites.

Microsoft Advanced Threat Protection (ATP) is an affordable add-on that provides the following:

  • The email arrives at Microsoft, where it is scanned by Exchange Online Protection for SPAM.
  • Next ATP scans the email; it ensures attachments are safe by checking the attachments against its real-time updated database.
  • Additionally, if the system recognizes a suspicious link or content, the email is removed, or the rough contents of the link are described.
  • Naturally, the user and the company IT administrator receive notification.
  • The intelligent solution provided by Microsoft can protect your data against sophisticated threats.

Advanced Threat Protection (ATP) is about $2.00 per month which is $24.00 annually per user. ATP is a necessary layer in today’s security environment.

Give us a call at 914-355-5800 to find out more about ATP and other Microsoft security products.


By: Joshua Weiss, Marketing Associate

Microsoft Teams is a workplace chat app that has integrated everything Office 365 offers and keeps it all in one convenient location.

Microsoft Teams is all about keeping its users working together. While Teams has tons of functions, like integrated apps, bots to help guide and work for you, enterprise-level security and more, its main goal is to allow its users an easy and secure way to speak about work, all while building team chemistry.

In today’s work climate, team chemistry can make or break your business. If everyone is not on the same page it can lead to disastrous results and we want the opposite of that. We can achieve this through the use of the Microsoft Teams chat.

The Teams chat is such a useful tool to have. Long gone are the days of slow back and forth emails between colleagues. Nowadays everyone wants a response ASAP and Teams allows people to deliver on that.

With the Teams chat, people can be connected immediately in a number of ways. You can simply text chat people or do things like call or video chat, all while being completely secure through the Microsoft cloud. Users can create teams in channels for specific projects and add the users they want into a specific team.

Here is an example of how useful this chat is. Let’s say you need advice on a project. All you would have to do is message a coworker, share your screen (by pressing one button inside the chat window) and they can see exactly what you see, allowing a simple and efficient way to give feedback. Also, if they wanted to add something, you could just give them control and they can add whatever they need. Instead of you having to email them the entire document and wait for it to get back to you before working on it again.

Teams is so simple yet so useful for workers because the benefit of quickly receiving feedback allows for peoples creativity to continue flowing instead of the typical ups and downs, we normally face.

One of the best features Teams has is the ability to add a Task from Microsoft Planner directly into a Team. This allows us to breakdown the work into tangible tasks and make everyone aware of the To Dos for a project. Such as a Task to meet weekly with reminders directly into our Outlook. This way, once we are in a chat, we will be organized as to what we talk about and have a clear path to get us to our goal.  

Like the old saying “time is money”, staying productive at work will bring you more profits. Teams is a great way to add value and build productivity throughout your business. Don’t miss out, with Teams you can be the most productive you have ever been!

Find out more! Email us at
Or call us at 914-355-5800


2018 will not be the lone year that data will be viewed as an immediate concern foreshadowing the implementation of General Data Protection Regulation (GDPR) on May 25, 2018. IT privacy and security compliance will continue to be significant to small and medium sized businesses with the development and implementations of regulations that may affect their regular operations.

Integrated Solution

Designed for organizations with 300 members and below, Microsoft 365 Business is specifically created to answer the needs of small and medium-sized businesses.  Considering that they have smaller resources and lower manpower compared to enterprises, they can get the value that is practically at par to the services enjoyed by enterprises. Microsoft 365 Business is an integrated, complete, intelligent solution that bundles productivity, security, and device management through Office 365, Windows 10, and Enterprise Mobility + Security.

With ‘Intelligent for Security,’ as one of Microsoft 365’s core principles, it has features that prove its worth, such as “Compliance Manager” that is relevant in proactively dealing with GDPR. Compliance Manager automatically monitors your system to ensure you are following regulations.

IT Privacy and Security Compliance Simplified for your Business

All these regulation-abiding technicalities may seem to be complex to business owners. However, an IT service provider and compliance expert (namely Computer Solutions East and Cover Compliance, LLC) have teamed up for a series of webinars to guide them safely through.

