Welcome to our blog!
CCNY Tech is proud to bring you some of the latest news and answers to your IT questions. All of our blogs are written by our IT professionals about things that matter to you. Whether you are a large or small company, have a local network or a massive datacenter, we are here to help.
Small Business Owners: It’s Time…
By jade streifert |
There are two main reasons why business owners aren’t taking appropriate actions to safeguard their networks; yet another motive is known as”security fatigue,” and the other explanation is essentially denial. Security fatigue occurs when cybersecurity gets so overwhelming that business owners abandon practices entirely. Safety is constantly changing and attacks are becoming more complex, so…
IT Asset Disposition in 2019
By jade streifert |
ITAD or IT Asset Disposition has evolved over the years and now many companies have improved their apprach to offer a balanced alternative to simple e-waste recycling. Modern ITAD comes with a number of different strategies to keep data secure while getting a return on the company’s hardware investment. It is a fact that companies,…
Reasons for Outsourcing Your IT Support Services
By jade streifert |
A professional IT support provider helps manage the network, users, services, and devices that are integral to a company’s operations. It helps guarantee that the organization’s network is current and that its technology provides seamless operations across all departments, hierarchies, and roles within the company. The immediate and long-term benefits of outsourcing your IT Support…
Beware of the Bolder Exploits
By jade streifert |
Security professionals have been trying to stay ahead of GandCrab. It has evolved to it’s 5th version and has potentially become 2018’s most prolific ransomware. Unfortunately, the criminals behind it continue to experiment with new features. Researchers announced the discovery of GandCrab v5 recently (September 2018), the latest major update to a strain of ransomware…
The Horrors For IT Departments
By jade streifert |
With Halloween approaching tomorrow, it is an excellent time to take a look at the “Tricks” being played at the doorstep of IT Departments. From more sophisticated cyber attacks to advances in job-killing technologies, 2018 has been a truly scary year for IT Departments. Cloud Computing The Cloud has made Enterprise Infrastructure more available for…
What is: Augmented Intelligence?
By jade streifert |
Augmented intelligence is an alternative definition of artificial intelligence that focuses on AI’s helpful role, emphasizing that it is designed to “enhance human intelligence” rather than replace it. The word augmented, which means “to improve,” reinforces the role human intelligence plays when using machine learning and deep learning algorithms to discover relationships and solve problems….
7 Ways IT Companies Help Small Firms Enact Big Ideas
By jade streifert |
Good customer service is crucial to success in business; there’s nothing high-tech about helping customers get exactly what they need. However, having effective and up-to-date technology can make the process easier and more efficient. Growth Is Linked To The Proficiency Of Your Technology For most small companies, investing in information technology (IT) can pay dividends…
Understanding Self-Replicating Ransomeware and Computer Worms
By jade streifert |
Self-replicating Computer Worms Self-replicating computer worms are an ideal way for cybercriminals to spread malware and infect countless computers. Unlike a virus, a worm attacks ports and protocols of vulnerable systems and therefore does not require a delivery system. When a computer worm infects, it allows criminals to steal private data, execute distributed denial of…
ITAD Growth Linked to Corporate Goals
By jade streifert |
Last year, the average cost of a data breach was $3.62 million, according to Ponemon Institute. Many companies often focus on potential fines, however, the largest financial impact comes from the cost of cleaning up after a data breach and the loss of customer confidence. According to a recent report published by MarketsandMarkets.com: The Global…
7 Differences of Used Vs. Refurbished IT Equipment
By jade streifert |
Have you ever thought about what the difference is between a used server and a refurbished server? What about the difference between used networking equipment and refurbished networking equipment? If so, you aren’t alone. While the term “used” and “refurbished” signify two very different hardware standards, some companies use both terms interchangeably, leaving you asking…
E-Waste Facts: Is ITAD the Right Solution?
By jade streifert |
IT Asset Disposition is a means to extend the lifespan of resources. Toxic components and chemicals can damage the Environment if not properly disposed of. This includes mercury, lead, arsenic, cadmium, selenium, chromium, and fire retardants. • The USA generates more e-waste than any other nation. The quantity of electronic equipment that Americans throw away…
First Day of Summer
By jade streifert |
Today is June 21st and the Summer of 2018 has begun. Some parts of the country have been feeling the summer warmth for a while, but now it’s OFFICIAL. Summer is a great time to relax by the pool or take a family adventure, but can you truly relax knowing that your company’s IT infrastructure…
About Our Blog
CCNY Tech has been in the IT industry for over 25 years and has some of the most knowledgeable technicians and staff. We wanted to reach out to our customers and personally answer their questions with our best suggestions and advice. We specialize in a wide range of IT services and products, and we want to bring that experience to you.
Our blogs are meant to serve as a guide, not just for those looking to improve their network, but for anyone who wants to learn more about IT. We love helping our customers and are always happy to hear from you. If you have any questions or any topics that you are hoping to learn more about, leave us a message and we’ll do our best to create a blog that can help.