Welcome to our blog!
CCNY Tech is proud to bring you some of the latest news and answers to your IT questions. All of our blogs are written by our IT professionals about things that matter to you. Whether you are a large or small company, have a local network or a massive datacenter, we are here to help.
Equifax Data Breach: Simple Steps to Improve Your Cybersecurity
By jade streifert |
The Equifax data breach, and attacks like it have everyone checking their cybersecurity. This attack left 143 million credit records exposed. In today’s world, cyber attacks are a part of reality. A company cannot just go back to the stone age and try to remain competitive. Fortunately, that is not necessary. There are some simple…
8 Ways to Shrink Your IT Budget Without Losing Productivity
By jade streifert |
It’s very easy for a tech budget to get out of control. We all feel that pressure to make some cuts but we don’t want to lose any of our valuable assets. Tech equipment and maintenance are some of our most important resources and it’s difficult to know where to trim down. This article will…
The Equifax Attack and How it Impacts Your Data Security
By jade streifert |
Around 143 million American consumers were exposed to a data breach at Equifax. As one of the nation’s major credit reporting agencies, the breach gave access to very sensitive, personal information of customers. This attack, and ones like it, are a reminder to all businesses about the importance of cyber security. In the Equifax attack,…
8 Benefits of Using a Professional Technology Services Company
By jade streifert |
A company’s IT can be a driving force. To remain competitive, a small business must maximize its technologies. Most small businesses are looking for cost-effective solutions. Therefore, maintaining a full-time IT department like larger businesses, is far too expensive. One solution is to hire a professional IT services company. It allows your business access to…
4 Myths About Buying Refurbished IT
By jade streifert |
While buying refurbished IT can mean amazing savings, it tends to carry a negative connotation. It’s as if “refurbished” somehow equals inferior or outdated. However, this article will reveal 4 myths about refurbished IT and may help change the idea that it is “worse than” buying new. The good news is, finding a cost-effective solution…
10 Questions to Ask Yourself About Your Business
By jade streifert |
Can your company risk data loss, data breach, or downtime associated with vulnerabilities? Most businesses are not as prepared for technology crisis as they would like to think. Unfortunately, by the time it is realized, it’s far too late. Costly repairs, wasted time, and lost data are very difficult and expensive to recover from. Whether…
Who is Really Responsible for IT Maintenance?
By jade streifert |
Who do you call when IT breaks at work? What if your IT is just making an odd noise? Well, you may call your maintenance team. But what if it’s an emergency but they are all tied up? IT Maintenance can’t be everywhere at once. These issues raise a few questions: Who is really responsible…
The Basic Monthly Checklist to IT Maintenance
By jade streifert |
In any industry, It is important to be educated about the general threats to your IT infrastructure. If you are unfamiliar, you may want to read up on security issues that businesses like yours are facing, as well as power and cooling issues that might put your systems at risk. Having even a basic understanding…
Windows 10 Pro for Workstations
By jade streifert |
Microsoft has announced a new version of Windows 10. The Windows 10 Pro for Workstations is a high-end edition that offers support for server grade hardware. This version is designed for security against data corruption and is capable of handling large workloads and information. It also offers the fastest read/write speeds with support for additional…
Choosing the Right Amount of Access for Administrators
By jade streifert |
Carefully assigning the right amount of administrator access to company employees will help to prevent your datacenter from attacks. Most admins really only need moderate access. By understanding this differentiation and putting these settings in place, you reduce the risk of network intrusions. Strict Policies for Accessibility The horror stories have been heard many times…
How Financial Services Network Security Strategies Have Recently Evolved
By jade streifert |
A Great Read from Our Partner Fortinet by Bill Hogan | Aug 03, 2017 | Filed in: Industry Trends Network security has become increasingly complicated for financial services providers due to the popularity of the Internet of Things (IoT) and consumer desire to access valuable data on various mobile devices. While financial institutions are transitioning…
Choosing the Right Server for Your Business
By jade streifert |
Whether you are a small business trying to manage your applications, or a larger company trying to manage your applications, expanding your datacenter, adding security to your existing networking, choosing the proper server hardware can become a challenging process. While servers can do amazing things, they are not all created equally nor are they all…
About Our Blog
CCNY Tech has been in the IT industry for over 25 years and has some of the most knowledgeable technicians and staff. We wanted to reach out to our customers and personally answer their questions with our best suggestions and advice. We specialize in a wide range of IT services and products, and we want to bring that experience to you.
Our blogs are meant to serve as a guide, not just for those looking to improve their network, but for anyone who wants to learn more about IT. We love helping our customers and are always happy to hear from you. If you have any questions or any topics that you are hoping to learn more about, leave us a message and we’ll do our best to create a blog that can help.