Our Blog

Blog Articles from CCNY Tech

Welcome to our blog!

CCNY Tech is proud to bring you some of the latest news and answers to your IT questions. All of our blogs are written by our IT professionals about things that matter to you. Whether you are a large or small company, have a local network or a massive datacenter, we are here to help.

Webcam Safety: Am I Paranoid or Smart?

Mark Zuckerberg, the founder and CEO of Facebook, popularized and legitimized a crude but reliable solution to cam hacks by positioning a piece of opaque tape over the lens of the electronic camera. Is it being smart or just paranoid? Everyday there are countless spam emails sent in to users saying they have actually been…

Read More »

Making your laptop last longer

How To Make Laptops Last Longer

Your laptop computer is designed to be a compact electronic workspace for education, work and play. In fact, laptop computers have been so powerful and liberating, they have actually coined a new term of entrepreneurship, referred to as the “the laptop lifestyle” which involves working entirely from your laptop computer. Increasing Life Expectancy of Your…

Read More »

Is Facebook Spying On Me

Is Facebook Advertising Spying On Me?

If you’ve ever felt like Facebook or any other app on your phone was listening to your conversations, you’re not entirely wrong. While it may look like Facebook is “listening” to you, it’s highly unlikely the social media network is tracking your every word through your phone’s microphone. Many users say their phone’s microphone has…

Read More »

What Makes For A Strong Password?

It all starts with a strong password. We all have more passwords than we care to have. It might sound simplistic, but strong passwords are a MUST for protecting our identity, reputation, and assets in this digital age. The Composition of a Good Password A four-character password is much weaker than an 8 to 12-character…

Read More »

wifi mesh vs range extenders

Wifi Mesh Networks Vs. Range Extenders

If getting WiFi coverage right across your home or small office is a constant battle, a top mesh system, powered by one of the best mesh WiFi wireless routers, could well be the answer to your connectivity woes. Bad WiFi coverage doesn’t have to be the nightmare it once was, thanks to the recent rise…

Read More »

Prevent Ransomware

12 Ways to Protect Yourself From Ransomware.

What is Ransomware? Ransomware is vicious malware that locks users out of their devices or blocks access to files until a sum of money, or ransom, is paid. Ransomware attacks can be deployed in different forms. Some variants may be more harmful than others, but they all have one thing in common: a ransom. Once…

Read More »

Top 5 Reason IT Hardware Fail

The Top 5 Reasons Computer Hardware Fails

As we get toward the hot summer months, it is a good time to take a look at some issues that can spell trouble for your computer or networking hardware. Most of these can be avoided with proper maintenance and precautions. 1. POWER SURGES We like to think electricity is a constant stream that never…

Read More »

What is Social Engineering?

Social engineering is the act of tricking somebody into divulging details or doing something about it, normally through technology. The idea behind social engineering is to take benefit of a possible victim’s natural propensities and emotional reactions. To access a computer system network, the typical hacker may look for a software vulnerability. A social engineer,…

Read More »

“Work-From-Home” Solutions For Older Computers From Microsoft

Covid-19 and stay at home orders across the world are presenting new and unique challenges for people who are being asked to work from home for the first time. Employees are navigating managing time, work, family and technology in new ways. While using a smartphone or tablet may have been easy to answer a quick…

Read More »

TikTok App: How to Keep Kids Safe?

Kids and Teens are obsessed with the app TikTok.  TikTok is a free social networking app that lets you view, create, and share videos. It was initially available as musical.ly from the U.S. but was re-branded when the 2 apps merged in August 2018.  As they did on the now-defunct Vine, children can create brief,…

Read More »

The State of Passwords and Two-Factor Authentication

 Since the start of computing, usernames and passwords have been required to authenticate user access like a padlock would protect a gym locker. As data became more valuable and hacking became more sophisticated, passwords have also had to become much more comprehensive and complicated to be secure. Today, “two-factor” or “passwordless” authentication have become…

Read More »

IT Asset Disposition (ITAD) and Certified Data Destruction from CCNY Tech

When your obsolete computers and IT equipment sit idle they depreciate in value, literally every day. — There’s an alternative. You can get paid for your older enterprise IT equipment. Not only can you benefit from electronics recycling but this process allows you to recover value on your tech investment. With our IT Asset Disposition…

Read More »

About Our Blog

CCNY Tech has been in the IT industry for over 25 years and has some of the most knowledgeable technicians and staff. We wanted to reach out to our customers and personally answer their questions with our best suggestions and advice. We specialize in a wide range of IT services and products, and we want to bring that experience to you.

Our blogs are meant to serve as a guide, not just for those looking to improve their network, but for anyone who wants to learn more about IT. We love helping our customers and are always happy to hear from you. If you have any questions or any topics that you are hoping to learn more about, leave us a message and we’ll do our best to create a blog that can help.

dictum mattis Curabitur eget diam massa dapibus nec ultricies Praesent vel, justo