What is a Managed Service Provider (MSP)?

A managed service provider (MSP) is a company that remotely manages a customer’s IT infrastructure or end-user systems, typically on a proactive basis and under a subscription model. Today, the terms “cloud service provider” and “managed service provider” are sometimes used as synonyms when the provider’s service is supported by a service level agreement (SLA) and is delivered over the remotely via the internet.

The evolution of MSPs began in the 1990s with the emergence of application service providers (ASPs), which offered remote application hosting services. ASPs helped pave the way for cloud computing and companies that would provide remote support for customers’ IT infrastructure. MSPs, for the most part, initially focused on the remote management and monitoring of servers and networks. Over time, MSPs have expanded the scope of their services in a bid to differentiate themselves from other providers.

Some MSPs specialize in specific segments of information technology legal, financial services, healthcare and manufacturing. Managed security services providers for instance, offer specialized services such as remote firewall administration, virus protection and other security-as-a-service offerings.

Pricing model for managed service providers
MSPs charge for their services under a number of different pricing models. Typical approaches include per-device, per-user and all-inclusive pricing. In per-device pricing, the MSP charges the customer a flat fee for each device under management. In per-user pricing, meanwhile, the MSP charges a flat fee for each user, accommodating users who use multiple devices. In all-inclusive pricing, also referred to as the all-you-can-eat model, the MSP charges a flat fee for all the IT infrastructure support and management services the MSP plans to offer.
Some solutions providers offer customers with an “as-needed” break/fix model. They will price their services on a time and materials (T&M) basis, billing an hourly rate for repairing a customer’s IT equipment and charging for parts or replacement gear.

Service-level agreements
An MSP often provides its service offering under a service-level agreement (SLA), a contractual arrangement between the MSP and its customer that spells out the performance and quality metrics that will govern the relationship. An MSP may offer a range of SLAs to customers, with the customer paying a higher fee for higher levels of service in a tiered pricing structure.

Challenges of managed service providers
MSPs pay close attention to operating costs and the cost of maintaining skilled employees. Labor is typically an MSP’s greatest expense. To keep labor costs in check and improve efficiency, most MSPs employ remote monitoring and management software to keep tabs on clients IT infrastructure. Remote management software lets MSPs remotely troubleshoot and fix issues with servers and devices.

CCNY Tech is a technology company location in Utica, New York that focuses on the whole lifecycle of information technology. From new or used hardware to service and end-of-life electronic recycling, CCNY Tech is here for your business or organization. We support you on your entire IT journey and act as a true partner in keeping you productive and increasing uptime, while reducing employee frustrations. Give CCNY Tech a call at 1-800-566-4786 for the right IT solution for your organization.

Definition: Virtual Private Cloud (VPC)

A virtual private cloud (VPC) is the logical division of a service provider’s public cloud multi-tenant architecture to support private cloud computing. This model enables an enterprise to achieve the benefits of private cloud — such as more granular control over virtual networks and an isolated environment for sensitive workloads — while still taking advantage of public cloud resources.

The terms private cloud and virtual private cloud are sometimes used incorrectly as synonyms. There is a distinct difference — in a traditional, on-premises private cloud model, an enterprise’s internal IT department acts as a service provider and the individual business units act as tenants. With a VPC, a public cloud provider acts as the service provider and the cloud’s subscribers are the tenants.

How a virtual private cloud works

In a virtual private cloud model, the public infrastructure-as-a-service (IaaS) provider is responsible for ensuring that each private cloud customer’s data remains isolated from every other customer’s data both in transit and inside the cloud provider’s network. This can be accomplished through the use of security policies requiring some — or all — of the following elements: encryption, tunneling, private IP addressing or allocating a unique virtual local area network (VLAN) to each customer.

A virtual private cloud user can define and directly manage network components, including IP addresses, subnets, network gateways and access control policies.


Benefits and challenges of virtual private clouds

As mentioned above, one of the biggest benefits of VPCs is that they enable an enterprise to tap into some of the benefits of private clouds, such as more granular network control, while still using off-premises, public cloud resources in a highly scalable, pay-as-you-go model.

Another benefit of VPCs is enabling a hybrid cloud deployment. An enterprise can use a VPC as an extension of its own data center without dealing with the complexities of building an on-premises private cloud.

Despite the benefits of VPCs, they can also introduce some challenges. For example, an enterprise might face some complexity when configuring, managing and monitoring its virtual private network (VPN).

In addition, while VPCs offer an isolated environment within a public cloud in which workloads can run, they are still hosted outside an enterprise’s own data center. This means that businesses in highly regulated industries with strict compliance requirements might face limitations on which kinds of applications and data they can place in a VPC.

Before it commits to a VPC, an enterprise should also verify that all of the resources and services it wants to use from its chosen public cloud provider are available via that provider’s VPC.

CCNY Tech is a technology company location in Utica, New York that focuses on the whole lifecycle of information technology. From new or used hardware to service and end-of-life electronic recycling, CCNY Tech is here for your business or organization. We support you on your entire IT journey and act as a true partner in keeping you productive and increasing uptime, while reducing employee frustrations. Give CCNY Tech a call at 1-800-566-4786 for the right IT solution for your organization.

Definition: Passwordless Authentication

Passwordless authentication is a verification process where a user confirms his or her identity without the requirement of manually entering a string of characters. Authentication methods include biometrics, security tokens and piggybacking off of another application, service or device which has already authenticated the user.

The benefits of using passwordless authentication include:

Improved user experience (UX).

Faster login times into applications or devices.

Less maintenance of passwords required for IT staff.

Reduced chance of phishing attacks, password re-use or password leaks.

Types of passwordless authentication

With passwordless authentication, users are presented with one or multiple methods of signing into an application or device without the need to enter a password. Common types of passwordless authentication include email-based, SMS-based, multi-factor, biometrics or passwordless authentication for logged-in users.

Authentication through email includes verifying a user with a magic link or one-time code. With a magic link, the user first enters their email and a unique token is created for the user and sent to them by email. The user clicks the link and the service being used will identify the token and exchange it for a live token, logging the user in. With a one-time code, a user will enter their email address and an email will then be sent to them with a unique one-time code. The user then enters the code into the service, which will verify the user and log them in.

Authentication through SMS will begin with the user entering their phone number, prompting a one-time code to be sent to their phone. The user will input the code into the service, where the service will verify the code and phone number, and log in the user. However, SMS passwordless authentication may be less secure than other methods of passwordless authentication as SMS authentications have recorded multiple attacks in the past. SMS and email-based passwordless authentication can also log into a service through a second device through push confirmations, using the first connected device as a communication channel.

Multi-factor authentication uses any (typically) three authentication factors to log in a user such as security questions, PIN codes and contact information. What these factors are depends on the device/service.

Biometrics is another common form of passwordless authentication. Biometrics focuses on technology such as fingerprint scanners or face scans. This form of authentication is commonly found on mobile devices such as smartphones. Android devices will commonly use fingerprint scanners (normally located on the power button, back of the device or even under the front display), while Apple devices (which used to use this authentication format) now use face authentication.

CCNY Tech is a technology company location in Utica, New York that focuses on the whole lifecycle of information technology. From new or used hardware to service and end-of-life electronic recycling, CCNY Tech is here for your business or organization. We support you on your entire IT journey and act as a true partner in keeping you productive and increasing uptime, while reducing employee frustrations. Give CCNY Tech a call at 1-800-566-4786 for the right IT solution for your organization.

