Our Blog

Blog Articles from CCNY Tech

Welcome to our blog!

CCNY Tech is proud to bring you some of the latest news and answers to your IT questions. All of our blogs are written by our IT professionals about things that matter to you. Whether you are a large or small company, have a local network or a massive datacenter, we are here to help.

The Latest on the Data Breach at Uber

UBER Data Breach Was Not Reported For 1 Year Yesterday it was reported that the transportation company Uber has suffered a data breach, revealing personal information of some 57 million people around the world. It has been confirmed by Uber that they knew of the year-old attack and had covered it up. The company could…

Read More »

What is a Computer Worm?

Although ransomware attacks have been the hot topic of cyber news lately, computer worms are still a common form of attack on individual and company computers. A computer worm is a malicious software program which can infect computers and self-replicate to spread, while remaining active on infected systems. How it works Computer worm are a…

Read More »

Why Hybrid Cloud is the Future of Enterprise IT

Hybrid cloud is flexible and versatile; it is an ideal IT solution for companies. Cloud computing has been gaining interest, particularly by businesses. It is a great way to save time, money, and space for an IT infrastructure. It allows companies to incorporate their current IT with a cost-effective extension and offers capabilities that their…

Read More »

Should You Be Concerned About The Ransomware Threat?

Many are wondering if the recent malware attacks are really as serious as they sound. Cyber crime and has been on the rise in recent years and has been a hot topic as of late. The Equifax breach and other large attacks have created quite a stir, and companies in all industries are worrying about…

Read More »

Google Chrome to Label HTTP Pages ‘Not Secure’

It may be time for your business to purchase an SSL certificate; here’s why: Google has announced that it will be marking all HTTP pages in Chrome as “Not secure” as of this month. This marks the next phase for Google as it started in January, labeling some pages as non-secure with the release of…

Read More »

windows versus linux blog ccnytech

Small Business: Compare Linux VS Windows

Choosing an operating system (OS) has more implications than you may realize. For small businesses in particular, there are systems that better fit your business needs, and those that do not. Without fully understanding your requirements, you may find that your operating system restricts which applications you can run, runs too slowly, prevents certain configurations,…

Read More »

A Secure Transition to the Cloud for Businesses

There are a number of benefits for companies transitioning to the cloud; it offers reduced cost, easy access, greater scalability, and more. Unsurprisingly, more and more businesses are making the move. However, not all cloud services are the same. It’s important to have a trustworthy provider, as well as one which offers adaptive authentication, control,…

Read More »

Becoming Efficient with IT Asset Management

IT administration is becoming increasingly more relevant to companies of all industries. Properly evaluating and managing systems can help you to stay efficient and avoid unnecessary asset purchases. Small to medium-sized businesses, in particular, struggle with IT asset management. Limited budgets and staff make it difficult to identify what is redundant and what is lacking….

Read More »

Managed IT Services vs. Internal IT Staff

Many companies without full-time IT staff choose to hire IT services companies hourly. While it can be very cost-effective to hire engineers by the hour, compared to full-time with salary, benefits, and vacation, there may actually be a better solution entirely. Managed IT services are growing in popularity for businesses of all sizes, in all…

Read More »

Guide to IT Security Awareness

IT security is essential and becomes a more widespread topic with each passing year. Every company knows that it needs it, but many find it overwhelming. Regardless of your level of security though, at the end of the day, it comes down to the end-users. It is important for all members of a company to…

Read More »

The Best Ways to Get Rid of Unwanted Data

The data that you store is likely very important. It can contain sensitive company and customer information, as well as information with profitable potential. Businesses in particular are constantly store and saving mission critical files, databases, and documents. The problem is, a lot of the data we store can quickly become obsolete or redundant. And…

Read More »

Signs of Bad IT Architecture

It’s important to constantly self-evaluate your IT architecture and processes. As the driving force behind most companies, your IT should be continuously monitored and streamlined. There are a few simple signs to look for that may be bogging down your systems. Even regular, simple fixes can make a big difference in the long run. This…

Read More »

About Our Blog

CCNY Tech has been in the IT industry for over 25 years and has some of the most knowledgeable technicians and staff. We wanted to reach out to our customers and personally answer their questions with our best suggestions and advice. We specialize in a wide range of IT services and products, and we want to bring that experience to you.

Our blogs are meant to serve as a guide, not just for those looking to improve their network, but for anyone who wants to learn more about IT. We love helping our customers and are always happy to hear from you. If you have any questions or any topics that you are hoping to learn more about, leave us a message and we’ll do our best to create a blog that can help.