The New Jersey IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Eclipse Integrated Systems, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Free IT Whitepaper

Free IT Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download!

What Our Clients Say

  • Amazing!

    Doing business with Eclipse Integrated Systems has been a pleasure.  Marc Buonocore and team are a great bunch to work with!  They really know their stuff when it comes to eliminating annoying computer issues and making technology actually WORK for businesses.

Latest Blogs

Social Media: The Most Effective Tool for Phishing Scams

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call Eclipse Integrated Systems at 800-340-0505.

Learn More

Tip of the Week: Cracked Your Phone’s Screen? Here’s What You Should Do Next

Here are six measures that you can take when you accidentally crack your screen.

Do Nothing
Yes, this is an option if you don’t want to invest in a new screen. It might be tempting to just deal with the cracked screen, especially if the phone still works perfectly fine. If you must bear with the cracked screen, it’s not the end of the world, especially if your contract has yet to expire and provide you with another option. If you think that the screen might start to fall apart, a screen protector can be used to hold it in place. Of course, if the crack is on the outside and your fingers are swiping against the edge of glass, you might need to resort to the next option.

Ask Around for a Replacement
Smartphones these days are easier to find than you might think. Since they are often replaced prematurely, someone you know might have a spare on-hand that they are willing to part with. In most cases, all you have to do is move your SIM card over to the replacement and you’ll be able to continue using your device. Keep in mind, typically the replacement needs to be on the same or a similar carrier.

Perform a Risky DIY Repair
If you don’t want to buy a new phone or ask around for a hand-me-down, you could always try to replace the screen yourself. There are plenty of resources on the Internet that can help you fix a phone, but only if you’re willing to take some risks. In a way, it’s a very high-risk high-reward investment, so only do this if you want to commit to fixing the device, regardless of whether it works or not. Typically you can find a replacement screen on eBay, but replacing it is about as complex as it sounds.

Get Someone Else to Fix It
If you don’t want to take the risk yourself, you can hire someone to do the job for you. However, taking it to the manufacturer is sure to result in a pricey repair bill. Instead, if you have an IT department or a managed IT provider on your side, they might be able to help point you in the right direction. For companies that are looking to provide smartphones to their staff, a comprehensive insurance plan is important in order to mitigate your organization’s liability. Much like the managed services we provide, insurance will replace the phone with a similar device for a fraction of the cost of replacing it yourself (which will likely cost your business hundreds of dollars).

Trade Away or Sell Your Phone
If you’re willing to invest a bit into a new phone, you can trade it in or sell your old one for a bit of extra cash toward the new one. While this doesn’t really help you fix the screen itself, a new phone can be a gift in and of itself. Just make sure to properly wipe your device of any sensitive data prior to doing so. If you don’t know how, we’d be happy to help.

Keep an Eye Out for a Good Deal
For the average small business, providing your staff with smartphones can boost productivity, even off the clock. You will be surprised just how much communication and collaboration can be done by your workers remotely. Because of the costs involved however purchasing new top-of-the-line smartphones may not be in the cards. You might be able to find unlocked or used devices online which will allow you to get functional and well-kept devices for cents on the dollar (compared to purchasing the phones at retail prices). If you want to buy a new phone(s), however, it may benefit you to look for deals on the Internet rather than shop for them in-store. Most important, though, is that any devices you buy will come without any strings attached, no contract or carrier specificity that could hinder your ability to get the phone connected.

Mobile devices can be a major benefit for the modern business. If you need help choosing which phones are best for your organization, what carrier to use, or to talk to one of our professionals about mobile device management call us today at 800-340-0505.

Learn More

Is Combining Mobile Apps and ATMs a Good Idea?

What’s Being Done?
Wells Fargo has created an initiative that lets members access their accounts through an ATM, even without their ATM cards, through a mobile device. The application in question allows the account holder to receive a temporary pass code that they can use at a Wells Fargo ATM alongside their PIN.

At the time of this writing, while Wells Fargo is certainly the one leading the pack in terms of app-based ATM access, there are others who are following suit. These organizations include Chase, Bank of America, and Citigroup, all of which have already started to implement similar measures for their ATMs.

However, that’s just the beginning. Wells Fargo’s ATMs also feature near-field communication (NFC), which lets their users access their funds without the need of their card. Users can also use their mobile device to scan their fingerprint, alongside entering their PIN. Only 40 percent of the ATMs are currently equipped with this feature, but it seems to be a great way to help card users in a pinch.

Will These Advancements Work?
These advancements might be a great way to help users stay more secure, but criminals will still find ways around these functions. This is apparent, as six times as many ATMs have been compromised since 2014.

Scammers are also taking advantage of cameras and card skimming technologies to steal information when a bank member accesses an ATM. Some of the more advanced card skimmers can be inserted directly into the ATM’s card scanning mechanism, giving thieves direct access to individual’s account information and security credentials. Even schemes like pinhole cameras can let hackers get a great view of a user’s PIN or card number.

To make matters worse, hackers might try to sabotage machines that don’t have their devices installed on them. This forces bank members to use the devices that have been tampered with, putting themselves at risk. Therefore, if you see a group of ATMs and only one of them works, you may want to avoid using it.

Even those who have chip-based cards aren’t safe from hackers, as scammers can use a method called “shimming” to steal the information located on the chip. While this is somewhat rare to encounter, chances are that hackers will eventually be able to streamline the process and it will become more popular over time--especially considering how common chip cards are now. That’s not even mentioning that the chip cards still have magnetic strips, which means that they might decide to just swipe the card.

A Couple of Problems
Keep in mind that ATMs are still rather vulnerable to scammers for a number of reasons. For one, these security features often are only added to the machine’s features rather than replacing old or ailing ones. For example, the Wells Fargo ATMs that allow for temporary PINs will still allow for access with less secure methods. Considering how there are only about 20 million Wells Fargo app users out of their 70 million members, there’s a majority that are still using less-secure features for their banking purposes.

Even further, this assumes that those 20 million app users will bother to take advantage of them in the first place. Sometimes a habit can be hard to break, especially when you’ve been using the same technology for so many years. Regrettably, some users will still just keep using their cards the same way, even though security is a valid reason to change it up.

What Can You Do?
Regardless of how you use ATMs, you’ll need to keep security at the top of your mind. To this end, it’s your responsibility to take advantage of whatever means necessary to protect your finances. The least you can do is shield your PIN with your other hand as you plug it into the ATM.

What are your thoughts on these ATM security practices? Let us know in the comments, and be sure to subscribe to our blog.

Learn More

Know someone who would benefit from Eclipse Integrated Systems? Let us know!

Latest News

Eclipse Integrated Systems launches new website!

Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...

Account login