All the webinars are offered by CSE and Cover Compliance, and are hosted by Glenn Mills, president of Cover Compliance. The webinars titled “IT Privacy and Security Compliance Simplified for your Business” has been truly successful due to the warm response of its attendees.

In 2008, Glenn began Cover Compliance to focus on smaller enterprises that face the same compliance challenges as large organizations but usually lack the resources that larger businesses take for granted.

The remaining installments of the webinar on June 14, June 19, June 21, June 26, and June 28 are still open for registration.

To sign up for the webinar, click here.

Pay for 11 and get 12 

Once you commit for an annual subscription (twelve months) to Microsoft 365 Business from this day until June 20, you are in for a special offer because you only need to pay for the value of 11 months.

To take advantage of this special offer from CSE, click here.


About Computer Solutions East, Inc. (for more information on Computer Solutions East, visit

Computer Solutions East is a full-service software licensing, network services, and support provider. Our services include: software license acquisition and management, Lync and Exchange Online Migration, cloud computing, servers and hosting services. Our expertise with Office 365 includes a unique understanding of aligning Microsoft Exchange Online for business environments, as well as, SharePoint Online. We concentrate heavily on software licenses through volume licensing of Office 365, and have migrated thousands of users to Microsoft’s Cloud.

Computer Solutions East is a Tier 1 Managed Microsoft Partner and has been working with Microsoft Hosted Exchange, Sharepoint and Cloud products since 2007, starting with their Business Productivity Online Suite (Exchange / Sharepoint / Lync 2007). Winner of 2016 East Region Renewal/Annuity Partner of the Year Award. Gold and Silver certified for Services on Volume Licensing, Office 365 and Azure Migrations (Small and Large), Dynamics CRM Online Customization and Configuration, Microsoft Authorized Education Reseller. Fixed Monthly IT and Ad Hoc Services.

Awards and Accomplishments:

  • Winner; 2016 Partner of the Year Award (East Region – Renewal / Annuity)
  • Finalist; 2016 NY Metro Partner of the Year
  • Finalist; 2016 NY Metro Cloud Partner of the Year
  • Finalist; 2015 NY Metro Partner of the Year
  • Finalist; 2015 NY Metro Cloud Partner of the Year
  • Winner; 2013 East Region TOP VAR Partner of the Year Award
  • Finalist; 2013 Small Business Partner of the Year
  • Ingram Micro SMB 500 (2013, 2015)
  • Inc. 5000 (2015, 2016, 2017)
  • CRN MSP 500 (2014, 2016)
  • CRN Pioneer 250 (2016, 2017, 2018)
  • CRN Next-Gen 250 (2016, 2017)
  • Tech Elite 250 (2017)

Technology solutions that makes sense for your business:

  • Microsoft Volume Licensing Services Sales
  • Microsoft Office 365 (Migration & Licensing)
  • Microsoft Dynamics 365 Deployment and Customization
  • Azure: Improve performance and consolidate resource, let Microsoft take care of your servers
  • Application Development: Websites, Quote to order automation, Netbook, Vendor XML integration with shopping cart
  • Fixed Monthly Contracts: 24/7 service with predictable monthly payment
  • Cisco Network and Telephone: WAN, LAN, VPN, Wireless and VoIP

About Cover Compliance, LLC (for more information on Cover Compliance, visit

Cover Compliance has more than 16 years of experience with technology, financial services, and healthcare compliance with a deep focus on privacy and data protection.

Cover Compliance provides compliance program support to smaller organizations that usually lack the resources (whether in staffing, time, or funding) to purchase sophisticated systems, or hire dedicated staff into compliance-only roles. Cover Compliance’s work encompasses managing compliance with demands on client operations, wherever they originate. These compliance demands may exist in contracts, codes of ethics and conduct, and board policies, as well as, the state, federal, and now international regulations that govern modern businesses.