Discover what great technology looks like!

As Marketing Coordinator at Techworks, Yelena adds creative flair to the world of technology. She digs into innovative ways to spread awareness of new services and programs and is here to get the word out to you.

Potential Security Threat: baseStriker Office 365 Vulnerability

hacker

There is a recently discovered Office 365 vulnerability that takes advantage of a flaw in Microsoft’s security, including it’s advanced services (ATP, Safelinks, etc). The method, called baseStriker, allows hackers to split malicious links into two separate types and lines of code to disguise its content. Microsoft’s security system currently scans the two incomplete links individually and is thus unable to identify them as malicious.

0 Comments
Continue reading

Website Access Blocked Due to Akamai Settings

coverimage

Is there a website you frequent that is suddenly not allowing you access anymore? It may be due to policies set up through Akamai Technologies.

0 Comments
Continue reading

Protect Your Business from Digital Threats

bigstock-Computer-Hacker-Silhouette-Of-97521494-300x300

National Small Business Week is April 29 to May 5! According to the United States Small Business Administration, "more than half of Americans either own or work for a small business, and they create about two out of every three new jobs in the U.S. each year."

You and other small and medium-sized business owners play a critical role in the American economy. That makes your network a prime target for hackers. This National Small Business Week, take a moment to reflect on the role technology plays in your company.

0 Comments
Continue reading

March 31 is World Backup Day

wbd

Small and medium-sized business owners must take every precaution against cyberattacks, and World Backup Day is the perfect time to assess the cybersecurity tools in your arsenal. In the current high-threat environment, it is good for business to add as many layers of digital protection as possible. That’s where File Folder Sharing (FFS) comes into play.

0 Comments
Continue reading

Mobile Safeguarding: The New Malware Prevention Practice

mobile

Mobile malware attacks skyrocketed last year. In just the first quarter of 2017, McAfee had already detected more than 1.5 million new incidents of malware specifically targeting mobile devices. By January 2018, Google had removed 60 apps from its Play Store due to malware.

0 Comments
Continue reading

Five Signs That You’ve Been Hacked

hacked

January 28 is Data Privacy Day, and the New Year is the right time for implementing resolutions and fresh starts. Have you resolved to be more vigilant in 2018? Your small business cannot afford to overlook the dangers posed by hackers who are getting more sophisticated every year. But how do you know if you’ve been hacked?

0 Comments
Continue reading

Is a BYOD Policy Right for Your Business in 2018?

shutterstock_214293535

As 2017 winds down, it is time to forecast the workplace technology trends for 2018 and anticipate how these trends can impact your small business. We are in the business of making sure you are prepared for what the changing technology environment will throw your way.

0 Comments
Continue reading

Shadow IT - The Risk Lurking in Your Company’s Devices

shadowITicon

Do you know every web application your employees are using? There is a high probability that your workforce is utilizing many devices and applications without explicit approval. Collectively, these programs and devices are called Shadow IT. Shadow IT is essentially any application employees download or IT service they sign up for without vetting by your IT team. There was a time in business when any piece of software would go through a thorough vetting process. These days, times have changed.

0 Comments
Continue reading

Are “Zombie” Servers Draining Your Precious Resources?

ZombieVMs3_ico_20171019-183610_1

Have you ever heard that loud rumbling noise coming from your server room?  Is it your IT infrastructure hard at work helping you to increase profits or is the sound of the “zombie” server?  A zombie, or comatose, server is a physical server that is running but has no external communications or visibility and contributes no computer resources; essentially it consumes electricity but serves no useful purpose.  For something you have most likely never heard of; it is a big problem. 

0 Comments
Continue reading

Increase Security Through FFS

data-security-image

Ransomware attacks continue to make headlines therefore, being proactive is critical. Hospitals, universities, SMBs and even government offices have found themselves a victims of these attacks. You must take every precaution against Ransomware attacks, especially as they become more and more frequent. In this climate of threats, it is necessary to add as many layers of protection as possible. That’s where File Folder Sharing (FFS) comes into play. 

0 Comments
Continue reading

Network Assessments are a Business Must!

Network Assessments are a Business Must!

Keeping your organization running smoothly and moving forward can sometimes feel like a juggling act.  Personnel issues, supply chain snags, and long term planning; your days can just fly by.  It is tempting to just put your IT network in the back of your mind and only deal with it when problems arise.  However, unless you have performed a full Network Assessment you could be heading for trouble. 


A Network Assessment is a complete review of all your organization’s existing IT infrastructure, security protocols, management, and performance.  Once you have a comprehensive view of the state of your IT, you will be able to identify areas of improvement and make strategic business decisions.  Don’t wait until you are contemplating a big project or until your organization has grown to the point that you aren’t quite sure of exactly what is going on throughout your network; by being proactive, problems will be caught early, solutions found, and your network’s performance can be tracked over time.

The four main areas a Network Assessment will help identify:

  • Weaknesses in your cyber security protocols that need immediate attention to avoid any adverse impacts to your operations and networks.

  • Overused or underused technology resources. The technology needs of your teammates can differ widely and some departments may require more network resources than others.  By looking at your entire system you will be able to optimize your resources.

  • Bandwidth bottlenecks.  As more and more organizations move their operations into the cloud, more bandwidth is oftentimes required.  Streaming videos, running programs, and downloading files can all slow down your network. 

  • Advantages and potential problems of rolling out new technologies.  A full Network Assessment will allow you to plan for your future technology needs by identifying how any changes will fit into your current framework.  What should the timeline for any improvement be?  What integration points do you need to keep in mind or prepare for?  With a full Network Assessment, you can employ a strategic approach to your technology plans rather than just keeping up with your organization’s needs.

