Get Started Today!  (845) 800-0778

The New York IT Experts

We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more


Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At S I M Technology, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

Do you have questions about IT Services and what they can do for your company? Fill out this simple form with your questions and our team respond promptly!

What Our Clients Say

  • Amazing!

    Doing business with S I M Technology has been a pleasure.  Anthony Granata and team are a great bunch to work with!  They really know their stuff when it comes to eliminating annoying computer issues and making technology actually WORK for businesses.

Latest Blogs

This NSA Employee Made a Mistake. How Hackers Exploited it is Worrisome

An investigation performed by the FBI points to the source of the hack coming from an individual associated with the NSA, like an employee or a contractor. However, unlike the infamous NSA-employee-turned-fugitive case of Edward Snowden, it looks like this most recent data breach wasn’t an attempt at whistleblowing. Instead, it’s more likely that the breach resulted from the sloppy handling of sensitive files.

Whether the mishandling of the NSA files was an intentional act or not has yet to be determined. Although, what we do know is how they were mishandled. Apparently, the responsible party left the tools on a remote computer during an operation--three years ago! If the tools were removed from the remote PC like they were supposed to be, this whole crisis could have been avoided. To say that this is unfortunate is an understatement, seeing as the stolen tools allow users to exploit systems from Fortinet Inc. and Cisco Systems.

Since the news of the hack became public knowledge, patches for these systems have been released, thus minimizing the damage that can be enacted by hackers using the stolen tools. Although, as is the nature of security patches, organizations that put off installing them will continue to be at risk until they do so, giving hackers ample motivation to seek out and exploit these negligent companies.

Currently, the FBI is looking into the possibility that the employee intentionally left these tools exposed so the Shadow Brokers could obtain them. However, the information thus far points to the employee making an honest mistake, seeing as the worker reported their mistake shortly after making it. Considering then how these events played out, the NSA actually comes out looking bad since they didn’t report the threat to the affected software manufacturers after learning about it; another misstep that could have resolved the problem much sooner.

The takeaway here for business owners is how easy it is for an innocent mistake by you or one of your employees to put your company’s sensitive information at serious risk. Often times, much attention and resources are given to protecting an organization from external threats, like hackers of the Shadow Broker nature, while too little attention is given to training staff on how to properly handle data. When it comes to having an airtight cybersecurity plan, your company must protect itself from every threat, and from every angle.

To make sure your network is fully protected, reach out to S I M Technology at (845) 800-0778.

Learn More

Is it Time to Rethink the 8-Hour Workday?

To understand this shift, let’s look to the origin of the eight-hour workday. The Industrial Revolution gave birth to a shorter, more productive workday. It all started with a Welsh activist named Robert Owen, who in 1817 argued for “Eight hours labor, eight hours recreation, eight hours rest.” It seemed like a radical idea at the time. Workdays often exceeded 12 hours, and lasted for as long as 16 hours or longer. However, the Ford Motor Company in the early 20th century revolutionized the workplace with the implementation of the eight-hour workday, while also doubling wages.

As you might imagine, the increased productivity that this resulted in was immense, and significantly improved both work ethic and working conditions. Just think about how today’s workplace can learn from this development. A study, which analyzed 2,000 full-time office workers, indicates that your employees might only be productive for as few as three hours a day. This might be shocking to hear, but when you consider how many distractions are in the office, you shouldn't be surprised. Here are some of the distractions that the study found were most prominent:

  • Reading news websites: 1 hour 5 min
  • Checking social media: 44 min
  • Discussing non-work-related things with coworkers: 40 min
  • Searching for new jobs: 26 min
  • Taking smoke breaks: 23 min
  • Making calls to partners/friends: 18 min
  • Making hot drinks: 17 min
  • Texting or instant messaging: 14 min
  • Eating snacks: 8 min
  • Making food in office: 7 min

Of course, some of these distractions could easily be removed through use of a content filtering system on your network. This can block access to time-wasting or inappropriate websites like Facebook, Twitter, BuzzFeed, those that host pornography, and many others, with the primary goal of retaining productivity and ensuring that your employees don’t visit potentially dangerous websites.

Would the world benefit from cutting the workday once again to achieve a higher level of productivity and worker satisfaction? Who knows; but the least you can do is implement a content filtering solution to keep your team focused. To learn more, reach out to us at (845) 800-0778.

Learn More

Tip of the Week: Merge Your Mobile Devices and Stop Carrying 2 Phones

Use Call Forwarding
If the only reason you’re lugging around a second phone is because you need it to answer calls, then you can easily leave one phone behind by forwarding all incoming calls to the other phone. Virtually every cell phone has this feature. In Android (depending on your version), open the phone app > Call settings > Additional settings > Call forwarding, you’ll then select which call forwarding option you want and enter the phone number of the second device. Just remember to turn off call forwarding when you return to your other phone and no longer need it activated.

Many VoIP phone systems let you automatically forward calls to cell phones. In some cases, you can even set up a schedule so after hours calls can be forwarded to your cell phone. Depending on your VoIP solution, you may just need to download an app.

Mirror Text Messages
While call forwarding is super easy to set up, forwarding your text messages is a little more complicated. Unlike call forwarding, the ability to mirror text messages between two devices doesn’t come as a standard feature on Android or iOS, which means that you’ll have to seek out the assistance of a third-party solution. One such text messaging mirroring solution is MySMS. The only drawback is that comes with a yearly fee of $9.99.

Set Up Multiple Accounts on One Device
Did you know that both Android and iOS devices allow users to set up multiple accounts on a single device? This may be an ideal situation if you want to add your work account to your personal device, or vice versa. Two things to keep in mind when doing this: 1) make sure to correctly set up important apps like calendar and email so you don’t get these mixed up, and 2) if you’re adding a work account, be sure to review your company’s mobile device security policy so you’re not putting sensitive data at risk.

Sync Your Apps to the Cloud
Whether you only have one smartphone and one PC, or you’re using two smartphones, a tablet, a laptop, and a workstation, it can be confusing to use multiple devices. If you’re looking to streamline your device usage, then syncing your cloud-based apps like Dropbox, Office 365, Google Drive, iCloud, etc., is the way to go. Otherwise, you’ll risk each device hosting critical data that can’t be accessed from other devices.

By consolidating your mobile devices, you’ll reduce the risk of having the device you’re not using getting lost or stolen, and it will be much more convenient than having to switch back and forth between devices. Of course, when merging devices like this, you’ll want to make sure that you’re not leaking sensitive data, and that you’re in compliance with whatever security policies your company has in place.

For assistance with this and all of your technology needs, call S I M Technology at (845) 800-0778.

Learn More

Know someone who would benefit from S I M Technology? Let us know!

Latest Blog Entry

One of the biggest hacks of 2016 was the United States National Security Agency, by a hacking group calling themselves the Shadow Brokers. This hack came to light after tools belonging to the NSA were discovered on the black market. How could a data breach of this magnitude ...

Latest News

S I M Technology launches new website!

S I M Technology is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...