Back to Top

Tech, Web, Cloud & Cabling Services

Home Page
3rd Annual Halloween Lights to Music!
3rd Annual Halloween Lights to Music!October 20, 2023229 North Locust / Events  HAPPY FALL Y’ALL! South Jersey Techies invites you to stop by our office our 3rd Annual Holiday Lights-to-Music Display! This time we are celebrating Halloween!  Located at 229 North Locust Ave, Marlton NJ. We hope you enjoy the show and have a Spooktacular time!! Visit 7pm thru midnight each evening now until Halloween   Park and Tune into 89.9FM   [...] Read more...
New Website Design – Furino & Sons Inc.
New Website Design – Furino & Sons Inc.October 1, 2023UncategorizedThe Website Design team of South Jersey Techies has been constantly working on developing great looking websites using the latest web technologies. The most recent website developed by our team is for Furino & Sons Inc. located in Branchburg, New Jersey. Furino & Sons Inc. works to provide their clients with a level of service and support that differentiates them from their competitors. A well managed company with solid financial reserves, Furino and Sons possesses the resources to complete extensive projects.       Have questions?   Our Web Design team is here to help. Call us at: 856-745-9990 or visit: https://southjerseytechies.net.   South Jersey Techies, LLC is a full Managed Web and IT Services Company located in Marlton, NJ providing IT Services, Managed IT Services, Website Design Services, Server Support, IT Consulting, VoIP Phones, Cloud Solutions Provider and much more. Contact Us Today. [...] Read more...
10 Tips for CyberSecurity Recommended By The FCC
10 Tips for CyberSecurity Recommended By The FCCSeptember 25, 2023Quick Reference Guides / Security / Tips & InfoCybersecurity is of paramount importance in today’s digital age as it plays a crucial role in safeguarding sensitive information, ensuring the privacy of individuals, and maintaining the integrity of critical systems and infrastructure. The Federal Communications Commission (FCC) in the United States recognizes the significance of cybersecurity and has provided recommendations and guidelines to help individuals, businesses, and organizations protect themselves from cyber threats. Here are some key points highlighting the importance of cybersecurity along with recommendations from the FCC:   Train employees in security principles – Establish basic security practices and policies for employees, such as requiring strong passwords, and establish appropriate Internet use guidelines that detail penalties for violating company cybersecurity policies. Establish rules of behavior describing how to handle and protect customer information and other vital data. We offer Security Awareness Training as an option for continuous security training for staff. Protect information, computers, and networks from cyber attacks – Keep clean machines: having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats. Set antivirus software to run a scan after each update. Install other key software updates as soon as they are available. We offer Managed Services & Support as an option for preventing cyber-attacks. Provide firewall security for your Internet connection – A firewall is a set of related programs that prevent outsiders from accessing data on a private network. Make sure the operating system’s firewall is enabled or install free firewall software available online. If employees work from home, ensure that their home system(s) are protected by a firewall. We offer a Managed Network Services & Support as an option for firewall security. Create a mobile device action plan – Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Require users to password-protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for lost or stolen equipment. We offer Mobile Device Management as an option for a mobile device action plan. Make backup copies of important business data and information – Regularly backup the data on all computers. Critical data includes word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files. Backup data automatically if possible, or at least weekly and store the copies either offsite or in the cloud. We offer various Backup & Recovery Solutions as an option for business continuity & disaster. Control physical access to your computers and create user accounts for each employee – Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft or can be lost, so lock them up when unattended. Make sure a separate user account is created for each employee and require strong passwords. Administrative privileges should only be given to trusted IT staff and key personnel. We offer Multi-Form Authentication Solutions as an option for computer login security. Secure your Wi-Fi networks – If you have a Wi-Fi network for your workplace, make sure it is secure, encrypted, and hidden. To hide your Wi-Fi network, set up your wireless access point or router, so it does not broadcast the network name, known as the Service Set Identifier (SSID). Password protect access to the router. We offer Managed Network Services & Support is an option for Wi-Fi security. Employ best practices on payment cards – Work with banks or processors to ensure the most trusted and validated tools and anti-fraud services are being used. You may also have additional security obligations pursuant to agreements with your bank or processor. Isolate payment systems from other, less secure programs and don’t use the same computer to process payments and surf the Internet. Risk Intelligence is an option we offer to identify potential vulnerabilities. Limit employee access to data and information, limit authority to install software – Do not provide any one employee with access to all data systems. Employees should only be given access to the specific data systems that they need for their jobs, and should not be able to install any software without permission. We offer Network & Security Assessments that can scan data repositories for user permissions, security and much more. Passwords & authentication – Require employees to use unique passwords and change passwords every three months. Consider implementing multi-factor authentication that requires additional information beyond a password to gain entry. Check with your vendors that handle sensitive data to see if they offer multi-factor authentication for your account. We offer Cloud Security Assessments which are used to ensure proper password & security practices are in place. Download the 10 Tips Below SJT-QR-CyberSecurity-10 Tips If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990. [...] Read more...
Quick Reference CyberSecurity Guide
Quick Reference CyberSecurity GuideSeptember 18, 2023Quick Reference Guides / Security / Tips & InfoIn today’s digital age, cybersecurity is at the forefront of technology, both at the workplace and in our personal lives. With the increasing frequency and sophistication of cyber threats, it is essential that we all play a role in protecting sensitive information both business and personal.   To help you stay informed and vigilant about cybersecurity best practices, we have created a Quick Reference Guide for Cybersecurity to be shared with your users as a courtesy to better protect themselves from cyber threats and contribute to a safer digital environment. Please Download Our Quick Reference Cyber Security Guide Below Quick Reference CyberSecurity Guide If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990. [...] Read more...