Definition: Local Area Network (LAN)

A local area network (LAN) is a group of computers and peripheral devices that share a common communications line or wireless link to a server within a distinct geographic area. A local area network may serve as few as two or three users in a home-office or several hundred users in a corporation’s central office. Homeowners and information technology (IT) administrators set up LANs so that network nodes can share resources such as printers or network storage.

LAN networking requires cables, switches, routers and other components that let users connect to internal servers, websites and other LANs that belong to the same wide area network (WAN). Ethernet and Wi-Fi are the two primary ways to enable LAN connections. Ethernet is a specification that enables computers to communicate with each other. Wi-Fi uses radio waves to connect computers to the LAN.

Setting up a small local area network

Operating systems such as Microsoft Windows and Apple OS X have networking capabilities incorporated into them. This means that as long as the network administrator has a relatively up-to-date laptop or desktop PC, it is fairly straightforward to network machines together.

To set up a wireless network, the administrator will need a wireless router linked to a broadband connection and an Ethernet cable that links the router to the main PC or server. This will then allow other computing devices which already have wireless networking equipment integrated or attached to them, to pick up wireless signals and join the local area network.
LAN security

Once the basic network has been set up, it must be secured. This can be done through security settings in the router, the use of strong passwords and frequent software updates. Hardware-based security such as fingerprint recognition, security tokens and full disk encryption can also be used to enhance network security. Additional security software for protecting and maintaining the network perimeter can be installed locally or purchased through a Software-as-a-Service (SaaS) delivery model.

CCNY Tech is a technology company location in Utica, New York that focuses on the whole lifecycle of information technology. From new or used hardware to service and end-of-life electronic recycling, CCNY Tech is here for your business or organization. We support you on your entire IT journey and act as a true partner in keeping you productive and increasing uptime, while reducing employee frustrations. Give CCNY Tech a call at 1-800-566-4786 for the right IT solution for your organization.

The State of Passwords and Two-Factor Authentication


Since the start of computing, usernames and passwords have been required to authenticate user access like a padlock would protect a gym locker.

As data became more valuable and hacking became more sophisticated, passwords have also had to become much more comprehensive and complicated to be secure.

Today, “two-factor” or “passwordless” authentication have become more popular. Two-factor authentication uses typical password plus a code sent to an app via a text message for an addition confirmation that YOU are indeed YOU.

Two factor and more advanced firewalls are detecting fraudulent access activity with better success.

People are also very satisfied with Single Sign On (SSO) password authentication systems like used with Google, Microsoft and Zoho. Once signed in to one product, you are able to access ALL of the other suite of products as your authentication has been properly verified.

Browser based password saving and third party tools have also helped minimize the trouble of remembering different passwords.

Choosing a Secure Password

Choosing your name as your password for your account is not secure and it will also be easily guessed when another person tries to get into your account. This also applies to using usernames, partial or full, as the password.

Do NOT Make it THAT Easy

The first thing that pops into most people’s heads when they think of choosing a password is the word “password.” Do NOT use the word “password” as a password for any of your accounts as this is generally the first attempt by anyone wishing to break in.

Password Sharing

It is best to avoid password sharing whenever possible. It is tempting to let coworkers, friends, and family have access to our accounts, but sharing our passwords makes it less secure. The means by which we share also make it more susceptible, in some cases, to having your accounts compromised and valuable information unsecure. The more people that have your password, the more susceptible you are to the password getting into the wrong hands.

Password Strength

Use an appropriate mixture of alphanumeric values to ensure security. 123456 is not a good password and neither is qwertyuiop or abcdefg. Passwords should be long enough to be secure but still able to be remembered. Using the password a2b0333w9987u309e82@#4%^ would be a great password ideally but most likely difficult to remember. It is great to use phrases and sentences to help remember passwords. For example, “Alex goes swimming at 4:30 pm” can be used as a password Alexgoesswimmining@430pm. This style can also be used by using the first letter of memorable phrases to create passwords: Alex Loves Eating Pizza At 12 everyday to Alep@12everyday.

A company like CCNY Tech can help you create the Right IT Infrastructure for your business or organization. Let our team of engineers find the right solution to make your system run securely and efficiently.

CCNY Tech offers small businesses in Upstate New York ways to be proactive with their security measures while being on-call to handle technical issues that come up. Contact a specialist at 315-724-2209 and ask about the exclusive TechAgent program that has been built around helping SMBs to increase uptime while staying within budget.

 

The average worker wastes 22 minutes dealing with IT-related issues.

A new study found that the average U.S. worker wastes 22 minutes a day dealing with IT-related issues. And based on a Robert Half Technology survey, an employee may spend 91 hours a year just trying to get his or her computer to work properly. This is more than two work weeks of time!

Contact us to get your system upgraded and reduce downtime and hassles. Besides inefficiencies and downtime, IT problems can affect employee morale and increases turnover.

Put an end to the nonsense and make the call to the IT Experts since 1988. CCNY Tech is here to help make the transition to a better IT infrastructure. Call us at 1-800-566-4786 or ccnytech.com.

IT Asset Disposition (ITAD) and Certified Data Destruction from CCNY Tech

When your obsolete computers and IT equipment sit idle they depreciate in value, literally every day. — There’s an alternative. You can get paid for your older enterprise IT equipment. Not only can you benefit from electronics recycling but this process allows you to recover value on your tech investment.

With our IT Asset Disposition (ITAD) service, CCNY Tech will help you manage IT purchase costs, reduce your net spend over time and maximize residual value on your IT assets quickly and efficiently.

We Convert Your Old IT Hardware into Revenue Opportunities
We work to maximize the recoverable value of your IT equipment by utilizing a vetted network of retail and wholesale channels for the most competitive pricing. Assets that have technical value are tested, secured, refurbished and remarketed for resale.

Send Us Your List of Equipment on Hand
Send us a simple list or a more complex spreadsheet with your unused or outdated IT equipment. CCNY Tech will evaluate what you have and the value it can offer you.

Here’s how we can help you:

Understand the fair market value of your existing IT assets
Reduce your total cost of ownership
Track, report and optimize your inventory
Offset new IT equipment purchases
Ensure that IT assets are secured

Our Services Include Industry Leading Services for ITAD:

Data Sanitization – all data is erased according to DoD guidelines.
BuyBack Process – CCNY Tech will work with you finalize the list of IT assets eligible for buyback.
Responsible Recycling – any assets not having aftermarket value will be properly recycled according.

Protect and destroy your data to the highest standards
With a simple phone call, we can start the process of scheduling your pickup: pack and ship your goods back to our secure facility, create inventory reports, perform secure Certified Digital Data Destruction and/or Physical Drive Destruction, refurbish and resell your valuable assets, and recycle your legacy IT Assets legally and in an environmentally-compliant manner.

We deliver a one-stop solution for managing your electronic equipment while returning the maximum value for your IT Assets.

One phone call to recycle and gain value from your IT equipment… 1-800-566-4786 ext. 3 – it is that EASY!

 

Stop paying other companies to recycle your valuable assets. In many cases, CCNY’s ITAD customers are able to recycle their old gear, have all their data destroyed, and still receive a check for the residual value of their IT Assets.

CCNY Tech has been refurbishing and reselling IT gear since 1988. We can manage all of your equipment, including computers, laptops, phones, networking gear, and many other types of IT equipment.

Whether you have surplus computer hardware, data center equipment to sell, or are looking to buy used computers, printers or racks, CCNY Tech has the knowledge and experience to assist you.

Give us a call at 1-800-566-4786 ext. 3 or contact us. Be sure to list the equipment you have so we can provide an asset value quote.


CCNY Tech has a variety of products from some of the top names in the industry! We supply servers, networking, and storage equipment, along with custom configurations. Check out our site or call our team to learn more about our products and services! Visit Website

Is a Multicloud Network Right For Your Organization?

