The New Jersey IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Eclipse Integrated Systems, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Free IT Whitepaper

Free IT Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download!

What Our Clients Say

  • Amazing!

    Doing business with Eclipse Integrated Systems has been a pleasure.  Marc Buonocore and team are a great bunch to work with!  They really know their stuff when it comes to eliminating annoying computer issues and making technology actually WORK for businesses.

Latest Blogs

Smartphones Are at the Center of the Internet of Things

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Learn More

Your Network is at Threat from the Inside, Too

From the Inside?
Some may be surprised to learn that one of the biggest threats to your business technology is the group of people you’ve hired to work with it. There are a variety of reasons that your end-users can create a security problem through their actions.

Vengeance - As melodramatic as it sounds, if an employee is dissatisfied enough by something to do with their job, they might just lash out against the business. Whether that takes the shape of deleting critical files before storming off, unleashing malware into your system, or just breaking some critical component, your business could find itself in deep trouble. Even worse, if the employee thinks ahead about it, they could potentially figure out how to hide their actions until they are long gone, or just access your network later to mess with your business - and the longer an issue persists, the more it will ultimately cost you.

The best way to fix this is to simply remove an employee’s credentials the moment they are no longer in your employ - and to mitigate this kind of situation from happening in the first place. If you keep your employees satisfied, engaged in their work, and happy, if they do ultimately leave, it will most likely be a departure spurred by greener pastures elsewhere, and not animosity toward your business. Being Bamboozled - How many of your employees read these blogs, or have gone over our website? Are they up-to-speed on how to best protect themselves against social engineering attacks by cybercriminals? These attacks can be particularly effective, as they take an employee’s instinct to do as they are told and pit it against their ability to shrewdly analyze an incoming message.

A social engineer will reach out to your employee under the guise of being someone else, as either an authority figure in your company, a client, or another business contact. This allows them to request certain information that some employees would be only too eager to hand over (after all, if the boss is asking for something, you deliver it, right?). The simplest way to eliminate this threat is to make sure your employees appreciate the reality of it, educating them and reinforcing the proper procedures to ensure that information isn’t just given out to someone who asks nicely.

Inappropriate/Illegal Activities - Unfortunately, a workstation is not just a great productivity tool. It is also one of the most potent distractions out there, thanks to all the content available online that should not be accessed by someone in a professional environment. From games, to adult material, to social media, to watching x-animal try to mimic y-human activity on YouTube, you are up against a formidable foe if you try to wrangle the Internet. However, it is crucial to your network security that you do so, as threats can be very easily hidden in content that would seem harmless on the surface. Protecting yourself against these threats means that you have to apply patches as they become available, and it can’t hurt to block access to certain websites if you discover that there is a tendency for them to be accessed during work hours.

Of course, there’s inappropriate, and then there’s illegal. Unfortunately, unless you can establish that you have taken measures to prevent such activities, any illegal activities performed on a business’ network are the responsibility of the owner. Citibank learned this the hard way, when its employees downloaded materials from the Internet that had absolutely no business being accessed in the workplace. This activity got Citibank sued for $2 million. This is why it is especially important to monitor your network activity, and again, block access to certain sites. You should also keep a documented acceptable use policy, signed by every employee, so that you can legally protect yourself should the need arise.

Leaking Information - There are a variety of reasons that an employee could want to take information out of the safe environment of your network. Those with good intentions may just want to get some extra work done at home - but we’ve all heard where the road paved with good intentions leads to. A frustrated employee might decide to take a little something along when they leave to entice their next employer into hiring them.

Either way, your data is at risk, so you need to take steps to prevent such activities. A few options are to require permissions for certain devices to access the network, and to require authorization to connect a device to Wi-Fi or Bluetooth within the office.

As unfortunate as internal threats inherently are, you need to accept that they are real in order to deal with them. Eclipse Integrated Systems can help. Reach out to us at 800-340-0505 to learn about our solutions to your security concerns, inside and out.

Learn More

Tip of the Week: How to Manage Your Network Profiles

What’s a Network Profile?
Every time a Windows 10 device connects to a new network, you’ll be asked if it should be discovered by other devices that are connected to the network. If you choose “Yes,” the network will be set to Private. If you choose “No,” it will be set to Public.

Private and Public settings are referred to the type of network that your device connects to, as well as what kind of security the device is responsible for. If you are connected to a company network, as well as all of its security measures and other users who collaborate, you’ll want to make sure it’s a Private network setting. If it’s a public device that is “publicly” accessible, you’ll be placed at more risk of a hacking attack.

Changing the Network Profile
Windows 10 provides your organization a few ways to change your device’s network profile. You can use the built-in Settings application to do this.

From the Start menu, access the Settings application. Next, you have to go to Network and Internet. Select the kind of connection that your device will be connected to from the left panel menu. If you are using a physical network connection, choose Ethernet. If you’re using a wireless router to access the network wirelessly, click on Wi-Fi. Once you’ve done this, click on Network in the right panel. You can choose to select either a Public or a Private network profile here.

Domain Networks
Enterprise workstations can also take advantage of a third network profile--the domain network option. Only a network administrator can set its use, making it distinctly different from the traditional Private or Public profiles. It can only be set, and accessed, while the device is in the workplace itself.

Does your business need a hand with managing its network settings? Give Eclipse Integrated Systems a call at 800-340-0505.

Learn More

Know someone who would benefit from Eclipse Integrated Systems? Let us know!

Latest News

Eclipse Integrated Systems launches new website!

Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...

Account login