Zero-Day Security Vulnerability in Chrome, Firefox and Others
Zero-Day Security Vulnerability in Chrome, Firefox and OthersSeptember 15, 2023Laptops / News / PCs / Tips & InfoGoogle Chrome, Microsoft Edge, Mozilla Firefox and Apple’s Safari browser have all been impacted by a single zero-day vulnerability. The flaw, tracked as CVE-2023-4863, is caused by a heap buffer overflow in the WebP code library. Once exploited it can lead to system crashes and arbitrary code execution, where hackers can gain control over an infected device. Where Does it Originate? CVE-2023-4863 was first identified by researchers at The Citizen Lab, a research arm of the University of Toronto. The institution subsequently informed Google and Apple of the vulnerability’s existence. Both companies have now released patches. They were joined by Mozilla, which released its own advisory on CVE-2023-4863 yesterday and updates for several versions of its Firefox browser and Thunderbird email client, and Microsoft.   Vulnerability Originates In Webp Reader. Users of the affected browsers should update to the most up-to-date version in order to ensure the zero-day vulnerability is patched on their machines. The problem isn’t with the browsers — the vulnerability originates in the WebP Codec. Many applications use the WebP codec and libwebp library to render WebP images.   In more detail, a heap buffer overflow in WebP allowed attackers to perform an out-of-bounds memory write. A heap buffer overflow allows attackers to insert malicious code by “overflowing” the amount of data in a program. Since this particular heap buffer overflow targets the codec (essentially a translator that lets a computer render WebP images), the attacker could create an image in which malicious code is embedded. From there, they could steal data or infect the computer with malware. The vulnerability was first detected by the Apple Security Engineering and Architecture team and The Citizen Lab at The University of Toronto on September 6. How Dangerous Is This Flaw? Since many browsers, including Microsoft Edge, Brave, Opera, and Vivaldi are built on the Chromium platform, the same platform that Chrome is based on, this could affect their users as well. The same risk is also applicable for Firefox browser clones.   Such a widespread exploit in ubiquitously used software is dangerous, widening the attack surface for most organizations.   Patching will mitigate the risk, but users must act quickly as hackers will already be at work. Attackers will be working over the coming days and weeks to make the exploit more reliable meaning remote code execution will be more likely. Modern web browsers are exceptionally good at pushing out security updates rapidly and applying them as quickly as practicable, so users will shortly be protected.   The biggest risk is to organizations which don’t allow automatic updates and push out updates at their own release schedule. What Steps Should You Take? Google, Mozilla, Brave, Microsoft and Tor have released security patches for this vulnerability. Individuals running those apps should update to the latest version. In the case of other applications, this is an ongoing vulnerability for which patches may not exist; NIST noted that the vulnerability has not yet received full analysis.   If you are already a Managed Services client, please follow the steps below to check for updates   Google Chrome – Click the 3 dots in the top right corner for the menu and choose Help->About Google Chrome.  Chrome will check and install updates automatically from this screen.   Microsoft Edge – Click the 3 dots in the top right corner for the menu and choose Help and feedback->About Microsoft Edge.  Edge will check and install updates automatically from this screen.   Mozilla Firefox – Click the 3 lines in the top right corner for the menu and choose Help->About Firefox.  Firefox will check and install updates automatically from this screen.     If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990 [...] Read more...
Microsoft Office 2013 End of Life: What You Need to Know
Microsoft Office 2013 End of Life: What You Need to KnowJuly 19, 2023Email Accounts / Microsoft / Microsoft Office / Microsoft Outlook / Microsoft PowerPoint / Microsoft Word / News / Software / Tips & InfoMicrosoft Office 2013 was a popular productivity suite that included several essential tools such as Word, Excel, PowerPoint, and Outlook. It was released in 2013 and was widely used by individuals, businesses, and organizations of all sizes. However, like all software products, Microsoft Office 2013 has reached its end of life, and users are now advised to upgrade to Microsoft 365, the cloud-based version of Microsoft Office. What Does End of Support Mean? End of life, or EOL, refers to the point in time when a software product is no longer supported by the manufacturer. In the case of Microsoft Office 2013, this means that Microsoft will no longer provide technical support, bug fixes, security updates, or new features for this product. This makes the software more vulnerable to cyberattacks, viruses, and malware. Continuing to use Microsoft Office 2013 after the end of life date could result in data loss, security breaches, and other serious problems. This means that Microsoft will no longer provide any updates or support for this software product beyond this date. Users who continue to use Microsoft Office 2013 after this date do so at their own risk. If you’re using Office 2013, it’s probably a good time to upgrade your version of Microsoft Office. Upgrade Options The best way to protect yourself and your organization is to upgrade to a newer version of Office: Cloud upgrade: Subscriptions to Microsoft 365 Box Version: Microsoft Home And Business 2021 Microsoft 365 Microsoft 365 is an all-in-one cloud solution with a number of different licensing options to fit your organization’s needs. The best part about cloud-based applications is that you no longer have to worry about retirements, patches, and end of support. Cloud licenses are automatically updated with new features, new applications, and security updates. Many cloud subscriptions also include installed (or desktop) versions of the application, so you can have the same look and feel of the Office applications you are accustomed to using, but built with more robust features and benefits. Microsoft Home And Business 2021 Office Home and Business 2021 is for families and small businesses who want classic Office apps and email. It includes Word, Excel, PowerPoint, and Outlook for Windows 11 and Windows 10. A one-time purchase installed on 1 PC or Mac for use at home or work.   If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990. [...] Read more...
New Website Design – West Bay Construction, Inc.
New Website Design – West Bay Construction, Inc.March 17, 2023UncategorizedThe Website Design team of South Jersey Techies has been constantly working on developing great looking websites using the latest web technologies. The most recent website developed by our team is for West Bay Construction, Inc. located in Linwood, New Jersey. West Bay Construction, Inc. is a general contractor headquartered in beautiful Southern New Jersey. They have been providing prompt and professional contracting services to state, federal and local authorities for over 20 years. They are qualified to perform work at the State level for the NJDOT, NJ Turnpike Authority and NJ Transit. Additionally, they also perform work for the local counties, as well as municipal levels including work for local Boards of Education.       Have questions?   Our Web Design team is here to help. Call us at: 856-745-9990 or visit: https://southjerseytechies.net.   South Jersey Techies, LLC is a full Managed Web and IT Services Company located in Marlton, NJ providing IT Services, Managed IT Services, Website Design Services, Server Support, IT Consulting, VoIP Phones, Cloud Solutions Provider and much more. Contact Us Today. [...] Read more...
