ProSysCon Computer Technologies, Inc.

ProSysCon Computer Technologies, Inc.


Allied Physicians Group, an independent provider of high-quality comprehensive family health care services for both children and adults, recently held their grand opening and ribbon cutting ceremony for its new office, Allied Pediatrics of Rocky Point, at 346 Route 25A, Rocky Point, on Feb. 16.
Local News Made Possible By:
ProSysCon Computer Technologies, Inc. - 631-546-5706
๐Ÿšจ๐Ÿšจ๐ŸšจHave you ever mentioned an item or store in an idle conversation, only to see an advertisement pop up on your phone for it? ๐Ÿ˜ฎ Google is providing some new security updates in their new Android 12 release that might help...
๐—ช๐—ต๐—ฒ๐—ป ๐˜†๐—ผ๐˜‚ ๐—ฏ๐—ฒ๐—น๐—ผ๐—ป๐—ด ๐˜๐—ผ ๐—ฎ๐—ป ๐—ฎ๐—บ๐—ฎ๐˜‡๐—ถ๐—ป๐—ด ๐—ด๐—ฟ๐—ผ๐˜‚๐—ฝ ๐—ผ๐—ณ ๐˜€๐˜‚๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€๐—ณ๐˜‚๐—น ๐—ฏ๐˜‚๐˜€๐—ถ๐—ป๐—ฒ๐˜€๐˜€-๐—ผ๐˜„๐—ป๐—ฒ๐—ฟ๐˜€/๐—บ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—ฟ๐˜€, ๐˜€๐˜‚๐—ฐ๐—ต ๐—ฎ๐˜€ LeTip Port Jefferson, ๐˜„๐—ถ๐˜๐—ต ๐Ÿณ๐Ÿฌ-๐˜€๐—ผ๐—บ๐—ฒ๐˜๐—ต๐—ถ๐—ป๐—ด ๐—บ๐—ฒ๐—บ๐—ฏ๐—ฒ๐—ฟ๐˜€, ๐—œ๐˜'๐˜€ ๐—ฎ ๐—ฝ๐—น๐—ฒ๐—ฎ๐˜€๐˜‚๐—ฟ๐—ฒ ๐˜๐—ผ ๐—ฏ๐—ฒ ๐—ฝ๐˜‚๐˜ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐˜€๐—ฝ๐—ผ๐˜-๐—น๐—ถ๐—ด๐—ต๐˜!
Bill Wasserberger aka The Country Printer speaks with Carmine Inserra of ProSysCon Computer Technologies, Inc., and Cliff Pfleger of Secure Operations on 8.17.21
Suffolk County Police said they arrested a man in Port Jeff for allegedly committing a lewd act in front of people at a park in Port Jefferson.
Local News Made Possible By:
ProSysCon Computer Technologies, Inc. - 631-546-5706

This weekโ€™s shelter pet is Peggy, an adorable seven-month-old female domestic shorthair who is patiently waiting at the Smithtown Animal Shelter for her furever home.
Local News Made Possible By:
ProSysCon Computer Technologies, Inc. - 631-546-5706
Suffolk County Police Fourth Precinct officers May 8 arrested a Hauppauge man after he allegedly crashed into two police vehicles while fleeing police officers who were investigating him for a prior robbery.
Local News Made Possible By:
ProSysCon Computer Technologies, Inc. - 631-546-5706
The U.S. Navyโ€™s Blue Angels and Air Force Thunderbirds roared overhead Tuesday, April 28, signaling a national support for health care workers all across the region.
Local News Made Possible By:
ProSysCon Computer Technologies, Inc. - 631-546-5706
An award-winning scientist, grandmother, aunt, mother and wife, Dr. Lina Obeid, died Nov. 29 at the age of 64 after a recurrence of lung cancer.
Local News Made Possible By:
ProSysCon Computer Technologies, Inc. - 631-546-5706
Thank you to ProSysCon Computer Technologies, Inc.,a Legacy Level Underwriter, for helping to Underwrite our 30th Anniversary Annual Fundraising Banquet, that was just held. Because of your faithful support, we are growing and helping more people!!