On account of the advantages of enhanced flexibility and endurance, organizations are increasingly embracing multicloud networks. But migrating to — and handling a multicloud network may be a confusing procedure.

Handling a multicloud platform is further complicated by the growing number of suppliers which are available, but this also creates opportunities. By way of instance, multicloud network design is suitable for organizations which have geographically distributed users, some of whom might not be located near a datacenter.

You must decide which providers are most appropriate, and how these programs may be optimized for performance. The more platforms that you have, the greater the diversity within the multicloud structure, which in turn drives greater challenges in the management level.

At their simplest level, all cloud providers essentially offer a similar kind of service, but every supplier is a bit different, as an instance, Amazon Web Services (AWS) offer auto-scaling. The difficulty of making an accurate decision concerning providers is compounded by cloud suppliers not fully understanding the organization’s activities. Thus, changes in services may happen without analyzing the impact that this will have upon clients that unite cloud services. To counter this, organizations must stay aware not only of the various cloud providers’ current operating procedures but also how these are likely to change later on.

All cloud platforms provide the exact types of services, it’s just what efficiencies you may be able to glean from each different provider. Each has its own solutions and ways to function with various workloads.

Before leaping into the cloud, organizations will need to pause to think about their technological requirements and there long and mid-term goals.

As part of the preparation, the whole network paths should be mapped, identifying where the cloud should fit within the structure.
Additionally, organizations must identify which programs are most suited to cloud-native execution and match these to the services that play to their strengths.

Locked into one cloud vendor
Being locked to one provider is the antithesis of multicloud structure, as it removes one of the main benefits of multicloud networks; namely enhanced resilience and flexibility. This flexibility comes from the kind of having the ability to align every service with the best platform. Being restricted to one provider can accidentally happen unless organizations make certain that the data they create remains in a standard format, rather than dedicated to a particular application or platform (proprietary).

When an application is in the cloud, it may be broken down to a set of microservices to acquire additional advantages, such as increased endurance and decreased update times. By using microservices, you can more effectively scale up and scale to leverage the benefits. But one of the drawbacks is not knowing where to segment or break an existing program that you’re migrating.


Despite the numerous benefits that come from working in the cloud, multicloud networks aren’t without their own challenges.
Handling a cloud environment is equally involved as managing a corporate network. Adding multiple cloud providers makes this even harder, in addition to increasing the price and management resources.

To handle employee time more efficiently, companies need to automate or outsource ongoing cloud maintenance jobs to permit their IT teams to concentrate on more critical responsibilities. Some organizations struggle to manage traditional application stacks, but the degree of sophistication that multicloud architecture requires sometimes goes beyond what is possible for internal IT staff to analyze.

Organizations need to automate low-level monitoring and maintenance tasks, in addition to automating policy across cloud environments and generating exception reports to highlight issues or trouble spots.

Incompatibilities
When an application is broken down into a set of microservices which are dispersed across various cloud platforms, this provides increased flexibility and reduced times in upgrading each microservice. However, in addition, it runs the risk that one microservice could interrupt other microservices because of incompatibilities.

Development teams will also need to ensure every one of those microservices that form their cloud program don’t cause incompatibilities and cascading failures.

Multicloud networks are complicated and resource-consuming, but the benefits they bring (such as increased resilience and gaining multiple supplier-specific advantages) can substantially outweigh their costs.

To take full advantage of the benefits, organizations should be careful to avoid possible pitfalls in their migration and management of muticloud and hire an experienced IT firm like CCNY Tech to navigate the decisions and architecture.

A company like CCNY Tech can help you create the Right IT Infrastructurefor your business or organization. Let our team of engineers find the right solution to make your system run securely and efficiently.

CCNY Tech offers small businesses in Upstate New York ways to be proactive with their security measures while being on-call to handle technical issues that come up. Contact a specialist at 315-724-2209 and ask about the exclusive TechAgent program that has been built around helping SMBs to increase uptime while staying within budget.

Get Prices for Used Networking Equipment:  Utica/Rome – Syracuse – Rochester  – Buffalo  – Albany   – NYC – Cortland NY

Email Client Stats – May 2019

Mobile phones and tablets are dominating email clients in 2019. Apple and Google are the dominant players and Yahoo Mail continues to fall out of favor.

#1 Gmail – 29% +0.75

#2 Apple iPhone – 28% +0.55

#3 Outlook – 9% -0.39

#4 Apple iPad – 8% -0.38

#5 Apple Mail – 7% -0.2

#6 Yahoo! Mail – 6% -0.18

#7 Google Android – 3%

#8 Outlook.com – 2% -0.15

#9 Samsung Mail – 1% -0.22

#10 Thunderbird – 1% -0.02

Tracked by Litmus Email Analytics in May 2019

 

Get Prices for Used Networking Equipment:  Utica/RomeSyracuseRochester  – Buffalo  – Albany   – NYCCortland NY

 

What’s the difference between a Router, Switch and Hub?

While Routers, Switches, and Hubs are Network devices, they all serve different purposes.

The First Ethernet Networks had no Idea of virtual LANs (VLANs).  Thus, a total network consisted of a single IP subnet.  If you wanted to connect two or more devices on the LAN using Ethernet, you would use a Network Hub.

A Hub is simply a multiport Ethernet repeater.  When the Hub receives information from a sending device, it simply repeats, or broadcasts, the exact same information out all ports on the Hub.

The purpose of a hub is to connect all of your network devices together on an internal network.  It is a device that has multiple ports that accepts Ethernet connections from Network Devices and is not intelligent because it does not filter any data based on where the data is supposed to be sent.  A hub only “knows” when a device is connected to one of its ports so when a data packet arrives at one of the ports. The hub will just Rebroadcast that data to every port that has a device connected to it.  When this happens it not only creates security concerns, but it also creates unnecessary traffic on the Network which wastes bandwidth.

A Hub quickly becomes an inefficient mode of communicating transport as the number of connected devices increases.

As a result of this, the Network Switch was created.

Now a switch is very similar to a hub as it is also a device that has multiple Ethernet ports and is connected to Network Devices. But unlike a Hub, a Switch is intelligent. A Switch can actually learn the physical addresses of the devices that are connected to it and it stores these physical addresses called MAC addresses in its table so when a data packet is sent to a switch It’s only directed to the intended destination port. Switches are far more preferred over hubs because they reduce any unnecessary traffic on the Network.

How a Network Switch functions:

HP ProCurve 4202vl-72 Switch ChassisFirst, a Switch divides a LAN using a single broadcast domain into multiple broadcast domains.  This helps to decrease the amount of broadcast traffic congestion on bigger Networks.

Next, a Layer 2 Switch can eliminate the need to repeat

Instead, the Switch will appear from the Ethernet frames received by the sending device.  The frame will contain a destination MAC address, which is cross-referenced from the Switch MAC address table.  If the Switch understands the specific port the MAC address corresponds to, it’s sent just out that port as one casted frame.

Now hubs and switches are used to exchange Data within a local area network such as in your home network or in a business. They are not used to exchange data outside their own network… that’s where the router comes in.

Cisco - 540W-FXO Unified Communications Wireless RouterA Router is a virtual or physical appliance that passes Information between two or more packet-Switched Networks – analyzing a given data packet’s destination IP address, calculating the best way for it to reach that destination and then forwarding it accordingly.

A router does exactly what its name implies a router is a device that routes or forwards data from one network to another based on their IP address when a data packet is received from the router inspects the Data’s IP address and determines if the packet was meant for its own network or if it’s meant for another network. If the router determines that the Data packet is meant for its own network it receives it, but if it’s not meant for its own network, it sends it off to another network.