3rd Annual Halloween Lights to Music!
3rd Annual Halloween Lights to Music!September 28, 2022229 North Locust / Events  HAPPY FALL Y’ALL! South Jersey Techies invites you to stop by our office our 3rd Annual Holiday Lights-to-Music Display! This time we are celebrating Halloween!  Located at 229 North Locust Ave, Marlton NJ. We hope you enjoy the show and have a Spooktacular time!! Visit 7pm thru midnight each evening now until Halloween   Park and Tune into 89.9FM   [...] Read more...
New Website Design – L&D Design and Construction
New Website Design – L&D Design and ConstructionAugust 8, 2022Website / Website DesignThe Website Design team of South Jersey Techies has been constantly working on developing great looking websites using the latest web technologies. The most recent website developed by our team is for L&D Design and Construction located in Linwood, New Jersey. L&D Design and Construction is an interior and exterior design business in the South Jersey area serving Atlantic and Cape May County. Lauren McBride is the owner and main designer who has a true passion for helping her clients achieve their functional and aesthetic goals for all indoor and outdoor spaces. Lauren is known for having a brilliant eye for design and understanding exactly what her clients are looking for.     Have questions?   Our Web Design team is here to help. Call us at: 856-745-9990 or visit: https://southjerseytechies.net.   South Jersey Techies, LLC is a full Managed Web and IT Services Company located in Marlton, NJ providing IT Services, Managed IT Services, Website Design Services, Server Support, IT Consulting, VoIP Phones, Cloud Solutions Provider and much more. Contact Us Today. [...] Read more...
Intuit Cyber Alert
Intuit Cyber AlertJune 10, 2022SecurityWe have been alerted to a new Phishing scam that effects Quickbook and Intuit customers. Recently, Intuit published a security notice on their website warning customers of a Phishing scam which appears to be a direct email from Intuit’s customer service department using the domain of “intuit-solution”.  This sender is not associated with Intuit nor is it an authorized agent of Intuit. If you receive an email from this domain or any other email that appears suspicious, do not click on any links or attachments, do not reply to the email and do not forward it to anyone. It is recommended that you delete the email. If you mistakenly click or have already clicked on a link or downloaded something from the email, immediately (1) delete the download (2) scan your system using an up-to-date anti-virus program and (3) change your passwords. If you experience any issues and are worried you may have fallen subject to this scam, contact South Jersey Techies for immediate support. Phishing is a cybercrime aimed to lure individuals into revealing personal information or expose them to downloads of malware that will infect their computer and networks. Phishing baits will impersonate real companies. The imposters are getting harder to spot and not all phishing scams work the same way.  You should never enter your username or password into a Login if you are not 100% confident of the source.  These scams are designed to retrieve sensitive information such as SSNs, credit card information and user names and passwords. Following basic safety tips can help you keep your information safe: Protect your computer with anti-virus software. Keep your browser up to date and install any updates as they are pushed. Contact your bank and any other financial institutions you use if you are a victim of identity theft. Check with your credit reporting agencies often and spot check for any inconsistencies. Report any suspicious emails to your technology provider or third-party vendor so they may be tracked and logged. If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990. [...] Read more...
Don’t Get Hooked – Avoid Phishing
Don’t Get Hooked – Avoid PhishingMay 4, 2022SecurityDid you know more than 90% of data breaches start with a phishing email? A successful ransomware attack can devastate any size organization. As examples from a recent survey, 50% of law firms, 42% of insurance brokers, 37% of non-profit organizations and 27% of retail companies lack a written incident response plan. And 34% said they don’t give employees phishing tests to determine their exposure to risk. We have been actively recommending and implementing layers of security from the hosted level, firewall level, server level, computer level, policy level and now by the user level. Organizations who have incident response plan (IRP) are able to respond more quickly and more effective than those without one. And for organizations in healthcare or financial services, having a plan may be required by law. If you don’t yet have an IRP, we can provide template plans for a variety of types of organizations and even can assist in writing one if need be. We want to reduce your organization’s chance of experiencing a cybersecurity disaster by 70% security awareness training and provide an IRP if an attempt is made. What is “phishing”? Phishing emails look like they came from a person or organization you trust, but in reality they’re sent by hackers to get you to click on or open something that will give the hackers access to your computer. Why are you at risk? Hackers are actively targeting organizations because you have information that is valuable to them. Specifically, they may be interested in any type of valuable data, such as customer, patient, student, or employee data, intellectual property, financial account information, or payment card data.  If one employee falls for a phishing attack, the systems the employee uses can potentially be accessed. (We can run a report on your account to assess phishing attempts per account, contact us if you are interested in obtaining this report) How to spot a phishing email Hackers have gotten clever in how they design the emails they send out to make them look legitimate.  But phishing emails often have the following characteristics: Ask you for your username and password, either by replying to the email or clicking on a link that takes you to a site where you’re asked to input the information. Look like they come from the HR or IT Team Have grammatical errors Contain email addresses that don’t match between the header and the body, are misspelled (like @gmaill.com), or have unusual formats @company-othersite.com) Have links or email addresses that show a different destination if you hover over them Try to create a sense of urgency about responding How can you prevent phishing emails? Employees responding to phishing emails is still one of the biggest risks we see. Training your employees is an essential first step in making sure your data is never encrypted or held for ransom. To help educate your employees about what to watch for, we’ve attached an employee tip sheet. You can download it HERE The Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA) within DHS also have useful collections that include tip sheets. Click here. In addition to tips we do have a solution that is a cloud-based training software that allows your business to train employees to aid with security awareness and phishing resistance. The platform allows us to setup and deliver simulated security threats and phishing incidents to educate and test employees. The training can be required and simulated emails will be sent, and if an employee falls for the threat testing, you would know and the employee can go through further testing. The cost is based per organization and is very reasonable. If there is an interest let us know. Last year we started “hardening” in Microsoft 365 to prevent phishing email attempts as a preventative measure for protecting your accounts. Similar to the “365 hardening” in #4 we have a new solution that is similar to the hardening but with more bells and whistles. The system works in an A.I. setup learning the types of emails you get and where they are coming from. Example. If you got an email from us regularly, but one email originated from a country in Europe not our usual IP address it would flag it. This system ties into 365 very nicely and even give the employees the ability to mark things phishing or safe, if needed. But once a message is marked safe the “outside email” banner will be removed for that email for the entire organization. The solution is a very reasonable cost per account, if there is an interest let us know. CALL US TODAY @ (856) 745-9990 [...] Read more...
