WE ARE OPEN DURING COVID-19. CONTACT OUR TEAM FOR HELP WITH IT HARDWARE & SERVICES.

Our Blog

Blog Articles from CCNY Tech

Welcome to our blog!

CCNY Tech is proud to bring you some of the latest news and answers to your IT questions. All of our blogs are written by our IT professionals about things that matter to you. Whether you are a large or small company, have a local network or a massive datacenter, we are here to help.

Stop Playing The Odds

IT departments looking to save time and money shouldn’t be doing this at the expense of their data protection. A study from the University of Texas showed that 43% of companies suffering from catastrophic data breaches were forced to close and never reopen, and 51% closed within two years. Although all breaches are not the…

Read More »

Small Business Owners: It’s Time…

There are two main reasons why business owners aren’t taking appropriate actions to safeguard their networks; yet another motive is known as”security fatigue,” and the other explanation is essentially denial. Security fatigue occurs when cybersecurity gets so overwhelming that business owners abandon practices entirely. Safety is constantly changing and attacks are becoming more complex, so…

Read More »

IT Asset Disposition in 2019

ITAD or IT Asset Disposition has evolved over the years and now many companies have improved their apprach to offer a balanced alternative to simple e-waste recycling. Modern ITAD comes with a number of different strategies to keep data secure while getting a return on the company’s hardware investment. It is a fact that companies,…

Read More »

Reasons for Outsourcing Your IT Support Services

Reasons for Outsourcing Your IT Support Services

A professional IT support provider helps manage the network, users, services, and devices that are integral to a company’s operations. It helps guarantee that the organization’s network is current and that its technology provides seamless operations across all departments, hierarchies, and roles within the company. The immediate and long-term benefits of outsourcing your IT Support…

Read More »

GandCrab v5 was discovered on September 24

Beware of the Bolder Exploits

Security professionals have been trying to stay ahead of GandCrab. It has evolved to it’s 5th version and has potentially become 2018’s most prolific ransomware. Unfortunately, the criminals behind it continue to experiment with new features. Researchers announced the discovery of GandCrab v5 recently (September 2018), the latest major update to a strain of ransomware…

Read More »

The Horrors For IT Departments

With Halloween approaching tomorrow, it is an excellent time to take a look at the “Tricks” being played at the doorstep of IT Departments. From more sophisticated cyber attacks to advances in job-killing technologies, 2018 has been a truly scary year for IT Departments. Cloud Computing The Cloud has made Enterprise Infrastructure more available for…

Read More »

What is: Augmented Intelligence?

Augmented intelligence is an alternative definition of artificial intelligence that focuses on AI’s helpful role, emphasizing that it is designed to “enhance human intelligence” rather than replace it. The word augmented, which means “to improve,” reinforces the role human intelligence plays when using machine learning and deep learning algorithms to discover relationships and solve problems….

Read More »

7 Ways IT Companies Enact Big Ideas for SMBs

7 Ways IT Companies Help Small Firms Enact Big Ideas

Good customer service is crucial to success in business; there’s nothing high-tech about helping customers get exactly what they need. However, having effective and up-to-date technology can make the process easier and more efficient. Growth Is Linked To The Proficiency Of Your Technology For most small companies, investing in information technology (IT) can pay dividends…

Read More »

Understanding Self-Replicating Ransomeware and Computer Worms

Self-replicating Computer Worms Self-replicating computer worms are an ideal way for cybercriminals to spread malware and infect countless computers. Unlike a virus, a worm attacks ports and protocols of vulnerable systems and therefore does not require a delivery system. When a computer worm infects, it allows criminals to steal private data, execute distributed denial of…

Read More »

ITAD Growth Linked to Corporate Goals

Last year, the average cost of a data breach was $3.62 million, according to Ponemon Institute. Many companies often focus on potential fines, however, the largest financial impact comes from the cost of cleaning up after a data breach and the loss of customer confidence. According to a recent report published by MarketsandMarkets.com: The Global…

Read More »

7 Differences of Used Vs. Refurbished IT Equipment

Have you ever thought about what the difference is between a used server and a refurbished server? What about the difference between used networking equipment and refurbished networking equipment? If so, you aren’t alone. While the term “used” and “refurbished” signify two very different hardware standards, some companies use both terms interchangeably, leaving you asking…

Read More »

E-Waste Facts: Is ITAD the Right Solution?

IT Asset Disposition is a means to extend the lifespan of resources. Toxic components and chemicals can damage the Environment if not properly disposed of. This includes mercury, lead, arsenic, cadmium, selenium, chromium, and fire retardants. • The USA generates more e-waste than any other nation. The quantity of electronic equipment that Americans throw away…

Read More »

About Our Blog

CCNY Tech has been in the IT industry for over 25 years and has some of the most knowledgeable technicians and staff. We wanted to reach out to our customers and personally answer their questions with our best suggestions and advice. We specialize in a wide range of IT services and products, and we want to bring that experience to you.

Our blogs are meant to serve as a guide, not just for those looking to improve their network, but for anyone who wants to learn more about IT. We love helping our customers and are always happy to hear from you. If you have any questions or any topics that you are hoping to learn more about, leave us a message and we’ll do our best to create a blog that can help.

leo quis, consectetur amet, sed leo. elit. suscipit libero Donec Praesent Praesent