Routers vs. Switches

As mentioned earlier, Layer 2 Switches can break up one each VLAN is its own IP subnet.

Rather than Switching frames using MAC addresses, routing between subnets uses IP addresses which are located within IP Network packets include ethernet frames with IP address destination and source information.

Traditionally, a dedicated Router would provide routing services for Layer 2 Switches. However, a more modern approach on venture Networks you would use a Layer 3 Switch, which combines routing and switching functions in a single device.

A company like CCNY Tech can help you create the Right IT Infrastructure for your business or organization. Let our team of engineers find the right solution to make your system run securely and efficiently.

CCNY Tech offers small businesses in Upstate New York ways to be proactive with their security measures while being on-call to handle technical issues that come up. Contact a specialist at 315-724-2209 and ask about the exclusive TechAgent program that has been built around helping SMBs to increase uptime while staying within budget.

Get Prices for Used Networking Equipment:  Utica/RomeSyracuseRochester  – Buffalo  – Albany   – NYCCortland NY

Visit From Congressman Anthony Brindisi

Representative Anthony Brindisi visited our facility in Utica NY this morning to see what CCNY Tech offers our customers, employees and community.

These week Rep. Brindisi is touring some local businesses in the district and decided to stop in to see us at work. He was very impressed with the size of our operations and looks forward to helping us grow and add jobs in the area.

CCNY Tech continues to grow and expand our reach and services to match our clients ever evolving technology needs.

 

Buy Re-manufactured Servers:  Utica/RomeSyracuseRochester  – Buffalo  – Albany   – NYCOswego

 

Is it Time? Signs You Are Ready For Managed IT Services

Managed Services can be generally defined as outsourcing day-to-day management responsibilities for improving operations and cutting expenses. When it comes to technology, it’s the outsourcing of continual monitoring and day-to-day administrative duties of your IT infrastructure.

How do you know if your organization could benefit from managed network services? The best way to determine if you’ll cut costs is to know what you are currently paying for your IT management internally. You need to judge the true upkeep costs and then comparing that to an estimate from a reputable managed network services provider like CCNY Tech.

Do you have a dedicated IT professional on staff?
Many small to medium-sized businesses have IT needs that will quickly overwhelm the time and skills of the unlucky staff member who isn’t an IT professional but just happens to be the tech-savviest person around. Many business owners find themselves in a tough position trying to keep a handle on technology while also running their business.

Even if this task is delegated to someone else, it still means someone on your staff is spending a large amount of time fixing IT problems rather than being productive at their job. In most cases, they probably don’t have the time or technical knowledge to plan for the future of your IT systems. This path will doom you to a continual reactive cycle that never prepares you for future growth, challenges, or demands on your network.

If you don’t have a dedicated IT person, managed services is the perfect substitute. Rather than paying the salary and benefits for another employee, you could pay a reduced amount for managed services. A technology professional with five years of experience may be worth $70,000+ a year. That $70,000 salary only gets you one person, not a team of professionals with expertise and knowledge. When you hire your own IT staff, there are also challenges scheduling around vacation, training, and illness. Using managed IT services provides full time IT coverage and vacations, illness, and other absences don’t affect your support.

Many choose our Managed Services because their IT professional is swamped with everyday tasks—and things are falling through the cracks.
Is your IT person on top of your software licensing? Are your security updates and upgrades being run continually on all your computers, server, and other devices? Even a single seasoned professional can be overrun with work that keeps piling up, and the biggest culprit is the everyday management and monitoring tasks that get delayed and shunted to the side when a bigger or higher priority issue comes up.

You’re always bringing in outside help to fix “emergency” problems that could have been detected and handled earlier.
If you currently work with an IT company, take a look at your “brake/fix” history with them. Is your server going down repeatedly because no one detected one of its hard drives was going bad? Are you continually paying for someone to come on-site and fix little problems with your employees’ computers?

If you’ve experienced any one or more of these signs, then Managed IT Services from CCNY Tech might be right for you. Call us at 315-724-2209 and press ‘1’ for sales.

Buy Re-manufactured Servers:  Utica/RomeSyracuseRochester  – Buffalo  – Albany   – NYCOswego

Network Edge Vs. Edge Computing

What is the network edge and how is it different from edge computing?

The network edge, also known as the WAN edge. Edge computing is a modern take on data center and cloud computing architectures to help create efficiencies.

In a nutshell, network edge is where an enterprise network connects to third-party network services.

Today, applications and data are housed in one or more data processing locations (either in private data centers or public clouds). These data centers are often geographically far from the end user. This distance between the user and the apps, data and services they interact with can create inefficiencies from a Bandwidth and Throughput.

Edge computing seeks to alleviate these inefficiencies by moving applications and data closer to the user. This is accomplished by decentralizing traditional data centers and locating them physically closer to end users, thus placing data and apps closer to the end-user edge.

What is the network edge?
The point at which the enterprise-owned network connects to a third-party network is known as the network edge.
The network edge, on the other hand, is one or more boundaries within a network that designate who controls the underlying network infrastructure equipment. For example, an enterprise network usually consists of a corporate wired LAN, a wireless LAN, and one or more private data centers. Each of these network segments is owned and managed by the corporate IT department.

The point at which the enterprise-owned network connects to a third-party network is known as the network edge. Thus, you’ll often hear network administrators talk about their WAN edge or internet edge.

Security Dilemma
You’re connecting your equipment to someone else’s. In these cases, added network edge security is required to prevent malicious activity from the foreign network moving into yours.

Many tools are available to protect the network edge. The most common choice today is a traditional network-based firewall. A firewall is a great first line of defense to permit or deny traffic based on IP address and protocol or port number.

Getting more granular, you can implement an intrusion prevention system to monitor traffic to see if any known malicious signatures are matched. If a packet is found to contain a malicious signature, it is stopped and blocked from entering the secure side of your network.

Other network security tools, such as network-based malware protection, data loss prevention and cloud-based threat intelligence and sandboxing services, are also great ways to protect the network edge from more advanced threats.

Companies investigating possible edge computing applications shouldn’t assume they can simply select an option off the shelf. The wide variety of applications means no single network architecture exists for the edge. Each network must be designed to meet the specific requirements of an application.

Is Edge Computing New?
Edge computing is not new — branch office servers have been executing applications for years. But much of the recent interest in edge computing has stemmed from the growth of IoT. Hundreds of IoT device types have been developed, ranging from simple devices that periodically report temperature to sophisticated machine tools.

As IoT (Internet of Things) growth and application processing requirements influence the future of edge computing, it’s also useful to compare edge computing with cloud computing. While each option has its advantages, the ultimate decision filters down to organization requirements and customization.

Edge computing will undoubtedly continue to increase as new types of IoT devices develop. It could also prove to be a viable alternative or complement cloud computing, especially for applications that require fast response times. The technology grow and make edge computing easier and less expensive than acquiring components and assembling them at remote sites.

CCNY Tech offers small businesses in Upstate New York ways to be proactive with their security measures, while being on-call to handle technical issues that come up. Contact a specialist at 315-724-2209 and ask about the exclusive TechAgent program that has been built around helping SMBs to increase uptime, while staying within budget.

 

Get a Quote for Pre-Owned Servers & Switches:  Utica/RomeSyracuseRochester  – Buffalo  – Albany   – NYCPlattsburgh

What Is a VPN Used For?

A virtual private network (VPN) is software that creates a safe and encrypted connection over a less secure network, such as the internet. VPNs were developed initially to provide branch office employees with safe and reliable access to corporate applications and data. Today, VPNs are often used by remote workers and business travellers who require access to sites that are geographically restricted. The two most common types of VPNs are remote access VPNs and site-to-site VPNs.