ProSysCon provides Enterprise-Level solutions scaled to meet the needs of your business Computer and Network Consulting for small and medium-sized businesses.

We specialize in Healthcare, Professional Services, Retail & Nonprofits. We support clients from Manhattan to Riverhead.


It looks real, but THIS IS NOT from American Express! Note the email address, and the link does not bring you to American Express' website.


It was fun to participate in the Sachem North Career Fair this morning. Lots of great interactions with students and other business professionals! Got great reactions to some personally designed and 3D printed fidgets and 3D props from 3 Village Lights .


Don't even bother opening this!!! Throw it out!!!

Photos from Brookhaven Chambers of Commerce Coalition - BCCC's post 02/07/2023

ProSysCon Computer Technologies, Inc. was a proud sponsor of the Brookhaven Is Back panel discussion last week. There was a lot of great information from different town departments with regard to their function and how they can help get your business moving or keep it in compliance.


ProSysCon Computer Technologies, Inc. is a proud sponsor of the 3VD TopGolf Outing!

This Thursday we will be hosting our 2nd Annual TopGolf Event held at Topgolf. We have a total of 234 golfers signed up to eat, play, and have an awesome time to raise money for great local causes.

We want to give a huge shout out to all of our amazing sponsors especially Bagel Express who returns as our Title Sponsor for the event. Thank you Geometric Circuits, Inc. and The Long Island Airstream Experience for also being large contributors.

To date we have raised and donated over $215,000 for local causes in Three Village. 2022 was our best year yet donating over $90,000 to things such as College Scholarships, Veterans Causes, the Stony Brook Children's Hospital, Food & Toy Drives, Menโ€™s Health Awareness, and much much more!

Thank you to all who have contributed and continue to do so.


ProSysCon Computer Technologies, Inc. is joining forces with Techworks Consulting, Inc to explain how to identify and avoid cyber threats in your organization. Come out Thursday (1/19/23) at the Three Village Chamber of Commerce general meeting. 11:30am.

On Thursday, January 19th, our very own Christopher Coluccio will be guest paneling with Carmine Inserra from ProSysCon Computer Technologies, Inc. in a discussion about for the Three Village Chamber of Commerce hosted at The Bench Bar & Grill in Stony Brook!

You can register here:

Pranks Destroy Scam Callers- GlitterBomb Payback 05/26/2022

$$$ SCAMS: Please spend a few minutes watching!


Mark Rober is one of my science heroes because not only is he a legit (former) NASA engineer, but he makes science learning fun. He also dishes out a healthy dose of karma to people who are stealing packages or taking advantage of other people. After watching this, watch all other videos with "GLITTER BOMB" in the title. You'll thank me later :)

This specific video EXPOSES some very COMMON SCAMS, explains how they work, and WHO the scammers are. They really are truly heartless individuals preying on some of the most vulnerable of society (seniors in this case). This video is a follow-up to several previous videos he made targeting porch pirates, but then moved on to phone scammers, and now actually got INSIDE one of the call centers!

The more people that understand how these scams work, the less effective they are. ALWAYS be skeptical of anyone calling you that you don't know, and remember, the IRS, Microsoft, your Bank, PayPal, etc, rarely (if ever) call you. . . always look up the actual number and call them back. . . DO NOT talk to them! Or call any numbers they give you or are left on voicemails.

*** As always, if you're not sure if something is a scam, PLEASE CALL US to ask about it. They're very convincing, and there's no shame in seeking a professional's assistance. ***

ProSysCon Computer Technologies, Inc. only posts about once a month, so please click Like/Follow to keep updated on useful tips and the latest scams and/or security threats.

Stay Safe!!!

Pranks Destroy Scam Callers- GlitterBomb Payback Please share this video and letโ€™s shut them down- Get your exclusive NordVPN deal here- Itโ€™s risk free with Nordโ€™s 30 day money...




HACKED is not the same thing as being IMPERSONATED: Many people are quick to post that their Facebook account was "Hacked" and not to accept any friend requests from them, when what they really mean is that someone is "Impersonating" them. In that case, someone created a new account with their name and are trying to get their existing friends to accept friend requests from the new account. This is not a true "hack" and is typically not aimed at "stealing" anything from you. The imposter may use the connections to make a fake account more believable or to market something to your friends that accept the requests. In a more extreme case, the imposter may be trying to get the "friend" status with your friends so they can see their full Facebook profile information. If they already know other information about a certain individual, then that could potentially lead to identity theft. Regardless, IT IS GOOD to notify your friends if you are being impersonated, and to have them report that account to Facebook.

