Welcome to our blog!
CCNY Tech is proud to bring you some of the latest news and answers to your IT questions. All of our blogs are written by our IT professionals about things that matter to you. Whether you are a large or small company, have a local network or a massive datacenter, we are here to help.
Hybrid Cloud Technology and Storage
By jade streifert |
Hybrid cloud services and storage are a growing interest for businesses in all industries. They can be very manageable and cost-effective. They also offer scalability and flexibility that is likely the future of computing. Hybrid cloud storage enables both public and private cloud for on-site and off-site backup. Hybrid cloud combined with in house IT…
Update Alert: Office 365 TLS Version Changes
By jade streifert |
For security reasons, starting October 31, 2018, all client-server and browser-server combinations should use TLS version 1.2 (or a later version) to guarantee connection to Office365 services without issues. This will require updates to client-server and browser-server combinations. If you don’t upgrade to TLS version 1.2 (or later) from October 31, 2018, you might encounter…
The 5 Myths of Donating IT Equipment
By jade streifert |
Donating IT equipment is a bad idea. It is always better to have a professional IT asset disposition company process the materials and send you a check, which in turn you can keep or donate. Here are the top five myths related to donating retired IT assets. MYTH #1 – You are “helping the organization”…
Cyptocurrency Resource Theft
By jade streifert |
Cyber criminals hijacking computing resources to mine for cryptocurrencies are increasing their attempts to bypass business security controllers. Researchers have discovered Illicit cryptocurrency mining or cryptojacking becoming popular with cyber offenders as a simple method to finance their operations because the increased popularity and value of blockchain based currencies grow. The attacks normally involve malware…
Network Tips: Keeping Your Wi-Fi Network Protected
By jade streifert |
Here are some security tips for keeping your Wi-Fi network protected. While our technology and Wi-Fi capabilities are advancing very quickly, Wi-Fi security seems to lag behind. The recent 2017 WPA2 protocol vulnerability is an enormous red flag for where our Wi-Fi security stands, and should be a concern for business owners in all industries….
Modern SMB Cybersecurity
By jade streifert |
There is no doubt that malware and ransomware attacks are a growing threat. Modern IT security is no longer just a major concern for government agencies and large enterprises. It is not uncommon for hackers to attack smaller organizations, wreaking havoc on operations and reputation. Small and midsize business (SMB) cybersecurity is becoming more critical…
Cybersecurity Talent Shortage
By jade streifert |
With Cyberattacks on the rise, it is no surprise that cybersecurity professionals are in demand. While the industry is growing rapidly, the schools and certifications for that area of study are very expensive. The Information Systems Audit and Control Association (ISACA), has forecasted a shortage of 2 million specialists by 2019. Even with employer assistance,…
What You Need to Know About WiFi Attacks
By jade streifert |
There have been a number of cyberattacks to shake the internet over the past few years. Malware and ransomware attacks have caused billions of dollars in damages to companies, and have affected millions of people on a personal level. We wish we could say that these attacks have come to an end but unfortunately, there…
Revolutionizing the Workplace
By jade streifert |
Technology is quickly becoming intertwined in every aspect of our lives. At any point in the day you are likely connected to technology in one way or another. Our smartphones, laptops, smartwatches, and even smart TVs are made to optimize our daily lives. So what will be the next big thing to revolutionize the workplace?…
Ransomware Defined
By jade streifert |
Ransomware attacks have become a growing concern, particularly for businesses. Ransomware is a subset of malware, which can infect a computer and hold important data ransomed. It allows the cybercriminal to encrypt a victim’s data and demand monetary payment before allowing decryption and regained access to their files. These attacks can be spread through compromised…
Preventing Vulnerabilities from Entering Your Network
By jade streifert |
HP is a very common name for both businesses and household IT. For this reason, it was especially concerning when more than two dozen models of HP laptops were found to contain a keylogger that recorded keystrokes into a log file. Although HP quickly released patches to remove the keylogger, the concern lingered. Customers have…
Five Networking Mistakes You Can Easily Avoid
By jade streifert |
When managing a network, it can be difficult to differentiate and diagnose issues. Even with constant monitoring and upkeep, IT is finicky and issues are not always readily apparent. Here are five common networking mistakes to avoid when maintain a network: 1. Setting a priority on Voice over Internet Protocol (VoIP) data – When…
About Our Blog
CCNY Tech has been a leader in the IT industry for over 25 years, boasting some of the most knowledgeable technicians and staff in the field. With a quarter-century of experience, we have honed our expertise to offer top-notch IT services and products. Consequently, our commitment to excellence drives us to reach out to our valued customers, providing personalized answers to their questions and sharing our best suggestions and advice.
Moreover, we specialize in a comprehensive range of IT services and products, ensuring that we can meet the diverse needs of our clients. Whether you’re looking to enhance your network, upgrade your hardware, or improve your cybersecurity, CCNY Tech is here to bring our extensive experience directly to you.
Furthermore, our blogs are designed to serve as an informative guide for everyone, from IT professionals seeking to enhance their knowledge to beginners eager to learn more about the world of technology. We are passionate about helping our customers and take great pride in providing valuable insights and tips through our blog posts.
Additionally, we encourage our readers to reach out with any questions or topics they are interested in learning more about. Your feedback is essential to us, and we are always happy to hear from you. Leave us a message, and we’ll do our best to create content that addresses your needs and helps you navigate the ever-evolving IT landscape.
At CCNY Tech, we are dedicated to empowering our customers with the knowledge and tools they need to succeed. Therefore, explore our blog for expert advice, industry news, and practical tips that can help you make the most of your IT investments. Join our community of tech enthusiasts and let us be your trusted source for all things IT.