A full Network Assessment is key to any comprehensive technology strategy.  Don’t drop the ball when it comes to your IT.  Your technology is too important for you to ignore.  Get Techworks Consulting, as your IT partner.  We will perform a Network Assessment across your entire IT environment.  Together, we will map out a course that will continue to move your organization forward. 

Stop trying to juggle your IT needs!  Contact Techworks Consulting!

0 Comments
Continue reading

So What is Ransomware, Exactly?

So What is Ransomware, Exactly?

Cryptolocker, Wannacry, CryptoWall, Locky, Winlocker, and KeRanger, the news has been full of these scary sounding programs.  Ransomware can strike fear into the heart of any office manager and business owner.  Once your organization becomes the victim of a Ransomware attack you will be facing sleepless nights, technology headaches, and days or weeks of trying to untangle the damage the hack has caused.  By now, most people know the best way to handle a Ransomware attack is to avoid one in the first place; by installing the latest patches and software updates, educating end users to avoid clicking on unfamiliar links, and not connecting to public Wi-Fi.  While many people are gaining an understanding on how to prevent an attack; most have a limited idea of what exactly Ransomware is.  Ransomware is a type of malware.  Instead of corrupting or deleting your files or poking around in your systems to gain information about your organization; this malware locks you out of your system or denies you access to your data unless you pay the hacker a ransom.

0 Comments
Continue reading

Declare Your Independence from IT Worry

Declare Your Independence from IT Worry

 This 4th of July as we celebrate our nation’s independence, declare your independence from IT worry!  With Techworks Consulting, you can rest easy knowing that we have your back and are working in your best interests.

0 Comments
Continue reading

VIDEO: Spring Cleaning Your Business

Now that it's getting warm again, it's time to do some spring cleaning. That shouldn't just mean your home, but also your business. When was your last Comprehensive Network Assessment?

Our first step is to develop a full understanding of your business needs, present environment, security needs, and growth plans. We continue the assessment with a thorough evaluation of your network to find factors that may be detrimental to your business’ productivity.

We want to make sure your network is running at industry best practices. Call us today (631) 285-1527 to set up a consultation.

0 Comments
Continue reading

Delays Can Cost You

Delays Can Cost You

Your days are filled with making decisions that will guide your business into the future. It is easy to put your IT needs on the backburner, but that will lead to days spent putting out IT fires rather than focusing on your growth.

0 Comments
Continue reading

Is your refrigerator secure?

Is your refrigerator secure?

No, we're not kidding. Technology has advanced to the point where previously simple appliances have the possibility of connecting to one another through your network. This is called the Internet of Things (IoT).

 

0 Comments
Continue reading

How to Protect Your Business from E-mail Spoofing Scams

b2ap3_thumbnail_Internet_Explorer_Web_Browser_60162-1.jpg  Imagine you got an e-mail from your CEO asking you to wire money to a new vendor account. This is an unusual and out-of-character request, but he's your boss so you shrug it off and wire the money. The next day your CEO says he never sent you anything. Turns out, his e-mail was spoofed and that money was stolen. 

0 Comments
Continue reading

Support for Older Versions of Internet Explorer Ends on January 12, 2016

b2ap3_thumbnail_Internet_Explorer_Web_Browser_60162-1.jpg

We make it a priority to keep our clients informed of the latest happenings to ensure they are always up to date and secure. Note: All current Managed Service customers do not need to be concerned as our automated patch policies already take care of any needed updates. However if you have any questions or concerns, please reach out to us.
 
What is end of support?
 
According to Microsoft, "Beginning January 12, 2016, only the most current version of Internet Explorer available for a supported operating system will receive technical supports and security updates. Internet Explorer 11 is the last version of Internet Explorer, and will continue to receive security updates, compatibility fixes, and technical support on Windows 7, Windows 8.1, and Windows 10."
 
 
Microsoft went on to say, "Running older versions of Internet Explorer after January 12, 2016 may expose you to potential risks, such as:

Security: Without critical browser security updates, your PC may become vulnerable to harmful viruses, spyware, and other malicious software which can steal or damage your business data and information.

Lack of Independent Software Vendor (ISV) Support: Many software vendors no longer support older versions of Internet Explorer. For example, Office 365 takes advantage of modern web standards and runs best with the latest browser.

Compliance: Businesses that are governed by regulatory obligations such as HIPAA should conduct due diligence to assess whether they are still able to satisfy compliance requirements using unsupported software."

 
Need help?
 
Unsure of what browser you are using? Go on https://whatbrowser.org/. It will tell you the browser you are using, whether you have the latest version or not, and which version you have.
 
If you would like more information, need any help updating your browser, or answers to any questions concerning this matter, please do not hesitate to call us at (631) 285-1527 or e-mail us at
 
0 Comments
Continue reading

What is your Identity Worth to You?

thumb identityYour identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

0 Comments
Continue reading

Disaster Recovery and Why it Matters to Long Island Businesses

When you mention the term 'disaster recovery,' most people think about the big ground-shattering events like earthquakes, fires, floods, tropical storms, etc. While these natural events are certainly disasters and devastating in their own right, smaller things can constitute as a disaster for your business, and they aren't seasonal.

0 Comments
Continue reading

Contact Us

Learn more about what Techworks Consulting, Inc. can do for your business.

Call Us Today
Call us today
(631) 285-1527


Headquarters
760 Koehler Ave, Unit #3
Ronkonkoma, New York 11779

HIPAA Seal of Compliance” width=

HIPAA Seal of Compliance” width=

Latest Blog

How seriously does your business take data privacy? Can you back up your answer with concrete examples of what you do to prioritize that notion? Today, we face a serious threat to both individual and consumer data privacy, so we want to tak...
TOP