Announcing Extended Support Hours
Announcing Extended Support HoursFebruary 23, 2022NewsTo better serve our customers, we are pleased to announce that beginning Tuesday, March 1st, 2022, we will be extending our regular office hours to 8am-8pm, Monday-Friday. We will continue to have emergency support technicians available after-hours from 8pm-8am and weekends. We appreciate our clients’ loyalty to South Jersey Techies over the last 18+ years. Whether a new, existing or soon-to-be client, we value your support and business to our team. As our business has grown, so has our team. This has given us the capacity to extend our regular office hours to provide your company the best possible support throughout the day. Our hope is that the new extended hours will be more convenient for some of your users and allow us to provide support to those users at the regular rate. If you or someone from the team needs support during those hours, please email support at support@sjtechies.com or call (856) 745-9990 to get scheduled with a member of our team [...] Read more...
Microsoft Releases Emergency Fixes for Windows Server, VPN bugs
Microsoft Releases Emergency Fixes for Windows Server, VPN bugsJanuary 28, 2022Microsoft / News / Servers / Technology / Tips & Info / WindowsMicrosoft has released emergency out-of-band (OOB) updates to address multiple issues caused by Windows Updates issued during the January 2022 Patch Tuesday. This update addresses issues related to VPN connectivity, Windows Server Domain Controllers restarting, Virtual Machines start failures, and ReFS-formatted removable media failing to mount. All OOB updates released are available for download on the Microsoft Update Catalog, and some of them can also be installed directly through Windows Update as optional updates. You will have to manually check for updates if you want to install the emergency fixes through Windows Update because they are optional updates and will not install automatically. Windows 10 – KB5010793 Details Here Option 1: Run Windows Update, KB5010793 will appear under optional download. Option 2: Download the patch from there: Microsoft Update Catalog Please download the matching Windows 10 Version. Windows 11 – KB5010795 or KB5008353 (may vary based on Windows Edition) Details Here Option 1: Run Windows Update, KB5010795 will appear under optional download. Select and install. Option 2: Download the patch from there: Microsoft Update Catalog If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990.   [...] Read more...
L2TP VPN Connections Break as part of January 2022 Patch Tuesday
L2TP VPN Connections Break as part of January 2022 Patch TuesdayJanuary 12, 2022Microsoft / News / Technology / WindowsUpdate 1/28/2022: South Jersey Techies has released OOB updates to fix the Windows L2TP VPN connection issues. Microsoft released Windows updates to fix security vulnerabilities and bugs as part of the January 2022 Patch Tuesday that came with fixes for six zero-day vulnerabilities and a total of 97 flaws. These updates also included KB5009566 for Windows 11 and KB5009543 for Windows 10 2004, 20H1, and 21H1. Problems are being reported rapidly from Windows 10 users and administrators who are trying to make L2TP VPN connections after installing the recent Windows 10 KB5009543 and Windows 11 KB5009566 cumulative updates and receiving the error below. L2TP VPN connections are being reported as broken when attempting to connect using the Windows VPN client by Windows users. You will also receive an error code in the Event Log entries, code 789, stating that the connection to the VPN failed. The bug is not affecting all VPN devices and seems only to be affecting users using the built-in Windows VPN client to make the connection. Some users have reported the bug affecting their Ubiquiti Site-to-Site VPN connections for those using the Windows VPN client. The bug also affects connections to SonicWall, Cisco Meraki, and WatchGuard Firewalls, with the latter’s client also affected by the bug. How to fix the break? Admins have been forced to remove the KB5009566 and KB5009543 updates, which immediately fixes the L2TP VPN connections on reboot. However, you face the risk of removing all fixes for vulnerabilities patches released during the January 2022 Patch Tuesday when removing the update due to Microsoft’s bundling of all security updates in a single Windows cumulative update. Weighing the risks of unpatched vulnerabilities versus the disruption caused by the inability to connect to VPN connections is something all Windows admins need to consider, carefully. Microsoft’s January 2022 Patch Tuesday fixed numerous vulnerabilities in the Windows Internet Key Exchange (IKE) protocol (CVE-2022-21843, CVE-2022-21890, CVE-2022-21883, CVE-2022-21889, CVE-2022-21848, and CVE-2022-21849) and in the Windows Remote Access Connection Manager (CVE-2022-21914 and CVE-2022-21885) that could be causing the problems. Unfortunately, there is no known fix or workaround for the L2TP VPN connection issues at this time. If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990. [...] Read more...
2021 Holiday Lights to Music Display
2021 Holiday Lights to Music DisplayDecember 6, 2021229 North Locust / EventsLooking for something fun and free to do with the kids this season? Stop by our office, tune into 89.9FM on your car stereo and enjoy our Musical Light Display with the family! Where: 229 North Locust Ave, Marlton, New Jersey 08053 When: 5pm thru midnight every night now until New Years Eve! Park and Tune into 89.9FM   [...] Read more...
Holiday Food Drive
Holiday Food DriveNovember 30, 2021Events  Holiday Food Drive! South Jersey Techies has teamed up with local businesses to help replenish Cherokee High School’s Food Pantry this holiday season! WHEN: Saturday, December 11th from 9:30a-11:30aWHERE: Laurel Oak Garden Center Bring your non-perishable food items on December 11th and get a FREE picture with Santa while enjoying our hot coco bar! Can’t make it on December 11th but still want to donate? There are 6 drop off locations where donations can be delivered at any time before December 11th listed below. Questions can be emailed to Scott Zielinski of The Zielinski Real Estate Group @ scott@zhomesrealestate.com [...] Read more...
Halloween Lights to Music!