In Contrast, being "Hacked" would imply that someone actually logged into their Facebook account, was posting misleading information, contacting their friends through PM to ask for money or personal information. This kind of hacking is considerably more difficult and would require the hacker to get around Facebook's security measures. . . especially if they're logging in from an unknown device. This would typically require a hacker to have gained access/control of a user's PC. Mobile Device or Email Account. It's not impossible, but is typically not the case.

Lastly, this also happens with emails. A "hacker"/"impersonator" can pretend to be you by just changing the Display Name on any email account. This has become s a frequent ploy by "bad actors" (a better term for what people generically refer to as a "hacker"). They'll open a Gmail account, change the display name, then send emails to individuals with notices to "update their information", "verify a payment", "past due payment notice" OR even worse pretending to be a home buyer's attorney and asking, "please wire $128,221.05 to the following account to proceed with your purchase." It's always important to follow-up with who's requesting the money before sending!

If you have any questions or are unsure about an email or notice, feel free to contact us to help you figure that out.

Stay Safe!

15 Things You Can Do in Android 12 That You Couldn't Do Before 10/21/2021

๐ŸšจSECURITY UPDATE: Have you ever mentioned an item or store in an idle conversation, only to see an advertisement pop up on your phone for it? It seems creepy, but advertising has become very complex and is thinly veiled behind providing you "a better user experience with only ads you'd be interested in". If you're an Android user, there are some really interesting security features coming in the new Android 12 release. Take a look...

15 Things You Can Do in Android 12 That You Couldn't Do Before Google's next big Android upgrade is here (at least for Pixels), and it brings a ton of new features.


PLEASE BE CAREFUL!!! There are a lot of new scams that seem very legitimate at first, but closer inspection reveals they're just phishing schemes. These are very convincing ways for hackers to get a lot of information about you and your business. If you ever receive an email you're not sure about, please forward us a copy or contact us and we can help you verify its authenticity.


๐Ÿšจ ๐Ÿ›‘ ๐Ÿšจ ๐Ÿ›‘ ๐Ÿšจ ๐Ÿ›‘ SCAM ALERT!!! Don't let the logo fool you! Here's a few things to watch for. . .


Just a heads up to anyone that has a Microsoft Exchange Server, you need to have your IT company check it IMMEDIATELY! This is going to cause some major issues in the coming weeks. Right now the hackers are just planting their backdoors on as many Exchange servers as possible. The next phase will be planting ransomware and exfiltrating data to expose. There are patches to prevent it going forward, but if you have an Exchange Server, chances are it has ALREADY been compromised. Make sure you have WORKING BACKUPS and that you've CHECKED your systems for the hackers' presence! Please feel free to contact us if you need assistance or aren't sure if you're affected.


THIS IS JUNK MAIL!!! (in our opinion). . . I just thought I'd make it clear to anyone that gets these notices, that this is NOT your domain registration, it has next to NO effect on whether your domain is found on the internet, and they're making a TON of money sending out official-looking mail that looks like a recurring invoice, and getting people to send them money. While they may actually list you on "their registry", no respectable search engine uses their information and you're wasting your money.

If you ever get an invoice for technical services you aren't sure about, please feel free to Call/Email/PM us, and we'll let you know whether it's a legitimate service.


DON'T FALL FOR THIS! . . . I've been getting a lot of these emails lately, so I'm sure others are also. The link to update your password looks like it's for your website/domain, but notice when you hover over the link, it's directed somewhere else. This is a classic phishing email, and IS NOT from your email provider!


These types of phishing attacks are common but this is one of the most polished ones I've seen to date. . . plus they went through the trouble to personalize the name of the file to be viewed and the account it was coming from. Be Vigilant, and don't open attachments or links unless you KNEW they were on their way. This one even made me think twice ๐Ÿ˜‰

Timeline photos 07/08/2020

Yes We Are Open!!!