Remote access VPN
Remote access VPN clients connect to a VPN gateway on the organization’s network. The gateway requires the device to authenticate its identity before granting access to internal network resources such as file servers, printers and intranets. This type of VPN usually relies on either IP Security (IPsec) or Secure Sockets Layer (SSL) to secure the connection, although SSL VPNs are focused on supplying secure access to a single application rather than to the entire internal network. Some VPNs provide Layer 2 access to the target network; these require a tunnelling protocol like the Point-to-Point Tunneling Protocol or the Layer 2 Tunneling Protocol running across the base IPsec connection. In addition to IPsec and SSL, other protocols used to secure VPN connectivity and encrypt data are Transport Layer Security and OpenVPN.

Site-to-site VPN
In contrast, a site-to-site VPN uses a gateway device to connect an entire network in one location to a network in another location. End-node devices in the remote location do not need VPN clients because the gateway handles the connection.

SSL Help Secure Your VPN
There are lots of SSL Certification Authorities with Browser based safety for Intra-Organizational security. As companies become more decentralized, they find themselves with employees all around the globe. This presents a challenge for network managers – how to make their networks available for their employees as well as maintain reliable security measures. Network managers put up Virtual Private networks to achieve this job.

VPN’s allow you to turn the Web into your company network. Through the use of encryption, VPN connections are protected from outside users, safeguarding data and enabling the secure, remote use of important applications. SSL Certificates help you secure your VPN connections in the most straightforward approach.

SSL Certificates Manage Data Transport
SSL Certificates are based on the SSL (Secure Sockets Layer) protocol. SSL is a protocol for managing the security of message transmission on the Internet. The SSL standard isn’t a single protocol, but rather a set of approved data transfer routines that are designed to safeguard the integrity of sent messages. SSL relies on certificates – digital identification – and secrets.

 

Certificates include the name of the certification authority which issued the certificate, the title of the thing to which the certification was issued, the entity’s public key, and time stamps that indicate the certificate’s expiration date. SSL Certificates on your Virtual Private Networks or Intranets Serves the identical function as Internet SSL – that they create the communication between a host and a browser safe and secure.

Thus, if you’ve got a large employee base that’s spread across, you should consider SSL Certificates as a great way to secure your internal communications. The SSL VPN can be a fantastic selection for schools, libraries and public kiosks where hope may be a problem, but easy access is also essential.

CCNY Tech offers small businesses in Upstate New York ways to be proactive with their security measures, while being on-call to handle technical issues that come up. Contact a specialist at 315-724-2209 and ask about the exclusive TechAgent program that has been built around helping SMBs to increase uptime, while staying within budget.

 

Get a Quote for Pre-Owned Servers & Switches:  Utica/RomeSyracuseRochester  – Buffalo  – Albany   – NYCPlattsburgh

Break/Fix vs. Managed IT Services

Break/Fix is a reactive approach of providing IT support to customers. Break/Fix services are generally fee-based and rely on a customer contacting the IT services company when repairs or upgrades are needed.

 

While break/fix usually works where the IT Services Company charges an hourly rate plus the cost of parts (also known as time-and-materials), there are some exceptions. For example, a Break/Fix IT company might offer discrete services, such as virus removal or data migration, at a flat rate instead of an hourly rate, usually because the contractor has a clear scope of the time and deliverable involved.

 

Break/Fix vs. Managed IT Services
Break/Fix is distinguished from Managed IT Services. Managed IT Services is an approach in which an IT services company will take responsibility for customers’ IT systems and provide remote monitoring and management. Service Level Agreements (SLAs) will determine what is covered and not covered in a Managed Services contract. Sometimes an SLA will cover a limited scope, or only perform operations remotely, for instance.

 

Whereas Break/Fix services resolve their customers’ IT issues only when support is requested, managed services providers (MSPs) take a proactive approach to prevent potential IT issues from disrupting uptime and employee efficiencies.

 

The Break/Fix model is inherently “Broken”

In the IT services industry, the Break/Fix service model has received criticism for taking a reactive approach to maintaining IT systems for clients. The controversy of the Break/Fix service model is multifaceted. Some IT services companies that focus on Break/Fix will end up “billing the customer” more cost per year than if a proactive approach was chosen. This direction is where taking a proactive approach is gaining more influence with small to medium-sized businesses.

 

Some IT managed service contracts are inclusive of both proactive and reactive care plans. This encourages businesses to fix problems before they become catastrophic for their business. Unmonitored and non-maintained systems are ripe for massive issues such as data loss, malware/spyware infection, or ransomware attacks.

 

Infected and poorly maintained systems can also cost money in losses in efficiencies for employees. Well maintained systems and computers not only keeps employees happier, but it also allows them to do their jobs with fewer issues and conflicts.

The Ancillary Benefits of Managed Services

The value of MSPs proactive approach is starting to be more understood by the business world due to the ancillary benefits with employee efficiencies, happier work experiences and increased uptime at a relatively fixed monthly cost. It generally works better for a companies for budgeting to know how much IT maintenance costs are involved before the year begins. By securing a prepaid MSP plan, companies and organization can have piece of mind that they have an IT partner that will be available when they need them, while monitoring potential issues 24/7.

Transitioning to Managed Services

While Break/Fix was a prevalent model for providing IT support a decade ago, many IT services companies have transitioned to the managed services model. However, many IT companies continue to offer Break/Fix services for customers that still see it as a fit.

If you are looking to transition to a managed services model, engaging a company like CCNY Tech can be an extremely viable option, as CCNY Tech offers a “hybrid approach” to managed services. Our CCNY TechAgent service allow for quick reactive response via ticket while we can monitor, patch and remotely assist when issues arise.

 

Contact a representative at CCNY Tech (315-724-2209) to learn more how the TechAgent program can help your business or organization, maintain a quality IT experience.

 

CCNY Tech delivers IT Services across Upstate New York
Utica |   Syracuse  | Ithaca  | Albany  | Rochester

 

CCNY Tech offers small businesses in Upstate New York ways to be proactive with their security measures, while being on-call to handle technical issues that come up. Contact a specialist at 315-724-2209 and ask about the exclusive TechAgent program that has been built around helping SMBs to increase uptime, while staying within budget.

Stop Playing The Odds

IT departments looking to save time and money shouldn’t be doing this at the expense of their data protection. A study from the University of Texas showed that 43% of companies suffering from catastrophic data breaches were forced to close and never reopen, and 51% closed within two years.

Although all breaches are not the same, many of the causes are human-related and carry similar themes.

Trusting Co-workers to Follow Policies
The reality is that employees aren’t always great at following company policies, and even when they do, mistakes still occur. Automation enables some solutions. This, along with, strict enforcement of created policies and procedures, and retention enables data retrieval are key steps businesses need to consider.

Underestimating Cybercriminals
Most companies have at least basic security solutions (firewalls and anti-virus applications) in place to defend against malware. But cybercriminals are becoming very adept at breaking through traditional cyberdefenses. IT professionals should evaluate their IT Infrastructure, identify areas of vulnerability and implement better security solutions to overcome them. These solutions include web-monitoring software for safe Internet usage, end-point protection for bring-your-own-device management and a sandbox to fight targeted attacks. From a backup perspective, the ideal approach is to operate backup and disaster-recovery solutions on a non-Windows operating system. Windows has long been one of cybercriminals’ favorite targets, and running protection software on an operating system which is relentlessly under attack just does not make sense.

