Northern Computers, Watertown NY

Steel Potter

Northern Computers

About Us

Northern Computers (formally IMC founded in 1985) is one of the oldest IT companies in NNY and CNY. We currently serve customers in Albany, Syracuse, Rochester, Elmira, plus Jefferson, Lewis, and St. Lawrence Counties. We serve local government, Not for Profit, and small to medium business.

Products & Services
You can entrust all of your business IT needs to Northern Computers. We specialize in networks, security, hardware, installation, and everything yo...
We offer security solutions in Watertown.
We offer commercial consulting for Voice, Data, CCTV, and Managed Services in Jefferson, Lewis, and St. Lawrence Counties 
Recommendations Given (18)
"professional law service"
""Great communication and amazing service!" "
Recent Activity

Steel from Northern Computers Answered this on December 14, 2021
Antivirus programs are end of life, they rely on signatures to be updated every few hours depending on the program. The writers  of the virus and malware programs have figured out that they need to change the signatures frequently to beat the updates. You now need to deploy an EDR solution that... (more) Antivirus programs are end of life, they rely on signatures to be updated every few hours depending on the program. The writers  of the virus and malware programs have figured out that they need to change the signatures frequently to beat the updates. You now need to deploy an EDR solution that will replace your outdated Antivirus programs. Hire a professional have them do a security assessment, and protect your network with a layered approach. 

Steel from Northern Computers Answered this on November 30, 2021
Modern network security requires a layered defense approach that factors in people, processes, and technology. Together such tactics, including creating a strong culture of security, conducting threat research, prioritizing assets, and deploying modern network controls will shorten threat... (more) Modern network security requires a layered defense approach that factors in people, processes, and technology. Together such tactics, including creating a strong culture of security, conducting threat research, prioritizing assets, and deploying modern network controls will shorten threat response times, resulting in minimizing the impact of cyberattacks. In short protect your end points, your perimeter, implement policies and procedures, do an annual security assessment, backup data off site, train your users and call a professional with experience in protecting your network