The New York IT Experts

We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more


Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At S I M Technology, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

Do you have questions about IT Services and what they can do for your company? Fill out this simple form with your questions and our team respond promptly!

What Our Clients Say

  • Amazing!

    Doing business with S I M Technology has been a pleasure.  Anthony Granata and team are a great bunch to work with!  They really know their stuff when it comes to eliminating annoying computer issues and making technology actually WORK for businesses.

Latest Blogs

Make Sure Your Business Technology Covers These 2 Areas

Here are a few concepts that technology-acquiring decision makers should consider: functionality, interoperability, and flexibility.

Interoperability and Functionality
It’s essential that your technology solutions play well with others, but this is something that may be difficult to judge--especially if you’re not in the business of managing technology. Often times, running your business falls second while you’re stuck dealing with technology responsibilities that no one else can handle. If this happens, you probably don’t have the time needed to properly research a solution and may just implement it without a second thought. This is a dangerous practice and it could have unexpected effects on your current infrastructure setup, including access to mission-critical data and downtime.

You can never be too careful, and it always helps if you have professional technicians ready and willing to help you identify a good choice for your IT infrastructure. Only someone with the necessary knowledge of the latest technology should be making the decision to implement new hardware and software solutions. Otherwise, it is possible that your exciting new solution could become a hindrance.

Scalable, Flexible Solutions
Cloud computing and communications solutions are designed to offer organizations the flexibility they need to stay competitive and agile. Businesses using scalable solutions can tailor their services to meet their specific needs. Compared to costly, expensive service bundles, this flexibility is much desired. Think of it like the “cord cutting” phenomenon which cable television is experiencing today. Users don’t want to invest in costly cable bills when they can get all sorts of content to view through online services like Netflix and Hulu Plus. Think of it like paying for 100 channels and only watching three of them.

Some of the many IT solutions that are both flexible and scalable to meet your needs include:

  • Cloud services
  • Virtual helpdesk and support
  • VoIP telephony
  • Hosted email
  • Productivity suites and software as a service

This type of flexibility is something that’s built into our brand of managed IT services. We want our clients to feel that our solutions are specific to what they need. This assures business owners that the solutions they implement won’t be outdated in the near future, and can be adjusted to accommodate growth.

Another important topic to touch on is how difficult it can be to implement technology solutions when you’re not entirely sure what you need in the first place. An IT roadmap can help your business get the most out of its technology, taking into account where you want your organization to be over the next few years. If you’re ready to get started, reach out to us at (845) 800-0778.

Learn More

Tip of the Week: 4 Ways to Resolve the Blue Screen of Death

The BSOD is the result that Windows resorts to when it experiences an error critical enough to require a reboot. This is what makes it different than a simple application crash, which will usually only require you to restart the application, not the entire computer.

Typically, a BSOD will occur if your computer encounters a problem in its hardware, a driver or software issue, or is infected with a virus. As a result, a STOP Error is thrown up, Windows crashes, and the only remedy is to perform a complete reboot--at the unfortunate cost of any unsaved data that the user may have been working on.

However, not all BSODs are caused by the same problem. Some are legitimate errors, but others are clever attempts by scammers to infiltrate a device more completely. An easy way to spot the difference between real and fraudulent BSOD messages is to check for a phone number. If one is provided, someone is trying to scam you. Microsoft has never provided contact information on their Blue Screen message, only the error code and instructions on how to reboot.

If there is no phone number provided, you’ve managed to incur a real BSOD. Fortunately, the steps to resolve it are pretty straightforward.

System Restore: If you’ve been encountering the BSOD fairly regularly, it could very well be a software problem causing it. If restoring the software to a previous version resolves the issue, you have confirmed that the BSOD was software-related. This is something you should have IT handle for you, since you don’t want to backtrack over something critical.

Malware Issues: Unsurprisingly, malware can often be the cause of this particularly irksome problem. Running a quick scan should quickly root out any malware floating around on your workstation that is causing your problem. Of course, it’s best to be proactive and have a properly managed antivirus that is kept updated and ran regularly.

Boot Up in Safe Mode: By eliminating all but the essential drivers to boot your PC up, it will allow you to determine if a certain driver is causing the issue. Safe mode will allow you to work towards resolving the cause of the BSOD. You might not be able to get much work done in safe mode, but it allows a technician to access event logs and other tools to help determine the problem.

Reinstall Windows: This should be your last-ditch option, as it will completely wipe your existing operating system and replace it with a new installation of Windows. If this doesn’t fix the Blue Screen, your problem most likely lies in your hardware, such as a hard drive failing, memory error, or several other issues. Again, you should rely on an expert who understands the repercussions of reinstalling Windows. Your applications, settings, and many other factors will need to be put back into place before you can start working again.

If you’d rather not have to deal with a BSOD, S I M Technology can help. By managing your IT, we can predict and prevent issues that would otherwise impact your productivity. To find out more, give us a call at (845) 800-0778.

Learn More

Hackers Use Social Media to Scam Employees Into Handing Over Company Data

Social media pushes users to share their information in online profiles that may (or may not) be viewable to the public. If the public includes hackers, they may attempt to use personal information like home addresses and email addresses for phishing scams. What social media sells people is that it’s “okay” to put your information online because it’s good to be social with your friends and others online. People have learned to trust social media, which may not be a good thing. Plus, since most of your employees likely have social media accounts, will they be putting your data at risk?

In other words, social media just becomes another outlet that can be used to stake out your organization’s data. Of course, you could always just block access to social media on your organization’s workstations, but employees can still use these services even while disconnected from your network via their mobile devices.

Hackers might role play as an employee’s long lost friend from the good old days and use the identity to extort money for “financial troubles.” Another option is that the hacker might try to make off with passwords, usernames, or other sensitive information. If accounts are compromised, it’s safe to assume that they are being compromised for a reason, like spreading threats via messages or malicious links.

Simply put: Social media is not to be trusted.

While businesses understand that social media can be a time sink for their employees, they don’t understand that it’s a legitimate threat that can become a major problem. The fact remains that Facebook users won’t suspect that threats are waiting on trusted websites--including social media--to infect their systems. Thus, you can never be too careful with your organization’s assets, and you need to educate your employees on how to identify threats of all kinds; and the more your business grows, the more likely one of your employees will slip up.

If your organization is nervous about network security, our trusted professionals would be happy to assist you. What you can start with is educating your staff on security best practices. Once they know how to identify threats (like those found on social media), you’ll need solutions designed to mitigate them. S I M Technology can equip your small business with enterprise-level solutions designed to optimize security. To learn more, reach out to us at (845) 800-0778.

Learn More

Know someone who would benefit from S I M Technology? Let us know!

Latest Blog Entry

All businesses need to use some sort of technology to keep their operations moving forward. Yet, it’s often difficult to gauge how new solutions will function with your current systems. You need to take your options into careful consideration before making such an important ...

Latest News

S I M Technology launches new website!

S I M Technology is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...