From the gleaming towers of Wall Street to the vibrant storefronts of Main Street, New York City thrives on innovation and resilience. In the wake of economic shifts and evolving technological landscapes, IT solutions have become the linchpin connecting these two worlds, fostering growth across every borough. From optimizing financial algorithms for global investment firms to empowering local businesses with e-commerce platforms and streamlined operations, technology is leveling the playing field and driving NYC’s unwavering spirit. This digital transformation is not just about implementing new software; it’s about building a stronger, more connected, and economically resilient New York, ensuring that the benefits of technological advancement reach every corner of the city.
Fairdinkum
Thu, 03 Apr 2025 08:00:00 +0000
Decoding the Tariff Impact on Your IT Upgrades
Decoding the Tariff Impact on Your IT Upgrades
Are you worried about your tech cost ballooning? New tariffs are something to consider. In early 2025, the U.S. government announced tariffs on imports from Canada, Mexico and China. The tariffs include a 25% levy on goods from Canada and Mexico and a new 10% charge on Chinese products. These tariffs are expected to increase...
The post Decoding the Tariff Impact on Your IT Upgrades appeared first on Fairdinkum.
Mon, 31 Mar 2025 16:57:32 +0000
Laura Dominguez: Field Systems Engineer
Laura Dominguez: Field Systems Engineer
Laura Dominguez is one of our dynamic Field Systems Engineers whose journey in the IT world, though only five years in the making, is already marked by exceptional dedication and unwavering principles. Her contributions have solidified her as an invaluable and dependable member of our team. And, as a bonus, her passion for baseball, ignited...
The post Laura Dominguez: Field Systems Engineer appeared first on Fairdinkum.
Wed, 19 Mar 2025 18:26:43 +0000
How North Korea Pulled Off a $1.5 Billion Cryptocurrency Heist and Why Cold Wallets Didn’t Stop It
How North Korea Pulled Off a $1.5 Billion Cryptocurrency Heist and Why Cold Wallets Didn’t Stop It
In February 2025, North Korean hackers executed one of the largest cryptocurrency thefts in history, stealing approximately $1.5 billion from the Dubai-based exchange Bybit. The attack, attributed to the infamous Lazarus Group, sent shockwaves through the crypto industry, raising urgent concerns about digital asset security. This incident also shattered the belief that cold wallets—previously considered...
The post How North Korea Pulled Off a $1.5 Billion Cryptocurrency Heist and Why Cold Wallets Didn’t Stop It appeared first on Fairdinkum.
Wed, 12 Mar 2025 14:55:07 +0000
The Return of the BYOD Threat
The Return of the BYOD Threat
Fifteen or so years ago, one of the biggest cybersecurity threats was the employee who used a personal device in the workplace. Even though workers used their home computers to log in to their business accounts, the Bring Your Own Device (BYOD) movement and the security concerns hit its stride with the introduction of smartphones...
The post The Return of the BYOD Threat appeared first on Fairdinkum.
Wed, 26 Feb 2025 23:09:08 +0000
How to Protect and Improve Your IT Systems During a Move
How to Protect and Improve Your IT Systems During a Move
At some point, almost every company needs to relocate. Moving furniture and updating addresses is cumbersome enough, but the modern organization also needs to move its entire IT structure. Yes, relying on cloud computing and SaaS architecture through an MSP will make access to corporate data a seamless process, but you still have the hardware,...
The post How to Protect and Improve Your IT Systems During a Move appeared first on Fairdinkum.
Tue, 25 Feb 2025 18:39:52 +0000
The Post-Analysis of the Cyber Incident: Why You Should Review the Lessons Learned
The Post-Analysis of the Cyber Incident: Why You Should Review the Lessons Learned
Phase 6: Lessons Learned A successful Incident Response Plan (IRP) will be your guide through any type of disaster that impacts your business, from a ransomware attack that locks up your data to a hurricane that destroys a data center to a power outage that makes your systems unavailable. The plan will take you from...
The post The Post-Analysis of the Cyber Incident: Why You Should Review the Lessons Learned appeared first on Fairdinkum.
Wed, 19 Feb 2025 16:39:25 +0000
Restoring Normalcy to Your Compromised Network
Restoring Normalcy to Your Compromised Network
Phase 5: Recovery In your Incident Response Plan (IRP), Phase 4 (eradication) goes hand-in-hand with Phase 5 (recovery). In fact, in the National Institutes of Standards and Technology (NIST) Computer Security Incident Handling Guide, eradication and recovery are grouped together in one section, stating “eradication and recovery should be done in a phased approach so...
The post Restoring Normalcy to Your Compromised Network appeared first on Fairdinkum.
Fri, 07 Feb 2025 08:00:00 +0000
You Found the Cyber Attack, Now Get Rid of It
You Found the Cyber Attack, Now Get Rid of It
If your organization’s Incident Response Plan (IRP) is going as projected in the aftermath of a cyber incident, the attack has been identified and contained. Now it is time for phase 4, eradication. Containment of the attack should keep it from spreading throughout the system. The goal of eradication is to completely remove threats from...
The post You Found the Cyber Attack, Now Get Rid of It appeared first on Fairdinkum.
Thu, 06 Feb 2025 08:00:00 +0000
Paul Stenson: Systems Engineer
Paul Stenson: Systems Engineer
Paul Stenson, our talented Systems Engineer, brings a unique blend of skills and experience to FDI. With 7 years in the IT/Tech space and a background as a camp counselor, Paul demonstrates a strong work ethic, adaptability and a knack for connecting with people. A true sports aficionado, Paul’s loyalties lie with the New York...
The post Paul Stenson: Systems Engineer appeared first on Fairdinkum.
Tue, 04 Feb 2025 14:02:36 +0000
The Best Way to Contain a Cyber Incident Depends on the Type of Attack
The Best Way to Contain a Cyber Incident Depends on the Type of Attack
The Best Way to Contain a Cyber Incident Depends on the Type of Attack After noticing that your network was experiencing unusual glitches, you turned to your Incident Response Plan (IRP) and instituted Phase 2—identifying the cause of the network problem. Unfortunately, it is a worst-case scenario. The network has been breached, and data appears...
The post The Best Way to Contain a Cyber Incident Depends on the Type of Attack appeared first on Fairdinkum.