Playing the Odds
Despite data-loss horror stories, many companies still don’t have disaster-recovery plans in place to protect data (customers, company & employee data) from natural and man-made disasters. Many companies that do have set policies have just one general set of guidelines that apply to all disaster situations. A strong plan focuses on people, infrastructure and processes, and clearly outlines how each is affected in different disaster scenarios.

Failing to Test Disaster-Recovery Plans
Failure to test disaster-recovery plans, or testing them infrequently, can greatly increase the risk of data loss in the event of a disaster. Since IT infrastructure evolves daily, thorough testing must be done on a consistent schedule as a standard business practice.

Transparency is key today. No matter whether the information loss is noticed right away or weeks afterwards, notifying the public and those affected is key to mitigating against negative outcomes for a business. Often companies will recover if they are candid with their customers and helpful with providing solutions to prevent identity thief or further breaches. Taking responsibility of the breach and disclosing exactly what information was breached can help tremendously against further damage.

CCNY Tech delivers IT Services across Upstate New York
Utica |   Syracuse  | Ithaca  | Albany  | Rochester

CCNY Tech offers small businesses in Upstate New York ways to be proactive with their security measures, while being on-call to handle technical issues that come up. Contact a specialist at 315-724-2209 and ask about the exclusive TechAgent program that has been built around helping SMBs to increase uptime, while staying within budget.

Get a Quote for Pre-Owned Networking Equipment:  Utica/RomeSyracuseRochester  – Buffalo  – Albany   – NYCWatertown NY

 

Small Business Owners: It’s Time…

There are two main reasons why business owners aren’t taking appropriate actions to safeguard their networks; yet another motive is known as”security fatigue,” and the other explanation is essentially denial. Security fatigue occurs when cybersecurity gets so overwhelming that business owners abandon practices entirely. Safety is constantly changing and attacks are becoming more complex, so some believe that their efforts are futile.

According to a survey, about 87% of small business owners don’t feel this is a legitimate threat. That same poll says that just 69% have steps in place to prevent attacks. These statistics leave an alarming variety of small companies without any intrusion detection/ avoidance in any way. Now let us be clear here, info breaches are a real chance for many companies, in all industries.

CCNY Tech’s Central New York MSP offering understand that securing company networks, data, applications, and sensitive information can be terribly overwhelming. It may be even more stressful when customer information is on the line. As technology grows more and more concentrated in our companies, our need for safety becomes much greater. But, network security doesn’t need to be as complicated as you may think. Although it’s critical, it can be readily implemented and maintained.

1. Designed Wifi Access Points – Having a WiFi range that extends further than your instant building leaves your network more exposed to hackers. Perhaps it doesn’t seem like a probable issue, but it is more common than you may know.

2. Install a Firewall – A firewall is a very straightforward and manageable way to protect your network. Using a dedicated firewall permits for more in-depth review of programs entering your system.

They provide an array of safety enforcement technologies and fight against complex threats.

3. Physical Security – It can be quite useful to keep your system infrastructure behind locked doors. Studies have found that the majority of breaches are performed by workers — both unintentionally and intentionally. It can be best to maintain network infrastructure off limits to anybody that doesn’t require direct contact with it.

4. Educate Your Employees – Since inside accidents are so common, it might be beneficial to spend 1 day per year teaching best practices. This includes teaching employees about opening particular emails, where to conserve company and client information, spam filters, and clean desk policies, amongst others.

A clean desk policy implies all workers keep company and customer data from their desks when it isn’t being used. Any visitor, or even employees from different departments shouldn’t have the opportunity to view sensitive information.

Password training may also be valuable to your organization. Not only is it important not to write passwords down, it’s also helpful to use complicated combinations and to change them regularly. Today the best bet is to have “two-factor authentication” which typically requires a second step of approval on a mobile device via text message or native application.

5. SSL and Encryption – Most businesses these days have a website. If financial information passes through a website, it is up to the business to perform their due diligence and safeguard that information to the best of the ability. A very simple way to kick off this is to allow SSL through your hosting provider. This will help to protect against loss of information through packet sniffing.

6. Keep Log Files – A centralized accounting server keeps logs from all devices on the system and may be used to determine the point of entry for an individual, in addition to their information (in case the system is not compromised). These files are essential for damage control and future preparation.

7. Captive Portal on accessibility Points – Implementing captive portal for guest users on your network is a simple method to alleviate some possible responsibility. This is accomplished by ensuring guest customers read and consent to an AUP (acceptable use policy) which clarifies acceptable use in your network. If a guest then utilizes your network to perpetrate a crime in some way, your business is no longer accountable for their actions.

8. Avoid BYOD – All employees and management should avoid using their private devices for work. When office workers use personal phones, tablet computers, laptops, etc. at the job site, they start the network to several dangers. When connecting outside devices to the business network, it’s subsequently subjected to some viruses and threats that they may have been carrying. Likewise, once an employee brings work home on personal computers and phones, they undermine the job into the low amount of security in their home system. Worker devices shouldn’t be connected to the company network and company work should not be brought home. This can leave a network quite vulnerable.

9. Anti-virus and Automated Software Updates – Researching and installing proper antivirus is an excellent way to shield your network. Attacks can be hiding in all kinds of places and antivirus makes it only that much safer to see sites and emails that are open.

Automated software upgrades are another very helpful networking practice because it ensures that you are running the latest versions. Software updates often include patches to some issues in prior versions. This may consist of security holes and leaks. These upgrades operate in the background, and while you don’t observe they are happening, they can be protecting your information.

CCNY Tech delivers Managed IT Services across Upstate New York
Utica |   Syracuse  | Ithaca  | Albany  | Rochester

CCNY Tech offers small businesses in Upstate New York ways to be proactive with their security measures, while being on-call to handle technical issues that come up. Contact a specialist at 315-724-2209 and ask about the exclusive TechAgent program that has been built around helping SMBs to increase uptime, while staying within budget.

 

Get a Quote for Pre-Owned Networking Equipment:  Utica/RomeSyracuseRochester  – Buffalo  – Albany   – NYCWatertown NY

IT Asset Disposition in 2019

ITAD or IT Asset Disposition has evolved over the years and now many companies have improved their apprach to offer a balanced alternative to simple e-waste recycling.

Modern ITAD comes with a number of different strategies to keep data secure while getting a return on the company’s hardware investment. It is a fact that companies, especially those who want to stay competitive, must invest a huge amount of money in new IT Hardware to stay efficient and profitable. New equipment is a great thing, but properly disposing of the older assets can cause some serious environmental damage and possible fines. There is no doubt that IT asset disposition is beneficial for every company and even for individuals, but there are few things that need to be taken into consideration before using IT Asset Disposition.

First of all, companies are free to choose whether this whole process will be carried by their own IT professionals or they will use an evolved IT Asset Disposition company like CCNY Tech. Both options have their advantages or disadvantages. Auditing of equipment and the elements of this equipment like serial numbers, barcodes and similar ID numbers are part of every serious IT Asset Disposition strategy. In this way, the company can get a precise report on the effects of this IT strategy implementation.

CCNY Tech – ITAD Services

An advanced IT Asset Disposition Company like CCNY Tech can help a company replenish it’s budget by remarketing some of the systems or parts of the systems that still have value to secondary or international markets. They can safely dismantle the device on small components and use these components for new devices.

Some companies simply outgrow the equipment they have and although they are perfectly fine these units are useless for them. IT asset disposition experts can help remove the secure data stored on these servers and devices in general. In case the equipment is non-functional, it is the best idea to send it to a specialized e-waste recycling company like CCNY Tech.