ProSysCon Computer Technologies, Inc. is officially an essential business as we provide services for doctor offices, laboratories, food retail and many other essential businesses. Don't hesitate to contact me if you need support or need assistance setting up your employees to work remotely. 631-546-5706


ProSysCon Computer Technologies, Inc. Is working both on-site at clients and remotely to get everyone else working from wherever you need to. If your office needs assistance getting your staff fully functional while working away from the office, we can help! We've specialized in mobile and distributed workforces for over decade! There are lots of effective and inexpensive ways to get you moving quickly! Let us know if we can help you!


Happy New Year everyone!

SAUSAGE LINK - Here's a quick example of why you should use a different password for every website that has sensitive information about you.

This email claims to have my password, 'sausagelink', and that a hacker has access to my account. That WAS indeed one of my passwords a long time ago, and they got it when someone hacked LinkedIn. I know this because it was the only place I ever used that password . . . and I don't mind sharing because it was changed immediately after the hack.

The claims of the email are typical for these types, but are very far-fetched. . . but the technical jargon may sound convincing to some. Please let your friends and relatives know that these are not real, and to just ignore them. . . AND to use different passwords for every site that has sensitive information.

I'll also add that you should use passwords that are at least 10 characters long, has upper and lower case letters, and at least one special character.

Feel free to send us any emails you think are suspicious. We will give you a quick reply and are always discreet.


Just received an email with an "invoice" from a company I've never heard of. Obviously it's a scam/hack, but it included a file I wasn't familiar with (IQY). It's a type of MS Excel file that contains a web address. It's used to retrieve data from a website to include in a spreadsheet. If you get one of these, DO NOT OPEN IT!!! Whether it's designed to exploit a vulnerability in MS Excel or simply a Spam message, there's no reason someone should be sending you one of these. I've just added it to the list of Blacklisted File Types in our Barracuda Email & Spam Firewall.

IQY File Extension - What is an .iqy file and how do I open it? Learn about .IQY files and view a list of programs that open them.

The Worst 25 Passwords of 2017 05/03/2018

Happy World Password Day!!! If you're currently using any of these Top Ten passwords, CHANGE IT IMMEDIATELY!!!

1. 123456
2. Password
3. 12345678
4. qwerty
5. 12345
6. 123456789
7. letmein
8. 1234567
9. football
10. iloveyou

An easy way to make a good password is to think of an adjective (maybe a color), a number (at least 2 digits) and a noun (maybe an animal or vehicle). Put them together for a great password (and change up the order to make it better). Example: Red69Mustang

Also remember to use different passwords for different sites and never use public computers to access sensitive sites or information like email, credit cards or banking. Passwords should also be changed periodically just in case it has been compromised (about every 90 days).

There are ways even more secure than passwords to secure your data. If you need even better security, ask us to show you how it works!

The Worst 25 Passwords of 2017 You should never bring these passwords into 2018


Come visit ProSysCon today (5/1/18, 9am-1pm) at the Strictly Business Tradeshow, booth A4!


Join ProSysCon and other businesses at the Strictly Business Tradeshow TOMORROW (5-1-18) at the Miller Business Resource Center from 9am to 1pm.


Is your e-mail secure? Can you spot a fake website? Join the Miller Business Resource Center for their next Business Bites and take part of this informative seminar on E-mail and Website Security so you and your business can stay safe! Presented by ProSysCon Computer Technologies, Inc.! Wednesday, April 25th 9am-10am (doors open at 8:30am for Networking). Click to Register:


๐Ÿšซ DO NOT click the links in these attachments. ๐Ÿšซ The hackers send you a PDF attachment, but there's a link INSIDE the PDF to open another document (a Word document in this case). This is an actual email I received this afternoon. It looks "real" and is very tricky. There's nothing good on the other end of that link! ๐Ÿ˜ฎ๐Ÿ“ง๐Ÿšซ

Three Village Light Parade 12/20/2017

ProSysCon was a proud sponsor of this year's Three Village Electric Holiday Parade! We built 2 floats this year. One was built in conjunction with Team Ardolino/Realty Connect USA and Bagel Express Setauket for Stony Brook Athletics (with the big SeaWolf, Wolfie and athletes). The other was for the Port Jeff Brewing Company (the big schooner with a band playing on it). Our owner and CEO, Carmine Inserra was also on the parade committee. We would like to thank all of the other sponsors, participants and attendees for making this year's parade such a huge success! These really are the types of events that make this such a great community to live in. Happy Holidays everyone!