Halloween Lights to Music!October 6, 2021Events  HAPPY FALL Y’ALL! South Jersey Techies invites you to stop by our office for a Holiday Lights-to-Music Display! This time we are celebrating Halloween! Located at 229 North Locust Ave, Marlton NJ. We hope you enjoy the show and have a Spooktacular time!! Visit 7pm thru midnight each evening until Halloween   Park and Tune into 89.9FM   [...] Read more...
Apples URGENT iPhone Software Update for CRITICAL Spyware Vulnerability
Apples URGENT iPhone Software Update for CRITICAL Spyware VulnerabilitySeptember 14, 2021Apple / Apple TV / Internet Security / iOS / iPad / News / Security / Virus / Adware / Spyware RemovalApple has updated its software for iPhones to address a critical vulnerability that independent researchers say has been exploited by notorious surveillance software to spy on a Saudi activist. Researchers from the University of Toronto’s Citizen Lab said the software exploit has been in use since February and has been used to deploy Pegasus, the spyware made by Israeli firm NSO Group that has allegedly been used to surveil journalists and human rights advocates in multiple countries. The urgent update that Apple (AAPL) released Monday plugs a hole in the iMessage software that allowed hackers to infiltrate a user’s phone without the user clicking on any links, according to Citizen Lab. The Saudi activist chose to remain anonymous, Citizen Lab said. Apple credited the Citizen Lab researchers for finding the vulnerability. “Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals,” Ivan Krsti?, head of Apple Security Engineering and Architecture, said in a statement. Krsti? said Apple rapidly addressed the issue with a software fix and that the vulnerability is “not a threat to the overwhelming majority of our users.” Still, security experts encouraged users to update their mobile devices for protection. In a statement, NSO Group did not address the allegations, only saying, “NSO Group will continue to provide intelligence and law enforcement agencies around the world with life saving technologies to fight terror and crime.” The firm has previously said its software is only sold to vetted customers for counterterrorism and law enforcement purposes. Researchers, however, say they have found multiple cases in which the spyware was deployed on dissidents or journalists. In 2019, Citizen Lab analysts alleged that Pegasus was used on the mobile phone of the wife of a slain Mexican journalist. In a lawsuit filed in 2019, Facebook accused NSO Group of being complicit in a hack of 1,400 mobile devices using WhatsApp. (NSO Group disputed the allegations at the time.) The proliferation of easy-to-use mobile hacking tools has given governments around the world a new and stealthy means of targeting adversaries. Sophisticated spyware made by NSO Group and other vendors has been reportedly used from Uzbekistan to Morocco. The surge in spyware prompted a United Nations panel of human rights experts in August to call for a moratorium on the sale of such surveillance tools. The UN panel said the ban should remain in place until governments have “put in place robust regulations that guarantee its use in compliance with international human rights standards.” [...] Read more...
New Website Design – Line Side Electric
New Website Design – Line Side ElectricJune 24, 2021Website / Website DesignThe Website Design team of South Jersey Techies has been constantly working on developing great looking websites using the latest web technologies. The most recent website developed by our team is for Line Side Electric, LLC located in Blackwood, New Jersey. Line Side Electric maintains a staff of experienced project managers, estimators, and a crew of quality electricians capable of performing system repairs, renovations, as well as the installation of new electrical systems. They strive to beat budgets and timelines while maintaining the highest level of quality. Their goal is to be considered both reliable and responsive to all of our customers at all times. Check out their new site for the services they have to offer and contact them today for more information!     Have questions?   Our Web Design team is here to help. Call us at: 856-745-9990 or visit: https://southjerseytechies.net.   South Jersey Techies, LLC is a full Managed Web and IT Services Company located in Marlton, NJ providing IT Services, Managed IT Services, Website Design Services, Server Support, IT Consulting, VoIP Phones, Cloud Solutions Provider and much more. Contact Us Today. [...] Read more...
Marlton Baseball Sponsor
Marlton Baseball SponsorJune 24, 2021Events / UncategorizedThank you Marlton Baseball for our plaque for sponsoring the 5-6 y/o baseball league this year. It was our pleasure and we look forward to it again next year!   [...] Read more...
Cyber-attack hits world’s largest meat supplier
Cyber-attack hits world’s largest meat supplierJune 3, 2021Internet Security / News / Security / Tips & InfoThe breach is the latest targeting of a crucial supply chain and comes three weeks after the Colonial Pipeline hack disrupted fuel operations in the U.S. Here’s what we know: What is JBS? JBS USA is part of JBS Foods, one of the world’s largest food companies. It has operations in 15 countries and has customers in about 100 countries, according to its website. Its customers include supermarkets and fast food outlet McDonald’s and in the US, JBS processes nearly one quarter of the county’s beef and one-fifth of its pork. JBS’s five biggest beef plants are in the US, and the shutdowns have halted a fifth of meat production there, according to Bloomberg. Its brands include Pilgrim’s, Great Southern and Aberdeen Black. The US headquarters is based in Greeley, Colorado, and it employs more than 66,000 people. What happened? Hackers attacked the company’s IT system last weekend, prompting shutdowns at company plants in North America and Australia. IT systems are essential in modern meat processing plants, with computers used at multiple stages including billing and shipping. JBS hack shuttered nine US beef plants but normal operations to resume Wednesday The hack, which the White House described Tuesday as ransomware, affected all of JBS’s US meatpacking facilities, according to an official at the United Food and Commercial Workers union that represents JBS employees. The cyberattack resulted in the closure of all nine of the company’s US beef plants, which are located in states including Arizona, Texas, Nebraska, Colorado, Wisconsin, Utah, Michigan and Pennsylvania, the union official said. The company said on Monday that it suspended all affected IT systems as soon as the attack was detected, and that its backup servers were not hacked. The White House has said that the ransomware attack was likely carried out by a Russia-based criminal organization, and that it is dealing with the Russian government on the matter. JBS’ operations in Australia were also affected. The Australian Meat Industry Council, a major trade group, said in a statement that “there is no indication whatsoever that this cyberattack will cause a major impact on Australian domestic red meat and pork products supply.” What is ransomware? In a ransomware attack, hackers steal an organization’s data and lock its computers. Victims must pay to regain access to their network and prevent the release of sensitive information. Some sophisticated ransomware hackers, such as the Russian hacker group Darkside, sell their ransomware technology and take a cut of any ransoms paid to their customers. Experts generally encourage ransomware victims not to pay any ransom. But a company’s ability to get back online without paying hackers may depend on whether it has protected backups of its data. In some cases, hackers can delete their target’s backups before locking its files, leaving the victim organization with no recourse. JBS did not comment to CNN about details of the ransomware attack, including whether it paid the ransom. This kind of cyberattack sounds familiar. Where have I heard that? The hack comes a few weeks after a ransomware attack targeted Colonial Pipeline, which forced a six-day shutdown of one of the United States’ largest fuel pipelines. That May attack resulted in gas shortages, spiking prices and consumer panic. Colonial Pipeline has confirmed it paid a $4.4m (£3.1m) ransom to the cyber-criminal gang responsible. Similar to JBS, Colonial Pipeline’s systems were hit with ransomware. Once a company has been hit by ransomware, its first course of action is usually to take much or all of its systems offline to isolate the hackers’ access and make sure they can’t move into other parts of the network. That may be among the reasons why JBS shut down its operations and Colonial shut down its pipeline — to disconnect the companies’ operations from the IT systems that hackers breached. People briefed on the Colonial attack have said that the company halted operations because its billing system was also compromised and feared they wouldn’t be able to determine how much to bill customers for fuel they received. The pipeline has since returned to normal operations. Don’t be the next victim of a ransomware attack. Contact South Jersey Techies to discuss how your critical information can be secure. If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990.     [...] Read more...