Thanks to the increased Eco-awareness, more and more companies will use ITAD strategies as part of their e-waste strategies. In this way they can expect to get the most from their investments in technology. By using IT asset disposition techniques, companies will not only avoid legal problems and protect the environment, but they can also return some of their original investments. This is certainly a trend that is becoming a standard.

CCNY Tech has mastered the process to separating the value, remarketing systems, and recycling the rest in an efficient manner.

ITAD Services from CCNY Tech

Reasons for Outsourcing Your IT Support Services

Reasons for Outsourcing Your IT Support Services

A professional IT support provider helps manage the network, users, services, and devices that are integral to a company’s operations. It helps guarantee that the organization’s network is current and that its technology provides seamless operations across all departments, hierarchies, and roles within the company.

The immediate and long-term benefits of outsourcing your IT Support Service.

Reduce labor costs
Tech support specialists are expensive. An IT professional earns between $40,000.00 to $90,000.00 per year. By outsourcing your IT needs you will spend a fraction of the annual salary.

Lessen IT Costs
IT projects can be budgeted more efficiently. A company’s expense is for the talent needed for the project. The level expertise for a specific project usually is not the level of talent needed for day to day operations. Hiring a firm allows a company to scale

Provide an uninterrupted flow of service
Professional IT network service providers ensure end-to-end networking and a continuous flow of functionality for internet, intranet, and extranet.

Increase in Productivity
When disaster management and recovery are tackled with competence, employees tend to be less anxious. Less anxious employees can devote more energy to day-to-day operations

Remain focused on core business
Having confidence in a skilled IT Service provider allows management to focus on their core business instead of Network security, disaster recovery, crashes, etc.

Enjoy expanded resources
By bringing in outside resources you are gaining the insight of professionals who have IT experiences outside of your IT environment. A company gains access to cutting-edge technology that they would not normally encounter.

Recovery from disaster
When a cyber-attack or other disaster hits a company, how a company’s data is protected becomes vital in the future of the business. Without a recovery plan already in place data can be lost and in some cases, businesses close.

Why CCNY Tech? One word “Proven”

  • 30 plus years in IT Industry
  • On-staff engineers
  • 100 plus years combined technical experience
  • Apple certified
  • Cisco certified
  • Fortinet certified
  • Dell certified

As a prospective client of CCNY Tech we request 15 minutes of your time.

What you get from CCNY Tech for your 15 minutes of time:

A qualified IT professional will walk thru your entire IT infrastructure, give suggestions and recommendations on what is needed immediately and concerns that can be addressed in the future.

After evaluating your IT Network, we will submit a customized proposal for IT services. In most cases, we can save your organization money with our remote access TechAgent solution.

CCNY Tech is an experienced Managed Service Provider in New York State
Utica |   Syracuse  | Ithaca  | Albany  | Rochester

Tricia Shauger is Vice President and Chief Operating Officer with CCNY Tech. Her expertise is in helping clients get the best IT partnership. CCNY Tech has 30 years experience dealing with the lifecycle needs of companies across the US.

Beware of the Bolder Exploits

GandCrab v5 was discovered on September 24

Security professionals have been trying to stay ahead of GandCrab. It has evolved to it’s 5th version and has potentially become 2018’s most prolific ransomware. Unfortunately, the criminals behind it continue to experiment with new features.

Researchers announced the discovery of GandCrab v5 recently (September 2018), the latest major update to a strain of ransomware that has gained significant traction in the criminal community this year.

GandCrab appeared in late January and the ransomware found success almost immediately, infecting more than 50,000 victims in less than a month. The success also earned the group the attention of the authorities, however, and in late February a collaboration between Bitdefender, Europol, and the Romanian Police resulted in the seizure of command-and-control servers and the release of a decryption tool victims could use to recover their encrypted files.

The raid was unfortunately just a minor setback. Within a week the GandCrab v2 was released, rendering the decryption tool ineffective.

GandCrab authors would continue iterating from there, consistently making tweaks, issuing updates, and fixing bugs on a regular basis. Thanks in part to this “agile” approach, GandCrab has managed to stay one step ahead of many traditional security solutions and gain widespread popularity amongst criminals who rent it out for use in their own campaigns.

GandCrab v5 was discovered on September 24, but, true to form, its authors busily spent the next week working out kinks and making minor changes, resulting in version 5.0.4 appearing by October 2.

Security researchers have noticed the ransomware appeared to be attempting to incorporate the same exploit code for the Windows Task Scheduler ALPC zero-day vulnerability. This exploit can give GandCrab elevated privileges once the ransomware is installed on infected machines. Microsoft released a fix for the vulnerability as part of its September 2018 updates. If they haven’t already, organizations are advised to patch to mitigate that specific threat as soon as possible.

Stay ahead of the cybercriminals by hiring a professional managed services firm like CCNY Tech. We can keep your hardware running great and your operating system safer from vulnerabilities. Let us setup proper backups, failovers to keep you up and running. We also monitor your systems and keep all your systems updated to stay ahead of problems. Give us a call at 1-800-566-4786 or visit ccnytech.com to get started.

3,840 Reasons to Call Us

The average user receives 16 malicious spam emails per month. Even if you only have 20 employees, that’s 320 times a month you have to trust in staff to correctly scrutinize emails and make the right call. That’s 3,840 bullets to dodge over the course of a year. Education of employees and the best in class technology from CCNY Tech can help you to get an upper hand.

Most Common Email Disguises (Malware)

Fake invoices are the #1 disguise for distributing malware.
Symantec 2018 ISTR

Spam and phishing emails come packaged up in all sorts of disguises. According to Symantec’s 2018 Internet Security Threat Report, these are the most common when it comes to distributing malware.

Most common disguises:
Bill / invoice (15.9%)
Email delivery failure (15.3%)
Legal / law enforcement (13.2%)
Scanned document (11.5%)
Package delivery (3.9%)

Dangerous SPAM Emails

Malicious content in spam emails is increasing in the form of attachments and URLs. Malicious attachments and URLs attempt to deliver software that can compromise the security of a computer.
Inboxes are still constantly under attack – 92.4% of malware is delivered via email according to Verizon 2018 DBIR.

The Horrors For IT Departments

With Halloween approaching tomorrow, it is an excellent time to take a look at the “Tricks” being played at the doorstep of IT Departments. From more sophisticated cyber attacks to advances in job-killing technologies, 2018 has been a truly scary year for IT Departments.

Cloud Computing
The Cloud has made Enterprise Infrastructure more available for startups, but it also brings with it a plethora of challenges. Cloud computing is fast to deploy and often a more affordable choice for business. However, with Cloud, it relies heavily on the technical capabilities and capacity of the Cloud Services Provider. As we all know, in technology there can be many points of failure that can slow or temporarily disable access. Couple that with today’s modern cyber hacking threats, a strong concern for data privacy, and the appropriate concern in putting so much trust for delivery in another companies hands, Cloud Computing is not an anxiety-free solution for most.

In addition, as local computers are being replaced with lower-resource “cloud clients,” the need for robust traditional IT support teams are in jeopardy. However, the upside is that the demand for people with coding, web and software development, and network security skills and experience are in high demand right now.

The Human Factor
Attempts to trick users into giving personal information spiked more than 500 percent from the first to second quarter of 2018, according to researchers at Proofpoint.

Social engineering is increasingly the most popular way to launch email attacks, and criminals continue to find new ways to exploit the human factor. Typical network security solutions have become more robust and intelligent in recent years, so hackers and mal-intent actors have resorted to the next weakest link… The Human Factor. The responsibility for educating users to understand those threats is a new concern for IT Departments to keep their data and networks secure.

