Blog

Categories

Hybrid Cloud Computing - CCNY Tech

Hybrid Cloud Technology and Storage

Hybrid cloud services and storage are … Read more

Update Alert: Office 365 TLS Version Changes

For security reasons, starting October 31, … Read more

5 myths of donating IT gear

The 5 Myths of Donating IT Equipment

Donating IT equipment is a bad … Read more

Cyptocurrency Resource Theft

Cyber criminals hijacking computing resources to … Read more

Wifi Protection tips

Network Tips: Keeping Your Wi-Fi Network Protected

Here are some security tips for … Read more

Modern SMB Cybersecurity

There is no doubt that malware … Read more

Careers in Cyber security CCNY Tech

Cybersecurity Talent Shortage

With Cyberattacks on the rise, it … Read more

What You Need to Know About WiFi Attacks

There have been a number of … Read more

Revolutionizing the Workplace

Technology is quickly becoming intertwined in … Read more

Ransomware Defined

Ransomware attacks have become a growing … Read more

Preventing Vulnerabilities from Entering Your Network

HP is a very common name … Read more

Five Networking Mistakes You Can Easily Avoid

When managing a network, it can … Read more

The Latest on the Data Breach at Uber

UBER Data Breach Was Not Reported … Read more

What is a Computer Worm?

Although ransomware attacks have been the … Read more

Why Hybrid Cloud is the Future of Enterprise IT

Hybrid cloud is flexible and versatile; … Read more

Should You Be Concerned About The Ransomware Threat?

Many are wondering if the recent … Read more

Google Chrome to Label HTTP Pages ‘Not Secure’

It may be time for your … Read more

windows versus linux blog ccnytech

Small Business: Compare Linux VS Windows

Choosing an operating system (OS) has … Read more

A Secure Transition to the Cloud for Businesses

There are a number of benefits … Read more

Becoming Efficient with IT Asset Management

IT administration is becoming increasingly more … Read more

Managed IT Services vs. Internal IT Staff

Many companies without full-time IT staff … Read more

Guide to IT Security Awareness

IT security is essential and becomes … Read more

The Best Ways to Get Rid of Unwanted Data

The data that you store is … Read more

Signs of Bad IT Architecture

It’s important to constantly self-evaluate your … Read more

Equifax Data Breach: Simple Steps to Improve Your Cybersecurity

The Equifax data breach, and attacks … Read more

8 Ways to Shrink Your IT Budget Without Losing Productivity

It’s very easy for a tech … Read more

The Equifax Attack and How it Impacts Your Data Security

Around 143 million American consumers were … Read more

8 Benefits of Using a Professional Technology Services Company

A company’s IT can be a … Read more

4 Myths About Buying Refurbished IT

While buying refurbished IT can mean … Read more

10 Questions to Ask Yourself About Your Business

Can your company risk data loss, … Read more