Holiday Lights to Music Display
Holiday Lights to Music DisplayDecember 3, 2020EventsNeed something fun to do with the kids this holiday season? Stop by our new office located at 229 North Locust Ave in Marlton, New Jersey and check out our first ever Lights to Music Display! Park and Tune into 89.9FM 5pm thru midnight each evening until New Years Eve! [...] Read more...
Teams Vs. Zoom
Teams Vs. ZoomOctober 16, 2020Microsoft / News / Tips & Info6 Microsoft Teams features Zoom doesn’t have One of the major news in March 2016 was that Microsoft was considering bidding $8 billion to purchase Slack. However, Bill Gates and the team decided that instead of buying Slack, they would develop their own chat app tool. Teams is mostly a Slack alternative, but it’s also meant to replace Skype for Business, which up until recently was Microsoft’s corporate video conferencing service. The app’s main functionality is the group chat that comes with plenty of features. Some of these features include editing, deleting, pinning messages, as well as starting a new thread and sharing files. You can even send .gif images, as well as emojis. Possibly due to Skype’s legacy, Teams includes a bunch of video features that Zoom doesn’t. There are real-time captions, built-in meeting notes, and a bizarre feature where you can pretend you’re in the same room as your coworkers! To be clear: Zoom is a perfectly capable and liked solution. That doesn’t mean other apps are not offering anything interesting, and Microsoft in particular is trying a bunch of new things in the space. Here are a few highlights. Built-in meeting notes Persistent chat with rich formatting Blurred background Virtual classroom with your coworkers Live captions Included with Microsoft subscription 1. Built-in meeting notes Zoom is a video conferencing app—and that’s about it. What happens if you’re in the middle of an important meeting, but need a way to take some notes? You think you’d have to use Microsoft Word or another program, but did you know that Teams has its own meeting notes feature, too? Microsoft Teams is built around the idea that it will be the all in one tool you use for all collaboration: team chat, video calls, and even internal documentation. Click Meeting notes, and a new tab for meeting minutes will be created in the current channel. Notes get saved as part of the meeting itself, and can go anywhere with you, and will be saved for later or for sharing with your coworkers. This is a quick way to ensure there’s a written record of the meeting in a place where everyone can access it, which is very slick. Meeting Notes in Teams is a great way to capture every detail about your meetings on the platform. You can take and access notes before, during, and after a meeting in Teams. So, keep all your notes in one place while sharing them with your colleagues. 2. Persistent chat with rich formatting  Zoom chat is very simple. Microsoft Teams’ chat for meetings, on the other hand, has more formatting features than AIM. We’re not sure if you have the multitasking skills to format text during a meeting, but it’s there if you want it. And this is just the beginning—there’s a large sticker collection and, for some reason, a meme creator. Imagine how much fun this can make your meetings! Microsoft Teams also keeps a record of the chat from every meeting and posts all comments in the channel. Have you ever lost track of helpful links and information during a Zoom meeting? With Teams, you can review the comments after the meeting, and any points made there can be found using search alongside the rest of your chats. It’s easy to see why this is useful. 3. Blur your background Zoom backgrounds are, at this point, an important part of our collective human culture—the ultimate form of self-expression. With this best practice, you can have your meeting almost anywhere, and disguise whatever happens in the background around you. Naturally, Microsoft Teams offers custom backgrounds for meetings. 4. Pretend you’re in the same room as your coworkers Zoom  has two views that you can switch between. Speaker View and Gallery View: essentially, you can see the person talking right now or see everyone at once. Microsoft Teams adds another: Together Mode. Everyone on the call is shown as though they’re sitting next to each other in some kind of classroom, or sporting event like we’ve seen on TV with the NBA,MLB, NHS and NFL. This is optional, and turning it on only changes things on your screen.  Is this useful? No. Will it make you feel slightly less alone during a year in which in-person interaction is rare? No. Is it somewhat amusing? Yes. 5. Live captions Teams can detect what’s said in a meeting and present real-time captions. And, if you’ve turned on the new meeting experience, your captions will include speaker attribution—so you’ll see not only what’s being said, but who’s saying it.  Zoom offers a closed captioning feature, but someone has to manually type them out. Microsoft’s system recognizes speech automatically. Live captions can make your meeting more inclusive to participants who are deaf or hard-of-hearing, people with different levels of language proficiency, and participants in loud places by giving them another way to follow along. 6. There’s a good chance you’re already paying for it Zoom is free, but the free version limits meetings to 40 minutes. Microsoft Teams’ free version has no such restrictions for video meetings. There’s also a good chance you’re already paying for the full version. Microsoft Teams is included with every version of Microsoft 365 for business. This means that, if your company pays for a Microsoft Office subscription, you already have access to Teams. You should probably give it a chance and consider not paying for Zoom and/or Slack on top of it. Features Group and private chat. Video calling, audio calling, and screen sharing. Schedule video calling. Thread messaging. Works seamlessly with any other Office app. Up to 250 people per video call. Over 270 integrations. Available in 53 languages. Best for Microsoft-centric teams. Organizations that want to keep ideas organized and compartmentalized. If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990.   [...] Read more...