Three Village Light Parade 2017 Three Village Electric Light Parade in East Setauket


โš ๏ธโ›”๐Ÿšซ Here's a few observations about an email I received this morning. These types of emails look "real" at first, but here's a few things that should raise immediate reservations to avoid falling prey to this type of scam.

The 'Secure' Wi-Fi Standard Has a Huge, Dangerous Flaw 10/27/2017

Your "Secure" WiFi isn't secure anymore. Everyone knows to use WPA2-AES when they setup a new router or access point, but a new flaw has been discovered that can be used to exploit its encryption. This article is pretty technical, so if you're not sure how it affects you or your company, give us a call.

The 'Secure' Wi-Fi Standard Has a Huge, Dangerous Flaw A vulnerability called Krack affects nearly every Wi-Fi device on the market.

New Group of Iranian Hackers Linked to Destructive Malware 09/21/2017

I always tell clients the computer "viruses" you know you have are the least of your worries. This article describes how this Iranian government hacker group has infected many machines, and the users have no idea it's there (even with updated anti-virus software). It's not slowing your machine down; it's not causing popups, sending spam or even holding your data hostage (yet), BUT it can download and run any software they want at their command. ProSysCon Computer Technologies, Inc. always recommends a multi-level approach to security and scanning. Ask us if you're properly protected!

New Group of Iranian Hackers Linked to Destructive Malware A suspected Iranian government hacking team known as APT33 may be planting computer-killing code in networks around the world.

Software Has a Serious Supply-Chain Security Problem 09/18/2017

Just when you thought you were downloading a great free utility from a reputable website. . . turns out it's infected with malware. Hackers don't just create fake sites and downloads or wait for you to click that phishing email link, now they're infecting files of "real" programs and sneaking in the front door. Oh! . . . and how safe do you think it is to use security software written by a Russian company (i.e., Kaspersky)? Apparently the US government thinks it's enough of a conflict that they don't allow it on any of their machines. A lot to think about here ๐Ÿ˜ฎ

Software Has a Serious Supply-Chain Security Problem Hackers have targeted software's supply chain in three high profile attacks discovered over the summer.

Intelโ€™s Bold Plan to Reinvent Computer Memory (and Keep It a Secret) 03/23/2017

Shhhhh, It's a secret! . . . Intel is about to change PC memory as we know it. Computer Memory has long been divided into 2 basic types: the RAM (think Fast, Immediate-Use & Expensive) and Hard Drives (which is Not So Fast, Long Term storage, but generally Cheap). The line has been blurred lately by the availability and falling price of Solid State Drives, but Intel's plan will be to have one giant pool of really fast memory that can be used for everything.

Intelโ€™s Bold Plan to Reinvent Computer Memory (and Keep It a Secret) Intel just unleashed a new kind of computer memory it believes will change the way the world builds computers. But it won't tell the world what's inside.

How to Watch the Super Bowl Without Cable 02/04/2017

I know a lot of people that are leaving cable and satellite providers in favor of online streaming TV. Between Amazon Prime, Netflix, Hulu and Sling (amongst others), you may be able to watch all of your favorite shows without having to pay for "the cord". This weekend might be the perfect time to see how some of those other options work. . .

How to Watch the Super Bowl Without Cable You only need a few apps to fully enjoy the biggest television event of the year.

Alexa and Google Home Record What You Say. But What Happens to That Data? 12/27/2016

Alexa and Google Home aren't quite Jarvis (from Iron Man), but they're fun to interact with and hopefully one day cater to your every need. In the technical world, every time you make something easier, you typically give up something else. . . in this case privacy and possibly security. This article explains how some of these devices work, and how you can help make them a little more secure. Happy Holidays!

Alexa and Google Home Record What You Say. But What Happens to That Data? Echo, Google Home, Siri, and Cortana send little snippets of your voice over the internet.

