Our Blog

Blog Articles from CCNY Tech

Welcome to our blog!

CCNY Tech is proud to bring you some of the latest news and answers to your IT questions. All of our blogs are written by our IT professionals about things that matter to you. Whether you are a large or small company, have a local network or a massive datacenter, we are here to help.

Hybrid Cloud Computing - CCNY Tech

Hybrid Cloud Technology and Storage

Hybrid cloud services and storage are a growing interest for businesses in all industries. They can be very manageable and cost-effective. They also offer scalability and flexibility that is likely the future of computing. Hybrid cloud storage enables both public and private cloud for on-site and off-site backup. Hybrid cloud combined with in house IT…

Read More »

Update Alert: Office 365 TLS Version Changes

For security reasons, starting October 31, 2018, all client-server and browser-server combinations should use TLS version 1.2 (or a later version) to guarantee connection to Office365 services without issues. This will require updates to client-server and browser-server combinations. If you don’t upgrade to TLS version 1.2 (or later) from October 31, 2018, you might encounter…

Read More »

5 myths of donating IT gear

The 5 Myths of Donating IT Equipment

Donating IT equipment is a bad idea. It is always better to have a professional IT asset disposition company process the materials and send you a check, which in turn you can keep or donate. Here are the top five myths related to donating retired IT assets. MYTH #1 – You are “helping the organization”…

Read More »

Cyptocurrency Resource Theft

Cyber criminals hijacking computing resources to mine for cryptocurrencies are increasing their attempts to bypass business security controllers. Researchers have discovered Illicit cryptocurrency mining or cryptojacking becoming popular with cyber offenders as a simple method to finance their operations because the increased popularity and value of blockchain based currencies grow. The attacks normally involve malware…

Read More »

Wifi Protection tips

Network Tips: Keeping Your Wi-Fi Network Protected

Here are some security tips for keeping your Wi-Fi network protected. While our technology and Wi-Fi capabilities are advancing very quickly, Wi-Fi security seems to lag behind. The recent 2017 WPA2 protocol vulnerability is an enormous red flag for where our Wi-Fi security stands, and should be a concern for business owners in all industries….

Read More »

Modern SMB Cybersecurity

There is no doubt that malware and ransomware attacks are a growing threat. Modern IT security is no longer just a major concern for government agencies and large enterprises. It is not uncommon for hackers to attack smaller organizations, wreaking havoc on operations and reputation. Small and midsize business (SMB) cybersecurity is becoming more critical…

Read More »

Careers in Cyber security CCNY Tech

Cybersecurity Talent Shortage

With Cyberattacks on the rise, it is no surprise that cybersecurity professionals are in demand. While the industry is growing rapidly, the schools and certifications for that area of study are very expensive. The Information Systems Audit and Control Association (ISACA), has forecasted a shortage of 2 million specialists by 2019. Even with employer assistance,…

Read More »

What You Need to Know About WiFi Attacks

There have been a number of cyberattacks to shake the internet over the past few years. Malware and ransomware attacks have caused billions of dollars in damages to companies, and have affected millions of people on a personal level. We wish we could say that these attacks have come to an end but unfortunately, there…

Read More »

Revolutionizing the Workplace

Technology is quickly becoming intertwined in every aspect of our lives. At any point in the day you are likely connected to technology in one way or another. Our smartphones, laptops, smartwatches, and even smart TVs are made to optimize our daily lives. So what will be the next big thing to revolutionize the workplace?…

Read More »

Ransomware Defined

Ransomware attacks have become a growing concern, particularly for businesses. Ransomware is a subset of malware, which can infect a computer and hold important data ransomed. It allows the cybercriminal to encrypt a victim’s data and demand monetary payment before allowing decryption and regained access to their files. These attacks can be spread through compromised…

Read More »

Preventing Vulnerabilities from Entering Your Network

HP is a very common name for both businesses and household IT. For this reason, it was especially concerning when more than two dozen models of HP laptops were found to contain a keylogger that recorded keystrokes into a log file. Although HP quickly released patches to remove the keylogger, the concern lingered. Customers have…

Read More »

Five Networking Mistakes You Can Easily Avoid

When managing a network, it can be difficult to differentiate and diagnose issues. Even with constant monitoring and upkeep, IT is finicky and issues are not always readily apparent.   Here are five common networking mistakes to avoid when maintain a network: 1. Setting a priority on Voice over Internet Protocol (VoIP) data – When…

Read More »

About Our Blog

CCNY Tech has been in the IT industry for over 25 years and has some of the most knowledgeable technicians and staff. We wanted to reach out to our customers and personally answer their questions with our best suggestions and advice. We specialize in a wide range of IT services and products, and we want to bring that experience to you.

Our blogs are meant to serve as a guide, not just for those looking to improve their network, but for anyone who wants to learn more about IT. We love helping our customers and are always happy to hear from you. If you have any questions or any topics that you are hoping to learn more about, leave us a message and we’ll do our best to create a blog that can help.