Our Blog

Blog Articles from CCNY Tech

Welcome to our blog!

CCNY Tech is proud to bring you some of the latest news and answers to your IT questions. All of our blogs are written by our IT professionals about things that matter to you. Whether you are a large or small company, have a local network or a massive datacenter, we are here to help.

Modern SMB Cybersecurity

There is no doubt that malware and ransomware attacks are a growing threat. Modern IT security is no longer just a major concern for government agencies and large enterprises. It is not uncommon for hackers to attack smaller organizations, wreaking havoc on operations and reputation. Small and midsize business (SMB) cybersecurity is becoming more critical…

Read More »

Careers in Cyber security CCNY Tech

Cybersecurity Talent Shortage

With Cyberattacks on the rise, it is no surprise that cybersecurity professionals are in demand. While the industry is growing rapidly, the schools and certifications for that area of study are very expensive. The Information Systems Audit and Control Association (ISACA), has forecasted a shortage of 2 million specialists by 2019. Even with employer assistance,…

Read More »

What You Need to Know About WiFi Attacks

There have been a number of cyberattacks to shake the internet over the past few years. Malware and ransomware attacks have caused billions of dollars in damages to companies, and have affected millions of people on a personal level. We wish we could say that these attacks have come to an end but unfortunately, there…

Read More »

Revolutionizing the Workplace

Technology is quickly becoming intertwined in every aspect of our lives. At any point in the day you are likely connected to technology in one way or another. Our smartphones, laptops, smartwatches, and even smart TVs are made to optimize our daily lives. So what will be the next big thing to revolutionize the workplace?…

Read More »

Ransomware Defined

Ransomware attacks have become a growing concern, particularly for businesses. Ransomware is a subset of malware, which can infect a computer and hold important data ransomed. It allows the cybercriminal to encrypt a victim’s data and demand monetary payment before allowing decryption and regained access to their files. These attacks can be spread through compromised…

Read More »

Preventing Vulnerabilities from Entering Your Network

HP is a very common name for both businesses and household IT. For this reason, it was especially concerning when more than two dozen models of HP laptops were found to contain a keylogger that recorded keystrokes into a log file. Although HP quickly released patches to remove the keylogger, the concern lingered. Customers have…

Read More »

Five Networking Mistakes You Can Easily Avoid

When managing a network, it can be difficult to differentiate and diagnose issues. Even with constant monitoring and upkeep, IT is finicky and issues are not always readily apparent.   Here are five common networking mistakes to avoid when maintain a network: 1. Setting a priority on Voice over Internet Protocol (VoIP) data – When…

Read More »

The Latest on the Data Breach at Uber

UBER Data Breach Was Not Reported For 1 Year Yesterday it was reported that the transportation company Uber has suffered a data breach, revealing personal information of some 57 million people around the world. It has been confirmed by Uber that they knew of the year-old attack and had covered it up. The company could…

Read More »

What is a Computer Worm?

Although ransomware attacks have been the hot topic of cyber news lately, computer worms are still a common form of attack on individual and company computers. A computer worm is a malicious software program which can infect computers and self-replicate to spread, while remaining active on infected systems. How it works Computer worm are a…

Read More »

Why Hybrid Cloud is the Future of Enterprise IT

Hybrid cloud is flexible and versatile; it is an ideal IT solution for companies. Cloud computing has been gaining interest, particularly by businesses. It is a great way to save time, money, and space for an IT infrastructure. It allows companies to incorporate their current IT with a cost-effective extension and offers capabilities that their…

Read More »

Should You Be Concerned About The Ransomware Threat?

Many are wondering if the recent malware attacks are really as serious as they sound. Cyber crime and has been on the rise in recent years and has been a hot topic as of late. The Equifax breach and other large attacks have created quite a stir, and companies in all industries are worrying about…

Read More »

Google Chrome to Label HTTP Pages ‘Not Secure’

It may be time for your business to purchase an SSL certificate; here’s why: Google has announced that it will be marking all HTTP pages in Chrome as “Not secure” as of this month. This marks the next phase for Google as it started in January, labeling some pages as non-secure with the release of…

Read More »

About Our Blog

CCNY Tech has been in the IT industry for over 25 years and has some of the most knowledgeable technicians and staff. We wanted to reach out to our customers and personally answer their questions with our best suggestions and advice. We specialize in a wide range of IT services and products, and we want to bring that experience to you.

Our blogs are meant to serve as a guide, not just for those looking to improve their network, but for anyone who wants to learn more about IT. We love helping our customers and are always happy to hear from you. If you have any questions or any topics that you are hoping to learn more about, leave us a message and we’ll do our best to create a blog that can help.

mattis adipiscing vulputate, non suscipit felis neque. Sed