The New Jersey IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Eclipse Integrated Systems, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Free IT Whitepaper

Free IT Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download!

What Our Clients Say

  • Amazing!

    Doing business with Eclipse Integrated Systems has been a pleasure.  Marc Buonocore and team are a great bunch to work with!  They really know their stuff when it comes to eliminating annoying computer issues and making technology actually WORK for businesses.

Latest Blogs

Tip of the Week: 4 Steps to Troubleshoot a Weak Wi-Fi Signal

Put Your Router Out in the Open
Some people don’t like the appearance of routers. They fashion them an eyesore and try to hide them away in cabinets or elsewhere, away from where people can see them. This is often both counterproductive and dangerous, as the device can potentially overheat in a place with poor air circulation. If you store your router in a cabinet, you’re also weakening the signal, which can make it spotty and difficult to use.

Instead, we recommend that you keep your router out in the open, where it can get plenty of air and keep the signal as strong as possible. This is a best practice for your technology, including workstations and servers that generate a lot of heat naturally by functioning properly.

Use a Central Location
While it might be tempting to just put your router in a far corner of your office and forget that it exists, chances are that the other half of your office won’t be receiving a very strong wireless signal. To avoid this, you need to set your router up in a central location where it can broadcast its signal to the entire office. Depending on your office’s setup, you might even need multiple access points to allow each of your employees to access the Internet.

Also of note, you should elevate your router slightly to ensure that the signal isn’t being blocked by furniture that sits on the floor. File cabinets, desks, and other objects, could all get in the way of the wireless signal.

Review Your Bandwidth and Internet Service Agreement
Sometimes the placement of a router won’t have anything to do with your problem, and the issue is with your network connection instead. In this case, the problem would be with your modem or your Internet service agreement limiting your bandwidth and the flow of data. If you’re having wireless problems, and you’re sure it’s not your router, it’s worth looking into the problem on the ISP’s side of things.

Upgrade Your Router
Are you using the same old router that you picked up when you first started your business? If so, there’s a strong chance that your router’s hardware or firmware is outdated. Since you actually have control over your router, you’d do well to investigate the issue before you purchase a new one. It’s recommended that you go with a router that’s capable of supporting both 2.4 GHz and 5.0 GHz bands. This will help you keep your network strong and healthy. Plus, sometimes all it takes to resolve connectivity issues is to upgrade your system’s firmware.

For help optimizing your business’s wireless network, reach out to Eclipse Integrated Systems at 800-340-0505.

Learn More

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

Security company LeakedSource was able to obtain and analyze the stolen passwords from an online black market. They found that the most commonly used password (connected to more than 120,000 accounts) is also the easiest to guess: “123456.”

This despite (or perhaps because of) the famous password scene from the 1987 film “Spaceballs.” If you recall, the joke was regarding King Roland being blackmailed by Dark Helmet to turn over the password securing Druidia’s planetary force field. The super-secret password in question, “12345.”

The revelation of the password being so ridiculously simple caused Dark Helmet to reply, “That's the stupidest combination I've ever heard in my life! That's the kind of thing an idiot would have on his luggage!”

Not surprisingly, the other most-used passwords from the Twitter haul are just as easy to guess; “123456789,” “qwerty,” and “password.”

We make the connection to Spaceballs in order to highlight the fact that using weak passwords has been a major IT security issue for at least 30 years, with little hope of things changing. Fortunately, the remedy is quite simple; use complex passwords with a string of random characters. Taking this measure alone will improve your security vastly over all the other King Rolands to be found in cyberspace.

However, using complex passwords will only get you so far. For example, as in the case of the recent Twitter heist, if your password is stolen, then it doesn't matter how complex it is. This is why we highly recommend that you take advantage of two-factor authentication security solutions. Twitter and other major websites offer two-factor authentication, which messages your mobile device with an additional code upon entering the correct password. It’s a small inconvenience that will virtually guarantee that you’ll be protected, should your password fall into the wrong hands.

Additionally, we recommend following the best practice of using a different password for each of your online accounts. For example, if your Twitter password gets stolen and this happens to be the same password used for your other online accounts, then the hacker would have an easy time logging into your other accounts.

Actually, this happens more than you would think, with Facebook’s Mark Zuckerberg becoming the recent poster child. On June 6th, Zuckerberg briefly lost control of his Twitter and Pinterest accounts after hackers used the same password to access both. The password in question was not only ridiculously easy to guess, but it was also one that he’s apparently used before, “dadada.”

Therefore, if you’re using complex passwords, two-factor authentication, a different password for each account, and you’re routinely changing your passwords, you’ll apparently have better online security than Mark Zuckerberg, which is something to brag about.

Following all of these password security best practices will go a long way in protecting your online identity, and when it comes to network security, the more precautions you take, the better. To that end, call Eclipse Integrated Systems today at 800-340-0505 to equip your business with the best security solutions on the market.

Learn More

This Breakthrough By MIT Will Propel Artificial Intelligence to New Heights

The team, hailing from MIT’s Computer Science and Artificial Intelligence Laboratory, developed a security platform combining the strength of human involvement with the effectiveness of artificial intelligence. Given the name A.I.², this new platform is capable of detecting 85 percent of incoming attacks while reducing reported false positives by 20 percent.

How A.I.² combines AI and human involvement is actually quite genius. To begin, the “untrained” machine reports a sample set of results to a human expert. These results are informed by machine learning and are checked against the 200 most important problems. The human expert then checks over and corrects the machine’s work, with the intention of finding mistakes and false positives. Subsequently, the human-checked results are inputted to A.I.², the machine learns, and the next set of tests will have fewer errors. This process is then repeated with the security platform adapting each time to look for what its human teacher looks for.

In a paper presented at the IEEE International Conference on Big Data Security, research scientist Kalyan Veeramachianeni summarized, "You can think about the system as a virtual analyst. It continuously generates new models that it can refine in as little as a few hours, meaning it can improve its detection rates significantly and rapidly."

Of course, the precedent of effectiveness set here by combining human expertise and oversight with A.I. has far-reaching ramifications for other A.I. initiatives currently in development; initiatives that have both humanity’s best and worst interests in mind. Although, for now, those of us in the IT world are celebrating this A.I.-enabled technology for being one giant leap forward in security analysis accuracy.

It’s important to keep in mind that a platform like A.I.² is still years away from being available to the average business. Therefore, we recommend that you stay on top of your network security by following best practices, which combines automated software solutions and human vigilance in order to combat the latest threats. Eclipse Integrated Systems is standing by to assist you with all of your company’s network security needs. To equip your business with the most comprehensive IT security solutions on the market, call us today at 800-340-0505.

Learn More

Know someone who would benefit from Eclipse Integrated Systems? Let us know!

Latest News

Eclipse Integrated Systems launches new website!

Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...

Account login

Remember me