Amazonโ€™s New Truck Can Haul Five Copies of the Internetโ€”With Room to Spare 12/21/2016

All I want for Christmas is a 100-Petabyte hard drive on wheels! Thanks to Amazon, we now have a standard by which to quantify a "Truckload" of data. If you wanted to send 100 Petabytes of data between 2 computers on your average local (gigabit) network, it would take over 28 years. . . and at general internet speeds, it would be much longer than that. Not everyone needs to move that much data, but there are some very practical uses for this in the big-data world. Amazon stores a huge amount of data for its users, and the new "Snowmobile" truck is designed primarily to help them upload their data more efficiently. Who knows, maybe this will make the Neiman Marcus catalog next year!

Amazonโ€™s New Truck Can Haul Five Copies of the Internetโ€”With Room to Spare Amazon is now moving data by the truckload. That might sound old-fashioned, but it's actually faster than the speediest internet connection.

How to block the ultrasonic signals you didnโ€™t know were tracking you 11/03/2016

When you install a new app on your phone, it asks for permission to access certain functionality (contacts, camera, call history, etc.). Most people wouldn't think twice about allowing the app to use the microphone. . .but here's a reason you should think twice. Check back in a week or so because I'm working on another article for why Siri, OK Google, Alexa and your smart TV shouldn't be trusted either. If you have any questions about how this technology affects you and your business's security/privacy, please contact ProSysCon Computer Technologies, Inc. for a better explanation.

How to block the ultrasonic signals you didnโ€™t know were tracking you An emerging tracking technique uses inaudible sounds to communicate with apps on your phone and track you. Here's how to stop it.

What We Know About Fridayโ€™s Massive East Coast Internet Outage 10/21/2016

If you're wondering why you didn't have access to certain websites this morning and afternoon, here's your answer. It was a coordinated, bot-net, denial of service (DDOS) attack on a key DNS provider. Was your computer part of the bot-net that participated in the attack? It's important to keep your antivirus software and firewall updated so hackers don't use your computer as a pawn in these types of attacks. Do you need help figuring out what antivirus is best for you? And whether it's properly updated? Call ProSysCon for an antivirus checkup!

What We Know About Fridayโ€™s Massive East Coast Internet Outage DNS service Dyn faces DDoS attacks.

Timeline photos 10/18/2016

ProSysCon is proud to have a table at the Expo this evening. . .

Uptime Funk - (Uptown Funk parody) 09/16/2016

For all of our fellow network consultants and system admins. . .

Uptime Funk - (Uptown Funk parody) "Uptime Funk" music video (parody of Uptown Funk) from SUSECon 2015 in Amsterdam. Lyrics: This bit Uncontrolled A bad bug, Make my system fold This bug, in t...

Forget Softwareโ€”Now Hackers Are Exploiting Physics 09/01/2016

This is going to be over the heads of most users, but to anyone who understands how the RAM memory in your computer works, this is almost unbelievable. If hackers actually develop a means to fully exploit this, it will have some major implications to computer security. They do mention using ECC RAM to potentially prevent it...of course that's more expensive. They didn't mention scanning for the actual code that has this capability, which would be similar to scanning for a typical virus. Hopefully it's that simple. If you have security concerns about your business servers, workstations or network, please let me know. We'd be glad to help!

Forget Softwareโ€”Now Hackers Are Exploiting Physics An emerging form of hacking techniques targets the fundamental physical properties of computation.

Want your business to be the top-listed Computer & Electronics Service in East Setauket?
Click here to claim your Sponsored Listing.



286 Main Street
East Setauket, NY

Opening Hours

Monday 9am - 5pm
Tuesday 9am - 5pm
Wednesday 9am - 5pm
Thursday 9am - 5pm
Friday 9am - 5pm

Other East Setauket computer & electronics services (show all)
MacMind Online MacMind Online
East Setauket, 11733

I help people with technical problems. Focused on remote and over the phone support. Reasonable rates

Connected Technology, LLC Connected Technology, LLC
7 Flowerfield, Suite 30
East Setauket, 11733

At Connected Technology, we are your trusted solution advisor and weโ€™re here to support you and yo