Cyber Security Awareness
Cyber Security AwarenessOctober 9, 2020Internet Security / News / Security / Tips & Info / Virus / Adware / Spyware RemovalAs school, socializing, and many aspects of life have moved online this year, it’s more important than ever that you protect your digital devices and steer clear of cybercriminals. Computer security threats are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Arm yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online. Examples of Online Cybersecurity Threats Computer Viruses Probably the most eminent computer security threat, a computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user. A virus replicates and executes itself, usually doing damage to your computer in the process. What can you do to avoid computer viruses? Carefully evaluate free software, downloads from peer-to-peer file sharing sites, and emails from unknown senders. These things are critical to avoiding viruses. Most web browsers have security settings which can be configured for top defense against online threats. But, as we’ll say again and again, the single most-effective way of fending off viruses is up-to-date antivirus software and monitoring agent, like we include in our Managed Service Plans. Spyware Threats A serious computer security threat, spyware is any program that monitors your online activities or installs programs without your consent for profit or to capture personal information. While many users won’t want to hear it, reading terms and conditions is a good way to build an understanding of how your activity is tracked online. As always, if a company you do not recognize is advertising for a deal that seems too good to be true, be sure you have an internet security solution in place and click with caution. Hackers and Predators People, not computers, create computer security threats and malware. Hackers and predators are programmers who victimize others for their own gain by breaking into computer systems to steal, change, or destroy information as a form of cyber-terrorism. These online predators can compromise credit card information, lock you out of your data, and steal your identity. As you may have guessed, online security tools with identity theft protection are one of the most effective ways to protect yourself from this brand of cybercriminal. Phishing Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages. Phishing attacks are some of the most successful methods for cybercriminals looking to pull off a data breach. Antivirus solutions with identity theft protection can be taught to recognize phishing threats in fractions of a second. Cyber Safety Tips Keep software systems up to date and use a good anti-virus program. Examine the email address and URLs in all correspondence. Scammers often mimic a legitimate site or email address by using a slight variation in spelling. If an unsolicited text message, email, or phone call asks you to update, check, or verify your account information, do not follow the link provided in the message itself or call the phone numbers provided in the message. Go to the company’s website to log into your account or call the phone number listed on the official website to see if something does in fact need your attention. Do not open any attachments unless you are expecting the file, document, or invoice and have verified the sender’s email address. Scrutinize all electronic requests for a payment or transfer of funds. Be extra suspicious of any message that urges immediate action. Confirm requests for wire transfers or payment in person or over the phone as part of a two-factor authentication process. Do not verify these requests using the phone number listed in the request for payment.   If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990. [...] Read more...
Office 2010 is Retiring
Office 2010 is RetiringSeptember 10, 2020Email Accounts / Microsoft / Microsoft Office / Microsoft Outlook / Microsoft PowerPoint / Microsoft Word / News / Software / Tips & InfoThe popular Microsoft Office 2010 is reaching end of support in a few months. To avoid security risks, it’s time to upgrade to a newer version of Office. The good news is that you have options. What Does End of Support Mean? Microsoft Office 2010 has been a popular version of the application over the last decade. The unfortunate news is that support for it ends this fall — on October 13, 2020, to be exact. All of your Office 2010 apps will continue to function. However, using an unsupported version of any software exposes your computer to serious and potentially harmful security risks. Microsoft will no longer provide technical support, bug fixes, or security fixes for Office 2010 vulnerabilities that may be subsequently reported or discovered. This includes security updates that help protect your PC from harmful viruses, spyware, and other malicious software. You’ll no longer receive Office 2010 software updates from Microsoft Update.You’ll no longer receive phone or chat technical support.No further updates to support content will be provided, and most online help content will be retired.Another difficulty you may face is incompatibility with some of the newer programs and file formats. If you’re using Office 2010, it’s probably a good time to upgrade your version of Microsoft Office. Upgrade Options The best way to protect yourself and your organization is to upgrade to a newer version of Office: Cloud upgrade: Subscriptions to Microsoft 365On-premises upgrade: Office Standard 2019 Microsoft 365 Microsoft 365 is an all-in-one cloud solution with a number of different licensing options to fit your organization’s needs. The best part about cloud-based applications is that you no longer have to worry about retirements, patches, and end of support. Cloud licenses are automatically updated with new features, new applications, and security updates. Many cloud subscriptions also include installed (or desktop) versions of the application, so you can have the same look and feel of the Office applications you are accustomed to using, but built with more robust features and benefits. Microsoft Office Standard 2019 Microsoft Office Standard 2019 is the latest version of the on-premises version of the office suite and is a good option for you if you are not ready for the cloud version at this time. This version of Office includes Word, Excel, PowerPoint, Outlook, OneNote, and Publisher. If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990. [...] Read more...
Shark Tank host, Barbara Corcoran loses $388,700 in phishing scam
Shark Tank host, Barbara Corcoran loses $388,700 in phishing scamMarch 5, 2020Email Accounts / Internet Security / News / Tips & InfoBarbara Corcoran of ABC’s “Shark Tank” has lost nearly $400,000 in a phishing scam this week. Corcoran told “People” that she was tricked as a result of an email scheme sent to her team. The high-powered businesswoman told People that she received a scam invoice approving a real estate renovation, but she didn’t think twice about verifying it because she invests in real estate. It was only until her bookkeeper caught Corcoran’s assistant’s email was misspelled by 1 letter and it was later found to be the address used by the scammer. “I was upset at first, but then remembered it was only money,” Corcoran told the magazine. Corcoran’s assistant Emily Burke told CNN Business that the “Shark Tank” star wouldn’t provide any additional comment “at the advisement of her attorneys until the authorities are done investigating.” However, Corcoran tweeted: “Lesson learned: Be careful when you wire money!” with a link to a TMZ story. In addition to being an investor and a judge on the hit ABC show, Corcoran formerly owned the global real estate agency that shares her name. She sold it for $66 million in 2001. Corcoran fell for a phishing scam. It’s common, too: Nearly 30,000 people reported being a victim of that type of scam last year. Together they reported nearly $50 million in losses, according to the FBI’s 2018 Internet Crime Report. Phishing attacks are common methods of stealing usernames, passwords and money. Hackers pretend to be a trustworthy source to convince you to share personal data. To be safe, it’s important to make sure the sender is authentic before clicking on a link. Google has rolled out security protections that warns people of potential unsafe emails. If you or your team have any questions or concerns please contact support at (856) 745-9990. [...] Read more...
