Our Blog

Blog Articles from CCNY Tech

Welcome to our blog!

CCNY Tech is proud to bring you some of the latest news and answers to your IT questions. All of our blogs are written by our IT professionals about things that matter to you. Whether you are a large or small company, have a local network or a massive datacenter, we are here to help.

7 Ways IT Companies Enact Big Ideas for SMBs

7 Ways IT Companies Help Small Firms Enact Big Ideas

Good customer service is crucial to success in business; there’s nothing high-tech about helping customers get exactly what they need. However, having effective and up-to-date technology can make the process easier and more efficient. Growth Is Linked To The Proficiency Of Your Technology For most small companies, investing in information technology (IT) can pay dividends...

Read More »

Understanding Self-Replicating Ransomeware and Computer Worms

Self-replicating Computer Worms Self-replicating computer worms are an ideal way for cybercriminals to spread malware and infect countless computers. Unlike a virus, a worm attacks ports and protocols of vulnerable systems and therefore does not require a delivery system. When a computer worm infects, it allows criminals to steal private data, execute distributed denial of...

Read More »

ITAD Growth Linked to Corporate Goals

Last year, the average cost of a data breach was $3.62 million, according to Ponemon Institute. Many companies often focus on potential fines, however, the largest financial impact comes from the cost of cleaning up after a data breach and the loss of customer confidence. According to a recent report published by MarketsandMarkets.com: The Global...

Read More »

7 Differences of Used Vs. Refurbished IT Equipment

Have you ever thought about what the difference is between a used server and a refurbished server? What about the difference between used networking equipment and refurbished networking equipment? If so, you aren’t alone. While the term “used” and “refurbished” signify two very different hardware standards, some companies use both terms interchangeably, leaving you asking...

Read More »

E-Waste Facts: Is ITAD the Right Solution?

IT Asset Disposition is a means to extend the lifespan of resources. Toxic components and chemicals can damage the Environment if not properly disposed of. This includes mercury, lead, arsenic, cadmium, selenium, chromium, and fire retardants. • The USA generates more e-waste than any other nation. The quantity of electronic equipment that Americans throw away...

Read More »

First Day of Summer

Today is June 21st and the Summer of 2018 has begun. Some parts of the country have been feeling the summer warmth for a while, but now it’s OFFICIAL. Summer is a great time to relax by the pool or take a family adventure, but can you truly relax knowing that your company’s IT infrastructure...

Read More »

Hybrid Cloud Computing - CCNY Tech

Hybrid Cloud Technology and Storage

Hybrid cloud services and storage are a growing interest for businesses in all industries. They can be very manageable and cost-effective. They also offer scalability and flexibility that is likely the future of computing. Hybrid cloud storage enables both public and private cloud for on-site and off-site backup. Hybrid cloud combined with in house IT...

Read More »

Update Alert: Office 365 TLS Version Changes

For security reasons, starting October 31, 2018, all client-server and browser-server combinations should use TLS version 1.2 (or a later version) to guarantee connection to Office365 services without issues. This will require updates to client-server and browser-server combinations. If you don’t upgrade to TLS version 1.2 (or later) from October 31, 2018, you might encounter...

Read More »

5 myths of donating IT gear

The 5 Myths of Donating IT Equipment

Donating IT equipment is a bad idea. It is always better to have a professional IT asset disposition company process the materials and send you a check, which in turn you can keep or donate. Here are the top five myths related to donating retired IT assets. MYTH #1 – You are “helping the organization”...

Read More »

Cyptocurrency Resource Theft

Cyber criminals hijacking computing resources to mine for cryptocurrencies are increasing their attempts to bypass business security controllers. Researchers have discovered Illicit cryptocurrency mining or cryptojacking becoming popular with cyber offenders as a simple method to finance their operations because the increased popularity and value of blockchain based currencies grow. The attacks normally involve malware...

Read More »

Wifi Protection tips

Network Tips: Keeping Your Wi-Fi Network Protected

Here are some security tips for keeping your Wi-Fi network protected. While our technology and Wi-Fi capabilities are advancing very quickly, Wi-Fi security seems to lag behind. The recent 2017 WPA2 protocol vulnerability is an enormous red flag for where our Wi-Fi security stands, and should be a concern for business owners in all industries....

Read More »

Modern SMB Cybersecurity

There is no doubt that malware and ransomware attacks are a growing threat. Modern IT security is no longer just a major concern for government agencies and large enterprises. It is not uncommon for hackers to attack smaller organizations, wreaking havoc on operations and reputation. Small and midsize business (SMB) cybersecurity is becoming more critical...

Read More »

About Our Blog

CCNY Tech has been in the IT industry for over 25 years and has some of the most knowledgeable technicians and staff. We wanted to reach out to our customers and personally answer their questions with our best suggestions and advice. We specialize in a wide range of IT services and products, and we want to bring that experience to you.

Our blogs are meant to serve as a guide, not just for those looking to improve their network, but for anyone who wants to learn more about IT. We love helping our customers and are always happy to hear from you. If you have any questions or any topics that you are hoping to learn more about, leave us a message and we’ll do our best to create a blog that can help.

consectetur tempus amet, ut porta. felis ipsum mattis elit.