Cryptocurrency & Malware
The use of cryptocurrency, fake antivirus and browser plugins are responsible for the jump in attempts to manipulate users this year. Overall, the volume of email fraud that organizations receive has increased 87 percent year-over-year, and the threat of Ransomware has sky-rocketed this year as cryptocurrency protects the cyber criminal’s identity, while increasing the bounty for them to expand these attacks.

The sad realities in the IT industry may seem scarier each year as companies become increasingly tied to networks and The Cloud for commerce and operations. But on the positive side, self-repairing systems and smaller more efficient processors will open the door for more reliable technology going forward.

CCNY Tech is a company dedicated to solving IT concerns and delivering the top enterprise hardware and software solutions available. We provide support for the full lifecycle of IT hardware, including the end-of-life disposal. Contact us at 1-800-566-4786 or visit ccnytech.com to learn more about our solutions.

What is: Augmented Intelligence?

Augmented intelligence is an alternative definition of artificial intelligence that focuses on AI’s helpful role, emphasizing that it is designed to “enhance human intelligence” rather than replace it.

The word augmented, which means “to improve,” reinforces the role human intelligence plays when using machine learning and deep learning algorithms to discover relationships and solve problems.

Some industry experts believe that the term artificial intelligence is too closely linked to many of the unrealistic fears about artificial intelligence and improbable expectations about how it will change the workplace and life in general. Although artificial intelligence has its pros and cons, the idea of

using computer information to help humans make better-informed decisions is nearly universally accepted.

Researchers and marketers hope the term augmented intelligence, which has a more neutral connotation, will help people understand that AI will simply improve products and services, not replace the humans that use them. While a sophisticated AI program is certainly capable of making a decision after analyzing patterns in large data sets, that decision is only as good as the information and data points that human beings gave the programming to use.

IBM, which has invested heavily in artificial intelligence with the Watson cognitive system, has embraced the label augmented intelligence and has also suggested the term intelligence augmentation (IA), not only to emphasize the supportive role of the technology but also to avoid confusion caused by using AI as an abbreviation. Other alternative lingo includes “machine-augmented intelligence” and “cognitive augmentation”.

With the advances in computing power and the ability of machine learning, computers have the ability to make more sophisticated recommendations to humans. In most cases, humans need to make the final judgment and decisions but augmented intelligence gives them the tools hopefully to make better-advised decisions.

 

For solid servers and networking gear, contact our team at CCNY Tech. We can get you a proposal to expand your IT infrastructure and make Augmented Intelligence a real value for you and your company.

CCNY Tech is a systems integrator with over 30 years experience in the technology sector. Whether you need upgraded hardware, legacy parts, managed services, or end-of-life recycling of hardware, CCNY Tech has the solution to fulfill your technology requirements.

7 Ways IT Companies Help Small Firms Enact Big Ideas

7 Ways IT Companies Enact Big Ideas for SMBs

Good customer service is crucial to success in business; there’s nothing high-tech about helping customers get exactly what they need. However, having effective and up-to-date technology can make the process easier and more efficient.

Growth Is Linked To The Proficiency Of Your Technology
For most small companies, investing in information technology (IT) can pay dividends in more ways than one. Not only can technology help businesses establish a corporate identity and lower the cost of doing business, it may also help level the playing area.

To remain competitive, a small business must optimize its technologies. Most small businesses are searching for cost-effective solutions that increase productivity and effectiveness while keeping costs within reach. Professional IT companies offer experienced, trusted professionalsOne solution would be to hire a professional IT services firm (like CCNY Tech). It allows your organization to access a team of trained engineers at a fraction of the cost of a full-time employee.

Working with a quality IT company also means you gain a diversified team with talent and knowledge. Professional IT companies offer experienced, trusted IT professionals. It is an excellent resource for any business and can be especially appealing to the small business.

1. Less Wasted Time
When IT emergencies occur, and you do not have access to an IT services company, your inner resources are displaced. Not only is it an opportunity cost, it’s an environmental stressor. Researching solutions and trying to get the job done right is quite inefficient for many non-IT professionals. With a services firm, your internal staff is free to concentrate on their tasks while everything runs smoothly in the background, without disrupting your productivity.

2. Reduced Downtime
System downtime carries monumental business costs. Loss of email communications and internet connectivity slows down all operations. Even worse is the risk of system failure and corrupted data. While the events themselves are costly, trying to recover can be even more costly. IT services companies can help you plan for such events and their recovery, as well as take preemptive measure to ensure uptime. Remote systems monitoring and regular maintenance will go a long way for your IT infrastructure.

3. Access to Professional and Diversified Talent
Working with a tech services firm allows you access to a broad knowledge base and extensive expertise, ensuring that they will understand the requirements of your systems. They will have developed best practices, allowing them to be more efficient and effective, saving you time and money. A professional IT company will also have specialized technicians to handle complicated issues as they arise. It can be very expensive to keep a full-time IT technician and they might not be fluent in all problem areas. When you work with an IT firm, you have an entire team of professional and diversified talent

4. A Predictable IT Budget
When you choose managed services with a professional IT company, you can create a plan and budget that is appropriate for your business. Managed services can include installs, upgrades, security, as well as regularly scheduled maintenance checks and checks. It’s a wonderful way to stay up-to-date and to be proactive about your infrastructure. Regular evaluations and security scans, in particular, may make a significant effect on your system’s success and safety. In just about all cases, a small company will spend 25% to 50% less than the cost of hiring even one mid-level IT professional. You will have access to a team and a plan that is right for you without even having to consider training, sick days, vacation, and turnover. You’ll have far more control over your IT budget and services.

improved productivity for SMBs5. Improved Productivity

Your IT infrastructure will likely be one of your best assets. It enables efficiency and innovation through communication and cooperation amongst workers. When your IT infrastructure is properly planned and maintained, your opportunities for central databases, email communications, quick connectivity, uptime, and other essential attributes are increased. Working with a professional IT company lets you have a well thought out system with proactive upgrades and maintenance to keep your infrastructure running at peak performance to increase overall productivity.

6. Flexibility and Expandability
Businesses are constantly changing. It is necessary to create a solid IT plan for possible growth, or even for paring down. It can be very challenging when your infrastructure isn’t built to be easily changed. It can be time-consuming, and stressful when there is not enough space or room in the budget for additional equipment. An IT services company can help you build an infrastructure with the characteristics that you need now, and help you plan for what you may need later on.

7. Stay Competitive
By maintaining your technologies up-to-date, you ensure high productivity, efficiency, and efficacy. By utilizing a professional IT company, you know that you’re receiving the most recent information and services from a staff with the latest training and real-world experience. They will have an understanding of the latest hardware, software, and network applications. Furthermore, they can help you determine which is the most fitting for your business. This will allow you to stay competitive and prepared to react to change.

The Personnel Aspect of Good Computing
Having updated and efficient technologies can help create a more attractive work environment. Workers want to be in a competitive and thriving company and do not want to deal with slow and outdated resources. It’s important to continuously exceed workforce expectations and keep your organization reputation and morale high. When you work with an IT company, you have the ability to meet these standards with a sensible budget and without the annoyance of constant research. You can trust that your staff is knowledgeable and will keep you operational and up-to-date. This will help not only to attract new employees but also to retain the ones you have.

CCNY Tech is an IT sales and services firm. For more than 25 years, CCNY Tech has been providing IT equipment as well as providing IT maintenance and IT recycling services. Partnering with some of the top brands in the market, they are experts in custom and equipment configurations. CCNY Tech IT professionals provide custom solutions to companies of all sizes. Learn more at ccnytech.com.

id venenatis, ipsum ut tempus velit, justo