New Office – 229 North Locust Ave
New Office – 229 North Locust AveOctober 10, 2019229 North LocustExciting things are happening at South Jersey Techies, LLC, and we want to share some important news. We are proud to announce that due to our business growth we will be moving to a new location in 2020. For the past two years we have been working with our township and service professionals to rezone and prepare to rehab a property to allow our business to continue to grow for the forseeable future. It’s not the most presentable place YET! [...] Read more...
Protect Your Data & Backup
Protect Your Data & BackupAugust 28, 2019News / Security / Software / Tips & Info / Virus / Adware / Spyware RemovalNot sure your are protected? Contact us, we can help! Hackers held two school districts on Long Island hostage over the summer, forcing one of them to pay $88,000 in cryptocurrency in order retrieve student and staff information before the school year started. Despite using an anti-virus software and other firewalls for cyber security, the School District’s encrypted files were accessed this summer by Ryuk ransomware, which can infiltrate an entire server with one click of a malicious email attachment. The virus encrypts data, essentially locking users out of access to their files, and hackers are blackmailing schools until payment is made, usually in bitcoin, through school insurance to unlock the system’s server. The Mineola School District was also attacked by the same virus. But they didn’t have to pay because they had a backup that wasn’t compromised. What are some tips to avoid having to pay the ransomware The nefarious ransomware business model has turned out to be a lucrative industry for criminals. Over the years its ill repute has made law enforcement team up with international agencies to identify and bring down scam operators. Most of the ransomware attacks that have taken place in the past have been linked to poor protection practices by employees and businesses. There are ways to prepare and steps you can take to avoid the nuances these hackers are causing. Here are a few dos and don’ts when it comes to ransomware. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick employees into installing malware, or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls or emails.Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.Do employ content scanning and filtering on your mail servers. Inbound e-mails should be scanned for known threats and should block any attachment types that could pose a threat.Do make sure that all systems and software are up-to-date with relevant patches. Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi like Norton Secure VPN. Ransomware criminals often attack small and medium sized businesses. Among other cyber attacks, ransomware is one criminal activity that can be easily worked around with the above-mentioned solutions. South Jersey Techies coupled with education about these threats is an excellent protection plan for today’s cyber landscape. [...] Read more...
Symantec Security Cloud
Symantec Security CloudJuly 26, 2019Laptops / PCs / Security / Software / Technology / Virus / Adware / Spyware RemovalSymantec Endpoint Protection Cloud Windows client upgrade scheduled for August 5, 2019 The SEP Cloud client for Windows is updated periodically to provide improvements and defect fixes. The next update is scheduled to start on August 5, 2019. WHAT’S NEW ? In this release, the SEP Cloud client for Windows will be updated to version 22.18 to provide an enhanced protection framework and client stability. Fixed an issue related to the OS feature on the agent, which was randomly failing with a medium severity while applying the Management policy.Fixed an issue related to the security event: “A process modified a critical system resource.” This event was erroneously displayed in the console as a threat detection/remediation event. The event is now removed and will not be displayed in the console.Enhancement to process HTTP error 429 status code request. The SEP Cloud agent will not attempt to connect with the cloud when the 429 status code is returned, but instead, try to connect based on the timeout information.If the timeout information is not available, then the product will retry to connect in 15 minutes by default. IMPACT All Windows devices that are currently enrolled in SEP Cloud will automatically be updated in the background, using LiveUpdate. This update does not affect the security of your devices. To start, the update is distributed to a small set of clients over the first seven days of the release, and then the remaining clients will get the update. If you want to update sooner, you can run LiveUpdate from the Symantec Endpoint Protection Cloud client UI. Action Required Windows device restart All users with Windows devices will be prompted to restart their devices after the update. Even if they delay the restart, their Windows clients remain Protected. If no user is logged on the device when the upgrade is made available, then the prompt is provided until the user logs on. The product update will not force the restart of the device. Windows installation package refreshAdministrators who created a Windows installation package before August 5 should create and distribute a new one after August 5 to use for new Windows package deployments. If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990. [...] Read more...
New Website Design – SigEp NC IOTA Alumni
New Website Design – SigEp NC IOTA AlumniJuly 24, 2019Website / Website DesignThe Website Design team of South Jersey Techies has been constantly working on developing great looking websites using the latest web technologies. The most recent website developed by our team is for SigEp NC IOTA Alumni in Wilson, North Carolina. SigEp was founded with the Cardinal Principles of Virtue, Diligence and Brotherly Love. Their mission is “Building Balanced Men,” which is achieved through a commitment to Sound Mind and Sound Body. As an Alumni and Volunteer Corporation (AVC) they serve as an association for alumni of the chapter, other local SigEps and friends of the Fraternity. Effectively engaging alumni brothers and community members to generate new volunteers and donors to support the chapter. Consistent communications and events, a visible and engaged Alumni and Volunteer Corporation, and active volunteer recruitment leads to a well-cultivated alumni base and a lasting affinity for SigEp NC Iota. Have questions? Our Web Design team is here to help. Call us at: 856-745-9990 or visit: https://southjerseytechies.net. South Jersey Techies, LLC is a full Managed Web and IT Services Company located in Marlton, NJ providing IT Services, Managed IT Services, Website Design Services, Server Support, IT Consulting, VoIP Phones, Cloud Solutions Provider and much more. Contact Us Today. [...] Read more...
CALL US NOW!